Get premium membership and access questions with answers, video lessons as well as revision papers.
- Output specification
- Input specification.
- File / data stores.
- Hardware & software requirements.
- Processing requirements.
Githiari answered the question on January 10, 2018 at 11:12
- Define the following terms in relation to computer security
a) Data Encryption
b) Sabotage
c) Firewall(Solved)
Define the following terms in relation to computer security
a) Data Encryption
b) Sabotage
c) Firewall
Date posted: January 10, 2018. Answers (1)
- Anita was working on her computer studies project. She was worried of the media to use for storing her data.She settled on a media that...(Solved)
Anita was working on her computer studies project. She was worried of the media to use for storing her data.She settled on a media that used serial file organization. How are files organized on a storage medium using this method?
List two advantages offered by this type of file organization
Date posted: January 10, 2018. Answers (1)
- What is a computational error? Give an example to illustrate(Solved)
What is a computational error? Give an example to illustrate
Date posted: January 10, 2018. Answers (1)
- Differentiate between logical and syntax errors encountered in programming(Solved)
Differentiate between logical and syntax errors encountered in programming
Date posted: January 10, 2018. Answers (1)
- Name two ways of editing cell entries in spreadsheets.(Solved)
Name two ways of editing cell entries in spreadsheets.
Date posted: January 10, 2018. Answers (1)
- What is meant by expert systems? Name the three components(Solved)
What is meant by expert systems? Name the three components
Date posted: January 10, 2018. Answers (1)
- Name four malicious programs that can affect your computer system(Solved)
Name four malicious programs that can affect your computer system
Date posted: January 10, 2018. Answers (1)
- Differentiate between Error Handling and interrupt handling(Solved)
Differentiate between Error Handling and interrupt handling
Date posted: January 10, 2018. Answers (1)
- Distinguish between a switch and hub(Solved)
Distinguish between a switch and a hub.
Date posted: January 9, 2018. Answers (1)
- Define a foreign key as used in databases(Solved)
Define a foreign key as used in databases
Date posted: January 9, 2018. Answers (1)
- List three characteristics of a primary key in a database.(Solved)
List three characteristics of a primary key in a database
Date posted: January 9, 2018. Answers (1)
- Give two examples of a database model(Solved)
Give two examples of a database model.
Date posted: January 9, 2018. Answers (1)
- What is a database model?(Solved)
What is a database model?
Date posted: January 9, 2018. Answers (1)
- State two types of database relationships.(Solved)
State two types of database relationships.
Date posted: January 9, 2018. Answers (1)
- List two attributes of a monitor that affects its display.(Solved)
List two attributes of a monitor that affects its display.
Date posted: January 9, 2018. Answers (1)
- Define the term password as used in file security.(Solved)
Define the term password as used in file security.
Date posted: January 9, 2018. Answers (1)
- Give two models of a modem(Solved)
Give two models of a modem.
Date posted: January 9, 2018. Answers (1)
- Define a modem as used in computer networking(Solved)
Define a modem as used in computer networking
Date posted: January 9, 2018. Answers (1)
- During the normal operation, the microprocessor goes through the fetch-execute cycle. Explain what happens in each phase.(Solved)
During the normal operation, the microprocessor goes through the fetch-execute cycle. Explain what happens in each phase.
Date posted: January 5, 2018. Answers (1)
- Outline reasons why it is important to preview a document before sending it to the printer.(Solved)
Outline reasons why it is important to preview a document before sending it to the printer.
Date posted: January 3, 2018. Answers (1)