Get premium membership and access questions with answers, video lessons as well as revision papers.
- Explain the meaning of information and communication technology (ICT)(Solved)
Explain the meaning of information and communication technology (ICT).
Date posted: April 19, 2018.
- What are the pointer declarations used in C?(Solved)
What are the pointer declarations used in C?
Date posted: April 13, 2018.
- Represent a two-dimensional array using pointer?(Solved)
Represent a two-dimensional array using pointer?
Date posted: April 13, 2018.
- What is a preprocessor, what are the advantages of preprocessor?(Solved)
What is a preprocessor, what are the advantages of preprocessor?
Date posted: April 13, 2018.
- Write a program to interchange 2 variables without using the third one.(Solved)
Write a program to interchange 2 variables without using the third one.
Date posted: April 13, 2018.
- Differentiate between array and pointer?(Solved)
Differentiate between array and pointer?
Date posted: April 13, 2018.
- The three most common groups automated information systems used for design and manufacturing (Solved)
The three most common groups automated information systems used for design and manufacturing
Date posted: April 9, 2018.
- State the members involved in planning stage in SDLC(Solved)
State the members involved in planning stage in SDLC.
Date posted: April 4, 2018.
- What are the main objects of Access Database?(Solved)
What are the main objects of Access Database?
Date posted: April 3, 2018.
- What are the front-end and back-end components of a database?
(Solved)
What are the front-end and back-end components of a database?
Date posted: April 3, 2018.
- List the ten field types found in Microsoft Access?
(Solved)
List the ten field types found in Microsoft Access?
Date posted: April 3, 2018.
- What are the different Number field types in M-Access in a computer application?(Solved)
What are the different Number field types in M-Access in a computer application?
Date posted: April 3, 2018.
- Differentiate between a macro and a module as used in computer applications.(Solved)
Differentiate between a macro and a module as used in computer applications.
Date posted: April 3, 2018.
- What is a report in computer science?(Solved)
What is a report in computer science?
Date posted: April 3, 2018.
- What is a table in computer science.?
(Solved)
What is a table in computer science.?
Date posted: April 3, 2018.
- What are the main elements of a database?
(Solved)
What are the main elements of a database?
Date posted: April 3, 2018.
- What is a primary key?
(Solved)
What is a primary key?
Date posted: April 3, 2018.
- What is relational database?
(Solved)
What is relational database?
Date posted: April 3, 2018.
- What is the extension of Access database file?(Solved)
What is the extension of Access database file?
Date posted: April 3, 2018.
- What is MS-Access?
(Solved)
What is MS-Access?
Date posted: April 3, 2018.
- List at least five database applications.
(Solved)
List at least five database applications.
Date posted: April 3, 2018.
- What is Database Management System (DBMS)?(Solved)
What is Database Management System (DBMS)?
Date posted: April 3, 2018.
- Write a SQL statement to create a simple table countries including columns country_id,country_name and region_id?(Solved)
Write a SQL statement to create a simple table countries including columns country_id,country_name and region_id?
Date posted: April 3, 2018.
- Explain the disadvantages of digitizers in transferring of spatial data to GIS.(Solved)
Explain the disadvantages of digitizers in transferring of spatial data to GIS.
Date posted: March 29, 2018.
- The fastest growing area of computing is end-user computing especially the area of end-user application development which is based on the fourth generation languages (4GLs)....(Solved)
The fastest growing area of computing is end-user computing especially the area of end-user application development which is based on the fourth generation languages (4GLs).
Required:
(i.) Describe five major features of a fourth generation language.
(ii.) Discuss the advantages to an organization in having users involved in developing information systems applications.
Date posted: March 28, 2018.
- (a) Explain the meaning of the term protocol in computer networks. (3 marks) (b)...(Solved)
(a) Explain the meaning of the term protocol in computer networks. (3 marks) (b) Describe the use of the following devices in computer networks: (i.) Multiplexors;
(ii.) Acoustic couplers; (iii.) Line concentrators;
(c) (i.) Explain how Integrated Systems Digital Network (ISDN) may be used in a business organization?
(ii.) Describe the type of computer network you would recommend for a large, country wide, commercial bank, with heavy data processing requirements at its four regional centers.
Date posted: March 28, 2018.
- (a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories: (i.) Transaction processing systems; ...(Solved)
(a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories:
(i.) Transaction processing systems;
(ii.) Management Information Systems;
(iii.) Decision Support Systems;
(iv.) Executive Support Systems;
(b) Identify and briefly explain the three fundamental components of an expert system. Explain how an expert system may be used in a business application.
Date posted: March 28, 2018.
- Boni Wholesalers Ltd. Provides a variety if goods to customers in Nairobi. The wholesale business is owned and managed by Mr. Boniface Ndambuki. Mr....(Solved)
Boni Wholesalers Ltd. Provides a variety if goods to customers in Nairobi. The wholesale business is owned and managed by Mr. Boniface Ndambuki. Mr. Boni purchases goods on credit from his well established suppliers. He has a large box-file containing supplier details and another equally large one containing commodity details. The commodity file also indicates the levels of inventory held in the store.
When a customer makes his order, the sales office accesses the commodity file to check if there is sufficient stock of the required items. If there is sufficient stock, then the sales office prepares a delivery note which is forwarded to the accounts office where an invoice is prepared. The invoice and the delivery note accompany the goods from the store to the customer who prepares a payment cheque for Boni Wholesalers Ltd. A copy of the delivery note is filed in the commodity file which now shows that the stock has reduced by the amount delivered to the customer.
Sometimes the stock of the required item is not sufficient to service the customer order. In this case the supplier‟s file is accessed to select the supplier that Boni
Wholesalers Ltd. Will order from. The sales office then produces purchase orders and dispatches them to the selected supplier. The supplier prepares his own invoice and delivery note which accompany the ordered goods to the stores of Boni Wholesalers Ltd. Once received, the invoice is forwarded to the accounts office for payment to the supplier. The delivery note is used to update the commodity as well as the supplier details files.
Required: a) In what ways can a business organization be considered as a system? Derive illustrations from Boni Wholesalers.
Date posted: March 28, 2018.
- Explain each of the following micro computer hardware/software devices:
(a) Cache memory; ...(Solved)
Explain each of the following micro computer hardware/software devices:
(a) Cache memory;
(b) Coprocessor;
(c) Device driver;
(d) Disk caching;
(e) Expansion card;
Date posted: March 28, 2018.
- (a) Information is a vital resource and most organizations are investing heavily in its management. It is therefore critical to protect data and information from...(Solved)
(a) Information is a vital resource and most organizations are investing heavily in its management. It is therefore critical to protect data and information from accidental or deliberate unauthorized modification or destruction. The information system itself must be protected from unauthorized interference so that it continues to meet its objective of continuing to provide information to various users. Required: (i.) Make two recommendations on physical security measures your organization‟s information system (2 marks) (ii.) Explain how “Backup” and “Uninterruptible Power Supply” are security measures. (2 marks)
(iii.) Discuss two security features that most operating systems have. (2 marks) (iv.) Name two disasters that information systems should be guarded against. (2 marks) (v.) Why do you think an information security policy is necessary for your organization? (2 marks)
b) Computer viruses pose a danger to the integrity of micro-computer systems. Fortunately a variety of anti-virus tools are available to detect, identify and remove viruses using a wide range of techniques. Required:
(i.) What is a computer virus?
(ii.) Name two anti-virus tools.
(iii.) Suggest two administrative measures that your organization should take to check the threats of computer viruses.
(iv.) Name two environmental factors that should be controlled so that they do not affect the operation of the computer.
Date posted: March 28, 2018.