• Unnecessary duplication of data
• Boredom & time wastage especially when searching for a particular item
• In order to carry out any file processing task(s), all the related files have to be processed
• Misleading reports due to poor data entry and organization
• Difficulty in sorting, retrieving & updating records
• Security: no protection of files against unauthorized access and corruption
• Sharing of files is difficult
• Some information resulting from several files may not be available.
Kavungya answered the question on June 6, 2019 at 09:08
- The following car details are to be entered in a database: Make, Date-of-manufacture, colour, and cost.
a) Prepare a suitable database structure showing field names and...(Solved)
The following car details are to be entered in a database: Make, Date-of-manufacture, colour, and cost.
a) Prepare a suitable database structure showing field names and their field data types
b) Explain how you index the data such that cars of the same make and colour are together.
c) Write a statement that can be used to select cars of colour green.
d) Give an instruction that would:
i) Select cars whose cost is between 500,000/= and 1,000,000/=
ii) Determine the average cost of all cars.
Date posted: June 6, 2019. Answers (1)
- Differentiate between Fill and stroke(Solved)
Differentiate between Fill and stroke
Date posted: June 6, 2019. Answers (1)
- Differentiate between Change case and drop cap.(Solved)
Differentiate between Change case and drop cap.
Date posted: June 6, 2019. Answers (1)
- Differentiate between Margins and column guides.(Solved)
Differentiate between Margins and column guides.
Date posted: June 6, 2019. Answers (1)
- Differentiate between pasteboard and printable page(Solved)
Differentiate between pasteboard and printable page.
Date posted: June 6, 2019. Answers (1)
- Why is layering very useful in a desktop publisher?(Solved)
Why is layering very useful in a desktop publisher?
Date posted: June 6, 2019. Answers (1)
- Name the two most common protocols for the Internet, and state their functions.(Solved)
Name the two most common protocols for the Internet, and state their functions.
Date posted: June 6, 2019. Answers (1)
- Mention two examples of email software.(Solved)
Mention two examples of email software.
Date posted: June 6, 2019. Answers (1)
- Briefly describe four factors contributing to Internet access and growth in Kenya.(Solved)
Briefly describe four factors contributing to Internet access and growth in Kenya.
Date posted: June 6, 2019. Answers (1)
- Differentiate between data security and data integrity.(Solved)
Differentiate between data security and data integrity.
Date posted: June 6, 2019. Answers (1)
- Computer systems need maximum security to prevent an unauthorized access. State six precautions that you would expect an organization to take to prevent illegal access...(Solved)
Computer systems need maximum security to prevent an unauthorized access. State six precautions that you would expect an organization to take to prevent illegal access to its computer-based systems.
Date posted: June 6, 2019. Answers (1)
- Give four rules that must be observed in order to keep within the law when working with data and information.(Solved)
Give four rules that must be observed in order to keep within the law when working with data and information.
Date posted: June 6, 2019. Answers (1)
- An individual has a right to demand guarantee to privacy of personal information stored on a computer. Give three such types of information.(Solved)
An individual has a right to demand guarantee to privacy of personal information stored on a computer. Give three such types of information.
Date posted: June 6, 2019. Answers (1)
- Clearly differentiate between data collection and data capture.(Solved)
Clearly differentiate between data collection and data capture.
Date posted: June 6, 2019. Answers (1)
- Name the examples of industries and business organizations that extensively use distributed processing systems.(Solved)
Name the examples of industries and business organizations that extensively use distributed processing systems.
Date posted: June 6, 2019. Answers (1)
- Explain the concept of multiprogramming(Solved)
Explain the concept of multiprogramming
Date posted: June 6, 2019. Answers (1)
- State at least four advantages of storing data in computer files over the manual filing system(Solved)
State at least four advantages of storing data in computer files over the manual filing system
Date posted: June 6, 2019. Answers (1)
- In a computer based information system, state the purpose of the computer files, and give one example where such a file may be required in...(Solved)
In a computer based information system, state the purpose of the computer files, and give one example where such a file may be required in a school.
Date posted: June 6, 2019. Answers (1)
- What are low-level languages? Give their features.(Solved)
What are low-level languages? Give their features.
Date posted: June 6, 2019. Answers (1)
- Examine two features of fourth generation languages (4GLS)(Solved)
Examine two features of fourth generation languages (4GLS)
Date posted: June 6, 2019. Answers (1)