Get premium membership and access questions with answers, video lessons as well as revision papers.
(1*162)+ (1*161)+ (1*160)
256+16+1 = 27310
maurice.mutuku answered the question on November 18, 2019 at 05:56
- List the advantages of using an electronic database system for storage of data over the file approach.(Solved)
List the advantages of using an electronic database system for storage of data over the file approach.
Date posted: November 18, 2019. Answers (1)
- Define the following terms.
(i) Database management system.
(ii) Network database.(Solved)
Define the following terms.
(i) Database management system.
(ii) Network database.
Date posted: November 18, 2019. Answers (1)
- Describe the following database features
(i) Macros
(ii) Programming module(Solved)
Describe the following database features
(i) Macros
(ii) Programming module
Date posted: November 18, 2019. Answers (1)
- List three types of data integrity constraints that should be observed in a database(Solved)
List three types of data integrity constraints that should be observed in a database
Date posted: November 18, 2019. Answers (1)
- The diagram below shows a layout of computers networked to access the internet. Use the diagram to answer the questions that follow.(Solved)
The diagram below shows a layout of computers networked to access the internet. Use the diagram to answer the questions that follow.
i. Name and describe the purpose of the devices labeled A
ii. State two functions of the device labeled server
iii. Name any three transmission medias that can be used to transmit internet to the server .
iv. Explain any two challenges that can be faced by interior network user.
v. Name the network topology used above
Date posted: November 14, 2019. Answers (1)
- List two programs that can be used by Web Developers.(Solved)
List two programs that can be used by Web Developers.
Date posted: November 14, 2019. Answers (1)
- Differentiate between peer to peer and server based network.(Solved)
Differentiate between peer to peer and server based network.
Date posted: November 14, 2019. Answers (1)
- A computer user is unable to retrieve a file stored in a server in organization.
State three reasons why the user will need to contact the...(Solved)
A computer user is unable to retrieve a file stored in a server in organization.
State three reasons why the user will need to contact the network administrator.
Date posted: November 14, 2019. Answers (1)
- Explain the following terms as used in desktop publishing.(Solved)
Explain the following terms as used in desktop publishing.
a. Embedded object.
b. Autoflow.
Date posted: November 14, 2019. Answers (1)
- The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell...(Solved)
The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24.
Date posted: November 14, 2019. Answers (1)
- Give any two characteristics of master file.(Solved)
Give any two characteristics of master file.
Date posted: November 8, 2019. Answers (1)
- Perform the following binary arithmetic.(Solved)
Perform the following binary arithmetic.
Date posted: November 8, 2019. Answers (1)
- Give any two benefit of hacking to an organization’s computer system.(Solved)
Give any two benefit of hacking to an organization’s computer system.
Date posted: November 8, 2019. Answers (1)
- Mention any three ways of ensuring efficient back up of data.(Solved)
Mention any three ways of ensuring efficient back up of data.
Date posted: November 8, 2019. Answers (1)
- List three paragraph formatting features of word processors.(Solved)
List three paragraph formatting features of word processors.
Date posted: November 8, 2019. Answers (1)
- Briefly explain the following terms as used in spreadsheet.
(i) Cell
(ii) Range
(iii) Value
(iv) Function(Solved)
Briefly explain the following terms as used in spreadsheet.
(i) Cell
(ii) Range
(iii) Value
(iv) Function
Date posted: November 8, 2019. Answers (1)
- State two operational methods of an organizational ensuring the security of data.(Solved)
State two operational methods of an organizational ensuring the security of data.
Date posted: November 8, 2019. Answers (1)
- Study the following pseudocode and answer the questions that follow.(Solved)
Study the following pseudocode and answer the questions that follow.
i. Determine the value of N and X.
ii. Draw a flowchart of the above pseudocode.
Date posted: November 8, 2019. Answers (1)
- Explain how you would change the name of a worksheet in Microsoft Excel.(Solved)
Explain how you would change the name of a worksheet in Microsoft Excel.
Date posted: November 8, 2019. Answers (1)
- Explain the meaning of the following terms as used in computer data transmission.(Solved)
Explain the meaning of the following terms as used in computer data transmission.
(a) Simplex transmission
(b) Half duplex transmission
(c) Full duplex transmission
Date posted: November 8, 2019. Answers (1)