JAMB Computer Science Past Questions & Answers - Page 49

241.

CRACKING comes under ___________

A.

website service

B.

transcription

C.

computer crime

D.

data security

Correct answer is C

Computer crime. It is the use of a computer as an instrument to further illegal ends. Such as committing fraud, trafficking in child pornography, cracking etc

242.

Encryption helps with what?

A.

Spam messages

B.

identify source of message

C.

Safe delivery of messages to destination without being accessed by a third party

D.

interpretation of message and digital data

Correct answer is C

Encryption deals with the safe transfer of data of information from its source to its destinations, without a third party having access to the information or data being transferred

243.

In any software package, which of the following versions represents a major improvement on the previous version?

A.

1.0

B.

1.5

C.

2.0

D.

2.5

Correct answer is C

Windows 2.0 allowed application windows to overlap each other, unlike its predecessor Windows 1.0, which could display only tiled windows. Windows 2.0 also introduced more sophisticated keyboard-shortcuts and the terminology of "Minimize" and "Maximize", as opposed to "Iconize" and "Zoom" in Windows 1.0. It was also the last version of Windows that did not require a hard disk.

With the improved speed, reliability and usability, computers now started becoming a part of daily life for some workers. Desktop icons and use of keyboard shortcuts helped to speed up work.
 

244.

An inventory management program can assist with ________

A.

distribution

B.

purchasing

C.

planning

D.

all of the above

Correct answer is D

All of the above

245.

Storage which retains data after power cut off is called

A.

Volatile storage

B.

Non-volatile storage

C.

Sequential storage

D.

Direct storage

Correct answer is B

Non volatile storage retains data after power is off because, Non volatile storage is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short or long term basis