Get premium membership and access questions with answers, video lessons as well as revision papers.
-use of unique password, pin or biometric authentication methodology
-Avoid sharing computer with untrustworthy personnels
-Avoid installing uncertified programs and application to keep your system free from robber virus
-Avoid installing any application direct from the internet while online to keep it free from firewall attackers.
Githiari answered the question on November 17, 2017 at 06:27
- Give two reasons why smaller computers like laptops tend to be more expensive than desktop computers.(Solved)
Give two reasons why smaller computers like laptops tend to be more expensive than desktop computers.
Date posted: November 17, 2017. Answers (1)
- Differentiate between database and database system(Solved)
Differentiate between database and database system
Date posted: November 17, 2017. Answers (1)
- Explain how priority scheduling algorithm differ from shortest job first algorithm in a computer system(Solved)
Explain how priority scheduling algorithm differ from shortest job first algorithm in a computer system
Date posted: November 17, 2017. Answers (1)
- List five components of a database system environment giving a brief description of their functions.(Solved)
List five components of a database system environment giving a brief description of their functions.
Date posted: November 17, 2017. Answers (1)
- Describe the techniques to control deadlocks in a computer system(Solved)
Describe the techniques to control deadlocks in a computer system
Date posted: November 17, 2017. Answers (1)
- Give 3 ways in which a system maintainer should follow to ensure integrity in the data stored in a database system(Solved)
Give 3 ways in which a system maintainer should follow to ensure integrity in the data stored in a database system
Date posted: November 17, 2017. Answers (1)
- Describe when a database table is said to be in the following forms
i)1NF
ii)2NF
iii)3NF(Solved)
Describe when a database table is said to be in the following forms
i)1NF
ii)2NF
iii)3NF
Date posted: November 17, 2017. Answers (1)
- Discuss five properties of relational tables in a computer database(Solved)
Discuss five properties of relational tables in a computer database
Date posted: November 17, 2017. Answers (1)
- Explain the main reason for overloading the [] operator(Solved)
Explain the main reason for overloading the [] operator
Date posted: November 17, 2017. Answers (1)
- Can operator = () be a friend function?(Solved)
Can operator = () be a friend function?
Date posted: November 17, 2017. Answers (1)
- Explain why you might need to overload the assignment operator in a computer program(Solved)
Explain why you might need to overload the assignment operator in a computer program
Date posted: November 17, 2017. Answers (1)
- How do friend operator function differ from member operator functions(Solved)
How do friend operator function differ from member operator functions
Date posted: November 17, 2017. Answers (1)
- When is it appropriate to use default argument? When is it probably a bad idea(Solved)
When is it appropriate to use default argument? When is it probably a bad idea
Date posted: November 17, 2017. Answers (1)
- A programmer while writing in C++ language realized a mistake with the code below as the major cause of the program’s failure.Point out the mistake.
Void...(Solved)
A programmer while writing in C++ language realized a mistake with the code below as the major cause of the program’s failure.Point out the mistake
Void f(int a);
Void f(int a);
Date posted: November 17, 2017. Answers (1)
- Describe the mistake with the following C++ computer code declaration?
Int f(int a=0, double balance);
(Solved)
Describe the mistake with the following C++ computer code declaration?
Int f(int a=0, double balance);
Date posted: November 17, 2017. Answers (1)
- Briefly explain why copy constructors are needed in the world of computer programming.(Solved)
Briefly explain why copy constructors are needed in the world of computer programming.
Date posted: November 17, 2017. Answers (1)
- Explain why using a default argument is related to function overloading(Solved)
Explain why using a default argument is related to function overloading
Date posted: November 17, 2017. Answers (1)
- Give two advantages of reference pattern in a computer program(Solved)
Give two advantages of reference pattern in a computer program
Date posted: November 17, 2017. Answers (1)
- What are the ways that a class might indicate an allocation failure in a computer program?(Solved)
What are the ways that a class might indicate an allocation failure in a computer program?
Date posted: November 17, 2017. Answers (1)
- Give two possible restrictions to an inline functions(Solved)
Give two possible restrictions to an inline functions
Date posted: November 17, 2017. Answers (1)