- To avoid damaging storage devices that may still be in use
- To avoid damaging system and application files
- To avoid loss of data and information
Ekioo answered the question on November 18, 2017 at 23:00
- Give and explain two types of booting(Solved)
Give and explain two types of booting
Date posted: November 18, 2017. Answers (1)
- Name three peripheral devices.(Solved)
Name three peripheral devices.
Date posted: November 17, 2017. Answers (1)
- State five types of websites(Solved)
State five types of websites
Date posted: November 17, 2017. Answers (1)
- State four elements of a webpage(Solved)
State four elements of a webpage
Date posted: November 17, 2017. Answers (1)
- State five characteristics of an effective website.(Solved)
State five characteristics of an effective website.
Date posted: November 17, 2017. Answers (1)
- Describe the ideal environment for a computer to work properly(Solved)
Describe the ideal environment for a computer to work properly
Date posted: November 17, 2017. Answers (1)
- Define the term feasibility study and explain three types of feasibility study(Solved)
Define the term feasibility study and explain three types of feasibility study
Date posted: November 17, 2017. Answers (1)
- Discuss briefly the interview method of gathering information(Solved)
Discuss briefly the interview method of gathering information
Date posted: November 17, 2017. Answers (1)
- Explain three methods of data processing(Solved)
Explain three methods of data processing
Date posted: November 17, 2017. Answers (1)
- A school intends to setup an e-learning system, list three problems that are likely to be encountered.(Solved)
A school intends to setup an e-learning system, list three problems that are likely to be encountered.
Date posted: November 17, 2017. Answers (1)
- What are the circumstances which may lead to developing of a new information system(Solved)
What are the circumstances which may lead to developing of a new information system
Date posted: November 17, 2017. Answers (1)
- How can one safeguard his computer against data and program loss(Solved)
How can one safeguard his computer against data and program loss
Date posted: November 17, 2017. Answers (1)
- Give two reasons why smaller computers like laptops tend to be more expensive than desktop computers.(Solved)
Give two reasons why smaller computers like laptops tend to be more expensive than desktop computers.
Date posted: November 17, 2017. Answers (1)
- Differentiate between database and database system(Solved)
Differentiate between database and database system
Date posted: November 17, 2017. Answers (1)
- Explain how priority scheduling algorithm differ from shortest job first algorithm in a computer system(Solved)
Explain how priority scheduling algorithm differ from shortest job first algorithm in a computer system
Date posted: November 17, 2017. Answers (1)
- List five components of a database system environment giving a brief description of their functions.(Solved)
List five components of a database system environment giving a brief description of their functions.
Date posted: November 17, 2017. Answers (1)
- Describe the techniques to control deadlocks in a computer system(Solved)
Describe the techniques to control deadlocks in a computer system
Date posted: November 17, 2017. Answers (1)
- Give 3 ways in which a system maintainer should follow to ensure integrity in the data stored in a database system(Solved)
Give 3 ways in which a system maintainer should follow to ensure integrity in the data stored in a database system
Date posted: November 17, 2017. Answers (1)
- Describe when a database table is said to be in the following forms
i)1NF
ii)2NF
iii)3NF(Solved)
Describe when a database table is said to be in the following forms
i)1NF
ii)2NF
iii)3NF
Date posted: November 17, 2017. Answers (1)
- Discuss five properties of relational tables in a computer database(Solved)
Discuss five properties of relational tables in a computer database
Date posted: November 17, 2017. Answers (1)