Get premium membership and access questions with answers, video lessons as well as revision papers.
It allows the user to perform mentainance type task usually related to managing a computer, it's devices, or it's programs. Example of a utility program is an antivirus for performing security mentainance of the computer.
Githiari answered the question on September 28, 2017 at 15:20
- Give four reasons why people use the internet in day to day life(Solved)
Give four reasons why people use the internet in day to day life
Date posted: September 28, 2017. Answers (1)
- Differentiate between data and information as used in computer studies. (Solved)
Differentiate between data and information as used in computer studies
Date posted: September 28, 2017. Answers (1)
- Explain three components of a computer(Solved)
Explain three components of a computer
Date posted: September 28, 2017. Answers (1)
- What is Search Engine? Give two examples. (Solved)
What is Search Engine? Give two examples.
Date posted: September 28, 2017. Answers (1)
- Give three examples to show how a person who has committed a computer crime can help to improve a computer system. (Solved)
Give three examples to show how a person who has committed a computer crime can help to improve a computer system.
Date posted: September 28, 2017. Answers (1)
- List three to enhance security of computer network. (Solved)
List three to enhance security of computer network.
Date posted: September 28, 2017. Answers (1)
- Describe the difference between system software and application software.(Solved)
Describe the difference between system software and application software.
Date posted: September 28, 2017. Answers (1)
- Define the term computer crime. (Solved)
Define the term computer crime.
Date posted: September 28, 2017. Answers (1)
- Explain how you would update a record on a magnetic tape. (Solved)
Explain how you would update a record on a magnetic tape.
Date posted: September 28, 2017. Answers (1)
- List three measures taken to enhance security of computer network. (Solved)
List three measures taken to enhance security of computer network.
Date posted: September 28, 2017. Answers (1)
- Define data integrity (Solved)
Define data integrity
Date posted: September 28, 2017. Answers (1)
- List four factors one should consider when installing an operating software. (Solved)
List four factors one should consider when installing an operating software.
Date posted: September 28, 2017. Answers (1)
- Give five elements of an information system.(Solved)
Give five elements of an information system.
Date posted: September 28, 2017. Answers (1)
- Distinguish between serial and parallel ports of a computer. (Solved)
Differentiate between serial and parallel ports.
Date posted: September 28, 2017. Answers (1)
- Define the term internet(Solved)
Define the term internet.
Date posted: September 28, 2017. Answers (1)
- Outline three precautions one should take when assembling a computer(Solved)
Outline three precautions one should take when assembling a computer
Date posted: September 28, 2017. Answers (1)
- Distinguish between a desktop and a mobile computer.(Solved)
Distinguish between a desktop and a mobile computer.
Date posted: September 28, 2017. Answers (1)
- State and explain two other types of HCL. (Solved)
State and explain two types of HCL.
Date posted: September 28, 2017. Answers (1)
- Give one advantage of using GUI over command line interface. (Solved)
Give one advantage of using GUI over command line interface.
Date posted: September 28, 2017. Answers (1)
- Name two circumstances in which it is better to use a questionnaire than an interview for gathering information. (Solved)
Name two circumstances in which it is better to use a questionnaire than an interview for gathering information.
Date posted: September 28, 2017. Answers (1)