Get premium membership and access questions with answers, video lessons as well as revision papers.
-Expert systems: software designed to operate at a level of a human expert in a specific area of specialization.for example, medical diagnosis
-Natural language processing: special programming where computers can recognize and understand natural language
-Artificial neural networks: Use of electronic devices and software to emulate the neurological structure of human brain
-Robotics/ perception systems: Computer controlled device that emulate a human being in carrying out tasks that would otherwise be dangerous
maurice.mutuku answered the question on September 26, 2019 at 07:29
- Give any three circumstances that may make an organization to develop a new information system(Solved)
Give any three circumstances that may make an organization to develop a new information system
Date posted: September 26, 2019. Answers (1)
- Distinguish between thinnet and thicknet coaxial cables.(Solved)
Distinguish between thinnet and thicknet coaxial cables.
Date posted: September 26, 2019. Answers (1)
- The figure below is a toolbar for a DTP package.(Solved)
The figure below is a toolbar for a DTP package.
(a) Name and state the functions of the tools labeled A, B, C and D.
(b) State four advantages of automated production.
(c) Most industries use computers for process control. Give any three benefits of this.
Date posted: September 26, 2019. Answers (1)
- Using 8-bit twos complementation, perform the following binary operation.
(Solved)
Using 8-bit twos complementation, perform the following binary operation.
Date posted: September 26, 2019. Answers (1)
- Convert 0.4210 to 6-bit binary notation.(Solved)
Convert 0.4210 to 6-bit binary notation.
Date posted: September 26, 2019. Answers (1)
- Compute the following binary arithmetic expressions.
(i) 1010.101 + 11.011
(ii) 1010.101 - 11.011(Solved)
Compute the following binary arithmetic expressions.
(i) 1010.101 + 11.011
(ii) 1010.101 - 11.011
Date posted: September 26, 2019. Answers (1)
- Differentiate between enhanced BCD and ASCII-8 coding scheme of representing data in computers.(Solved)
Differentiate between enhanced BCD and ASCII-8 coding scheme of representing data in computers.
Date posted: September 26, 2019. Answers (1)
- With aid of a labeled diagram, describe ring network topology; stating one disadvantage of such network.(Solved)
With aid of a labeled diagram, describe ring network topology; stating one disadvantage of such network.
Date posted: September 26, 2019. Answers (1)
- Name and explain two types of twisted pair cable used in data transmission.(Solved)
Name and explain two types of twisted pair cable used in data transmission.
Date posted: September 26, 2019. Answers (1)
- The internet has been embraced as great a great resource for information and a variety of applications. State two ways in which a book publisher...(Solved)
The internet has been embraced as great a great resource for information and a variety of applications. State two ways in which a book publisher can make use of the internet.
Date posted: September 26, 2019. Answers (1)
- Define a network node(Solved)
Define a network node
Date posted: September 26, 2019. Answers (1)
- The diagram below shows a network arrangement that includes a network security feature to protect data and information. Use it to answers the questions that...(Solved)
The diagram below shows a network arrangement that includes a network security feature to protect data and information. Use it to answers the questions that follow.
(i) The networking device labeled A is used to connect computers to a WAN (Internet). Name the device used for this purpose.
(ii) The part labeled B is a security feature used to protect data traffic in the network. Identify and explain the function of this part.
Date posted: September 26, 2019. Answers (1)
- State two roles of a programmer in system development life cycle.(Solved)
State two roles of a programmer in system development life cycle.
Date posted: September 26, 2019. Answers (1)
- Differentiate between Multi-user operating system and Multi threading operating system(Solved)
Differentiate between Multi-user operating system and Multi threading operating system
Date posted: September 26, 2019. Answers (1)
- Kiprono has been experiencing a lot of problems in his computer while using it. As a result, he was advised to do the following in...(Solved)
Kiprono has been experiencing a lot of problems in his computer while using it. As a result, he was advised to do the following in order to avoid the problems.
(i) Compress the disk files
(ii) Defragment the disk.
Explain the difference between the two terms above
Date posted: September 26, 2019. Answers (1)
- Differentiate between a select query and action query as used in databases.(Solved)
Differentiate between a select query and action query as used in databases.
Date posted: September 26, 2019. Answers (1)
- A concert was organized in a hall with a capacity of 1500 people. The first 700 people to buy the tickets at ksh. 1500 were...(Solved)
A concert was organized in a hall with a capacity of 1500 people. The first 700 people to buy the tickets at ksh. 1500 were reserved a seat at the VIP section while the others who bought their tickets at ksh. 1000 sat at normal hall outside the VIP section. Assuming that only 1420 tickets were sold;
i) Write a program pseudocode that would be used to determine the sitting arrangements of ticket holders i.e VIP or Normal, the number of VIP, Normal and Unoccupied seats and finally dispay the total amount of money collected from the concert
ii) Draw a flowchart for the pseudocode above
Date posted: September 26, 2019. Answers (1)
- A company in town wishes to link its offices together; the linking may be through wireless or fibre optic network media
State two benefits that the...(Solved)
A company in town wishes to link its offices together; the linking may be through wireless or fibre optic network media
State two benefits that the company would gain from the use of metropolitan area network (MAN)
Date posted: September 26, 2019. Answers (1)
- State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media.(Solved)
State three ways in which computer virus infection can be prevented other than through restricting the usage of removable storage media.
Date posted: September 26, 2019. Answers (1)
- With the aid of a diagram describe the Hierarchical Database Model.(Solved)
With the aid of a diagram describe the Hierarchical Database Model.
Date posted: September 26, 2019. Answers (1)