Get premium membership and access questions with answers, video lessons as well as revision papers.
(i) Reduction of paper cost.
(ii) Leads to timely and accurate reporting of data.
(iii) Leads to improved flow of data that is valuable to management.
(iv) Data is input only once and is made available to many files.
(v) Avoid duplication of files.
(vi) Saving on storage space.
maurice.mutuku answered the question on November 18, 2019 at 05:38
- Define the following terms.
(i) Database management system.
(ii) Network database.(Solved)
Define the following terms.
(i) Database management system.
(ii) Network database.
Date posted: November 18, 2019. Answers (1)
- Describe the following database features
(i) Macros
(ii) Programming module(Solved)
Describe the following database features
(i) Macros
(ii) Programming module
Date posted: November 18, 2019. Answers (1)
- List three types of data integrity constraints that should be observed in a database(Solved)
List three types of data integrity constraints that should be observed in a database
Date posted: November 18, 2019. Answers (1)
- The diagram below shows a layout of computers networked to access the internet. Use the diagram to answer the questions that follow.(Solved)
The diagram below shows a layout of computers networked to access the internet. Use the diagram to answer the questions that follow.
i. Name and describe the purpose of the devices labeled A
ii. State two functions of the device labeled server
iii. Name any three transmission medias that can be used to transmit internet to the server .
iv. Explain any two challenges that can be faced by interior network user.
v. Name the network topology used above
Date posted: November 14, 2019. Answers (1)
- List two programs that can be used by Web Developers.(Solved)
List two programs that can be used by Web Developers.
Date posted: November 14, 2019. Answers (1)
- Differentiate between peer to peer and server based network.(Solved)
Differentiate between peer to peer and server based network.
Date posted: November 14, 2019. Answers (1)
- A computer user is unable to retrieve a file stored in a server in organization.
State three reasons why the user will need to contact the...(Solved)
A computer user is unable to retrieve a file stored in a server in organization.
State three reasons why the user will need to contact the network administrator.
Date posted: November 14, 2019. Answers (1)
- Explain the following terms as used in desktop publishing.(Solved)
Explain the following terms as used in desktop publishing.
a. Embedded object.
b. Autoflow.
Date posted: November 14, 2019. Answers (1)
- The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell...(Solved)
The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24.
Date posted: November 14, 2019. Answers (1)
- Give any two characteristics of master file.(Solved)
Give any two characteristics of master file.
Date posted: November 8, 2019. Answers (1)
- Perform the following binary arithmetic.(Solved)
Perform the following binary arithmetic.
Date posted: November 8, 2019. Answers (1)
- Give any two benefit of hacking to an organization’s computer system.(Solved)
Give any two benefit of hacking to an organization’s computer system.
Date posted: November 8, 2019. Answers (1)
- Mention any three ways of ensuring efficient back up of data.(Solved)
Mention any three ways of ensuring efficient back up of data.
Date posted: November 8, 2019. Answers (1)
- List three paragraph formatting features of word processors.(Solved)
List three paragraph formatting features of word processors.
Date posted: November 8, 2019. Answers (1)
- Briefly explain the following terms as used in spreadsheet.
(i) Cell
(ii) Range
(iii) Value
(iv) Function(Solved)
Briefly explain the following terms as used in spreadsheet.
(i) Cell
(ii) Range
(iii) Value
(iv) Function
Date posted: November 8, 2019. Answers (1)
- State two operational methods of an organizational ensuring the security of data.(Solved)
State two operational methods of an organizational ensuring the security of data.
Date posted: November 8, 2019. Answers (1)
- Study the following pseudocode and answer the questions that follow.(Solved)
Study the following pseudocode and answer the questions that follow.
i. Determine the value of N and X.
ii. Draw a flowchart of the above pseudocode.
Date posted: November 8, 2019. Answers (1)
- Explain how you would change the name of a worksheet in Microsoft Excel.(Solved)
Explain how you would change the name of a worksheet in Microsoft Excel.
Date posted: November 8, 2019. Answers (1)
- Explain the meaning of the following terms as used in computer data transmission.(Solved)
Explain the meaning of the following terms as used in computer data transmission.
(a) Simplex transmission
(b) Half duplex transmission
(c) Full duplex transmission
Date posted: November 8, 2019. Answers (1)
- Explain any two ways in which computers have been made user-friendly for persons that are physically challenged.(Solved)
Explain any two ways in which computers have been made user-friendly for persons that are physically challenged.
Date posted: November 8, 2019. Answers (1)