-
Explain three ways by which computer users can protect their eyes from harmful emissions from the computer screen
(Solved)
Explain three ways by which computer users can protect their eyes from harmful emissions from the computer screen
Date posted:
June 5, 2019
.
Answers (1)
-
A school bought a computer system. The hardware items supplied include: a 800 MHz processor, 64 MB of RAM, a sound card, speakers, a monitor,...
(Solved)
A school bought a computer system. The hardware items supplied include: a 800 MHz processor, 64 MB of RAM, a sound card, speakers, a monitor, a keyboard, a 120 GB hard disk, a floppy disk drive, a CD – Read/ write drive, a mouse, a modem, an inkjet printer and a joystick.
The software supplied include: an operating system, a BASIC interpreter and the following packages: spreadsheets, graphics, word processor, art, database and games
(a) List three input devices from the given specifications
(b) Explain the meaning of the following
(i) 800 MHZ
(ii) 64 MB of RAM
(iii) 120 GB hard disk
(c) Some of the students in the school use the computer to do homework. Name the package used to:
(i) Do calculations and draw graphs
(ii) Write an essay
(iii) Make a poster
(d) Students enjoy playing noisy computer games
(i) Which two hardware items are needed to produce sound?
(ii) Which input device is only used for playing games?
Date posted:
June 5, 2019
.
Answers (1)
-
A school organizes its work in directories. The director WP contains the files CATS, EXAMS and ASSIGNMENTS. The directory of SP contain the spreadsheet files....
(Solved)
A school organizes its work in directories. The director WP contains the files CATS, EXAMS and ASSIGNMENTS. The directory of SP contain the spreadsheet files. The directory DB contains the database files. The directory PROG is contained in the OTHERS directory. The directory WP also contains the PERSONAL directory. Given that the directory STUDENT contains directories SP, DB, WP and OTHERS
(a) Draw the directory tree structure with C as the root
(b) Write the path at which the contents of subdirectory DB can be erased or displayed
Date posted:
June 5, 2019
.
Answers (1)
-
Write the path for the directory PROG
(Solved)
Write the path for the directory PROG
Date posted:
June 5, 2019
.
Answers (1)
-
Give two reasons for storing files in directories and subdirectories
(Solved)
Give two reasons for storing files in directories and subdirectories
Date posted:
June 5, 2019
.
Answers (1)
-
For each of the following give one reason why they are not allowed in a computer laboratory
(i) Smoking
(ii) Eating foods
(Solved)
For each of the following give one reason why they are not allowed in a computer laboratory
(i) Smoking
(ii) Eating foods
Date posted:
June 5, 2019
.
Answers (1)
-
A serial file comprises of records placed in positions 1 to 10. State the position of the end of the file market.
(Solved)
A serial file comprises of records placed in positions 1 to 10. State the position of the end of the file market.
Date posted:
June 5, 2019
.
Answers (1)
-
Write the number 45110 in BCD notation
(Solved)
Write the number 45110 in BCD notation
Date posted:
June 5, 2019
.
Answers (1)
-
Arrange the following data units in ascending order of size.
BYTE, FILE, BIT, NIBBLE
(Solved)
Arrange the following data units in ascending order of size.
BYTE, FILE, BIT, NIBBLE
Date posted:
June 5, 2019
.
Answers (1)
-
i) Draw a flowchart to compute the combined resistance (R) of two resistors R+1 and Ra=2 in parallel using the formula
ii) WRITE A PROGRAM USING...
(Solved)
i) Draw a flowchart to compute the combined resistance (R) of two resistors R+1 and Ra=2 in parallel using the formula
ii) WRITE A PROGRAM USING Pascal or c languages for the flowchart in c(i) above.
Date posted:
June 5, 2019
.
Answers (1)
-
Differentiate between bolding and highlighting text.
(Solved)
Differentiate between bolding and highlighting text.
Date posted:
June 5, 2019
.
Answers (1)
-
Using two's complement, subtract 7 from 4 and give the answer in decimal notation.
(Solved)
Using two's complement, subtract 7 from 4 and give the answer in decimal notation.
Date posted:
June 5, 2019
.
Answers (1)
-
Convert 91B16 to octal.
(Solved)
Convert 91B16 to octal.
Date posted:
June 5, 2019
.
Answers (1)
-
Briefly explain the classification of computer according to historical development (generations)
(Solved)
Briefly explain the classification of computer according to historical development (generations)
Date posted:
June 5, 2019
.
Answers (1)
-
Explain the following input/ output terms as used in computer systems. Give an example for each
(a) Read
(b) Write
(Solved)
Explain the following input/ output terms as used in computer systems. Give an example for each
(a) Read
(b) Write
Date posted:
June 5, 2019
.
Answers (1)
-
A manager wishes to replace the current manual system with a computerised one. Describe three main areas that must be evaluated to justify the replacement....
(Solved)
A manager wishes to replace the current manual system with a computerised one. Describe three main areas that must be evaluated to justify the replacement.
Date posted:
May 7, 2019
.
Answers (1)
-
Students of a school intend to elect their school captain by secret
ballot. State three ways in which computers can be used to improve the
election process.
(Solved)
Students of a school intend to elect their school captain by secret
ballot. State three ways in which computers can be used to improve the
election process.
Date posted:
May 7, 2019
.
Answers (1)
-
List three factors that should be considered when developing a database
application and give reasons why each should be considered.
(Solved)
List three factors that should be considered when developing a database
application and give reasons why each should be considered.
Date posted:
May 7, 2019
.
Answers (1)
-
What is the difference between a CRT’S monitors and a flat panel display
(Solved)
What is the difference between a CRT’S monitors and a flat panel display.
Date posted:
May 1, 2019
.
Answers (1)
-
To prevent unauthorized access to the computer room, which control measures should be implemented?
(Solved)
To prevent unauthorized access to the computer room, which control measures should be implemented?
Date posted:
April 24, 2019
.
Answers (1)