Get premium membership and access questions with answers, video lessons as well as revision papers.
- Convert 0.4210 to 6-bit binary notation.(Solved)
Convert 0.4210 to 6-bit binary notation.
Date posted: September 26, 2019. Answers (1)
- Compute the following binary arithmetic expressions.
(i) 1010.101 + 11.011
(ii) 1010.101 - 11.011(Solved)
Compute the following binary arithmetic expressions.
(i) 1010.101 + 11.011
(ii) 1010.101 - 11.011
Date posted: September 26, 2019. Answers (1)
- Differentiate between enhanced BCD and ASCII-8 coding scheme of representing data in computers.(Solved)
Differentiate between enhanced BCD and ASCII-8 coding scheme of representing data in computers.
Date posted: September 26, 2019. Answers (1)
- With aid of a labeled diagram, describe ring network topology; stating one disadvantage of such network.(Solved)
With aid of a labeled diagram, describe ring network topology; stating one disadvantage of such network.
Date posted: September 26, 2019. Answers (1)
- Name and explain two types of twisted pair cable used in data transmission.(Solved)
Name and explain two types of twisted pair cable used in data transmission.
Date posted: September 26, 2019. Answers (1)
- The internet has been embraced as great a great resource for information and a variety of applications. State two ways in which a book publisher...(Solved)
The internet has been embraced as great a great resource for information and a variety of applications. State two ways in which a book publisher can make use of the internet.
Date posted: September 26, 2019. Answers (1)
- Define a network node(Solved)
Define a network node
Date posted: September 26, 2019. Answers (1)
- The diagram below shows a network arrangement that includes a network security feature to protect data and information. Use it to answers the questions that...(Solved)
The diagram below shows a network arrangement that includes a network security feature to protect data and information. Use it to answers the questions that follow.
(i) The networking device labeled A is used to connect computers to a WAN (Internet). Name the device used for this purpose.
(ii) The part labeled B is a security feature used to protect data traffic in the network. Identify and explain the function of this part.
Date posted: September 26, 2019. Answers (1)
- State two roles of a programmer in system development life cycle.(Solved)
State two roles of a programmer in system development life cycle.
Date posted: September 26, 2019. Answers (1)
- Differentiate between Multi-user operating system and Multi threading operating system(Solved)
Differentiate between Multi-user operating system and Multi threading operating system
Date posted: September 26, 2019. Answers (1)
- Kiprono has been experiencing a lot of problems in his computer while using it. As a result, he was advised to do the following in...(Solved)
Kiprono has been experiencing a lot of problems in his computer while using it. As a result, he was advised to do the following in order to avoid the problems.
(i) Compress the disk files
(ii) Defragment the disk.
Explain the difference between the two terms above
Date posted: September 26, 2019. Answers (1)
- Differentiate between a select query and action query as used in databases.(Solved)
Differentiate between a select query and action query as used in databases.
Date posted: September 26, 2019. Answers (1)
- A concert was organized in a hall with a capacity of 1500 people. The first 700 people to buy the tickets at ksh. 1500 were...(Solved)
A concert was organized in a hall with a capacity of 1500 people. The first 700 people to buy the tickets at ksh. 1500 were reserved a seat at the VIP section while the others who bought their tickets at ksh. 1000 sat at normal hall outside the VIP section. Assuming that only 1420 tickets were sold;
i) Write a program pseudocode that would be used to determine the sitting arrangements of ticket holders i.e VIP or Normal, the number of VIP, Normal and Unoccupied seats and finally dispay the total amount of money collected from the concert
ii) Draw a flowchart for the pseudocode above
Date posted: September 26, 2019. Answers (1)
- A company in town wishes to link its offices together; the linking may be through wireless or fibre optic network media
State two benefits that the...(Solved)
A company in town wishes to link its offices together; the linking may be through wireless or fibre optic network media
State two benefits that the company would gain from the use of metropolitan area network (MAN)
Date posted: September 26, 2019. Answers (1)
- State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media.(Solved)
State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media.
Date posted: September 26, 2019. Answers (1)
- With the aid of a diagram describe the Hierarchical Database Model.(Solved)
With the aid of a diagram describe the Hierarchical Database Model.
Date posted: September 26, 2019. Answers (1)
- State two transmission media used in wireless transmission.(Solved)
State two transmission media used in wireless transmission.
Date posted: September 26, 2019. Answers (1)
- State any two techniques used by a network administrator to detect and prevent computer crimes.(Solved)
State any two techniques used by a network administrator to detect and prevent computer crimes.
Date posted: September 26, 2019. Answers (1)
- State the use of each of the following flowchart symbols.(Solved)
State the use of each of the following flowchart symbols.
Date posted: September 26, 2019. Answers (1)
- List any three protocols used in sending and receiving of emails.(Solved)
List any three protocols used in sending and receiving of emails.
Date posted: September 26, 2019. Answers (1)