Get premium membership and access questions with answers, video lessons as well as revision papers.
1. Cost cutting : through information technology in the business the traveling cost has been reduced since one can communicate with somebody who is far away from him without him/ her traveling to that geographical area unlike the previously when one had to travel from one geographical area to another thus spending a lot of money.
2. Storing and protecting information: through the introduction of it many offices have found space for expansion since they can store their data in one computer unlike where on office had to store large volumes of file to store data thus limiting space for expansion.
3. Maximizes productivity: since it involves use of new technologies e.g computers. Companies have improved productivity since computers are faster, accurate and can do a lot of tusk at the same time unlike where one had to do all the tasks manually and thus wasting a lot of time through this IT has maximize productivity.
4. Quality: most companies with well equipped facilities of IT e.g computers and printers can be able to produce well printed copies for advertising their products thus quality services to their products thus producing quality services to their customers.
5. Feedback: by the use of IT people can communicate with people who are far away from them and get immediate feedback.
6. Competitive advantaged: organization that have come up with the use of IT gets competitive unlike those that do not use IT technologies to manage their business since computers are much faster and accurate people tend to go for them because they can be served faster.
7. Faster communication: use of information technology in the business fasten communication e.g use of a compute to communicate with somebody who is in one geographical area makes it easy than one traveling to that geographical area making it easy than one traveling to that geographical area this saves time.
8. Work remotely: through connection of internet world wide one can manage his/her business from any place without him/her being forced to go to their work place thus enabling people to work remotely.
9. Time saving: before the introduction of IT people had to travel from one geographical area to another to conduct meeting thus wasting a lot of time during traveling but with the introduction of IT one does no need to travel in order for them to conduct the meeting instead they can conduct the meeting by use of video conferencing thus saving time.
10. Customer relationship: since use of IT in business is much faster and accurate one tends to create relationship among his customers.
wilson atisa answered the question on January 16, 2018 at 19:24
- Why must user needs be considered when acquiring new software?(Solved)
Why must user needs be considered when acquiring new software?
Date posted: January 16, 2018. Answers (1)
- State FOUR functions of an operating system(Solved)
State FOUR functions of an operating system
Date posted: January 16, 2018. Answers (1)
- State the use of the following application software. Give two examples of each
(i) Word processor
(ii) Spreadsheet
(iii) Databases
(Solved)
State the use of the following application software. Give two examples of each
(i) Word processor
(ii) Spreadsheet
(iii) Databases
Date posted: January 16, 2018. Answers (1)
- A student in Form one describes the computers found in their schools as useless. When his teacher asked him the reasons, he said that they...(Solved)
A student in Form one describes the computers found in their schools as useless. When his teacher asked him the reasons, he said that they did not have USB ports.
a) What does USB mean in full
b) Name FOUR devices that may be connected through the USB port.
Date posted: January 16, 2018. Answers (1)
- Give the functions of the following keyboard keysa) Space bar b) Home key (Solved)
Give the functions of the following keyboard keys
a) Space bar
b) Home key
Date posted: January 16, 2018. Answers (1)
- Differentiate between PROM and EPROM.(Solved)
Differentiate between PROM and EPROM.
Date posted: January 16, 2018. Answers (1)
- State FOUR behaviors that should be avoided in a computer laboratory(Solved)
State FOUR behaviors that should be avoided in a computer laboratory
Date posted: January 16, 2018. Answers (1)
- Give TWO types of documentation that accompanies software (Solved)
Give TWO types of documentation that accompanies software
Date posted: January 16, 2018. Answers (1)
- What is meant by the term software authenticity as with regard to software selection? (Solved)
What is meant by the term software authenticity as with regard to software selection?
Date posted: January 16, 2018. Answers (1)
- Mention any TWO ports that are used to connect peripheral devices (Solved)
Mention any TWO ports that are used to connect peripheral devices.
Date posted: January 15, 2018. Answers (1)
- Give any FOUR examples of peripheral devices?(Solved)
Give any FOUR examples of peripheral devices?
Date posted: January 15, 2018. Answers (1)
- What is a spyware?(Solved)
What is a spyware?
Date posted: January 15, 2018. Answers (1)
- Explain the three components of an expert system. (Solved)
Explain the three components of an expert system.
Date posted: January 15, 2018. Answers (1)
- A recent breakthrough in the manufacturing industry is the development of a fuel manufacturing plant that can produce vehicles using robots.Despite these advances some manufacturers...(Solved)
A recent breakthrough in the manufacturing industry is the development of a fuel manufacturing plant that can produce vehicles using robots.Despite these advances some manufacturers prefer to use human labour.Give two advantages and two disadvantages of fully automated manufacturing industry.
Date posted: January 15, 2018. Answers (1)
- State three measures that can be taken to protect data against computer threats. (Solved)
State three measures that can be taken to protect data against computer threats.
Date posted: January 15, 2018. Answers (1)
- Describe 3 security threats of data stored in a computer system(Solved)
Describe 3 security threats of data stored in a computer system
Date posted: January 15, 2018. Answers (1)
- Define the following terms
(i) Internet:
(ii) Domain name:
(iii) ISP:
(iv)WWW
(Solved)
Define the following terms
(i) Internet:
(ii) Domain name:
(iii) ISP:
(iv)WWW
Date posted: January 15, 2018. Answers (1)
- List six database programs available in the market today.(Solved)
List six database programs available in the market today.
Date posted: January 15, 2018. Answers (1)
- From the below fields in a database which field can be used as the primary key field? Explain?
(i) Name:
(ii) Admission number
(iii) Fees:
(iv) Gender:(Solved)
From the below fields in a database which field can be used as the primary key field? Explain?
(i) Name:
(ii) Admission number
(iii) Fees:
(iv) Gender:
Date posted: January 15, 2018. Answers (1)
- Identify the most appropriate data type for these fields in a database.
(i) Name:
(ii) Admission number
(iii) Fees
(iv) Gender: (Solved)
Identify the most appropriate data type for these fields in a database.
(i) Name:
(ii) Admission number
(iii) Fees
(iv) Gender:
Date posted: January 15, 2018. Answers (1)