WAEC Data Processing Past Questions & Answers - Page 26

126.

The malware which appears as a harmless object but attack it's victims at the slightest opportunity is called

A.

Worm

B.

Trojan horse

C.

Macro virus

D.

Logic bomb

Correct answer is B

No explanation has been provided for this answer.

127.

Computer professional bodies in Nigeria include the following except

A.

Internet Service Providers Association

B.

Nigeria Computer Society

C.

Nigeria Information Technology Development Agency

D.

Nigeria Internet Group

Correct answer is D

No explanation has been provided for this answer.

128.

A novice is discouraged from opening the CRT monitor for maintenance because

A.

It cannot be appropriately reassembled after opening

B.

It may harbour pests carrying infectious diseases

C.

It may contain high static

D.

The tube is fragile

Correct answer is C

No explanation has been provided for this answer.

129.

In computing, ergonomics is a term associated with computer

A.

Ethics

B.

Maintenance

C.

Malware detection

D.

Safety measures

Correct answer is D

No explanation has been provided for this answer.

130.

Indiscriminate sending of unsolicited e-mails to many addresses is known as

A.

Plagiarism

B.

Phishing

C.

Pharming

D.

Spamming

Correct answer is D

No explanation has been provided for this answer.