Get premium membership and access questions with answers, video lessons as well as revision papers.
- It is single standard
- The cost of connecting is minimal
- Information is easily accessible
- The information is worldwide
Kavungya answered the question on May 14, 2019 at 11:30
- Briefly explain the meaning of the following terms as used in the context of information sharing:
(i) Bandwidth.
(ii) Browsing.
(iii) User net newsgroup.
(iv) File transfer protocol.(Solved)
Briefly explain the meaning of the following terms as used in the context of information sharing:
(i) Bandwidth.
(ii) Browsing.
(iii) User net newsgroup.
(iv) File transfer protocol.
Date posted: May 14, 2019. Answers (1)
- Explain four benefits of e-government.(Solved)
Explain four benefits of e-government.
Date posted: May 14, 2019. Answers (1)
- State three examples of internet service providers in your country.(Solved)
State three examples of internet service providers in your country.
Date posted: May 14, 2019. Answers (1)
- Highlight four factors that determine the downloading speed of a file from a website.(Solved)
Highlight four factors that determine the downloading speed of a file from a website.
Date posted: May 14, 2019. Answers (1)
- "The practice of telecommuting has ensured that there exists a thin line between work,,
family and leisure". In relation to the above statement, evaluate the merits...(Solved)
"The practice of telecommuting has ensured that there exists a thin line between work,,
family and leisure". In relation to the above statement, evaluate the merits and demerits of
telecommuting.
Date posted: May 14, 2019. Answers (1)
- Highlight four social-economic challenges brought about by the rapid advancements in
internet technology.(Solved)
Highlight four social-economic challenges brought about by the rapid advancements in
internet technology.
Date posted: May 14, 2019. Answers (1)
- Highlight four functions of an internet service provider (ISP)(Solved)
Highlight four functions of an internet service provider (ISP)
Date posted: May 14, 2019. Answers (1)
- In relation to internet technology, briefly describe the importance of each of the following:
i. Web server.
ii. Web browser.
iii. HTML.
iv. Cyber cafe(Solved)
In relation to internet technology, briefly describe the importance of each of the following:
i. Web server.
ii. Web browser.
iii. HTML.
iv. Cyber cafe
Date posted: May 14, 2019. Answers (1)
- (a) Briefly describe the flowing terms in relation to computer networking
i. Intranet. .
ii. Extranet,
iii. Global system for mobile (GSM) communication.
iv. Bluetooth.
(b) Explain the role of...(Solved)
(a) Briefly describe the flowing terms in relation to computer networking
i. Intranet. .
ii. Extranet,
iii. Global system for mobile (GSM) communication.
iv. Bluetooth.
(b) Explain the role of interface message processor (IMP) in a computer network.
Date posted: May 14, 2019. Answers (1)
- There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication...(Solved)
There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication systems over analog data
communication systems.
Date posted: May 14, 2019. Answers (1)
- a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices...(Solved)
a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices that he would use in setting up the LAN.
ii) State six advantages of a LAN.
b) Expound the following acronyms as used in computing:
i) TCP.
ii) FTP.
iii) HTTP.
iv) HTML.
v) WWW.
vi) IP.
Date posted: May 14, 2019. Answers (1)
- Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.(Solved)
Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.
Date posted: May 14, 2019. Answers (1)
- a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single...(Solved)
a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single website.
Required
i) Define the term “Protocol”
ii) Describe any four protocols used in the World Wide Web.
iii) Outline four ways of accessing web pages.
Date posted: May 14, 2019. Answers (1)
- Distinguish between synchronous and asynchronous data transmission modes.(Solved)
Distinguish between synchronous and asynchronous data transmission modes.
Date posted: May 14, 2019. Answers (1)
- i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface(Solved)
i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface
Date posted: May 14, 2019. Answers (1)
- Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse...(Solved)
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse sales data but suspects that her home
computer might.be infected by computer viruses.
Required:
i) Illustrate any four unusual events that could alert Joyce Kubo of possible computer virus
infection.
ii) Suppose after completing her analysis, Joyce Kubo prepares her results in PDF file format
and posts them to the company's website.
Briefly explain two reasons why Joyce Kubo could prefer the PDF file format.
iii) Suppose Joyce Kubo intends to display her results using a presentation package.
Describe four precautions which Joyce Kubo should observe when putting text in
presentation.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.(Solved)
(i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
Date posted: May 14, 2019. Answers (1)
- a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,(Solved)
a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.(Solved)
(i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
Date posted: May 14, 2019. Answers (1)
- Briefly discuss four advantages of the virtual private network.(Solved)
Briefly discuss four advantages of the virtual private network.
Date posted: May 14, 2019. Answers (1)