a)Joystick
b)Optical Mark Recognition
c)Mouse
d)Keyboard
e)Monitor
Rennykid answered the question on January 24, 2018 at 14:58
- Explain how you can protect a document from unauthorized opening or altering.(Solved)
Explain how you can protect a document from unauthorized opening or altering.
Date posted: January 24, 2018. Answers (1)
- Define an algorithm. (Solved)
Define an algorithm.
Date posted: January 24, 2018. Answers (1)
- What's the function of primary key in access?(Solved)
Student is supposed to know the importance and function of a primary key as used in database.
Date posted: January 23, 2018. Answers (1)
- Write the following abbreviations in full
a)PC
b)MICR
c)OCR
d)OMR
e)POST
f)CMOS
g)NIC(Solved)
The student is supposed to know and identify the meaning of basic frequently used abbreviations.
Date posted: January 23, 2018. Answers (1)
- What is spooling in relations to computer operating system?(Solved)
What is spooling in relations to computer operating system?
Date posted: January 20, 2018. Answers (1)
- State and explain any three types of feasibility analysis applied during system development. (Solved)
State and explain any three types of feasibility analysis applied during system development.
Date posted: January 20, 2018. Answers (1)
- Discuss the positive impacts of information technology (IT) in business(Solved)
Discuss the positive impacts of information technology (IT) in business.
Date posted: January 16, 2018. Answers (1)
- Why must user needs be considered when acquiring new software?(Solved)
Why must user needs be considered when acquiring new software?
Date posted: January 16, 2018. Answers (1)
- State FOUR functions of an operating system(Solved)
State FOUR functions of an operating system
Date posted: January 16, 2018. Answers (1)
- State the use of the following application software. Give two examples of each
(i) Word processor
(ii) Spreadsheet
(iii) Databases
(Solved)
State the use of the following application software. Give two examples of each
(i) Word processor
(ii) Spreadsheet
(iii) Databases
Date posted: January 16, 2018. Answers (1)
- A student in Form one describes the computers found in their schools as useless. When his teacher asked him the reasons, he said that they...(Solved)
A student in Form one describes the computers found in their schools as useless. When his teacher asked him the reasons, he said that they did not have USB ports.
a) What does USB mean in full
b) Name FOUR devices that may be connected through the USB port.
Date posted: January 16, 2018. Answers (1)
- Give the functions of the following keyboard keysa) Space bar b) Home key (Solved)
Give the functions of the following keyboard keys
a) Space bar
b) Home key
Date posted: January 16, 2018. Answers (1)
- Differentiate between PROM and EPROM.(Solved)
Differentiate between PROM and EPROM.
Date posted: January 16, 2018. Answers (1)
- State FOUR behaviors that should be avoided in a computer laboratory(Solved)
State FOUR behaviors that should be avoided in a computer laboratory
Date posted: January 16, 2018. Answers (1)
- Give TWO types of documentation that accompanies software (Solved)
Give TWO types of documentation that accompanies software
Date posted: January 16, 2018. Answers (1)
- What is meant by the term software authenticity as with regard to software selection? (Solved)
What is meant by the term software authenticity as with regard to software selection?
Date posted: January 16, 2018. Answers (1)
- Mention any TWO ports that are used to connect peripheral devices (Solved)
Mention any TWO ports that are used to connect peripheral devices.
Date posted: January 15, 2018. Answers (1)
- Give any FOUR examples of peripheral devices?(Solved)
Give any FOUR examples of peripheral devices?
Date posted: January 15, 2018. Answers (1)
- What is a spyware?(Solved)
What is a spyware?
Date posted: January 15, 2018. Answers (1)
- Explain the three components of an expert system. (Solved)
Explain the three components of an expert system.
Date posted: January 15, 2018. Answers (1)