Get premium membership and access questions with answers, video lessons as well as revision papers.
Data is stored and maintained in a single location
Users in remote locations access the data over a WAN
The database is maintained centrally
Security is managed centrally
marlinbito answered the question on July 2, 2018 at 07:09
- Describe two advantages of using RFID instead of bar codes to identify aircraft parts.(Solved)
Describe two advantages of using RFID instead of bar codes to identify aircraft parts.
Date posted: July 2, 2018. Answers (1)
- RFID is used to identify aircraft parts. Describe the main features of RFID.
(Solved)
RFID is used to identify aircraft parts. Describe the main features of RFID.
Date posted: July 2, 2018. Answers (1)
- Describe the main features of a typical browser.(Solved)
Describe the main features of a typical browser.
Date posted: July 2, 2018. Answers (1)
- A Job Centre has a number of interactive terminals. Members of the public use a search engine to find jobs on the Internet.
Explain how...(Solved)
A Job Centre has a number of interactive terminals. Members of the public use a search engine to find jobs on the Internet.
Explain how a search engine is used.
Date posted: July 2, 2018. Answers (1)
- Identify three different types of internal memory and describe how each is used(Solved)
Identify three different types of internal memory and describe how each is used
Date posted: July 2, 2018. Answers (1)
- Data can be processed using batch processing. Describe the main features of batch processing.(Solved)
Data can be processed using batch processing. Describe the main features of batch processing.
Date posted: July 2, 2018. Answers (1)
- Describe two benefits of using OCR to capture data(Solved)
Describe two benefits of using OCR to capture data
Date posted: July 2, 2018. Answers (1)
- A scanner is used to input a text document. Describe the main features of Optical Character Recognition (OCR).(Solved)
A scanner is used to input a text document. Describe the main features of Optical Character Recognition (OCR).
Date posted: July 2, 2018. Answers (1)
- Organisations are making increasing use of cloud computing.
In cloud computing, data is stored on a global network of servers using the Internet.
Write a...(Solved)
Organisations are making increasing use of cloud computing.
In cloud computing, data is stored on a global network of servers using the Internet.
Write a report evaluating
• The ICT resources required by an organisation for cloud computing
• The impact of Data Protection legislation for an organisation using cloud computing
Date posted: July 2, 2018. Answers (1)
- A manufacturer uses robots to assemble touch screens for computers. Describe the main features of touch screen technology.(Solved)
A manufacturer uses robots to assemble touch screens for computers. Describe the main features of touch screen technology.
Date posted: July 2, 2018. Answers (1)
- Describe the main features of an interactive DVD which make it suitable for training users(Solved)
Describe the main features of an interactive DVD which make it suitable for training users
Date posted: July 1, 2018. Answers (1)
- Computer users can get support and training in various ways. Explain how users could get support from a user group.(Solved)
Computer users can get support and training in various ways. Explain how users could get support from a user group.
Date posted: July 1, 2018. Answers (1)
- Name and describe two psychological factors which can influence how humans interact with a computer.(Solved)
Name and describe two psychological factors which can influence how humans interact with a computer.
Date posted: July 1, 2018. Answers (1)
- Describe one method of ensuring that data transmitted over a network is secure.(Solved)
Describe one method of ensuring that data transmitted over a network is secure.
Date posted: July 1, 2018. Answers (1)
- It is important that data on a network is kept secure. Describe one method of ensuring that access to data on a network is restricted(Solved)
It is important that data on a network is kept secure. Describe one method of ensuring that access to data on a network is restricted
Date posted: July 1, 2018. Answers (1)
- Name and describe one other method of detecting data transmission errors(Solved)
Name and describe one other method of detecting data transmission errors
Date posted: July 1, 2018. Answers (1)
- Parity bits can be used to detect errors. Evaluate the use of parity bits in detecting data transmission errors.(Solved)
Parity bits can be used to detect errors. Evaluate the use of parity bits in detecting data transmission errors.
Date posted: July 1, 2018. Answers (1)
- The organisation uses the DBMS to process real-time transactions. Describe a suitable backup and recovery strategy for the DBMS.(Solved)
The organisation uses the DBMS to process real-time transactions. Describe a suitable backup and recovery strategy for the DBMS.
Date posted: July 1, 2018. Answers (1)
- An organisation uses a Database Management System (DBMS) and a decision support system. Explain the role of the Database Administrator (DBA).(Solved)
An organisation uses a Database Management System (DBMS) and a decision support system. Explain the role of the Database Administrator (DBA).
Date posted: July 1, 2018. Answers (1)
- Describe two benefits of developing a system in-house(Solved)
Describe two benefits of developing a system in-house
Date posted: July 1, 2018. Answers (1)