i) High initial cost- the cost of buying network hard work and software is very high.
ii) Security issues-the data on the network is prone to illegal access threats.(award 1 for state and
1 for explanation)
gideon1 answered the question on September 25, 2017 at 09:27
- Describe the characteristics of a good program(Solved)
Describe the characteristics of a good program.
Date posted: September 25, 2017. Answers (1)
- State two types of selection controls used in high level programming language.(Solved)
State two types of selection controls used in high level programming language.
Date posted: September 25, 2017. Answers (1)
- With the aid of a diagram, differentiate between analog and digital data signals.(Solved)
With the aid of a diagram, differentiate between analog and digital data signals.
Date posted: September 25, 2017. Answers (1)
- Differentiate sequential file organization from indexed sequential file organization.(Solved)
Differentiate sequential file organization from indexed sequential file organization.
Date posted: September 25, 2017. Answers (1)
- Explain the following type of computer virus
-A worm
(Solved)
Explain the following type of computer virus
-A worm
Date posted: September 25, 2017. Answers (1)
- Explain two computational errors giving example in each case.(Solved)
Explain two computational errors giving example in each case.
Date posted: September 25, 2017. Answers (1)
- Computers are used to enhance marketing in a variety of ways, one of which is E- business,
Explain how computers are used in E-business.(Solved)
Computers are used to enhance marketing in a variety of ways, one of which is E- business,
Explain how computers are used in E-business.
Date posted: September 25, 2017. Answers (1)
- Explain open learning.(Solved)
Explain open learning.
Date posted: September 25, 2017. Answers (1)
- What are data terminal equipment?(Solved)
What are data terminal equipment?
Date posted: September 25, 2017. Answers (1)
- Describe data encryption.(Solved)
Describe data encryption.
Date posted: September 25, 2017. Answers (1)
- Explain industrial espionage.(Solved)
Explain industrial espionage.
Date posted: September 25, 2017. Answers (1)
- By use of examples, differentiate between a function and formula in a spread sheets.(Solved)
By use of examples, differentiate between a function and formula in a spread sheets.
Date posted: September 25, 2017. Answers (1)
- State two types of charts found in spread sheets.(Solved)
State two types of charts found in spread sheets.
Date posted: September 25, 2017. Answers (1)
- State two types of database models.(Solved)
State two types of database models.
Date posted: September 25, 2017. Answers (1)
- Explain one area computers can be used in science and research.(Solved)
Explain one area computers can be used in science and research.
Date posted: September 25, 2017. Answers (1)
- State two advantages of using biometric devices in voting.(Solved)
State two advantages of using biometric devices in voting.
Date posted: September 25, 2017. Answers (1)
- Discuss the following types of computers (i) Dedicated purpose computers (ii) Embedded computers.(Solved)
Discuss the following types of computers
i) Dedicate purpose computers.
ii) Embedded computers.
Date posted: September 25, 2017. Answers (1)
- 1.(i) What is an Uninterruptible Power Supply (UPS)
(ii) State the functions of the uninterruptible Power Supply (UPS)(Solved)
1.(i) What is an Uninterruptible Power Supply (UPS)
(ii) State the functions of the uninterruptible Power Supply (UPS)
Date posted: September 25, 2017. Answers (1)
- Define a computer laboratory(Solved)
What is a computer laboratory?
Date posted: September 25, 2017. Answers (1)
- Give the functions of control unit in computer(Solved)
What are the functions of control unit in a computer?
Date posted: September 25, 2017. Answers (1)