2019/2020 Waec SSCE Computer Studies Expo Questions and Answers
2019/2020 WAEC SSCE COMPUTER STUDIES EXPO QUESTIONS AND ANSWERS FOR MAY/JUNE EXAMINATIONS
Computer -Obj
1ADBBBDBDBB
11CADDBCDCAD
21BBDDADAAAB
31DADAAACDAC
41BACDAACADA
*
*
(1a)
firewall is a system designed to prevent unauthorized access to or from a private network. In other word You can implement a firewall in either hardware or software form, or a combination of both.
(1aii)
(i)If you are using Windows XP, always turn on the firewall.
(ii)Always run all necessary latest updates & service packs (all windows! including all your programs & software!—keep them updated)
(1b)
(i)feasibility study- this extent to which the required software performs a series of steps to solve business problems and user requirements. This feasibility is dependent on human resources (software development team) and involves visualizing whether the software will operate after it is developed and be operative once it is installed.
(ii) Design – The prerequisite for this phase is the requirement specification document. In this phase, the system and software design are prepared based on the given requirements. The system design helps in specifying hardware and software requirements and overall defines the system architecture.
(iii) Maintenance –Problems arises once the customers start using the product. These problems need to be fixed from time to time. This is what is covered in the maintenance phase. The service engineers oblige the customers by solving the issue.
(2a)
(i) Add all basic details to every song (ie tag) : title, artist, album name, album artist, track number, year, genre
(ii) Add artwork for every track
(iii) Add lyrics for every track
(iv) Add genre category to each track
(2b)
(i) Copy
(ii) Move
(2c)
(i) file: is a computer resource for recording data discretely in a computer storage device. In other words Just as words can be written to paper, so can information be written to a computer file. Files can be edited and transferred through the internet
(ii) record: is a collection of fields, possibly of different data types, typically in fixed number and sequence.
(3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.
(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits
For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits
(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes
(3ai)
A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device.
(3aii)
Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
(3bi)
For 2kb
1 byte = 8 bits.
1 Kilobyte = 8 x 10³ Bits.
1 Kilobyte = 8 x 1000 Bits.
1 KB = 8000 bits.
.:. 2kb = 8000 x 2 = 16,000bits
For 2mb
1mb = 1000kb
.:. 2mb = 2000kb
Where 1kb = 8000 bits,
Then to find 2000kb in bits
= 8000 x 2000
=16,000,000 bits
(3bii)
The total storage of the two devices in bits = 16,000 + 16,000,000
= 16,016,000 bits
.:. Changing to bytes
= 8 bits = 1 byte
.:. 16,016,000 bits = ?
= 2,002,000 bytes
(4ai)
Flowchart
(4aii)
I= terminator
J= input/output
K= decision
L= processing
(4bi)
Document stage is one of the most important activity in the system development life cycle that ensure the continuity of the system
(4bii)
(i) portability
(ii) readability
(iii) flexibility
(iv) efficiency
(v) structural
(5ai)
Encryption is a process in which information is converted into a form which cannot be understood by unauthorized user.
(5aii)
– Biometric
– Password
(5aiii)
– Encryption hides your data from curious eyes
– Prevents unwanted access to documents and e-mail messages