Get premium membership and access questions with answers, video lessons as well as revision papers.
-Computer crime is complex to detect.
-It is not easy to find clear evidence.
-There are no witness.
-Few people know the management of computer crime.
gideon1 answered the question on November 4, 2017 at 06:30
- A computer teacher wants to minimize illegal entry of people to a computer laboratory. Explain measures which to be put in place in order to curb...(Solved)
A computer teacher wants to minimize illegal entry of people to a computer laboratory. Explain measures which can be put in place in order to curb this illegal entry.
Date posted: November 4, 2017. Answers (1)
- List any two factors to consider when choosing an operating system.(Solved)
List any two factors to consider when choosing an operating system.
Date posted: November 4, 2017. Answers (1)
- State two peripheral devices connected to a computer via PS/2 port.(Solved)
State two peripheral devices connected to a computer via PS/2 port.
Date posted: November 4, 2017. Answers (1)
- List any three parts of an application window.(Solved)
List any three parts of an application window.
Date posted: November 4, 2017. Answers (1)
- Differentiate between disk partitioning and disk clean up.(Solved)
Differentiate between disk partitioning and disk clean up.
Date posted: November 4, 2017. Answers (1)
- Define deadlock(Solved)
Define deadlock
Date posted: November 4, 2017. Answers (1)
- List four techniques of using a mouse(Solved)
Explain the four mouse operation techniques.
Date posted: November 4, 2017. Answers (1)
- State three ways in which computers can be used in
(a). Financial institution.
(b).Transport system.(Solved)
State three ways in which computers can be used in
(a). Financial institution.
(b).Transport system.
Date posted: November 4, 2017. Answers (1)
- Outline four factors you would use to differentiate between off the shelf software and bespoke software (Solved)
Outline four factors you would use to differentiate between off the shelf software and bespoke software
Date posted: November 2, 2017. Answers (1)
- Define the acronym R.A.M as used in computing.(Solved)
Define the acronym R.A.M as used in computing.
Date posted: October 31, 2017. Answers (1)
- State and explain types of processes.(Solved)
State and explain types of processes.
Date posted: October 26, 2017. Answers (1)
- Differentiate between data acquisition and digital data acquisition. (Solved)
Differentiate between data acquisition and digital data acquisition.
Date posted: October 26, 2017. Answers (1)
- Differentiate between computer system and system unit.(Solved)
Differentiate between computer system and system unit.
Date posted: October 26, 2017. Answers (1)
- What are the consideration for data acquisition systems?(Solved)
What are the consideration for data acquisition systems?
Date posted: October 26, 2017. Answers (1)
- Outline the advantages of black box testing.(Solved)
Outline the advantages of black box testing.
Date posted: October 26, 2017. Answers (1)
- Outline the disadvantages of black box testing.(Solved)
Outline the disadvantages of black box testing.
Date posted: October 26, 2017. Answers (1)
- Distinguish between idle-detect time-out and nonproductive receive time-out
(Solved)
Distinguish between idle-detect time-out and nonproductive receive time-out
Date posted: October 24, 2017. Answers (1)
- Outline the advantages of using databases(Solved)
Outline the advantages of using databases
Date posted: October 23, 2017. Answers (1)
- State and explain factors to consider when purchasing a computer monitor(Solved)
State and explain factors to consider when purchasing a computer monitor.
Date posted: October 23, 2017. Answers (1)
- Explain the control structures given below
(i)Iteration
(ii)Selection
(iii)Sequence(Solved)
Explain the control structures given below
(i)Iteration
(ii)Selection
(iii)Sequence
Date posted: October 18, 2017. Answers (1)