Get premium membership and access questions with answers, video lessons as well as revision papers.
a) Data-refers to raw facts that has no meaning attached to it by the user
b) information -refers to the processed facts that is meaningful and useful to the user
c) program-refers to a set of step -by-step instructions that tells the computer what to do and how to do it
d) hardware -refers to the tangible components of a computer like monitor
Wincate 1 answered the question on October 2, 2017 at 11:55
- Stage of Erick Erickson's theory of personality development (Solved)
Stage of Erick Erickson s theory of personality development
Date posted: September 30, 2017. Answers (1)
- The control unit is made up of two main sub-components.Name and give their functions(Solved)
The control unit is made up of two main sub-components.Name and give their functions
Date posted: September 30, 2017. Answers (1)
- Give three attachments found in the computer's motherboard(Solved)
Give three attachments found in the computer's motherboard
Date posted: September 30, 2017. Answers (1)
- Give three rules followed in maintaining a safe computer working environment(Solved)
Give three rules followed in maintaining a safe computer working environment
Date posted: September 30, 2017. Answers (1)
- 1.(i) Name two types of fibre optic.
(ii) Name five components of the fibre optic cable.(Solved)
1.(i) Name two types of fibre optic.
(ii) Name five components of the fibre optic cable.
Date posted: September 30, 2017. Answers (1)
- Give any three advantages of using a fibre optic cable.(Solved)
Give any three advantages of using a fibre optic cable.
Date posted: September 30, 2017. Answers (1)
- Define the term ergonomics?(Solved)
Define the term ergonomics?
Date posted: September 30, 2017. Answers (1)
- List any three ways of dealing with virus on a computer.(Solved)
List any three ways of dealing with virus on a computer.
Date posted: September 30, 2017. Answers (1)
- State three objectives of normalization.(Solved)
State three objectives of normalization.
Date posted: September 30, 2017. Answers (1)
- List and briefly describe three components of a database system.(Solved)
List and briefly describe three components of a database system.
Date posted: September 30, 2017. Answers (1)
- List any four ICT related programmes offered at the Universities.(Solved)
List any four ICT related programmes offered at the Universities.
Date posted: September 30, 2017. Answers (1)
- Describe three duties of chief programmer.(Solved)
Describe three duties of chief programmer.
Date posted: September 30, 2017. Answers (1)
- Explain three types of physical network topologies.(Solved)
Explain three types of physical network topologies.
Date posted: September 30, 2017. Answers (1)
- Outline four data types that can be entered into a spreadsheet.(Solved)
Outline four data types that can be entered into a spreadsheet.
Date posted: September 30, 2017. Answers (1)
- List and give the functions of computer buses.(Solved)
List and give the functions of computer buses.
Date posted: September 30, 2017. Answers (1)
- Differentiate between Cache and Buffer memories.(Solved)
Differentiate between Cache and Buffer memories.
Date posted: September 30, 2017. Answers (1)
- Name four examples of application software.(Solved)
Name four examples of application software.
Date posted: September 30, 2017. Answers (1)
- Give one function of a main frame operating system which you would not expect to find in the
operating system of a micro- computer.(Solved)
Give one function of a main frame operating system which you would not expect to find in the
operating system of a micro- computer.
Date posted: September 30, 2017. Answers (1)
- State the differences between auto correct and auto complete as used in word processing.(Solved)
State the differences between auto correct and auto complete as used in word processing.
Date posted: September 30, 2017. Answers (1)
- Give one function of a mainframe why it is difficult to detect and prevent a computer crime.(Solved)
Give one function of a mainframe why it is difficult to detect and prevent a computer crime.
Date posted: September 30, 2017. Answers (1)