- Differentiate between a router and a gateway.(Solved)
Differentiate between a router and a gateway.
Date posted: September 30, 2019. Answers (1)
- What is system implementation?(Solved)
What is system implementation?
Date posted: September 30, 2019. Answers (1)
- Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form(Solved)
Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form
Date posted: September 30, 2019. Answers (1)
- Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya(Solved)
Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya
Date posted: September 30, 2019. Answers (1)
- State four problems that may occur during printing and how to solve them.(Solved)
State four problems that may occur during printing and how to solve them.
Date posted: September 30, 2019. Answers (1)
- Explain how you would unfreeze a computer running windows which has stopped responding to commands(Solved)
Explain how you would unfreeze a computer running windows which has stopped responding to commands
Date posted: September 30, 2019. Answers (1)
- (i) Define the term “system registry”(ii) State three causes of system registry failure(Solved)
(i) Define the term “system registry”
(ii) State three causes of system registry failure
Date posted: September 30, 2019. Answers (1)
- Differentiate between compatibility and interoperability in relation to computer software and hardware.(Solved)
Differentiate between compatibility and interoperability in relation to computer software and hardware.
Date posted: September 30, 2019. Answers (1)
- Most distributions of Linux operating system are available to users under General Public Licence (GPL)
(a) Explain the meaning of GPL
(b) State four examples of...(Solved)
Most distributions of Linux operating system are available to users under General Public Licence (GPL)
(a) Explain the meaning of GPL
(b) State four examples of Linux distributions available under GPL
Date posted: September 30, 2019. Answers (1)
- State three advantages of LED over incandescent and fluorescent illuminating devices.(Solved)
State three advantages of LED over incandescent and fluorescent illuminating devices.
Date posted: September 30, 2019. Answers (1)
- Differentiate between Core 2 Duo and Quad Core processors in terms of internal architecture(Solved)
Differentiate between Core 2 Duo and Quad Core processors in terms of internal architecture
Date posted: September 30, 2019. Answers (1)
- Define Macro(Solved)
Define Macro
Date posted: September 30, 2019. Answers (1)
- The traffic lights serve as output devices for a computerized traffic system. Name the appropriate input device for this system.(Solved)
The traffic lights serve as output devices for a computerized traffic system. Name the appropriate input device for this system.
Date posted: September 30, 2019. Answers (1)
- Describe three ways in which computers have positively impacted on education.(Solved)
Describe three ways in which computers have positively impacted on education.
Date posted: September 30, 2019. Answers (1)
- (a) What is the hexadecimal equivalent of 7478(b) Use one’s compliment to solve 610(Solved)
(a) What is the hexadecimal equivalent of 7478
(b) Use one’s compliment to solve 610
Date posted: September 30, 2019. Answers (1)
- Explain the meaning of the following terms as used in computer programming.
i) Syntax
ii) Semantics(Solved)
Explain the meaning of the following terms as used in computer programming.
i) Syntax
ii) Semantics
Date posted: September 30, 2019. Answers (1)
- State TWO circumstances under which interviews may be used as a method of gathering information(Solved)
State TWO circumstances under which interviews may be used as a method of gathering information
Date posted: September 30, 2019. Answers (1)
- Define an information system.(Solved)
Define an information system.
Date posted: September 30, 2019. Answers (1)
- Most computerized security systems make use of biometric analysis. Name Physical features of human being that can be considered for this analysis.(Solved)
Most computerized security systems make use of biometric analysis. Name Physical features of human being that can be considered for this analysis.
Date posted: September 30, 2019. Answers (1)
- Describe THREE computer crimes taking place in society citing control measures that can be put in place to curb them.(Solved)
Describe THREE computer crimes taking place in society citing control measures that can be put in place to curb them.
Date posted: September 30, 2019. Answers (1)