Get premium membership and access questions with answers, video lessons as well as revision papers.
(a)The error of typing Kajaido as Kajiado is a transposition error.
(ii) The error of typing 8726 as 8126 is a misreading error.
(b) The above errors can be avoided by using data capture devices such as barcode readers. Optical character readers, digital cameras etc which enter data with minimum user intervention.
Mohaissack answered the question on October 12, 2017 at 11:13
- Describe third generation languages and name two examples.(Solved)
Describe third generation languages and name two examples.
Date posted: October 12, 2017. Answers (1)
- Name four toggle keys on a standard computer keyboard. (Solved)
Name four toggle keys on a standard computer keyboard.
Date posted: October 12, 2017. Answers (1)
- Name four approaches that may be used to replace a computerized Information system. (Solved)
Name four approaches that may be used to replace a computerized Information system.
Date posted: October 12, 2017. Answers (1)
- List two uses of computers in meteorology.(Solved)
List two uses of computers in meteorology.
Date posted: October 12, 2017. Answers (1)
- With reference to quality of print, noise level and cost, compare a dot matrix with a laser printer. (Solved)
With reference to quality of print, noise level and cost, compare a dot matrix with a laser printer.
Date posted: October 12, 2017. Answers (1)
- Give three reasons why system maintenance phase is necessary in SDLC. (Solved)
Give three reasons why system maintenance phase is necessary in SDLC.
Date posted: October 12, 2017. Answers (1)
- State three standard coding schemes used in data representation. (Solved)
State three standard coding schemes used in data representation.
Date posted: October 12, 2017. Answers (1)
- State two characteristics of a computer that is infected by computer viruses(Solved)
State two characteristics of a computer that is infected by computer viruses
Date posted: October 12, 2017. Answers (1)
- State three characteristics of a suitable password. (Solved)
State three characteristics of a suitable password.
Date posted: October 12, 2017. Answers (1)
- Explain how data in a computer system is secured using (i) Password; ...(Solved)
Explain how data in a computer system is secured using:
(i) Password
(ii) User access level
Date posted: October 12, 2017. Answers (1)
- The following are some of the phases in the Systems Development Life Cycle (SDLC): system analysis, system design, system implementation, system review and...(Solved)
The following are some of the phases in the Systems Development Life Cycle (SDLC): system analysis, system design, system implementation, system review and maintenance. State four activities that are carried out during the system implementation phase.
Date posted: October 12, 2017. Answers (1)
- Machine language programs are more difficult to write than high-level language programs. State two reasons for this.(Solved)
Machine language programs are more difficult to write than high-level language programs. State two reasons for this.
Date posted: October 12, 2017. Answers (1)
- A firm operates an order system that coordinates orders, raw materials and inventory across its three factories. Currently the orders are processed manually at...(Solved)
A firm operates an order system that coordinates orders, raw materials and inventory across its three factories. Currently the orders are processed manually at each factory and communicated to the others over the phone. The management intends to computerise their operations. State the first two computer professionals who will be required and their roles.
Date posted: October 12, 2017. Answers (1)
- State three ways in which ICT can be used in shipping control. (Solved)
State three ways in which ICT can be used in shipping control.
Date posted: October 12, 2017. Answers (1)
- State two reasons why it is necessary to use standard furniture in a computer laboratory. (Solved)
State two reasons why it is necessary to use standard furniture in a computer laboratory.
Date posted: October 12, 2017. Answers (1)
- Copyright laws are laws granting authors the exclusive privilege to produce, distribute, perform or display their creative works. It is a legal framework...(Solved)
Copyright laws are laws granting authors the exclusive privilege to produce, distribute, perform or display their creative works. It is a legal framework for protecting the works such as book publishing, motion-picture production and recording. State two challenges that are posed to these laws by ICT.
Date posted: October 12, 2017. Answers (1)
- Explain why telecommuting is not suitable for a doctor when carrying out an operation on a patient. (Solved)
Explain why telecommuting is not suitable for a doctor when carrying out an operation on a patient.
Date posted: October 12, 2017. Answers (1)
- The word RACE is appearing several times in a long story document composed using a DTP package. How would this word be safely replaced with...(Solved)
The word RACE is appearing several times in a long story document composed using a DTP package. How would this word be safely replaced with the word CONTENT?
Date posted: October 12, 2017. Answers (1)
- State four functions which are specific to Network Operating Systems(Solved)
State four functions which are specific to Network Operating Systems
Date posted: October 12, 2017. Answers (1)
- Explain why an intranet is a more secure way to share files within an organization. (Solved)
Explain why an intranet is a more secure way to share files within an organization.
Date posted: October 12, 2017. Answers (1)