Data is stored in computers in binary form. The computer’s CPU carries arithmetic & logical operations by binary numbers.
This is because; binary numbers has only two digits, 0 & 1, which make it suitable for representing two states of data such as OFF & ON.
steve williams answered the question on November 17, 2017 at 02:31
- State any four advantages of using an electronic spreadsheets(Solved)
State any four advantages of using an electronic spreadsheets
Date posted: November 16, 2017. Answers (1)
- Differentiate between real–time systems and online systems(Solved)
Differentiate between real–time systems and online systems
Date posted: November 16, 2017. Answers (1)
- Distinguish between an entity and an attribute as used in database design.(Solved)
Distinguish between an entity and an attribute as used in database design.
Date posted: November 16, 2017. Answers (1)
- What is a reference model? State any two models that are used in creating computer networks.(Solved)
What is a reference model? State any two models that are used in creating computer networks.
Date posted: November 16, 2017. Answers (1)
- Biometrics is one of the security measures organizations are adopting today. Explain what is meant by biometric analysis.(Solved)
Biometrics is one of the security measures organizations are adopting today. Explain what is meant by biometric analysis.
Date posted: November 16, 2017. Answers (1)
- Your school principal has identified you as an advisor in setting up a computer network for the school. The principal wants to set up either...(Solved)
Your school principal has identified you as an advisor in setting up a computer network for the school. The principal wants to set up either a wireless network or a wired network for the school. Advice the principal on the best type of network that will suit the school. Give two reasons for your choice.
Date posted: November 16, 2017. Answers (1)
- What is a password? List any two characteristics of a good password.(Solved)
What is a password? List any two characteristics of a good password.
Date posted: November 16, 2017. Answers (1)
- List any three advantages of soft copy output.(Solved)
List any three advantages of soft copy output.
Date posted: November 16, 2017. Answers (1)
- Distinguish between insert mode and type over mode as used in word processing. (Solved)
Distinguish between insert mode and type over mode as used in word processing.
Date posted: November 16, 2017. Answers (1)
- Define user- friendly as used in software development.(Solved)
Define user- friendly as used in software development.
Date posted: November 16, 2017. Answers (1)
- The interim electoral and boundaries commission of Kenya plans to carry out electronic voting in the next general election. State THREE ways in which computers...(Solved)
The interim electoral and boundaries commission of Kenya plans to carry out electronic voting in the next general election. State THREE ways in which computers will help the commission attain its target.
Date posted: November 16, 2017. Answers (1)
- State any three measures that should be put in place in order to ensure safety of computer users in a computer room.(Solved)
State any three measures that should be put in place in order to ensure safety of computer users in a computer room.
Date posted: November 16, 2017. Answers (1)
- List three functions of the main memory.(Solved)
List three functions of the main memory.
Date posted: November 16, 2017. Answers (1)
- Using appropriate examples, differentiate between distributed and centralized processing modes. (Solved)
Using appropriate examples, differentiate between distributed and centralized processing modes.
Date posted: November 16, 2017. Answers (1)
- State two characteristics of a good database/file design(Solved)
State two characteristics of a good database/file design
Date posted: November 16, 2017.
- Differentiate between phased and parallel implementation methods. (Solved)
Differentiate between phased and parallel implementation methods.
Date posted: November 16, 2017. Answers (1)
- Distinguish between a primary key and a foreign key as used in DBMS.(Solved)
Distinguish between a primary key and a foreign key as used in DBMS.
Date posted: November 16, 2017. Answers (1)
- Explain the role of problem identification in system development(Solved)
Explain the role of problem identification in system development.
Date posted: November 16, 2017. Answers (1)
- Outline three advantages of using computer for data processing over other types of office and business equipment.(Solved)
Outline three advantages of using computer for data processing over other types of office and business equipment.
Date posted: November 16, 2017. Answers (1)
- Differentiate between Analogue and Digital data.(Solved)
Differentiate between Analogue and Digital data.
Date posted: November 16, 2017. Answers (1)