To enhance its performance
maurice.mutuku answered the question on October 1, 2019 at 05:32
- The following are symbols of some keys found on the keyboard. Name the keys represented by the symbols.(Solved)
The following are symbols of some keys found on the keyboard. Name the keys represented by the symbols.
Date posted: October 1, 2019. Answers (1)
- Outline the ‘line of sight’ principle in wireless transmission.(Solved)
Outline the ‘line of sight’ principle in wireless transmission.
Date posted: September 30, 2019. Answers (1)
- Explain the following terms as used in computing cycle.
(i) Fetch phase
(ii) Decode phase
(iii) Execution phase.(Solved)
Explain the following terms as used in computing cycle.
(i) Fetch phase
(ii) Decode phase
(iii) Execution phase.
Date posted: September 30, 2019. Answers (1)
- Subtract 010112 from 110012(Solved)
Subtract 010112 from 110012
Date posted: September 30, 2019. Answers (1)
- Name four examples of document readers.(Solved)
Name four examples of document readers.
Date posted: September 30, 2019. Answers (1)
- State the main component that formed the basis for second generation computers.(Solved)
State the main component that formed the basis for second generation computers.
Date posted: September 30, 2019. Answers (1)
- Using twos complements compute the following using 8 bits:
2010 - 2510(Solved)
Using twos complements compute the following using 8 bits:
2010 - 2510
Date posted: September 30, 2019. Answers (1)
- Compute the value of x in the following expressions:
(i) 24.3510 = X2
(ii) 6ABH = X10(Solved)
Compute the value of x in the following expressions:
(i) 24.3510 = X2
(ii) 6ABH = X10
Date posted: September 30, 2019. Answers (1)
- Identify any three duties of an information system manager(Solved)
Identify any three duties of an information system manager
Date posted: September 30, 2019. Answers (1)
- List three sources of viruses(Solved)
List three sources of viruses
Date posted: September 30, 2019. Answers (1)
- Differentiate between private data and confidential data(Solved)
Differentiate between private data and confidential data
Date posted: September 30, 2019. Answers (1)
- Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees(Solved)
Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees
Date posted: September 30, 2019. Answers (1)
- The various services are to be provided by servers. Briefly describe the services provided by
(i) Print server
(ii) Internet server
(iii) Intranet server
(Solved)
The various services are to be provided by servers. Briefly describe the services provided by
(i) Print server
(ii) Internet server
(iii) Intranet server
Date posted: September 30, 2019. Answers (1)
- (a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal...(Solved)
(a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal 18 years, output “Adult” otherwise output “Young”
(b) What is the difference between looping and selection.
Date posted: September 30, 2019. Answers (1)
- Differentiate between a router and a gateway.(Solved)
Differentiate between a router and a gateway.
Date posted: September 30, 2019. Answers (1)
- What is system implementation?(Solved)
What is system implementation?
Date posted: September 30, 2019. Answers (1)
- Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form(Solved)
Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form
Date posted: September 30, 2019. Answers (1)
- Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya(Solved)
Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya
Date posted: September 30, 2019. Answers (1)
- State four problems that may occur during printing and how to solve them.(Solved)
State four problems that may occur during printing and how to solve them.
Date posted: September 30, 2019. Answers (1)
- Explain how you would unfreeze a computer running windows which has stopped responding to commands(Solved)
Explain how you would unfreeze a computer running windows which has stopped responding to commands
Date posted: September 30, 2019. Answers (1)