Get premium membership and access questions with answers, video lessons as well as revision papers.
1.Application software,e.g Adobe Reader
2.System software,e.g Windows
3.Test-ware,e.g debuggers
4.Web pages
5.Device Drivers
STEPHKIMOTHO answered the question on May 26, 2018 at 09:09
- List three categories of operating systems(Solved)
List three categories of operating systems.
Date posted: May 26, 2018. Answers (1)
- As a programmer, what is the significance of the Integrated Development Environment(IDE) in programming?(Solved)
As a programmer, what is the significance of the Integrated Development Environment(IDE) in programming?
Date posted: May 26, 2018. Answers (1)
- As a programmer, briefly explain why comments are used when writing a program(Solved)
As a programmer, briefly explain why comments are used when writing a program.
Date posted: May 26, 2018. Answers (1)
- Define the following terms as used in computer programming: (a.) A compiler (b.) A debugger (c.) An algorithm(Solved)
Define the following terms as used in computer programming: (a.) A compiler (b.) A debugger (c.) An algorithm
Date posted: May 26, 2018. Answers (1)
- What is computer programming?(Solved)
What is computer programming?
Date posted: May 26, 2018. Answers (1)
- Using an example, differentiate a code from a program(Solved)
Using an example, differentiate a code from a program.
Date posted: May 26, 2018. Answers (1)
- Explain three techniques of detecting deadlocks in a computer system(Solved)
Explain three techniques of detecting deadlocks in a computer system.
Date posted: May 16, 2018. Answers (1)
- Explain common types of computer networks(Solved)
Explain common types of computer networks.
Date posted: May 16, 2018. Answers (1)
- What is social Engineering?(Solved)
What is social Engineering?
Date posted: May 16, 2018. Answers (1)
- Explain characteristics of information security within an organization? (Solved)
Explain characteristics of information security within an organization?
Date posted: May 16, 2018. Answers (1)
- Giving examples explain threats to data security(Solved)
Giving examples explain threats to data security.
Date posted: May 16, 2018. Answers (1)
- What is a cyber crime?(Solved)
What is a cyber crime?
Date posted: May 16, 2018. Answers (1)
- Describe the difference between an internal and an external hyperlink(Solved)
Describe the difference between an internal and an external hyperlink
Date posted: May 14, 2018. Answers (1)
- What’s the difference between encoding, encryption, and hashing?
(Solved)
What’s the difference between encoding, encryption, and hashing?
Date posted: May 13, 2018. Answers (1)
- Expand on Claude Shannon’s theorem. Differentiate the term confusion and diffusion as envisaged by Shannon to strengthen crypto-algorithm.(Solved)
Expand on Claude Shannon’s theorem. Differentiate the term confusion and diffusion as envisaged by Shannon to strengthen crypto-algorithm.
Date posted: May 13, 2018. Answers (1)
- In DES, the encryption and decryption algorithms are the same. Is that also the case in AES?(Solved)
In DES, the encryption and decryption algorithms are the same. Is that also the case in AES?
Date posted: May 13, 2018. Answers (1)
- What do we mean by public-key cryptography?(Solved)
What do we mean by public-key cryptography?
Date posted: May 13, 2018. Answers (1)
- What is a certificate and why are certificates needed in public key cryptography?(Solved)
What is a certificate and why are certificates needed in public key cryptography?
Date posted: May 13, 2018. Answers (1)
- Given this class fragment,
class samp {
double *p;
public:
samp (do d) {
p = (double *) malloc(sizeof(double));
if (!p) exit (1); //allocation error
*p = d;
}
~samp() {free(p) ;}
//...
}; ...(Solved)
Given this class fragment,
class samp {
double *p;
public:
samp (do d) {
p = (double *) malloc(sizeof(double));
if (!p) exit (1); //allocation error
*p = d;
}
~samp() {free(p) ;}
//...
};
//...
samp ob1(1, ob2(0.0);
//...
ob2 = ob1;
what problem is caused by the assignment of ob1 to ob2?
Date posted: May 12, 2018. Answers (1)
- To illustrate exactly when an object is constructed and destructed when returned from a function, create a C++ class called who. Have who's constructor take...(Solved)
To illustrate exactly when an object is constructed and destructed when returned from a function, create a C++ class called who. Have who's constructor take one character argument that will be used to identify an object.Have the constructor display a message similar to this when constructing an object:
Constructing who #X
where x is the identifying character associated with each object when an object is destroyed, have a message similar to this displayed:
Destroying who #x
where, again, x is the identifying character. Finally, create a function called make_who() that returns a who object. Give each object a unique name.Note the output displayed by the program.
Date posted: May 12, 2018. Answers (1)