WAEC Computer Science Past Questions & Answers - Page 71

351.

A computer program that gathers information about a person or organization without their knowledge or consent  is known known as

A.

adware

B.

time bomb

C.

trojan horse

D.

spyware

Correct answer is C

No explanation has been provided for this answer.

352.

Which of the following options is not a similarity between computer file and manual file? Both can 

A.

be accessed

B.

be retrieved

C.

store multimedia

D.

contain information

Correct answer is C

No explanation has been provided for this answer.

353.

The file access method shown in Figure 12 is called 

A.

hashed access

B.

indexed access

C.

random access

D.

sequential access

Correct answer is A

No explanation has been provided for this answer.

354.

To prevent unforeseen data loss, a user must 

A.

edit the data

B.

create the data

C.

backup the data

D.

defragment the data

Correct answer is C

No explanation has been provided for this answer.

355.

The binary number 0.1101 in decimal is 

A.

0.8125

B.

0.8215

C.

0.8225

D.

0.8512

Correct answer is C

No explanation has been provided for this answer.