WAEC Computer Science Past Questions & Answers - Page 44

216.

INPUT   OUTPUT
P O R
0 0 1
0 1 0
1 0 0
1 1 0

The table above represents the Truth Table for?    

A.

NOT logic gate

B.

NOR logic gate

C.

AND logic gate

D.

NAND logic gate

Correct answer is D

No explanation has been provided for this answer.

217.

Which of the following is not a good ICT security policy?

A.

Re-use of old password

B.

Frequent change of password

C.

Backing up files and documents

D.

Scanning e-mail attachment for virus before opening it

Correct answer is A

No explanation has been provided for this answer.

218.

Which of the following factors limits access to computerized file system? it 

A.

occupies less space

B.

requires regular supply of power

C.

is highly efficient in processing information

D.

provides easy and fast access to information

Correct answer is B

No explanation has been provided for this answer.

219.

Soft boot is initiated by pressing? 

A.

Ctrl + Alt + Del

B.

function key F10

C.

main switch

D.

bootstrap buttons

Correct answer is A

No explanation has been provided for this answer.

220.

The absolute address of cell G5 in a spreadsheet application is represented by?

A.

$G5

B.

G$5

C.

$G$5

D.

$G5$

Correct answer is A

No explanation has been provided for this answer.