- It is the signal pathway between two receiver stations. There must be no obstacle between the two stations or along the line of sight for this will block the signal.
maurice.mutuku answered the question on September 30, 2019 at 12:19
- Explain the following terms as used in computing cycle.
(i) Fetch phase
(ii) Decode phase
(iii) Execution phase.(Solved)
Explain the following terms as used in computing cycle.
(i) Fetch phase
(ii) Decode phase
(iii) Execution phase.
Date posted: September 30, 2019. Answers (1)
- Subtract 010112 from 110012(Solved)
Subtract 010112 from 110012
Date posted: September 30, 2019. Answers (1)
- Name four examples of document readers.(Solved)
Name four examples of document readers.
Date posted: September 30, 2019. Answers (1)
- State the main component that formed the basis for second generation computers.(Solved)
State the main component that formed the basis for second generation computers.
Date posted: September 30, 2019. Answers (1)
- Using twos complements compute the following using 8 bits:
2010 - 2510(Solved)
Using twos complements compute the following using 8 bits:
2010 - 2510
Date posted: September 30, 2019. Answers (1)
- Compute the value of x in the following expressions:
(i) 24.3510 = X2
(ii) 6ABH = X10(Solved)
Compute the value of x in the following expressions:
(i) 24.3510 = X2
(ii) 6ABH = X10
Date posted: September 30, 2019. Answers (1)
- Identify any three duties of an information system manager(Solved)
Identify any three duties of an information system manager
Date posted: September 30, 2019. Answers (1)
- List three sources of viruses(Solved)
List three sources of viruses
Date posted: September 30, 2019. Answers (1)
- Differentiate between private data and confidential data(Solved)
Differentiate between private data and confidential data
Date posted: September 30, 2019. Answers (1)
- Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees(Solved)
Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees
Date posted: September 30, 2019. Answers (1)
- The various services are to be provided by servers. Briefly describe the services provided by
(i) Print server
(ii) Internet server
(iii) Intranet server
(Solved)
The various services are to be provided by servers. Briefly describe the services provided by
(i) Print server
(ii) Internet server
(iii) Intranet server
Date posted: September 30, 2019. Answers (1)
- (a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal...(Solved)
(a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal 18 years, output “Adult” otherwise output “Young”
(b) What is the difference between looping and selection.
Date posted: September 30, 2019. Answers (1)
- Differentiate between a router and a gateway.(Solved)
Differentiate between a router and a gateway.
Date posted: September 30, 2019. Answers (1)
- What is system implementation?(Solved)
What is system implementation?
Date posted: September 30, 2019. Answers (1)
- Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form(Solved)
Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form
Date posted: September 30, 2019. Answers (1)
- Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya(Solved)
Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya
Date posted: September 30, 2019. Answers (1)
- State four problems that may occur during printing and how to solve them.(Solved)
State four problems that may occur during printing and how to solve them.
Date posted: September 30, 2019. Answers (1)
- Explain how you would unfreeze a computer running windows which has stopped responding to commands(Solved)
Explain how you would unfreeze a computer running windows which has stopped responding to commands
Date posted: September 30, 2019. Answers (1)
- (i) Define the term “system registry”(ii) State three causes of system registry failure(Solved)
(i) Define the term “system registry”
(ii) State three causes of system registry failure
Date posted: September 30, 2019. Answers (1)
- Differentiate between compatibility and interoperability in relation to computer software and hardware.(Solved)
Differentiate between compatibility and interoperability in relation to computer software and hardware.
Date posted: September 30, 2019. Answers (1)