JAMB Computer Science Past Questions & Answers - Page 35

171.

In Boolean algebra, the bar sign (-) indicates ....................

A.

OR operation

B.

AND operation

C.

NOT operation

D.

None of the above

Correct answer is C

In modern Boolean algebra, we use the plus (+) symbol to mean OR, the dot (•) symbol to mean AND, and a bar above a variable to mean NOT

172.

When an input signal 1 is applied to a NOT gate, the output is ..................

A.

0

B.

1

C.

Either 0 & 1

D.

None of the above

Correct answer is A

In a NOT gate, no output (0) is there when an input (1) is there

173.

Destruction of files for malicious reasons such as access by fraudulent people is classified as being

A.

modified

B.

accessed

C.

destroyed

D.

unauthorized access

Correct answer is D

Access to an information system or network that violates the owner or operator's stated security policy is considered unauthorized access

174.

___________ is when someone steals another persons identity.

A.

Cyber bullying

B.

Identity Theft

C.

Identity Phase

D.

Cyber Know How

Correct answer is B

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964

175.

What is the etiquette one should follow while working online?

A.

Anything goes . . . providing he/she remains anonymous

B.

Netflix

C.

Netiquette

D.

Piracy

Correct answer is C

Netiquette, which is a portmanteau of "net" and "etiquette," refers to using courtesy and politeness when communicating with others online