Verified NECO computer studies questions & answers 2017 / Obj & Theory / Runz /Expo / bmasterz


Verified NECO computer studies questions & answers 2017 / Obj & Theory / Runz /Expo / bmasterz

(adsbygoogle = window.adsbygoogle || []).push({});


NECO computer studies questions & anwers 2017
NECO computer studies questions & anwers 2017

Computer StudiesComputer Studies NECO Questions 2017 | In this article, I will be showing you past Computer Studies objective and theory random repeatedquestions for free. You will also understand how NECO Computer Studies questions are set and many other examination guides. Stay focus and read through.

Tags : Verified NECO computer studies questions & answers 2017, 2017 neco runs, 2017 neco answers, computer obj & theory, verified neco computer obj, Verified Neco computer Theory, How can i get neco runs,neco expo site, neco runz website, best neco expo site, free neco runz , free neco expo site, Neco computer Obj & Theory Anwers

The National Examinations Council is an examination body in Nigeria that conducts the Senior Secondary Certificate Examination and the General Certificate in Education in June/July and December/January respectively.

** Remember to drop your comment at the comment box with your name so that we can know our active members !


1A 2D 3A 4A 5C 6.7E 8.9.10C 11.12D 13 14E 15E 16 17A 18B 19B 20D 21C 22E 23C 24A 25A 26D 27A 28A 29D 30A 31C 32A 33B 34A 35E 36E 37B 38D 39E 40A 41D 42B 43D 44B 45B 46B 47A 48B 49E 50E 51E 52E 53D 54C 55D 56A 57B 58D 59E 60A
A single-user operating system is a type of system that has been developed and designed to use on a computer.


Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. This is usually only for a limited time.

spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes. Much of it is sent by botnets, networks of virus-infected computers , complicating the process of tracking down the spammers .

iii)Malware is short for malicious
software , is an umbrella term used to refer to a variety of forms of hostile or intrusive
software , including computer viruses, worms, trojan horses, ransomware, spyware , adware , scareware, and other malicious programs.

iv) hacking:In computer science , hack verb means gain unauthorized access to computer data: to use a
computer or other technological device or system in order to gain unauthorized access to data held by another person or organization; a transitive verb meaning cope with something: to succeed at or endure something.

(adsbygoogle = window.adsbygoogle || []).push({});

v) Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

i)Hardware Troubles
ii)Slow Performance
iii)Missing files
iv)Disks or Disk Drives Are Not Accessible

1)Protect Information:
2)Reduce transfer of data
3)Ban unencrypted device:

++ Verified NECO computer studies questions & answers 2017 / Obj & Theory / Runz /Expo / bmasterz

A network topology is the pattern in which nodes (i.e., computers, printers, routers or other devices) are connected to a local area network (LAN) or other network via links

i)Star topology
ii)bus topology
iii)Mesh topology
iv)Ring topology

3bi)Web server is a computer system, which provides the web pages via HTTP (Hypertext Transfer Protocol).


Web browser is a client, program, software or tool through which we sent HTTP request to web server.

Hub connects multiple Ethernet devices together, making them act as a single segment.
 Switch is used to connect various network segments.

 10 REM “Program to calculate the perimeter of a circle”

20  INPUT “R “
30  LET P1 = 22/7
40  LET P   = 2 * P1 * R
50  PRINT   P
60  END

LET statement is used to assign a value to a variable.

REM statement is used to give the remark OR the comment within the program.

INPUT statement allows input of values after the RUN command is given.

(bi)Looping is the process whereby a software program repeat the same institution or processes the same information and over until it relieves the order to stop

(ii)High level language TRANSLATOR compiler

Assembly Language Translator Assembler


i)Collation is the assembly of written information into a standard order
Collation is a fundamental element of most office filing systems, library catalogs, and reference books.

ii)Information processing is the change (processing) of information in any manner detectable by an observer. As such, it is a process that describes everything that happens (changes) in the universe, from the falling of a rock (a change in position) to the printing of a text file from a digital computer system

iii)Information Analysis is a vital function in both government and the private sector. Analysts identify, obtain, analyze, and synthesize information to provide insights and advice to policymakers on critical decisions they must make.

A presentation program is a software package used to display information in the form of a slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the content.

i)Slide master
ii)Slide notes
iv)plain text editor

Keep Refreshing this page for more  answers

  QUERY is use To make a request for information from a database

Popular Keywords on NECO Computer StudiesQuestions

  • neco gce Computer Studies questions
  • neco questions for Computer Studies
  • 2017/2018 neco Computer Studies questions
  • neco Computer Studies past questions download
  • neco Computer Studies questions
  • gce Computer Studies questions 2017
  • neco Computer Studies question
  • Computer Studies questions for gce
If you need us to help you with updated questions and answers at the right time about NECO Computer Studies Examination 2017, kindly provide us your phone number and email address in the comment box below. Also feel free to ask any question pertaining to this guide.
What’s your take on this? We believe this article was interesting right, if yes, don’t hesitate using our share button below to inform – friends and relation via Facebook, twitter or Google+.

Tags: 2017/2018 NECO Computer Studies Questions, 2017/2018 OBJ Questions, NECO, NECO Computer Studies, NECO Computer Studies OBJ and Theory Answers 2017, NECO Computer Studies OBJ Questions, NECO Computer Studies Questions, NECO Computer Studies Questions 2017

(adsbygoogle = window.adsbygoogle || []).push({});


Please enter your comment!
Please enter your name here