- Convert binary number 11010110.10012 into octal number.(Solved)
Convert binary number 11010110.10012 into octal number.
Date posted: October 1, 2019. Answers (1)
- Find the sum of binary number 101.1012 and 110.1002(Solved)
Find the sum of binary number 101.1012 and 110.1002
Date posted: October 1, 2019. Answers (1)
- Subtract 1102 from 110102(Solved)
Subtract 1102 from 110102
Date posted: October 1, 2019. Answers (1)
- Give a reason why HTML is not considered as a true programming language.(Solved)
Give a reason why HTML is not considered as a true programming language.
Date posted: October 1, 2019. Answers (1)
- Benjos was instructed by his teacher while typing a Microsoft word document to replace all the occurrences of the word MS with Microsoft. Highlight the...(Solved)
Benjos was instructed by his teacher while typing a Microsoft word document to replace all the occurrences of the word MS with Microsoft. Highlight the steps to do this
Date posted: October 1, 2019. Answers (1)
- Name two files that are created in mail merging process(Solved)
Name two files that are created in mail merging process
Date posted: October 1, 2019. Answers (1)
- Citing relevant examples state two advantages of integrated software as opposed to single purpose.(Solved)
Citing relevant examples state two advantages of integrated software as opposed to single purpose.
Date posted: October 1, 2019. Answers (1)
- What is the role of special purpose memories in the microprocessor?(Solved)
What is the role of special purpose memories in the microprocessor?
Date posted: October 1, 2019. Answers (1)
- The following are symbols of some keys found on the keyboard. Name the keys represented by the symbols.(Solved)
The following are symbols of some keys found on the keyboard. Name the keys represented by the symbols.
Date posted: October 1, 2019. Answers (1)
- Outline the ‘line of sight’ principle in wireless transmission.(Solved)
Outline the ‘line of sight’ principle in wireless transmission.
Date posted: September 30, 2019. Answers (1)
- Explain the following terms as used in computing cycle.
(i) Fetch phase
(ii) Decode phase
(iii) Execution phase.(Solved)
Explain the following terms as used in computing cycle.
(i) Fetch phase
(ii) Decode phase
(iii) Execution phase.
Date posted: September 30, 2019. Answers (1)
- Subtract 010112 from 110012(Solved)
Subtract 010112 from 110012
Date posted: September 30, 2019. Answers (1)
- Name four examples of document readers.(Solved)
Name four examples of document readers.
Date posted: September 30, 2019. Answers (1)
- State the main component that formed the basis for second generation computers.(Solved)
State the main component that formed the basis for second generation computers.
Date posted: September 30, 2019. Answers (1)
- Using twos complements compute the following using 8 bits:
2010 - 2510(Solved)
Using twos complements compute the following using 8 bits:
2010 - 2510
Date posted: September 30, 2019. Answers (1)
- Compute the value of x in the following expressions:
(i) 24.3510 = X2
(ii) 6ABH = X10(Solved)
Compute the value of x in the following expressions:
(i) 24.3510 = X2
(ii) 6ABH = X10
Date posted: September 30, 2019. Answers (1)
- Identify any three duties of an information system manager(Solved)
Identify any three duties of an information system manager
Date posted: September 30, 2019. Answers (1)
- List three sources of viruses(Solved)
List three sources of viruses
Date posted: September 30, 2019. Answers (1)
- Differentiate between private data and confidential data(Solved)
Differentiate between private data and confidential data
Date posted: September 30, 2019. Answers (1)
- Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees(Solved)
Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees
Date posted: September 30, 2019. Answers (1)