Get premium membership and access questions with answers, video lessons as well as revision papers.
- What are the common properties of computer viruses?(Solved)
Discuss the common properties of computer viruses.
Date posted: April 14, 2018.
- What is a computer virus?(Solved)
Define computer virus.
Date posted: April 14, 2018.
- What are the main security threats to data?(Solved)
Highlight the main security threats to data.
Date posted: April 14, 2018.
- What is confidential data?(Solved)
Define confidential data.
Date posted: April 14, 2018.
- What is private data?(Solved)
Define private data.
Date posted: April 14, 2018.
- What is data security?(Solved)
Define data security.
Date posted: April 14, 2018.
- What is data privacy?(Solved)
Define data privacy.
Date posted: April 14, 2018.
- Which procedure would you use in accessing a research topic notes from the Internet?(Solved)
Describe the procedure you would use in accessing a research topic notes from the Internet.
Date posted: April 14, 2018.
- What are the qualities of good e-mail contact management software?(Solved)
Give the qualities of good e-mail contact management software.
Date posted: April 14, 2018.
- Explain some commonly used workbook management practices when working on MS Excel.(Solved)
Explain some commonly used workbook management practices when working on MS Excel.
Date posted: April 14, 2018.
- State the basic keyboard shortcut keys used to format and edit a spreadsheet.(Solved)
State the basic keyboard shortcut keys used to format and edit a spreadsheet.
Date posted: April 14, 2018.
- State the keyboard shortcuts used in navigating through a spreadsheet.(Solved)
State the keyboard shortcuts used in navigating through a spreadsheet.
Date posted: April 14, 2018.
- Explain the most fundamental keyboard shortcuts when dealing with spreadsheets.(Solved)
Explain the most fundamental keyboard shortcuts when working with spreadsheets.
Date posted: April 14, 2018.
- What is the use of WAP and WML with regard to telephone messaging in handsets?(Solved)
Discuss the use of WAP and WML with regard to telephone messaging in handsets.
Date posted: April 14, 2018.
- Three methods of detecting system errors(Solved)
Three methods of detecting system errors.
Date posted: April 14, 2018.
- What are the features of an e-mail document?(Solved)
Highlight the features of any e-mail document.
Date posted: April 14, 2018.
- What are the parts of an email document?(Solved)
Highlight the parts of an email document.
Date posted: April 14, 2018.
- Explain properly the meaning of the term Data Mining and explain the benefits of data mining.(Solved)
Explain properly the meaning of the term Data Mining and explain the benefits of data mining.
Date posted: April 14, 2018.
- Outline the four major symbols used by functional modelling perspective to describe a process.(Solved)
Outline the four major symbols used by functional modelling perspective to describe a process.
Date posted: April 14, 2018.
- Briefly explain the concept of functional modeling in DBMS.(Solved)
Briefly explain the concept of functional modeling in DBMS.
Date posted: April 14, 2018.
- Briefly discuss the history of the evolution of the internet.(Solved)
Briefly discuss the history of the evolution of the internet.
Date posted: April 14, 2018.
- Briefly write short notes on the 5 classes of IPv4 addressing system.(Solved)
Briefly write short notes on the 5 classes of IPv4 addressing system.
Date posted: April 14, 2018.
- Differentiate between absolute URL and relative URL.(Solved)
Differentiate between absolute URL and relative URL.
Date posted: April 14, 2018.
- A school not being aware of the various threats that their computers networks are exposed to, advice and discuss with the management the ways and...(Solved)
A school not being aware of the various threats that their computers networks are exposed to, advice and discuss with the management the ways and means of protecting online website operations from hackers.
Date posted: April 14, 2018.
- You have been posted to a new school having graduated from a Kenyan university. The school being aware of your IT skills, they have requested...(Solved)
You have been posted to a new school having graduated from a Kenyan university. The school being aware of your IT skills, they have requested you to advise them on their new project of coming up with a computer network for the school to connect to the internet. Advice the school on what is required.
Date posted: April 14, 2018.
- What is the difference between e-mail and e-mail software?(Solved)
Differentiate between e-mail and e-mail software.
Date posted: April 14, 2018.
- Explain each of the following technologies.
a. Network technology.
b. Client technologies.
c. Server technology.
d. Operating system technology.(Solved)
Explain each of the following technologies.
a. Network technology.
b. Client technologies.
c. Server technology.
d. Operating system technology.
Date posted: April 14, 2018.
- What is the procedure of downloading and saving a web page having contents of interest from a particular site?(Solved)
Explain the procedure of downloading and saving a web page having contents of interest from a particular site.
Date posted: April 14, 2018.
- What is IT infrastructure?(Solved)
What is IT infrastructure?
Date posted: April 14, 2018.
- Why is it important to consider users while developing systems?(Solved)
Why is it important to consider users while developing systems?
Date posted: April 14, 2018.