0% found this document useful (0 votes)
54 views

CSC 101 Pq&a

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
54 views

CSC 101 Pq&a

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
— y FEDERAL UNIVERSITY, OYE EKITI { DEPARTMENT OF CoMPUTER SCIENCE \ FIRST SEMESTER EXAMINATION 2015/2016 ACADEMIC SESSION Course Title: Introduction to Computing Course Code: CSC 101 Credit Units: 2 Instruction: - Answer all questions in Section A and any three @3) questions in Section B - ‘Time Allowed: 2 hours — / SECTION A 1 se ‘The use of computer to carry out crime related activities i called {a) stealing (b) Automates Stealing (c) Cybercrime (6) Tech-based bugle ~ isan intersection between computational system anc social behavior {@} Browsing _(b) Social Computing (¢)Socio-Tech’ (4) All of te above 43. The following are means of preventing Cyber atcack except -nw-en = (a) Using Updated Antivirus (b) Downfoading software from trsted sites only (Ke passwords with only trustes people () Avoid clicking unnecessary links on webpages {a system of moral standards used as guideline for computer users {Gi Computer Ethics. (o) Computer Norms fe)Gybertaw (0 System Standard “The fraudulent practice of using another person's name and personal information In order to.cory out Computer related task is called... {2} impersonation (b) CyberSnadowing (identity Theft (None of the above isthe repeated use cf electronic comm incstions to haras or frighten someone {@) insulting (b) Cyberstalkine (c)Cyberpoking (6) Cybertigh 7 is the right of indivicusl or companies to deny of restrict the collection and use of E information about them, {a). Privacy (b) Denial of Service (ec) Blocking (4) Firewall a.” Gagthorted copying, duplication or acquisition of intellectuat property referred to-as {a) Reproduction. (b) Expansion — (c)Piracy (8) Anti-Autheriity 3, Which ofthe following Is used to control network access to a system? (a) Firewall (b) Trafficator (c)Adware (2) Malware 40, Which generation of computers marked the bepising of the use of Keyboard for input of data and i monitor for output? (2) Fist (b) Second () Third - (8) Fourth ih 11 eruitors are special features of which generation of computer classifications? ; (a) First (b) Second {c) Third (d) Fourth eer eeetpnology forthe Third generation of computer classification is associated. GWT abe ey Teansbtors (€)_ Integrated Creuit(C) (a) None of the above 2a esa Tobe ing asso! cgtl computes istraditonaly the fastest and most expensive? Tehar the follows ciaicomputers _(@) MieroComputers (a) Super Computers 1 aan nn egitl compute 5st handed by what aspect of the CPU? toy aww © & (6) Calentator Operating System isan example of Operating rie san ME iy pram (Stem Sofware (4) General puro software 16. vn eee: of tne CEU contol the atte! he operatinsof the microprocessor? f) acu yy cv > () AW ATE 2 17. Which spect he computer memory ca UE described as voit? (0) ROM) Ram fc) isk (0) TAPP oe WW compating aews is conside eoriy Greek and Rorcan civilization” {2} rascals active (p}Leibnia’s Machine © 39) is regard! as ine first program fa) Abacus (b)ENIAC (c} Colossus (6) 2o=The zomeuter progran to compute the HEFT! we (a) Charles bobyage (bj Jabn-Atsnasoft n. ib an example of a conrputer but using vacuum jay atanassffBeley Machine {ByTEO: = ZENPDPD na. aheat pronosed to determine ix computer can thnk scaled fel Diterence Engine Test (0) Turing Test [cL Reasoning E aye fest goneral purpose computer designe” o handle both puma and rex val (a) aka T fe. Harvard Market (0) ENIAC ena (a)URIVAC en isthe wilds Wrst elecitonic agit commute’ 2 Je) Atvoarotéerry compas —topananeaténaine. mec (22 Behe vacuum tbe wos invented by the Battin ee a ceckene sp alrPming fe) nn Tug in fares S3F 2986 26. Tue scan integrated “oencinereei ase So vee tracing 12 Coma vegeta Sconce cari aot an tet ig we Sem ecw 1 pat ofthe tolowi wis ened? fp) Maite (mer. 4 rupenvctermento! 1 oeagnramereen cam” ON Hee eernenrl acanmgrtanansteer YS) a) eal cone ee eee) Fre a ne ane goes Tie lew eee tapes! 5a gy premettots ed meres enaert 7 Sticks and Stb nes (b) Pape and Pencils sere po coe and Fewchons (6 Ese¥ 906 wai et a folowing ishot palt of te componatts df= HOW ‘ {oh networt secoupe. (Ht procesing “10 A new ee pecan a a iifeonasnar emcee {ol argumentative Gp rnpine’orocesing speeds are measur!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy