INSTRUCTION: Answer all the questions.
Answer: a. First generation
Answer: c. Infallible
Answer: b. Motherboard
Answer: d. Modem
Answer: c. Compiler
Answer: b. Bug
Answer: d. Worm
Answer: a. Disk operating system
Answer: b. Central processing unit
Answer: a. Modem
Answer: b. Basic input output system
Answer: a. Programs
Answer: c. ESC
Answer: d. F12
Answer: b. ROM
Answer: c. Analyzing the data or information
Answer: c. Sharing copyrighted files without permission breaks copyright laws
Answer: a. Hacker
Answer: a. Downloading
Answer: c. 202
Answer: A cell is the intersection of a row and column in a spreadsheet. Example: A1
Answer: A spreadsheet is a software application used for organizing, analyzing, and storing data in tabular form. Advantages: 1. Easy data manipulation, 2. Automatic calculations
Answer: A field is a single piece of data; a column in a table.
Answer: A DBMS is software used to store, retrieve, and manage data in databases.
How this project complements or add to other similar initiatives
Before now, there have been various verification process of works especially those linked to the payroll system of the state. But it is evident that majority of these verification processes were manual, irregular and not updated at a consistent basis which gives room to returning to where we were coming from.
At intervals which most time on yearly basis, new recruitments are done at various departments of the civil service in the state which often takes place after a verification process has been concluded and these new recruits are not properly verified into the system before handling them appointment letters.
This gives another chance to the fraudulent ones to use this open opportunity to create more ghost workers and collecting salaries on ‘their’ behalves.