ANSWERS WILL BE POSTED SOON.. PLEASE CHECK BACK BY SOON..
1A 2D 3A 4A 5B
6A 7E 8C 9C 10C
11B 12D 13D 14E 15E
16C 17A 18B 19B 20D
21C 22E 23C 24A 25A
26D 27A 28A 29D 30A
31C 32A 33B 34A 35E
36E 37B 38D 39E 40A
41D 42B 43D 44B 45B
46B 47A 48B 49E 50E
51E 52E 53D 54C 55D
56S 57B 58D 59E 60A
10 REM “Program to calculate the perimeter of a circle”
20 INPUT “R “
30 LET P1 = 22/7
40 LET P = 2 * P1 * R
50 PRINT P
LET statement is used to assign a value to a variable.
REM statement is used to give the remark OR the comment within the program.
INPUT statement allows input of values after the RUN command is given.
4bi)Looping is the process whereby a software program repeat the same institution or processes the same information and over until it relieves the order to stop
ii)High level language TRANSLATOR compiler
Assembly Language Translator Assembler
Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. This is usually only for a limited time.
spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers, complicating the process of tracking down the spammers.
Malware is short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
hacking:In computer science , hack verb means gain unauthorized access to computer data: to use a computer or other technological device or system in order to gain unauthorized access to data held by another person or organization.
Encryption is the most effective way to achieve data security . To read anencrypted file, you must have access to a secret key or password that enables you to decrypt it.
ii)frequent crashes and freezes
iii)excessive drive or processor use
iv)unfamiliar programs and pop-ups
A network topology is the pattern in which nodes (i.e., computers, printers, routers or other devices) are connected to a local area network (LAN) or other network via links
3bi)Web server is a computer system, which provides the web pages via HTTP (Hypertext Transfer Protocol).
Web browser is a client, program, software or tool through which we sent HTTP request to web server.
Hub connects multiple Ethernet devices together, making them act as a single segment.
Switch is used to connect various network segments.
6i) Collation is the assembly of written information into a standard order
Collation is a fundamental element of most office filing systems, library catalogs, and reference books.
ii)Information processing is the change (processing) of information in any manner detectable by an observer. As such, it is a process that describes everything that happens (changes) in the universe, from the falling of a rock (a change in position) to the printing of a text file from a digital computer system
iii)Information Analysis is a vital function in both government and the private sector. Analysts identify, obtain, analyze, and synthesize information to provide insights and advice to policymakers on critical decisions they must make.
iv)The gathering of relevant and up-to-date information is a key business process. Information consists of organised facts and figures that have meaning within the context that the information is intended to be interpreted by people. Information is thus a valuable business commodity, and frequently businesses pay money for up-to-date and relevant information.
6bi)A presentation program is a software package used to display information in the form of a slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the content.
d) plain text editor
Click Here To Like Our Facebook Page