Get premium membership and access questions with answers, video lessons as well as revision papers.
Enterprise data center contain assets, application and important information that are always targeted by electronic attacks and theft of confidential information.
GEOFFREY OKELLO answered the question on February 28, 2018 at 09:37
- Differentiate Database administrator and web administrator(Solved)
Differentiate Database administrator and web administrator
Date posted: February 27, 2018. Answers (1)
- Give 3 reason why data and information in a computer system needs to be converted to other number systems other than binary. (Solved)
Give 3 reason why data and information in a computer system needs to be converted to other number systems other than binary.
Date posted: February 27, 2018. Answers (1)
- An organization is facing threats to data integrity. Explain three of how the threats can be minimized. (Solved)
An organization is facing threats to data integrity. Explain three of how the threats can be minimized.
Date posted: February 27, 2018. Answers (1)
- Outline two methods used to secure data in a database.(Solved)
Outline two methods used to secure data in a database.
Date posted: February 27, 2018. Answers (1)
- Give two ways in which ICT is used in shipping industry. (Solved)
Give two ways in which ICT is used in shipping industry.
Date posted: February 27, 2018. Answers (1)
- Which is the first web browser invented in 1990?(Solved)
Which is the first web browser invented in 1990?
Date posted: February 26, 2018. Answers (1)
- What will be the output of following program ?
1
2
3
4
5
6
7
8
9
10
11
12
#include < stdio.h >
int main()
{
int tally=0;
for(;;)
...(Solved)
What will be the output of following program ?
1
2
3
4
5
6
7
8
9
10
11
12
#include < stdio.h >
int main()
{
int tally=0;
for(;;)
{
if(tally==10)
break;
printf("%d ",++tally);
}
return 0;
}
0 1 2 3 4 5 6 7 8 9 10
0 1 2 3 ... infinite times
1 2 3 4 5 6 7 8 9 10
1 2 3 4 5 6 7 8 9
Date posted: February 24, 2018. Answers (1)
- What will be the output of following program ?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
#include
void main()
{
int i=1;
while (i<=5)
{
...(Solved)
What will be the output of following program ?
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
#include
void main()
{
int i=1;
while (i<=5)
{
printf("%d",i);
if (i==5)
goto print;
i++;
}
}
fun()
{
print:
printf("includehelp.com");
}
Date posted: February 24, 2018. Answers (1)
- What will be the output of following program ?
1
2
3
4
5
6
7
#include
void main()
{
char cnt=0;
for(;cnt++;printf("%d",cnt)) ;
printf("%d",cnt);
}(Solved)
What will be the output of following program ?
1
2
3
4
5
6
7
#include
void main()
{
char cnt=0;
for(;cnt++;printf("%d",cnt)) ;
printf("%d",cnt);
}
Date posted: February 24, 2018. Answers (1)
- What will be the output of following program ?
1
2
3
4
5
6
7
8
#include < stdio.h >
void main()
{ unsigned char var=0;
for(var=0;var<=255;var++)
...(Solved)
What will be the output of following program ?
1
2
3
4
5
6
7
8
#include < stdio.h >
void main()
{ unsigned char var=0;
for(var=0;var<=255;var++)
{
printf("%d ",var);
}
}
Date posted: February 24, 2018. Answers (1)
- What is the advantage of UNION in C?(Solved)
What is the advantage of UNION in C?
Date posted: February 24, 2018. Answers (1)
- Write a C language program to create file “odd” to store all odd numbers between 1 and n.(Solved)
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
Date posted: February 24, 2018. Answers (1)
- Distinguish between character constant and string constant(Solved)
Distinguish between character constant and string constant.
Date posted: February 24, 2018. Answers (1)
- Explain in detail bitwise operators with example(Solved)
Explain in detail bitwise operators with example.
Date posted: February 24, 2018. Answers (1)
- Describe all operators used in C language with example(Solved)
Describe all operators used in C language with example.
Date posted: February 24, 2018. Answers (1)
- Explain the concept of files, records and fields(Solved)
Explain the concept of files, records and fields.
Date posted: February 24, 2018. Answers (1)
- What is built in function?(Solved)
What is built in function?
Date posted: February 24, 2018. Answers (1)
- A feasibility study attempts to establish whether a project is economically, financially,
technically and socially acceptable.
a) (i) Name two ways in which a new system...(Solved)
A feasibility study attempts to establish whether a project is economically, financially,
technically and socially acceptable.
a) (i) Name two ways in which a new system can realize direct savings.
(ii) Name two intangible benefits that can be realized by a new system.
(iii) Name two methods of carrying out an investment appraisal.
b) (i) List three factors to be considered in technical feasibility.
(ii) Mention two circumstances under which you would recommend the use of computer
bureaux instead of developing a new system.
c) (i) Name two factors to be considered in social feasibility study.
(ii) What is the role of the user during the feasibility study stage?
d) You have just completed a feasibility study and you are now in the process of writing a
feasibility study report. Briefly describe five main sections of your report
Date posted: February 15, 2018. Answers (1)
- Most systems fail due to lack of adequate documentation than any other single reason.
Discuss the categories of documentation that may be considered during systems...(Solved)
Most systems fail due to lack of adequate documentation than any other single reason.
Discuss the categories of documentation that may be considered during systems
development life cycle (SDLC)
Date posted: February 15, 2018. Answers (1)
- A system analyst in the development of computerized information systems is defined as an agent of change.Required: (a) Define the term 'agent of change‘ and describe...(Solved)
A system analyst in the development of computerized information systems is defined as an 'agent of change'.
Required:
a) Define the term =agent of change‘ and describe four roles of a system analyst in the
development of computerized information systems.
b) Outline five advantages of an external system analyst in the development of
computerized information systems.
Date posted: February 15, 2018. Answers (1)