Posts

The History of Computers

Image
 

JSS3 COMPUTER STUDIES PAPER III PRACTICAL

Image
  PAPER III (PRACTICAL)   1.   Use Microsoft Word to prepare your Curriculum Vitae (CV) showing the following information ·         Name, Date of birth ,Place of birth, Local Government Area, State of Origin , Nationality, Primary School Attended ,Next of Kin, Next of kin GSM Number ,One Referee (name only)   Note: i.  Items a to j should be bold and information provided should be italicized. ii. The heading CURRICULUM VITAE should be in upper case, bold and underlined   2.   Use Corel Draw or MS Publisher to design a simple letter head paper for your father or any relation’s businesses organization, showing at following information: ·         Use any form of LOGO , Company Name, Address of the location of the company , Our ref and your ref , Telephone or GSM number ·         Use any suitable line to demarcate the heading and body of the paper   3.   Use Microsoft Excel to prepare the table. Do not forget to use formula for average and sum.    

Who is Hacker?

Image
  Who is a Hacker? Types of Hackers A  Hacker  is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent. Symbol Description Ethical Hacker (White hat):  A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration  Testing  and vulnerability assessments. Cracker (Black hat):  A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. Grey hat:  A hac

What is Cybercrime?

Image
  What is Cybercrime? Cyber crime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using   Mobile   phones via SMS and online chatting applications. Type of Cybercrime The following list presents the common types of cybercrimes: Computer Fraud:  Intentional deception for personal gain via the use of computer systems. Privacy violation:  Exposing personal information such as email addresses, phone number, account details, etc. on social media, websites, etc. Identity Theft:  Stealing personal information from somebody and impersonating that person. Sharing copyrighted files/information:  This involves distributing copyright protected files such as eBooks and computer programs etc. Electronic funds

JSS ONE - HISTORICAL DEVELOPMENT OF COMPUTERS

Image
  JSS1 EXAM QUESTIONS  HISTORICAL DEVELOPMENT OF COMPUTERS Exam questions is separated from BECE past questions book year by year. Teachers can use that questions in the lesson to show students.