An anonymous union is the syntactic mechanism that allows two variables to share the same memory space.The member of an anonymous union are accessed directly, without reference to an object.They are at the same scope level as the union itself
Githiari answered the question on November 17, 2017 at 05:30
- List six database programs available in the market today.(Solved)
List six database programs available in the market today.
Date posted: November 17, 2017. Answers (1)
- (a) What is a utility software? (b) Give four examples of utility software(Solved)
(a) What is a utility software?
(b) Give four examples of utility software
Date posted: November 17, 2017. Answers (1)
- List four stages involved in the data processing cycle.(Solved)
List four stages involved in the data processing cycle
Date posted: November 17, 2017. Answers (1)
- List three differences between a laser printer and a dot matrix printer(Solved)
List three differences between a laser printer and a dot matrix printer
Date posted: November 17, 2017. Answers (1)
- Explain why computers use binary numbers in data representation(Solved)
Explain why computers use binary numbers in data representation
Date posted: November 17, 2017. Answers (1)
- State any four advantages of using an electronic spreadsheets(Solved)
State any four advantages of using an electronic spreadsheets
Date posted: November 16, 2017. Answers (1)
- Differentiate between real–time systems and online systems(Solved)
Differentiate between real–time systems and online systems
Date posted: November 16, 2017. Answers (1)
- Distinguish between an entity and an attribute as used in database design.(Solved)
Distinguish between an entity and an attribute as used in database design.
Date posted: November 16, 2017. Answers (1)
- What is a reference model? State any two models that are used in creating computer networks.(Solved)
What is a reference model? State any two models that are used in creating computer networks.
Date posted: November 16, 2017. Answers (1)
- Biometrics is one of the security measures organizations are adopting today. Explain what is meant by biometric analysis.(Solved)
Biometrics is one of the security measures organizations are adopting today. Explain what is meant by biometric analysis.
Date posted: November 16, 2017. Answers (1)
- Your school principal has identified you as an advisor in setting up a computer network for the school. The principal wants to set up either...(Solved)
Your school principal has identified you as an advisor in setting up a computer network for the school. The principal wants to set up either a wireless network or a wired network for the school. Advice the principal on the best type of network that will suit the school. Give two reasons for your choice.
Date posted: November 16, 2017. Answers (1)
- What is a password? List any two characteristics of a good password.(Solved)
What is a password? List any two characteristics of a good password.
Date posted: November 16, 2017. Answers (1)
- List any three advantages of soft copy output.(Solved)
List any three advantages of soft copy output.
Date posted: November 16, 2017. Answers (1)
- Distinguish between insert mode and type over mode as used in word processing. (Solved)
Distinguish between insert mode and type over mode as used in word processing.
Date posted: November 16, 2017. Answers (1)
- Define user- friendly as used in software development.(Solved)
Define user- friendly as used in software development.
Date posted: November 16, 2017. Answers (1)
- The interim electoral and boundaries commission of Kenya plans to carry out electronic voting in the next general election. State THREE ways in which computers...(Solved)
The interim electoral and boundaries commission of Kenya plans to carry out electronic voting in the next general election. State THREE ways in which computers will help the commission attain its target.
Date posted: November 16, 2017. Answers (1)
- State any three measures that should be put in place in order to ensure safety of computer users in a computer room.(Solved)
State any three measures that should be put in place in order to ensure safety of computer users in a computer room.
Date posted: November 16, 2017. Answers (1)
- List three functions of the main memory.(Solved)
List three functions of the main memory.
Date posted: November 16, 2017. Answers (1)
- Using appropriate examples, differentiate between distributed and centralized processing modes. (Solved)
Using appropriate examples, differentiate between distributed and centralized processing modes.
Date posted: November 16, 2017. Answers (1)
- State two characteristics of a good database/file design(Solved)
State two characteristics of a good database/file design
Date posted: November 16, 2017.