Get premium membership and access questions with answers, video lessons as well as revision papers.
•It should be able to process data accurately and with high speed, using various techniques like operations research, simulation, heuristics, etc.
•It should be able to collect, organize, manipulate, and update large amount
Of raw data of both related and unrelated nature, coming from various
Internal and external sources at different periods of time.
•It should provide real time information on ongoing events without any
Delay.
•It should support various output formats and follow latest rules and
regulations in practice.
•It should provide organized and relevant information for all levels of
management: strategic, operational, and tactical.
•It should aim at extreme flexibility in data storage and retrieval
ERICK MOGAKA answered the question on November 8, 2017 at 06:26
- State three differences between RAM and ROM(Solved)
State three differences between RAM and ROM
Date posted: November 8, 2017. Answers (1)
- A computer programmer goes mad when somebody describes his job as a computer operator. Explain the difference to that “somebody” so that they do not...(Solved)
A computer programmer goes mad when somebody describes his job as a computer operator. Explain the difference to that “somebody” so that they do not make that mistake again?
Date posted: November 8, 2017. Answers (1)
- Identify three health hazards associated with the use of computers in an organization(Solved)
Identify one health hazard associated with the use of computers in an organization
Date posted: November 8, 2017. Answers (1)
- Explain the term ergonomics as used in ICT.(Solved)
Explain the term ergonomics as used in ICT.
Date posted: November 8, 2017. Answers (1)
- Compare the 2nd and 3rd generation computers in terms of technology and type of memory used(Solved)
Compare the 2nd and 3rd generation computers in terms of technology and type of memory used
Date posted: November 8, 2017. Answers (1)
- State two threats to computer security. In each threat identified, propose an appropriate remedy.(Solved)
State two threats to computer security. In each threat identified, propose an appropriate remedy.
Date posted: November 8, 2017. Answers (1)
- Give four way used to prevent electrostatic discharge in a computer system(Solved)
Give four way used to prevent electrostatic discharge in a computer system
Date posted: November 8, 2017. Answers (1)
- Suppose you are required to open a system unit to fix a problem, state any two precautions that you should take (Solved)
Suppose you are required to open a system unit to fix a problem, state any two precautions that you should take
Date posted: November 8, 2017. Answers (1)
- What is the use of CMOS battery in a computer? (Solved)
What is the use of CMOS battery in a computer?
Date posted: November 8, 2017. Answers (1)
- What is the difference between SIMMS and DIMMS(Solved)
What is the difference between SIMMS and DIMMS
Date posted: November 8, 2017. Answers (1)
- State five impacts of ICT in contemporary society(Solved)
State five impacts of ICT in contemporary society
Date posted: November 8, 2017. Answers (1)
- Describe the term disk formatting in a computer system(Solved)
Describe the term disk formatting in a computer system
Date posted: November 8, 2017. Answers (1)
- Differentiate between technical support and software support(Solved)
Differentiate between technical support and software support
Date posted: November 8, 2017. Answers (1)
- What benefits are derived from the stored program concept(Solved)
What benefits are derived from the stored program concept
Date posted: November 8, 2017. Answers (1)
- Define the term Access time(Solved)
Define the term Access time
Date posted: November 8, 2017. Answers (1)
- Distinguish between the following terms (i)Program counter and Instructions register (ii)Computer programmer and system analyst...(Solved)
Distinguish between the following terms
i)Program counter and Instructions register
ii)Computer programmer and system analyst
iii)Router and gateway
iv)ICT ethics and ICT policy
Date posted: November 8, 2017. Answers (1)
- Describe the difference between a bus and a ring network topology(Solved)
Describe the difference between a bus and a ring network topology
Date posted: November 7, 2017. Answers (1)
- Describe the BIOS routine and functions(Solved)
Describe the BIOS routine and functions
Date posted: November 7, 2017. Answers (1)
- Define the term real time in a computer system(Solved)
Define the term real time in a computer system
Date posted: November 7, 2017. Answers (1)
- State one measure taken to get rid of the heat produced by the processor while working(Solved)
State one measure taken to get rid of the heat produced by the processor while working
Date posted: November 7, 2017. Answers (1)