Welcome to Schoolngr.com

Home   School   News   C B T   Classroom
Monday, 25 November 2024

RegisterLogin

Computer Studies Past Questions


Question 251:


Running other software on idle computer without the knowledge of the organisation is called theft of ____________

A. Software
B. Computer
C. Computer time
D. Use


Question 252:


Sensitive data can be protected from prying eyes using ____________

A. File permissions
B. File locks
C. Passwords
D. Encryption


Question 253:


The number of input combination for a 4 input gate is ____________

A. 9
B. 8
C. 15
D. 16


Question 254:


When does the output of a NOR gate =0?

A. Whenever 0 is present at input
B. Only when all input =0
C. Whenever 1 is present at input
D. Only when all input =1.


Question 255:


A collection of facts and figures is known to be ____________

A. Data
B. Database
C. Sequenced data
D. Structural data






AboutContact usBack to Top
...

Disclaimer
All Views, Names, Acronyms, Trademarks, Expressed on this website are those of their respective owners. Please note that www.schoolngr.com is not affiliated with any of the institutions featured in this website. It is always recommended to visit an institutions or sources official website for more information. In the same vein, all comments placed here do not represent the opinion of schoolngr.com


SCHOOLNGR - © 2020 - 2024 - Tayo Hammed | Terms Of Service | Copyright | Privacy Policy