Nabteb Computer Craft Answers 2022 30th November

Nabteb Computer Craft Answers 2022 30th November

NABTEB COMPUTER CRAFT SOLUTIONS

(1a)
Search Engine is software accessed on the Internet that searches a database of information according to the user’s query. The engine provides a list of results that best match what the user is trying to find.

(1b)
Internet is an electronic communications network that connects computer networks and organizational computer facilities around the world.

Or

Internet is a large system of connected computers around the world that allows people to share information and communicate with each other.

(1c)
(Pick any five)
(i) Internet is the best source to get information on various topics to improve knowledge.
(ii) Using internet, we can show our talents and skill to the whole world.
(iii) Most banks now provide their services online, which is fast and secure.
(iv) Online shopping saves time and we can buy all that we don’t find in our local markets.
(v) Internet is a great tool to sell your product/services in the International Market.
(vi) The Internet gives you the facility to work from home and earn money.
(vii) Internet is also a source for donation and funding.

(1d)
(Pick any three)
(i) Google
(ii) Microsoft Bing
(iii) Yahoo
(iv) Baidu
(v) Yandex
(vi) DuckDuckGo

=======================================

(2a)
Digital divide refers to the gap between people with effective access to digital and information technology and those with very limited or no access at all. Digital Divide, or digital split, is a social issue referring to the differing amount of information between those who have access to the Internet and those who do not have access.

(2b)
(i) Uploading means sending data or a file from your computer to somewhere on the Internet.
(ii) Downloading: This is the transmission of a file or data from a web page or computer system to another computer system or storage medium.
(iii) Copying: This is an act of duplicating and transferring the content of a page on the internet to another location.
(iv) Browsing: This is the act of viewing and moving about between documents on computer networks.

(2c)
(i) Governments can significantly reduce the digital divide gap if they reduce the prices of technological devices, internet services, electricity tariffs, and taxes.
(ii) Provision digital access to those in the community who do not have it.
(iii) Schools need to also step up with the governments and introduce technical learning curriculums in the classrooms
(iv) Some solid efforts should make people aware of digital literacy and its benefits.

=======================================

You can also read how to score 200-350 in Jamb 2023

(3a)
A database is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS).

(3b)
(i) Field: a field contains the most detailed information about events, people, objects, and transactions.
(ii) Object: is an option that can be selected and manipulated.
(iii) Table: A table is a collection of related records with a unique table name

(3c)
(i) Hierarchical Database Model
(ii) Network Database model
(iii) Relational Database Model
EXPLANATION
(i) Hierarchical Database Model: Another name for hierarchical database model is tree model(because it looks like a tree in structure) and it specifies that one entity can have more than one owning entity. The main entity is called the parent and the sub entity is called the child. The main entity which is the parent with no owner is called the root.
(ii) Network Database model: The network database model is like the hierarchical database model except that an entity can have more than one parent. A member of the network can have more than one owner.
(iii) Relational Database Model: A relational database model consists of more than one table. That is, it contains a set of related data tables. Examples of software that handle relational database are Microsoft Access and Oracle.

=======================================

(4a)
Spreadsheet is a sheet of paper or electronic program that uses rows and column to display numerical and non numerical data for a business

(4b)
(Pick any three)
(i) It has environment that can make number manipulation easy
(ii) It is somewhat painless
(iii) Experiments can be performed with numbers without having to re-do all the calculation
(iv) It can be updated automatically
(v) It is highly portable

(4c)
(i) It functions only with electricity power
(ii) It requires technical know-how
(iii) It can be relatively expensive to establish

=======================================

(5a)
Computer professional as an individual that possess information and technology competencies, or proven extensive knowledge in computing or has undergone training in various field of information technology

(5b)
(Pick any five)
(i) Computer professionals should have excellent analytical skills that can be applied to solve problems or develop new ideas.
(ii) They should be adaptive to change
(iii) The soft skills of verbal and written communication
(iv) Computer professionals must know many programming languages.
(v) Time management skill and ability to multitask
(vi) Computer professionals must have sharp troubleshooting skills
(vii) Skill beyond information technology such as business and finance.

(5c)
(i) Hacker is a person who breaks into a computer system. The reasons for hacking can be many: installing malware, stealing or destroying data, disrupting service, and more.
(ii) Computer operators: Computer Operator is the person who handles and operates computer in a computer room. He must understand how to use the operating system which is installed in the computer very well.
(iii) Computer programmer: A Computer Programmer is the one that writes meaningful computer programs. He converts project specifications and statements of problems and procedures to detailed local flow charts for coding into computer language.
(iv) System analyst: A System Analyst is the one in charge of analyzing a project or system in order to modify the system or design a new system to ensure compatibility and user effectiveness.

=======================================

(6a)
Computer virus is a self-replicating piece of computer codes or program that can partially or fully attach itself to computer files or applications and cause havoc to the computer. Like any other program, it contains instructions that instruct the computer on a task.

(6b)
(Pick any three)
(i) Boot sector virus
(ii) File virus
(iii) Macro virus
(iv) Multipartite virus
EXPLANATION
(i) Boot sector virus: This replaces or implants itself in the boot sector area of the hard drive. This kind of virus can prevent the hard disk from booting.
(ii) File virus: This kind of virus infects applications. The infected applications spread the virus by infecting associated documents and other applications whenever they are opened or run. This virus is also called executable file virus. It infects programs or executable codes or files with .com or .exe extensions.
(iii) Macro virus: This virus affects Microsoft office applications such as Excel and Word. A document infected with a macro generally modifies a pre-existing commonly used command (such as save) to trigger its payload upon execution of the command.
(iv) Multipartite virus: This infects both files and the boot sector. It is a double whammy (i.e. two bad things that can happen together, or one after the other) that can re-infect the system dozens of time before it is caught.

(6c)
(Pick any two)
(i) A computer virus can be used to steal people’s personal information. Although illegal, this can be very useful and profitable for those stealing and then selling on or using the information gained in this way.
(ii) A virus is able to take control of a person’s computer.
(iii) Online advertising is often targeted by hackers, who make money from virus-related scams (for example ‘click jacking’)
(iv) A virus can be a way for a hacker or programmer to show off his ability.

=======================================

(7a)
Computer security is the protection that is set up for computer systems and keeps critical information from unauthorized access, theft, or misuse.

(7b)
(i) To Protect Personal Information
(ii) To Protect Organization properties
(iii) To Prevent from Data theft
(iv) To Prevent Viruses and Malware
(v) To Stop Unauthorized Access

(7c)
(Pick any two)
(i) Application Security
(ii) Information Security
(iii) Network Security
(iv) Internet Security
EXPLANATION
(i) Application security is the introduction of security features in applications during their development process. Some examples of application security tools are antivirus software, firewalls, web application firewalls, encryption, etc.
(ii) Information security is a set of practices that aim to protect the confidentiality, integrity, and availability of data from unauthorized access and misuse.
(iii) Network security is any activity that aims to protect the integrity and usability of a network and data.
(iv) Internet security is one of the most important types of computer security that come with a set of rules and protocols that focus on specific threats and activities that happen online.

1 Comment

Leave a Reply

Your email address will not be published.


*