i) Web server program
Is software that runs on the web site hosting Server computer. Its main purpose is serving web
pages, which means it waits for requests from web browsers (also known as clients) and
responds by sending the required data back.
ii) Web browser
Is a software program that allows you to browse, search, and receive various types of
information such as: websites, videos and audio files, images, and other documents on the Web.
The primary functions of a web browser are to retrieve or fetch information to the user, allow
them to view it, and access information.
in) HyperText Markup Language (HTML)
Is the main markup language for creating web pages and other information that can be displayed
in a web browser.
HTML elements form the building blocks of all websites. HTML allows images and objects to
be embedded and can be used to create interactive forms. It provides a means to create structured
documents by denoting structural semantics for text such as headings, paragraphs, lists, links,
quotes and other items.
iv) Internet cafe or cybercafe
Is a place which provides internet access to the public, usually for a fee.
Assist those who cannot afford the computer to access internet.
Global system for mobile communication (GSM) is a wide area wireless communications system
that uses digital radio transmission to provide voice, data, and multimedia communication
services. A GSM system coordinates the communication between a mobile telephones (mobile
stations), base stations (Tell sites'), and switching systems,
Kavungya answered the question on May 14, 2019 at 09:39
- (a) Briefly describe the flowing terms in relation to computer networking
i. Intranet. .
ii. Extranet,
iii. Global system for mobile (GSM) communication.
iv. Bluetooth.
(b) Explain the role of...(Solved)
(a) Briefly describe the flowing terms in relation to computer networking
i. Intranet. .
ii. Extranet,
iii. Global system for mobile (GSM) communication.
iv. Bluetooth.
(b) Explain the role of interface message processor (IMP) in a computer network.
Date posted: May 14, 2019. Answers (1)
- There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication...(Solved)
There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication systems over analog data
communication systems.
Date posted: May 14, 2019. Answers (1)
- a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices...(Solved)
a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices that he would use in setting up the LAN.
ii) State six advantages of a LAN.
b) Expound the following acronyms as used in computing:
i) TCP.
ii) FTP.
iii) HTTP.
iv) HTML.
v) WWW.
vi) IP.
Date posted: May 14, 2019. Answers (1)
- Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.(Solved)
Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.
Date posted: May 14, 2019. Answers (1)
- a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single...(Solved)
a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single website.
Required
i) Define the term “Protocol”
ii) Describe any four protocols used in the World Wide Web.
iii) Outline four ways of accessing web pages.
Date posted: May 14, 2019. Answers (1)
- Distinguish between synchronous and asynchronous data transmission modes.(Solved)
Distinguish between synchronous and asynchronous data transmission modes.
Date posted: May 14, 2019. Answers (1)
- i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface(Solved)
i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface
Date posted: May 14, 2019. Answers (1)
- Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse...(Solved)
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse sales data but suspects that her home
computer might.be infected by computer viruses.
Required:
i) Illustrate any four unusual events that could alert Joyce Kubo of possible computer virus
infection.
ii) Suppose after completing her analysis, Joyce Kubo prepares her results in PDF file format
and posts them to the company's website.
Briefly explain two reasons why Joyce Kubo could prefer the PDF file format.
iii) Suppose Joyce Kubo intends to display her results using a presentation package.
Describe four precautions which Joyce Kubo should observe when putting text in
presentation.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.(Solved)
(i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
Date posted: May 14, 2019. Answers (1)
- a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,(Solved)
a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.(Solved)
(i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
Date posted: May 14, 2019. Answers (1)
- Briefly discuss four advantages of the virtual private network.(Solved)
Briefly discuss four advantages of the virtual private network.
Date posted: May 14, 2019. Answers (1)
- (i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.(Solved)
(i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
Date posted: May 14, 2019. Answers (1)
- Explain three modes of data communication and their practical use.(Solved)
Explain three modes of data communication and their practical use.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices(Solved)
(i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
Date posted: May 14, 2019. Answers (1)
- Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.(Solved)
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
Date posted: May 14, 2019. Answers (1)
- Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records...(Solved)
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.
Required:
Describe five types of general information systems controls.
Date posted: May 14, 2019. Answers (1)
- Differentiate between information systems (IS) and information technology (IT).(Solved)
Differentiate between information systems (IS) and information technology (IT).
Date posted: May 14, 2019. Answers (1)
- a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system...(Solved)
a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system that could arise as a result of
computer crime.
Date posted: May 14, 2019. Answers (1)
- Identify three vital services which information systems can provide to a business organization.(Solved)
Identify three vital services which information systems can provide to a business organization.
Date posted: May 14, 2019. Answers (1)