Get premium membership and access questions with answers, video lessons as well as revision papers.
i) Can explain how he committed the crime in order to enhance the security(e.g hackers and crackers)
ii) Can help in data recovery e.g. when data is lost or modified
iii) Can help in tracking other crime committers
johnmulu answered the question on September 28, 2017 at 12:14
- List three to enhance security of computer network. (Solved)
List three to enhance security of computer network.
Date posted: September 28, 2017. Answers (1)
- Describe the difference between system software and application software.(Solved)
Describe the difference between system software and application software.
Date posted: September 28, 2017. Answers (1)
- Define the term computer crime. (Solved)
Define the term computer crime.
Date posted: September 28, 2017. Answers (1)
- Explain how you would update a record on a magnetic tape. (Solved)
Explain how you would update a record on a magnetic tape.
Date posted: September 28, 2017. Answers (1)
- List three measures taken to enhance security of computer network. (Solved)
List three measures taken to enhance security of computer network.
Date posted: September 28, 2017. Answers (1)
- Define data integrity (Solved)
Define data integrity
Date posted: September 28, 2017. Answers (1)
- List four factors one should consider when installing an operating software. (Solved)
List four factors one should consider when installing an operating software.
Date posted: September 28, 2017. Answers (1)
- Give five elements of an information system.(Solved)
Give five elements of an information system.
Date posted: September 28, 2017. Answers (1)
- Distinguish between serial and parallel ports of a computer. (Solved)
Differentiate between serial and parallel ports.
Date posted: September 28, 2017. Answers (1)
- Define the term internet(Solved)
Define the term internet.
Date posted: September 28, 2017. Answers (1)
- Outline three precautions one should take when assembling a computer(Solved)
Outline three precautions one should take when assembling a computer
Date posted: September 28, 2017. Answers (1)
- Distinguish between a desktop and a mobile computer.(Solved)
Distinguish between a desktop and a mobile computer.
Date posted: September 28, 2017. Answers (1)
- State and explain two other types of HCL. (Solved)
State and explain two types of HCL.
Date posted: September 28, 2017. Answers (1)
- Give one advantage of using GUI over command line interface. (Solved)
Give one advantage of using GUI over command line interface.
Date posted: September 28, 2017. Answers (1)
- Name two circumstances in which it is better to use a questionnaire than an interview for gathering information. (Solved)
Name two circumstances in which it is better to use a questionnaire than an interview for gathering information.
Date posted: September 28, 2017. Answers (1)
- List down three difficulties associated with telecommunication (Solved)
List down three difficulties associated with telecommunication
Date posted: September 28, 2017. Answers (1)
- What is meant by the term E-Learning? (Solved)
What is meant by the term E-Learning?
Date posted: September 28, 2017. Answers (1)
- Name four responsibilities that are carried out by a system analyst (Solved)
Name four responsibilities that are carried out by a system analyst
Date posted: September 28, 2017. Answers (1)
- State two differentiate between dynamic RAM and static RAM. (Solved)
State two differentiate between dynamic RAM and static RAM.
Date posted: September 28, 2017. Answers (1)
- Which circumstances could necessitate implementation of a client server operating system in an organisation?(Solved)
Which circumstances could necessitate implementation of a client server operating system in an organisation?
Date posted: September 27, 2017. Answers (1)