- shielded twisted pair
- Unshielded twisted pair
marto answered the question on September 26, 2019 at 06:33
- The internet has been embraced as great a great resource for information and a variety of applications. State two ways in which a book publisher...(Solved)
The internet has been embraced as great a great resource for information and a variety of applications. State two ways in which a book publisher can make use of the internet.
Date posted: September 26, 2019. Answers (1)
- Define a network node(Solved)
Define a network node
Date posted: September 26, 2019. Answers (1)
- The diagram below shows a network arrangement that includes a network security feature to protect data and information. Use it to answers the questions that...(Solved)
The diagram below shows a network arrangement that includes a network security feature to protect data and information. Use it to answers the questions that follow.
(i) The networking device labeled A is used to connect computers to a WAN (Internet). Name the device used for this purpose.
(ii) The part labeled B is a security feature used to protect data traffic in the network. Identify and explain the function of this part.
Date posted: September 26, 2019. Answers (1)
- State two roles of a programmer in system development life cycle.(Solved)
State two roles of a programmer in system development life cycle.
Date posted: September 26, 2019. Answers (1)
- Differentiate between Multi-user operating system and Multi threading operating system(Solved)
Differentiate between Multi-user operating system and Multi threading operating system
Date posted: September 26, 2019. Answers (1)
- Kiprono has been experiencing a lot of problems in his computer while using it. As a result, he was advised to do the following in...(Solved)
Kiprono has been experiencing a lot of problems in his computer while using it. As a result, he was advised to do the following in order to avoid the problems.
(i) Compress the disk files
(ii) Defragment the disk.
Explain the difference between the two terms above
Date posted: September 26, 2019. Answers (1)
- Differentiate between a select query and action query as used in databases.(Solved)
Differentiate between a select query and action query as used in databases.
Date posted: September 26, 2019. Answers (1)
- A concert was organized in a hall with a capacity of 1500 people. The first 700 people to buy the tickets at ksh. 1500 were...(Solved)
A concert was organized in a hall with a capacity of 1500 people. The first 700 people to buy the tickets at ksh. 1500 were reserved a seat at the VIP section while the others who bought their tickets at ksh. 1000 sat at normal hall outside the VIP section. Assuming that only 1420 tickets were sold;
i) Write a program pseudocode that would be used to determine the sitting arrangements of ticket holders i.e VIP or Normal, the number of VIP, Normal and Unoccupied seats and finally dispay the total amount of money collected from the concert
ii) Draw a flowchart for the pseudocode above
Date posted: September 26, 2019. Answers (1)
- A company in town wishes to link its offices together; the linking may be through wireless or fibre optic network media
State two benefits that the...(Solved)
A company in town wishes to link its offices together; the linking may be through wireless or fibre optic network media
State two benefits that the company would gain from the use of metropolitan area network (MAN)
Date posted: September 26, 2019. Answers (1)
- State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media.(Solved)
State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media.
Date posted: September 26, 2019. Answers (1)
- With the aid of a diagram describe the Hierarchical Database Model.(Solved)
With the aid of a diagram describe the Hierarchical Database Model.
Date posted: September 26, 2019. Answers (1)
- State two transmission media used in wireless transmission.(Solved)
State two transmission media used in wireless transmission.
Date posted: September 26, 2019. Answers (1)
- State any two techniques used by a network administrator to detect and prevent computer crimes.(Solved)
State any two techniques used by a network administrator to detect and prevent computer crimes.
Date posted: September 26, 2019. Answers (1)
- State the use of each of the following flowchart symbols.(Solved)
State the use of each of the following flowchart symbols.
Date posted: September 26, 2019. Answers (1)
- List any three protocols used in sending and receiving of emails.(Solved)
List any three protocols used in sending and receiving of emails.
Date posted: September 26, 2019. Answers (1)
- Name three types of graphics used in a word processor.(Solved)
Name three types of graphics used in a word processor.
Date posted: September 26, 2019. Answers (1)
- List three examples of Data Communication Equipment.(Solved)
List three examples of Data Communication Equipment.
Date posted: September 26, 2019. Answers (1)
- What is meant by Data Communication Equipment (DCE)?(Solved)
What is meant by Data Communication Equipment (DCE)?
Date posted: September 26, 2019. Answers (1)
- Briefly describe the two types of spreadsheets.(Solved)
Briefly describe the two types of spreadsheets.
Date posted: September 18, 2019. Answers (1)
- List two duties performed by each of the following personnel.
(i). Database administrator
(ii). Computer trainer(Solved)
List two duties performed by each of the following personnel.
(i). Database administrator
(ii). Computer trainer
Date posted: September 18, 2019. Answers (1)