Get premium membership and access questions with answers, video lessons as well as revision papers.
In Microsoft windows, configuration information about installed peripherals and software is stored in a database called the registry.Once the operating system's kernel has been loaded it checks the system to determine which driver and utility programs are needed.If a peripheral device that is already installed on the system requires a driver to operate, that peripheral's driver will be installed and loaded automatically.
Githiari answered the question on October 12, 2017 at 15:16
- Describe five components located inside the system unit(Solved)
Describe five components located inside the system unit
Date posted: October 12, 2017. Answers (1)
- Describe how data is represented in the computer system.(Solved)
Describe how data is represented in the computer system.
Date posted: October 12, 2017. Answers (1)
- Name and describe any two types of database models. (Solved)
Name and describe any two types of database models.
Date posted: October 12, 2017. Answers (1)
- Give three ways in which horticultural farmers can benefit from the use of information and communication Technology (ICT). (Solved)
Give three ways in which horticultural farmers can benefit from the use of information and communication Technology (ICT).
Date posted: October 12, 2017. Answers (1)
- Name and explain the two types of drop caps. (Solved)
Name and explain the two types of drop caps.
Date posted: October 12, 2017. Answers (1)
- State the purpose of each of the types of buses found on the computer motherboard;
Address bus,Control bus
and Data bus(Solved)
State the purpose of each of the types of buses found on the computer motherboard;
Address bus,Control bus
and Data bus
Date posted: October 12, 2017. Answers (1)
- Name two types of buses found on the computer motherboard. (Solved)
Name two types of buses found on the computer motherboard.
Date posted: October 12, 2017. Answers (1)
- A computer user typed the name Kajaido as Kajiado and 8726 as 8126. (a) State the type of each...(Solved)
A computer user typed the name Kajaido as Kajiado and 8726 as 8126.
(a) State the type of each error
(b) Explain how such errors can be controlled
Date posted: October 12, 2017. Answers (1)
- Describe third generation languages and name two examples.(Solved)
Describe third generation languages and name two examples.
Date posted: October 12, 2017. Answers (1)
- Name four toggle keys on a standard computer keyboard. (Solved)
Name four toggle keys on a standard computer keyboard.
Date posted: October 12, 2017. Answers (1)
- Name four approaches that may be used to replace a computerized Information system. (Solved)
Name four approaches that may be used to replace a computerized Information system.
Date posted: October 12, 2017. Answers (1)
- List two uses of computers in meteorology.(Solved)
List two uses of computers in meteorology.
Date posted: October 12, 2017. Answers (1)
- With reference to quality of print, noise level and cost, compare a dot matrix with a laser printer. (Solved)
With reference to quality of print, noise level and cost, compare a dot matrix with a laser printer.
Date posted: October 12, 2017. Answers (1)
- Give three reasons why system maintenance phase is necessary in SDLC. (Solved)
Give three reasons why system maintenance phase is necessary in SDLC.
Date posted: October 12, 2017. Answers (1)
- State three standard coding schemes used in data representation. (Solved)
State three standard coding schemes used in data representation.
Date posted: October 12, 2017. Answers (1)
- State two characteristics of a computer that is infected by computer viruses(Solved)
State two characteristics of a computer that is infected by computer viruses
Date posted: October 12, 2017. Answers (1)
- State three characteristics of a suitable password. (Solved)
State three characteristics of a suitable password.
Date posted: October 12, 2017. Answers (1)
- Explain how data in a computer system is secured using (i) Password; ...(Solved)
Explain how data in a computer system is secured using:
(i) Password
(ii) User access level
Date posted: October 12, 2017. Answers (1)
- The following are some of the phases in the Systems Development Life Cycle (SDLC): system analysis, system design, system implementation, system review and...(Solved)
The following are some of the phases in the Systems Development Life Cycle (SDLC): system analysis, system design, system implementation, system review and maintenance. State four activities that are carried out during the system implementation phase.
Date posted: October 12, 2017. Answers (1)
- Machine language programs are more difficult to write than high-level language programs. State two reasons for this.(Solved)
Machine language programs are more difficult to write than high-level language programs. State two reasons for this.
Date posted: October 12, 2017. Answers (1)