Get premium membership and access questions with answers, video lessons as well as revision papers.
• Statement should be short, clear and readable
• Statements should not be ambiguous i.e. statements should have more than one meaning
• A pseudo code should clearly show start, stop and control structures.
• A pseudo code should be clear and well indicated
• Input process and output and output statement should be clearly stated using keywords e.g. print, input, read.
Musyoxx answered the question on February 28, 2018 at 16:23
- Explain the meaning of “what if analysis” in spreadsheets(Solved)
Explain the meaning of “what if analysis” in spreadsheets
Date posted: February 28, 2018. Answers (1)
- Distinguish between Hard system and soft system(Solved)
Distinguish between Hard system and soft system
Date posted: February 28, 2018. Answers (1)
- State two reasons for partitioning a disk. (Solved)
State two reasons for partitioning a disk.
Date posted: February 28, 2018. Answers (1)
- Differentiate between partitioning and formatting as used in disk management.(Solved)
Differentiate between partitioning and formatting as used in disk management.
Date posted: February 28, 2018. Answers (1)
- Define the following features of a desktop:(a)icons (b)task bar (c)background (d)recycle bin(Solved)
Define the following features of a desktop:
(a)icons
(b)task bar
(c)background
(d)recycle bin
Date posted: February 28, 2018. Answers (1)
- Differentiate between Entity type and Entity set. (Solved)
Differentiate between Entity type and Entity set.
Date posted: February 28, 2018. Answers (1)
- Define entity as used in DBMS with example? (Solved)
Define entity as used in DBMS with example?
Date posted: February 28, 2018. Answers (1)
- Define the concept of “database schema.” Describe the types of schemas
that exist in a database complying with the three levels ANSI/SPARC architecture.(Solved)
Define the concept of “database schema.” Describe the types of schemas
that exist in a database complying with the three levels ANSI/SPARC architecture.
Date posted: February 28, 2018. Answers (1)
- What is poor email etiquette?(Solved)
What is poor email etiquette?
Date posted: February 28, 2018. Answers (1)
- What the name for the program or service that lets you view e-mail messages?(Solved)
What the name for the program or service that lets you view e-mail messages?
Date posted: February 28, 2018. Answers (1)
- With the use of internet, email has become part and parcel of communication. Briefly describe the negative impact it brings.(Solved)
With the use of internet, email has become part and parcel of communication. Briefly describe the negative impact it bring.
Date posted: February 28, 2018. Answers (1)
- The internet is making the world to be a global village with easier communication of email. Describe the advantages of using email for communication.(Solved)
The internet is making the world to be a global village with easier communication of email. Describe the advantages of using email for communication.
Date posted: February 28, 2018. Answers (1)
- State a specific example where each of the following types of computers can be used: super computer, mainframe computer, minicomputer, micro computer(Solved)
State a specific example where each of the following types of computers can be used:
Super computer
Mainframe computer
Minicomputer
Micro computer
Date posted: February 28, 2018. Answers (1)
- After a system is implemented, it is evaluated. Give 3 reasons why a system should be evaluated.(Solved)
After a system is implemented, it is evaluated. Give 3 reasons why a system should be evaluated.
Date posted: February 27, 2018. Answers (1)
- Outline the seven open systems interconnection ( OSI ) reference model Layers in their order(Solved)
Outline the seven open systems interconnection ( OSI ) reference model Layers in their order
Date posted: February 27, 2018. Answers (1)
- Explain the meaning of the terms below as used in data security and controls. (i) Information security (ii) Fraud (iii) Eavesdropping (Solved)
Explain the meaning of the terms below as used in data security and controls.
(i) Information security
(ii) Fraud
(iii) Eavesdropping
Date posted: February 27, 2018. Answers (1)
- Make a clear difference between Log file and Firewall.(Solved)
Make a clear difference between Log file and Firewall.
Date posted: February 27, 2018. Answers (1)
- Give FOUR reasons why operating systems were developed. (Solved)
Give FOUR reasons why operating systems were developed.
Date posted: February 27, 2018. Answers (1)
- State advantages of using wireless transmission media to connect to the internet.(Solved)
State advantages of using wireless transmission media to connect to the internet.
Date posted: February 27, 2018. Answers (1)
- Make a clear difference between a Website and Web portal(Solved)
Make a clear difference between a Website and Web portal
Date posted: February 27, 2018. Answers (1)