CHIBYKE.COM


Home | Jamb | Waec | Neco| Post Utme


For More Info Call Us: +2347057918462

Search anything below

GET WAEC COMPUTER ANSWERS 2019 Obj, Theory Full Expo

2019 WAEC Computer Answers Obj / Theory.To see the answers, kindly keep refreshing this page. it will be posted shortly………………….

##NOTE

we are still solving them

Question 1 answers has been corrected.

Computer solutions

1ai. a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls filter traffic between two or more networks and run on network hardware.

1aii.
a) Run defragmentation
b) Run anti-spyware

1bi. Feasibility Study: The purpose of this first phase is to find out the scope of the problem and determine solutions. Resources, cost, time, benefits and other items should be considered here.

1bii System Design: This third phase describes, in details, the necessary specifications, features and operations that will satisfy the functional requirements of the proposed system which will be in place

1biii. Maintenance: The last phase is when end users can fine-tune the system, if they wish, to boost performance, add new capabilities or meet additional user requirements.

(2a)
(i) Add all basic details to every song (ie tag) : title, artist, album name, album artist, track number, year, genre
(ii) Add artwork for every track
(iii) Add lyrics for every track
(iv) Add genre category to each track

(2b)
(i) Copy
(ii) Move.

(2ci)

*File*

A file is an object on a computer that stores data, information, settings, or commands used with a computer program

(2cii)

*Record*

In computer, a record (also called a structure, struct, or compound data) is a database entry that may contain one or more values.

(3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.

(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.

(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits

For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits

(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes

4a.
i) Flow Chart

4aii)
I = Start
J = Input/Output
K = Decision
L = Process

(4bi)
Documentation stage is one of the most important activity in the system development life cycle that ensure the continuity of the system and implementation of the actual programming instructions.

(4bi)

The program development life cycle is a set of steps or phases that are used to develop a program in any programming language.
– Problem Definition.
– Problem Analysis.
– Algorithm Development.
– Coding and Documentation.
– Testing and Debugging.
– Maintenance.

4.bii

Characteristics of Computer

SPEED : In general, no human being can compete to solving the complex computation, faster than computer.
ACCURACY : Since Computer is programmed, so what ever input we give it gives result with accuratly.
STORAGE : Computer can store mass storage of data with appropriate formate.
DILIGENCE : Computer can work for hours without any break and creating error.
VERSATILITY : We can use computer to perform completely different type of work at the same time.
POWER OF REMEMBERING : It can remember data for us.
NO IQ : Computer does not work without

5ai)

Encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

(5aii)

Biometric
Password

(5aiii)

Encryption hides your data from curious eyes

Prevents unwanted access to documents and e-mail messages

YOU ARE TOLD TO ANSWER ONLY THREE QUESTIONS

🔥🔥🔥🔥🔥🔥🔥🔥
OBJ ANSWERS ✅✅✅

*2019 wassce computer study obj*✍✍🔥🔥

1-10 – DCABBAACCD
11-20 – CBADCCAADA
21-30 – BBDAACABBA
31-40 – DDCBCCADCB
41-50 – ABBDACCAAD
completed💯💯✔

*more loading*

#KEEP__REFRESHING____THIS____PAGE___TO___SEE__FULL__ANSWERS###

###Solved By EXAMPROF##

CONTACT/WHATSAPP US ON 07057918462 FOR MORE EXPO.


CLICK TO DROP YOUR COMMENT
Related Posts
About Author
Leave a comment

Enter Your Name (Optional)

Enter Comment Below



Wish to be here, mail your pics and details to chibykewebsite@gmail.com
Copyright ©2010 - 2019
Designed by Chibyke