Real time – data is received and processed so fast and the results returned so quickly that the process is instantaneous to the user.
Batch – data is accumulated and processed at a predetermined time. Once processing begins no amendments.
maurice.mutuku answered the question on September 26, 2019 at 08:14
- Give Two possible ways of fitting the document in one page(Solved)
Give Two possible ways of fitting the document in one page
Date posted: September 26, 2019. Answers (1)
- Convert 110110111112 to Octal(Solved)
Convert 110110111112 to Octal
Date posted: September 26, 2019. Answers (1)
- Explain the following terms as they are used in internet
(i) Surf
(ii)Downloading(Solved)
Explain the following terms as they are used in internet
(i) Surf
(ii)Downloading
Date posted: September 26, 2019. Answers (1)
- Define the following terms.
i) Record
ii) File
iii) Database(Solved)
Define the following terms.
i) Record
ii) File
iii) Database
Date posted: September 26, 2019. Answers (1)
- Name and describe four main application areas of artificial intelligence in ICT(Solved)
Name and describe four main application areas of artificial intelligence in ICT
Date posted: September 26, 2019. Answers (1)
- Give any three circumstances that may make an organization to develop a new information system(Solved)
Give any three circumstances that may make an organization to develop a new information system
Date posted: September 26, 2019. Answers (1)
- Distinguish between thinnet and thicknet coaxial cables.(Solved)
Distinguish between thinnet and thicknet coaxial cables.
Date posted: September 26, 2019. Answers (1)
- The figure below is a toolbar for a DTP package.(Solved)
The figure below is a toolbar for a DTP package.
(a) Name and state the functions of the tools labeled A, B, C and D.
(b) State four advantages of automated production.
(c) Most industries use computers for process control. Give any three benefits of this.
Date posted: September 26, 2019. Answers (1)
- Using 8-bit twos complementation, perform the following binary operation.
(Solved)
Using 8-bit twos complementation, perform the following binary operation.
Date posted: September 26, 2019. Answers (1)
- Convert 0.4210 to 6-bit binary notation.(Solved)
Convert 0.4210 to 6-bit binary notation.
Date posted: September 26, 2019. Answers (1)
- Compute the following binary arithmetic expressions.
(i) 1010.101 + 11.011
(ii) 1010.101 - 11.011(Solved)
Compute the following binary arithmetic expressions.
(i) 1010.101 + 11.011
(ii) 1010.101 - 11.011
Date posted: September 26, 2019. Answers (1)
- Differentiate between enhanced BCD and ASCII-8 coding scheme of representing data in computers.(Solved)
Differentiate between enhanced BCD and ASCII-8 coding scheme of representing data in computers.
Date posted: September 26, 2019. Answers (1)
- With aid of a labeled diagram, describe ring network topology; stating one disadvantage of such network.(Solved)
With aid of a labeled diagram, describe ring network topology; stating one disadvantage of such network.
Date posted: September 26, 2019. Answers (1)
- Name and explain two types of twisted pair cable used in data transmission.(Solved)
Name and explain two types of twisted pair cable used in data transmission.
Date posted: September 26, 2019. Answers (1)
- The internet has been embraced as great a great resource for information and a variety of applications. State two ways in which a book publisher...(Solved)
The internet has been embraced as great a great resource for information and a variety of applications. State two ways in which a book publisher can make use of the internet.
Date posted: September 26, 2019. Answers (1)
- Define a network node(Solved)
Define a network node
Date posted: September 26, 2019. Answers (1)
- The diagram below shows a network arrangement that includes a network security feature to protect data and information. Use it to answers the questions that...(Solved)
The diagram below shows a network arrangement that includes a network security feature to protect data and information. Use it to answers the questions that follow.
(i) The networking device labeled A is used to connect computers to a WAN (Internet). Name the device used for this purpose.
(ii) The part labeled B is a security feature used to protect data traffic in the network. Identify and explain the function of this part.
Date posted: September 26, 2019. Answers (1)
- State two roles of a programmer in system development life cycle.(Solved)
State two roles of a programmer in system development life cycle.
Date posted: September 26, 2019. Answers (1)
- Differentiate between Multi-user operating system and Multi threading operating system(Solved)
Differentiate between Multi-user operating system and Multi threading operating system
Date posted: September 26, 2019. Answers (1)
- Kiprono has been experiencing a lot of problems in his computer while using it. As a result, he was advised to do the following in...(Solved)
Kiprono has been experiencing a lot of problems in his computer while using it. As a result, he was advised to do the following in order to avoid the problems.
(i) Compress the disk files
(ii) Defragment the disk.
Explain the difference between the two terms above
Date posted: September 26, 2019. Answers (1)