(a) Use the Fig 1 to answer questions (i) to (iv)(i) What does Fig 1 represent?(ii) Identify two output components in Fig 1.(iii) Give the names of the parts labelled III, VI, VII.(iv) State one precautionary measure tha…
See more
2017
(a) A teacher asked a student to capture and print out a one-slide presentation assignment using, MS Word, showing everything on the screen.(i) What keys or combination of keys can be used to carry out this operation?(ii…
See more
2017
(a) Define the term Software Maintenance.(b) List four types of Software Maintenance.(c) State our importance of software maintenance.
See more
2017
Mr Okafor has a company that specializes in the production of beverages with headquarters in Abuja. He intended to monitor the sales and transactions in the company's branches across Nigeria as well as interact with his…
See more
2017
(a)(i) What is computer Ethics? (ii) State three computer room management ethics.(b) List five laboratory rules and regulations.
See more
2017
(a) State four classes of computer based on size. (b) Define the term Information and Communication Technology (ICT). (c) Highlight three wys (ICT) has impacted on the society.
See more
2017
Which of these operations would not improve the performance of a parallel database system?
See more
2017
Maintaining the value and content of data is part of data
See more
2017
Which of the following is not an advantage of file organization?
See more
2017
What file organization would require that all the five (5) records be read before the 6th record is written?
See more
2017
Which of the following is not an effect of computer virus?
See more
2017
Which of these methods would delete a relationship defined between two tables in MS Access?
See more
2017
Which of the following is used to retrieve specific information from database tables?
See more
2017
Which of the following is not an anti-virus?
See more
2017
A computer professional who studies an existing system with a view to evolving a computer-based system from it is called?
See more
2017
Safety measures to be observed when using the computer include all of the following except
See more
2017
Which of the following is safety measure in the computer laboratory?
See more
2017
Commonly accepted practices, rules or methods in computing are called
See more
2017
Which of the following is not a good computer maintenance practice?
See more
2017
Which of the following is one of the tools used to maintain the computer