Get premium membership and access questions with answers, video lessons as well as revision papers.
a) Input mask
- Automatically formats the field entry into a specified format.
b) Validate Rule
- Logical expression that restricts the values to be entered into a field, example >=0 and <=100
john3 answered the question on November 13, 2017 at 18:23
-
Explain the difference between Gas Plasma Display and Liquid Crystal display Monitors(Solved)
Explain the difference between Gas Plasma Display and Liquid Crystal display Monitors
Date posted: November 13, 2017. Answers (1)
- State the functions of the following protocols; (a) FTP(b) TCP/IP(Solved)
State the functions of the following protocols;
(a) FTP
(b) TCP/IP
Date posted: November 13, 2017. Answers (1)
- Describe two facilities offered by email software such as Ms Outlook. (Solved)
Describe two facilities offered by email software such as Ms Outlook.
Date posted: November 13, 2017. Answers (1)
- Describe TWO roles of each of the following;(a) Database Administrator (b) System analyst(Solved)
Describe TWO roles of each of the following;
(a) Database Administrator
(b) System analyst
Date posted: November 13, 2017. Answers (1)
- What do you understand by the term ‘soft system’’ in a system development?(Solved)
What do you understand by the term ‘soft system’’ in a system development?
Date posted: November 12, 2017. Answers (1)
- State two reasons why it is necessary to have well connected and proper cables in a computer lab(Solved)
State two reasons why it is necessary to have well connected and proper cables in a computer lab
Date posted: November 12, 2017. Answers (1)
- State three ways in which ICT can be used in industrial control.(Solved)
State three ways in which ICT can be used in industrial control.
Date posted: November 12, 2017. Answers (1)
- Distinguish between data verification and data validation(Solved)
Distinguish between data verification and data validation
Date posted: November 12, 2017. Answers (1)
- State the technology used in the following computer generations (i)4th generation (ii)1st generation (iii)2nd generation (iv)3rd generation:(Solved)
State the technology used in the following computer generations
i)4th generation:
ii)1st generation:
iii)2nd generation:
iv)3rd generation:
Date posted: November 12, 2017. Answers (1)
- What is a computer? (Solved)
What is a computer?
Date posted: November 12, 2017. Answers (1)
- Discuss how hard disk stores data(Solved)
Discuss how hard disk stores data
Date posted: November 8, 2017. Answers (1)
- State one disadvantage of using magnetic tapes(Solved)
State one disadvantage of using magnetic tape
Date posted: November 8, 2017. Answers (1)
- Describe how floppy disk works (Solved)
Describe how floppy disk works
Date posted: November 8, 2017. Answers (1)
- Outline five characteristics of a computerized system(Solved)
Outline five characteristics of a computerized system
Date posted: November 8, 2017. Answers (1)
- State three differences between RAM and ROM(Solved)
State three differences between RAM and ROM
Date posted: November 8, 2017. Answers (1)
- A computer programmer goes mad when somebody describes his job as a computer operator. Explain the difference to that “somebody” so that they do not...(Solved)
A computer programmer goes mad when somebody describes his job as a computer operator. Explain the difference to that “somebody” so that they do not make that mistake again?
Date posted: November 8, 2017. Answers (1)
- Identify three health hazards associated with the use of computers in an organization(Solved)
Identify one health hazard associated with the use of computers in an organization
Date posted: November 8, 2017. Answers (1)
- Explain the term ergonomics as used in ICT.(Solved)
Explain the term ergonomics as used in ICT.
Date posted: November 8, 2017. Answers (1)
- Compare the 2nd and 3rd generation computers in terms of technology and type of memory used(Solved)
Compare the 2nd and 3rd generation computers in terms of technology and type of memory used
Date posted: November 8, 2017. Answers (1)
- State two threats to computer security. In each threat identified, propose an appropriate remedy.(Solved)
State two threats to computer security. In each threat identified, propose an appropriate remedy.
Date posted: November 8, 2017. Answers (1)