Get premium membership and access questions with answers, video lessons as well as revision papers.
(i) Internet – Worldwide system of computer networks.
(ii) Domain name – e.g. edu., org., com It identifies the type of institution offering a particular service (s).
(iii) ISP – internet service provider Company that provides access to internet
(iv) WWW - World Wide Web A vast virtual space on the internet where information called website are installed.
Githiari answered the question on January 15, 2018 at 10:10
- List six database programs available in the market today.(Solved)
List six database programs available in the market today.
Date posted: January 15, 2018. Answers (1)
- From the below fields in a database which field can be used as the primary key field? Explain?
(i) Name:
(ii) Admission number
(iii) Fees:
(iv) Gender:(Solved)
From the below fields in a database which field can be used as the primary key field? Explain?
(i) Name:
(ii) Admission number
(iii) Fees:
(iv) Gender:
Date posted: January 15, 2018. Answers (1)
- Identify the most appropriate data type for these fields in a database.
(i) Name:
(ii) Admission number
(iii) Fees
(iv) Gender: (Solved)
Identify the most appropriate data type for these fields in a database.
(i) Name:
(ii) Admission number
(iii) Fees
(iv) Gender:
Date posted: January 15, 2018. Answers (1)
- List four tasks that can be performed in a database.(Solved)
List four tasks that can be performed in a database.
Date posted: January 15, 2018. Answers (1)
- Differentiate between macros and report in a database.
(Solved)
Differentiate between macros and report in a database.
Date posted: January 15, 2018. Answers (1)
- State three standard data coding schemes used in computing and electronic systems (Solved)
State three standard data coding schemes used in computing and electronic systems
Date posted: January 15, 2018. Answers (1)
- Give two reasons why someone may prefer using a laptop to a desktop when creating a computer program(Solved)
Give two reasons why someone may prefer using a laptop to a desktop when creating a computer program.
Date posted: January 12, 2018. Answers (1)
- State one way in which logical and physical computer access can be controlled.(Solved)
State one way in which logical and physical computer access can be controlled.
Date posted: January 12, 2018. Answers (1)
- One of the challenges that computer organizations face is unauthorized access.Distinguish between logical and physical computer access.(Solved)
One of the challenges that computer organizations face is unauthorized access. Distinguish between physical and logical computer access.
Date posted: January 12, 2018. Answers (1)
- Describe any two roles of the following career opportunities in the ICT field.i) Systems analystii) Information system manageriii) Network administratoriv) Computer trainer(Solved)
Describe any two roles of the following career opportunities in the ICT field.
i) Systems analyst
ii) Information system manager
iii) Network administrator
iv) Computer trainer
Date posted: January 11, 2018. Answers (1)
- One of the scripting languages used to create web pages is hypertext markup language(HTML). State two limitations of HTML(Solved)
One of the scripting languages used to create web pages is hypertext markup language (HTML). State two limitations of HTML.
Date posted: January 11, 2018. Answers (1)
- State the use of the following network devices
i) Network interface cards
ii) Routers(Solved)
State the use of the following network devices
i) Network interface cards
ii) Routers
Date posted: January 10, 2018. Answers (1)
- Explain how information and communication technology has contributed to teaching and learning in schools (Solved)
Explain how information and communication technology has contributed to teaching and learning in schools
Date posted: January 10, 2018. Answers (1)
- Difference between real-time systems and online systems(Solved)
Difference between real-time systems and online systems
Date posted: January 10, 2018. Answers (1)
- Define the following terms as used in mail merging
i) Main document
ii) Data source(Solved)
Define the following terms as used in mail merging
i) Main document
ii) Data source
Date posted: January 10, 2018. Answers (1)
- Describe the following menu tools as used in Ms. Word (i) Print layout (ii) Web layout(Solved)
Describe the following menu tools as used in Ms. Word
(i) Print layout
(ii) Web layout
Date posted: January 10, 2018. Answers (1)
- Define the data processing(Solved)
Define the data processing
Date posted: January 10, 2018. Answers (1)
- List any four components of requirement specification made during system development(Solved)
List any four components of requirement specification made during system development
Date posted: January 10, 2018. Answers (1)
- Define the following terms in relation to computer security
a) Data Encryption
b) Sabotage
c) Firewall(Solved)
Define the following terms in relation to computer security
a) Data Encryption
b) Sabotage
c) Firewall
Date posted: January 10, 2018. Answers (1)
- Anita was working on her computer studies project. She was worried of the media to use for storing her data.She settled on a media that...(Solved)
Anita was working on her computer studies project. She was worried of the media to use for storing her data.She settled on a media that used serial file organization. How are files organized on a storage medium using this method?
List two advantages offered by this type of file organization
Date posted: January 10, 2018. Answers (1)