Get premium membership and access questions with answers, video lessons as well as revision papers.
[C] It can be used as the main power source
Kavungya answered the question on July 23, 2021 at 07:09
- Give the name of a computer which is small in size, portable and convenient for mobile users.(Solved)
Give the name of a computer which is small in size, portable and convenient for mobile users.
Date posted: July 23, 2021. Answers (1)
- What was the major improvement in the fourth generation computers.(Solved)
What was the major improvement in the fourth generation computers.
Date posted: July 23, 2021. Answers (1)
- List and explain processes state(Solved)
List and explain processes state
Date posted: March 30, 2020. Answers (1)
- Convert the following binary number 1101.012 to decimal.(Solved)
Convert the following binary number 1101.012 to decimal.
Date posted: November 18, 2019. Answers (1)
- Perform the following binary arithmetic.
i) 111112 + 111112
ii) 110102 - 10102(Solved)
Perform the following binary arithmetic.
i) 111112 + 111112
ii) 110102 - 10102
Date posted: November 18, 2019. Answers (1)
- Convert the following hexadecimal number to its decimal equivalence 11116(Solved)
Convert the following hexadecimal number to its decimal equivalence 11116
Date posted: November 18, 2019. Answers (1)
- List the advantages of using an electronic database system for storage of data over the file approach.(Solved)
List the advantages of using an electronic database system for storage of data over the file approach.
Date posted: November 18, 2019. Answers (1)
- Define the following terms.
(i) Database management system.
(ii) Network database.(Solved)
Define the following terms.
(i) Database management system.
(ii) Network database.
Date posted: November 18, 2019. Answers (1)
- Describe the following database features
(i) Macros
(ii) Programming module(Solved)
Describe the following database features
(i) Macros
(ii) Programming module
Date posted: November 18, 2019. Answers (1)
- List three types of data integrity constraints that should be observed in a database(Solved)
List three types of data integrity constraints that should be observed in a database
Date posted: November 18, 2019. Answers (1)
- The diagram below shows a layout of computers networked to access the internet. Use the diagram to answer the questions that follow.(Solved)
The diagram below shows a layout of computers networked to access the internet. Use the diagram to answer the questions that follow.
i. Name and describe the purpose of the devices labeled A
ii. State two functions of the device labeled server
iii. Name any three transmission medias that can be used to transmit internet to the server .
iv. Explain any two challenges that can be faced by interior network user.
v. Name the network topology used above
Date posted: November 14, 2019. Answers (1)
- List two programs that can be used by Web Developers.(Solved)
List two programs that can be used by Web Developers.
Date posted: November 14, 2019. Answers (1)
- Differentiate between peer to peer and server based network.(Solved)
Differentiate between peer to peer and server based network.
Date posted: November 14, 2019. Answers (1)
- A computer user is unable to retrieve a file stored in a server in organization.
State three reasons why the user will need to contact the...(Solved)
A computer user is unable to retrieve a file stored in a server in organization.
State three reasons why the user will need to contact the network administrator.
Date posted: November 14, 2019. Answers (1)
- Explain the following terms as used in desktop publishing.(Solved)
Explain the following terms as used in desktop publishing.
a. Embedded object.
b. Autoflow.
Date posted: November 14, 2019. Answers (1)
- The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell...(Solved)
The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24.
Date posted: November 14, 2019. Answers (1)
- Give any two characteristics of master file.(Solved)
Give any two characteristics of master file.
Date posted: November 8, 2019. Answers (1)
- Perform the following binary arithmetic.(Solved)
Perform the following binary arithmetic.
Date posted: November 8, 2019. Answers (1)
- Give any two benefit of hacking to an organization’s computer system.(Solved)
Give any two benefit of hacking to an organization’s computer system.
Date posted: November 8, 2019. Answers (1)
- Mention any three ways of ensuring efficient back up of data.(Solved)
Mention any three ways of ensuring efficient back up of data.
Date posted: November 8, 2019. Answers (1)