JAMB Computer Science Past Questions & Answers - Page 16

76.

A computer code that spreads without the user interaction and can cause network performance problem is

A.

a trojan

B.

a computer worm

C.

a spyware

D.

a computer virus

Correct answer is B

A computer worm is a computer code that spreads without user interaction, they are not always destructive but can cause network performance and stability problems

77.

The logic gate in the figure above is

A.

XNOR gate

B.

NOT gate

C.

XOR gate

D.

OR gate

Correct answer is C

It's an XOR gate
denoted by Z = A ⊕ B.

78.

A set of moral principles that regulate the use of computers is called

A.

cyber security guidelines

B.

computer ethics

C.

computer safety laws

D.

computer rules

Correct answer is B

Computer ethics is the term used to describe a set of moral principles that regulate the use of computers. It involves questions related to privacy, accuracy, property, and access

79.

When records are given a new value, it is called

A.

updation

B.

insertion

C.

deletion

D.

retrieval

Correct answer is A

When records are given a new value, it is called 'updation'. This is a process in database management where an existing record is modified with new data. 'Insertion' is adding a new record, 'deletion' is removing a record, and 'retrieval' is fetching data from the database

80.

Which of the following is used for modulation and demodulation ?

A.

Gateway

B.

Protocol

C.

Modem

D.

Multiplex

Correct answer is C

A modem(modulator-demodulator) is a hardware device that connects a computer or router to a broadband network