Computer Science questions and answers

Computer Science Questions and Answers

Challenge your competence level in computers, computing, algorithms, hardware and software with these Computer science questions and answers.

81.

The following are the methods of file security except

A.

hacking

B.

use of password

C.

Use of back up

D.

Use of Anti-virus

Correct answer is A

The methods of file security are
- Use of back-ups
- Use of anti-virus
- Password
- Proper label of storage devices

82.

What protocol is used between Email servers?

A.

SMTP

B.

SNMP

C.

FTP

D.

POP

Correct answer is A

The Simple Mail Transfer Protocol is an internet standard communication protocol for electronic mail transmission

83.

A set of programs that direct computers to perform specific information processing activities for end users is

A.

System software

B.

Operating System

C.

Application software

D.

Translators

Correct answer is C

Application software is the set of programs necessary to carry out operations for a specified application

84.

What is the function of the escape key ?

A.

to shutdown the computer

B.

to start an application

C.

to interrupt or cancel the current process or running program

D.

to delete a file/folder

Correct answer is C

Escape key can perform various functions like interrupting or cancelling the current process or running program or close a pop-up window

85.

A type of application software that combines the abilities of several general purpose applications in one program is ?

A.

Graphics Packages

B.

Integrated Packages

C.

Multipurpose application

D.

Database management packages

Correct answer is B

Integrated Packages is an all-in-one application package that includes word processing, spreadsheet, database manager, graphics and communications

86.

What category of application package does microsoft excel belong to ?

A.

Word processing package

B.

Graphics packages

C.

Database management packages

D.

Spreadsheet packages

Correct answer is D

Microsoft Excel is a spreadsheet package. It is used for storing, organizing, and manipulating data. It provides tools for data visualization such as charts and graphs. Word processing packages like Microsoft Word are used for creating, editing, and formatting text documents. Database management packages are used for storing, retrieving, and managing data in a database. Graphics packages are used for creating and editing images, drawings, and illustrations

87.

The following are input devices except

A.

mouse

B.

monitor

C.

Keyboard

D.

joystick

Correct answer is B

The monitor is an output device, not an input device. Input devices are used to input data into a computer system for processing. Examples include a keyboard, mouse, joystick, etc. On the other hand, output devices are used to display or output the processed data. Examples include a monitor, printer, etc.

88.

A computer code that spreads without the user interaction and can cause network performance problem is

A.

a trojan

B.

a computer worm

C.

a spyware

D.

a computer virus

Correct answer is B

A computer worm is a computer code that spreads without user interaction, they are not always destructive but can cause network performance and stability problems

89.

The logic gate in the figure above is

A.

XNOR gate

B.

NOT gate

C.

XOR gate

D.

OR gate

Correct answer is C

It's an XOR gate
denoted by Z = A ⊕ B.

90.

A set of moral principles that regulate the use of computers is called

A.

cyber security guidelines

B.

computer ethics

C.

computer safety laws

D.

computer rules

Correct answer is B

Computer ethics is the term used to describe a set of moral principles that regulate the use of computers. It involves questions related to privacy, accuracy, property, and access


Sub-categories

JAMB

WAEC

NECO