Challenge your competence level in computers, computing, algorithms, hardware and software with these Computer science questions and answers.
The following are the methods of file security except
hacking
use of password
Use of back up
Use of Anti-virus
Correct answer is A
The methods of file security are
- Use of back-ups
- Use of anti-virus
- Password
- Proper label of storage devices
What protocol is used between Email servers?
SMTP
SNMP
FTP
POP
Correct answer is A
The Simple Mail Transfer Protocol is an internet standard communication protocol for electronic mail transmission
What is the function of the escape key ?
to shutdown the computer
to start an application
to interrupt or cancel the current process or running program
to delete a file/folder
Correct answer is C
Escape key can perform various functions like interrupting or cancelling the current process or running program or close a pop-up window
What category of application package does microsoft excel belong to ?
Word processing package
Graphics packages
Database management packages
Spreadsheet packages
Correct answer is D
Microsoft Excel is a spreadsheet package. It is used for storing, organizing, and manipulating data. It provides tools for data visualization such as charts and graphs. Word processing packages like Microsoft Word are used for creating, editing, and formatting text documents. Database management packages are used for storing, retrieving, and managing data in a database. Graphics packages are used for creating and editing images, drawings, and illustrations
The following are input devices except
mouse
monitor
Keyboard
joystick
Correct answer is B
The monitor is an output device, not an input device. Input devices are used to input data into a computer system for processing. Examples include a keyboard, mouse, joystick, etc. On the other hand, output devices are used to display or output the processed data. Examples include a monitor, printer, etc.
The logic gate in the figure above is
XNOR gate
NOT gate
XOR gate
OR gate
Correct answer is C
It's an XOR gate
denoted by Z = A ⊕ B.
A set of moral principles that regulate the use of computers is called
cyber security guidelines
computer ethics
computer safety laws
computer rules
Correct answer is B
Computer ethics is the term used to describe a set of moral principles that regulate the use of computers. It involves questions related to privacy, accuracy, property, and access
Head of Programme & Budgeting Division (AfCDC) at the African Union
ISO Administrator at Deepwater Engineering Limited
Account Officer at Deepwater Engineering Limited
Key Accounts Manager at Paystack
Project Coordinator at the African Union
Project Coordinator (AfCDC) at African Union (AU)
Control Systems Engineer - DCS / SCADA at Thomas Edin Limited
Instrument Specialist at Thomas Edin Limited
Senior Electrical Instrumentation & Control Engineer at Thomas Edin Limited
Distribution Control System Specialist at Thomas Edin Limited