-Inserting foreign objects on the electrical sockets
-Avoid eating or drinking while in the lab to prevent contamination
-Avoid making noise while in the computer lab to prevent disturbances
-Do not print a document not unless needed.
Githiari answered the question on January 16, 2018 at 12:03
- Give TWO types of documentation that accompanies software (Solved)
Give TWO types of documentation that accompanies software
Date posted: January 16, 2018. Answers (1)
- What is meant by the term software authenticity as with regard to software selection? (Solved)
What is meant by the term software authenticity as with regard to software selection?
Date posted: January 16, 2018. Answers (1)
- Mention any TWO ports that are used to connect peripheral devices (Solved)
Mention any TWO ports that are used to connect peripheral devices.
Date posted: January 15, 2018. Answers (1)
- Give any FOUR examples of peripheral devices?(Solved)
Give any FOUR examples of peripheral devices?
Date posted: January 15, 2018. Answers (1)
- What is a spyware?(Solved)
What is a spyware?
Date posted: January 15, 2018. Answers (1)
- Explain the three components of an expert system. (Solved)
Explain the three components of an expert system.
Date posted: January 15, 2018. Answers (1)
- A recent breakthrough in the manufacturing industry is the development of a fuel manufacturing plant that can produce vehicles using robots.Despite these advances some manufacturers...(Solved)
A recent breakthrough in the manufacturing industry is the development of a fuel manufacturing plant that can produce vehicles using robots.Despite these advances some manufacturers prefer to use human labour.Give two advantages and two disadvantages of fully automated manufacturing industry.
Date posted: January 15, 2018. Answers (1)
- State three measures that can be taken to protect data against computer threats. (Solved)
State three measures that can be taken to protect data against computer threats.
Date posted: January 15, 2018. Answers (1)
- Describe 3 security threats of data stored in a computer system(Solved)
Describe 3 security threats of data stored in a computer system
Date posted: January 15, 2018. Answers (1)
- Define the following terms
(i) Internet:
(ii) Domain name:
(iii) ISP:
(iv)WWW
(Solved)
Define the following terms
(i) Internet:
(ii) Domain name:
(iii) ISP:
(iv)WWW
Date posted: January 15, 2018. Answers (1)
- List six database programs available in the market today.(Solved)
List six database programs available in the market today.
Date posted: January 15, 2018. Answers (1)
- From the below fields in a database which field can be used as the primary key field? Explain?
(i) Name:
(ii) Admission number
(iii) Fees:
(iv) Gender:(Solved)
From the below fields in a database which field can be used as the primary key field? Explain?
(i) Name:
(ii) Admission number
(iii) Fees:
(iv) Gender:
Date posted: January 15, 2018. Answers (1)
- Identify the most appropriate data type for these fields in a database.
(i) Name:
(ii) Admission number
(iii) Fees
(iv) Gender: (Solved)
Identify the most appropriate data type for these fields in a database.
(i) Name:
(ii) Admission number
(iii) Fees
(iv) Gender:
Date posted: January 15, 2018. Answers (1)
- List four tasks that can be performed in a database.(Solved)
List four tasks that can be performed in a database.
Date posted: January 15, 2018. Answers (1)
- Differentiate between macros and report in a database.
(Solved)
Differentiate between macros and report in a database.
Date posted: January 15, 2018. Answers (1)
- State three standard data coding schemes used in computing and electronic systems (Solved)
State three standard data coding schemes used in computing and electronic systems
Date posted: January 15, 2018. Answers (1)
- Give two reasons why someone may prefer using a laptop to a desktop when creating a computer program(Solved)
Give two reasons why someone may prefer using a laptop to a desktop when creating a computer program.
Date posted: January 12, 2018. Answers (1)
- State one way in which logical and physical computer access can be controlled.(Solved)
State one way in which logical and physical computer access can be controlled.
Date posted: January 12, 2018. Answers (1)
- One of the challenges that computer organizations face is unauthorized access.Distinguish between logical and physical computer access.(Solved)
One of the challenges that computer organizations face is unauthorized access. Distinguish between physical and logical computer access.
Date posted: January 12, 2018. Answers (1)
- Describe any two roles of the following career opportunities in the ICT field.i) Systems analystii) Information system manageriii) Network administratoriv) Computer trainer(Solved)
Describe any two roles of the following career opportunities in the ICT field.
i) Systems analyst
ii) Information system manager
iii) Network administrator
iv) Computer trainer
Date posted: January 11, 2018. Answers (1)