System files hold critical system information while application files hold programs data
Kavungya answered the question on June 6, 2019 at 10:25
-
Give three comparisons of the traditional method of typing a document on a Typewriter against using a word processor
(Solved)
Give three comparisons of the traditional method of typing a document on a Typewriter against using a word processor
Date posted:
June 6, 2019
.
Answers (1)
-
Define Blocking text.
(Solved)
Define Blocking text.
Date posted:
June 6, 2019
.
Answers (1)
-
Give any two application programs classified as spreadsheets.
(Solved)
Give any two application programs classified as spreadsheets.
Date posted:
June 6, 2019
.
Answers (1)
-
State five features of spreadsheets that are useful in financial modeling.
(Solved)
State five features of spreadsheets that are useful in financial modeling.
Date posted:
June 6, 2019
.
Answers (1)
-
Define ‘What if’ analysis.
(Solved)
Define ‘What if’ analysis.
Date posted:
June 6, 2019
.
Answers (1)
-
a) A formula to add the contents of B5 and C4 was entered in Cell F5.
what will it become when it is copied to Cell...
(Solved)
a) A formula to add the contents of B5 and C4 was entered in Cell F5.
what will it become when it is copied to Cell H8?
b) Explain the reason for your answer.
c) What is the equivalent R1C1 reference for G20?
Date posted:
June 6, 2019
.
Answers (1)
-
The fist column in the table below contains formulas as entered into cell D46. In the second column, enter the formulas as they would appear...
(Solved)
The fist column in the table below contains formulas as entered into cell D46. In the second column, enter the formulas as they would appear when copied to cell B56.
Date posted:
June 6, 2019
.
Answers (1)
-
State the components of a Database hierarchy in ascending order.
(Solved)
State the components of a Database hierarchy in ascending order.
Date posted:
June 6, 2019
.
Answers (1)
-
Give the two classes of database software.
(Solved)
Give the two classes of database software.
Date posted:
June 6, 2019
.
Answers (1)
-
Differentiate between Tabular and columnar form layout.
(Solved)
Differentiate between Tabular and columnar form layout.
Date posted:
June 6, 2019
.
Answers (1)
-
Describe four major shortcomings of the conventional (paper )file structures that are being addressed by the database approach.
(Solved)
Describe four major shortcomings of the conventional (paper )file structures that are being addressed by the database approach.
Date posted:
June 6, 2019
.
Answers (1)
-
The following car details are to be entered in a database: Make, Date-of-manufacture, colour, and cost.
a) Prepare a suitable database structure showing field names and...
(Solved)
The following car details are to be entered in a database: Make, Date-of-manufacture, colour, and cost.
a) Prepare a suitable database structure showing field names and their field data types
b) Explain how you index the data such that cars of the same make and colour are together.
c) Write a statement that can be used to select cars of colour green.
d) Give an instruction that would:
i) Select cars whose cost is between 500,000/= and 1,000,000/=
ii) Determine the average cost of all cars.
Date posted:
June 6, 2019
.
Answers (1)
-
Differentiate between Fill and stroke
(Solved)
Differentiate between Fill and stroke
Date posted:
June 6, 2019
.
Answers (1)
-
Differentiate between Change case and drop cap.
(Solved)
Differentiate between Change case and drop cap.
Date posted:
June 6, 2019
.
Answers (1)
-
Differentiate between Margins and column guides.
(Solved)
Differentiate between Margins and column guides.
Date posted:
June 6, 2019
.
Answers (1)
-
Differentiate between pasteboard and printable page
(Solved)
Differentiate between pasteboard and printable page.
Date posted:
June 6, 2019
.
Answers (1)
-
Why is layering very useful in a desktop publisher?
(Solved)
Why is layering very useful in a desktop publisher?
Date posted:
June 6, 2019
.
Answers (1)
-
Briefly describe four factors contributing to Internet access and growth in Kenya.
(Solved)
Briefly describe four factors contributing to Internet access and growth in Kenya.
Date posted:
June 6, 2019
.
Answers (1)
-
Computer systems need maximum security to prevent an unauthorized access. State six precautions that you would expect an organization to take to prevent illegal access...
(Solved)
Computer systems need maximum security to prevent an unauthorized access. State six precautions that you would expect an organization to take to prevent illegal access to its computer-based systems.
Date posted:
June 6, 2019
.
Answers (1)
-
Give four rules that must be observed in order to keep within the law when working with data and information.
(Solved)
Give four rules that must be observed in order to keep within the law when working with data and information.
Date posted:
June 6, 2019
.
Answers (1)