-Head gear or head mounted display
-Gloves
-Body suit
-Virtual reality software
Kavungya answered the question on October 29, 2019 at 11:30
-
Describe three factors that cause system entropy
(Solved)
Describe three factors that cause system entropy
Date posted:
October 11, 2019
.
Answers (1)
-
a)Study the Pseudo code below and answer the questions that follows.
BEGIN
Print “enter the value of A and B”;
Read A, B
Y =...
(Solved)
a)Study the Pseudo code below and answer the questions that follows.
BEGIN
Print “enter the value of A and B”;
Read A, B
Y = A+B
While Y<20 Do
BEGIN
PRINT Y
A = B
B = Y
Y = B+A
END WHILE
PRINT A, B, Y;
END
i)Assuming the user keys in 2 and 4 when prompted to enter the values for A and B respectively, determine the values of A, B and Y show your working
ii)State the control structures used in the above pseudocode.
b)Draw a flowchart that would be used in place of the pseudocode
c)Give three examples of Iteration construct
Date posted:
October 11, 2019
.
Answers (1)
-
Describe two situations in the bus transport industry where computerized systems could replace human employees.
(Solved)
Describe two situations in the bus transport industry where computerized systems could replace human employees.
Date posted:
October 11, 2019
.
Answers (1)
-
Explain the functions of complementary metal-oxide semiconductor (CMOS)
(Solved)
Explain the functions of complementary metal-oxide semiconductor (CMOS)
Date posted:
October 1, 2019
.
Answers (1)
-
Briefly explain what happen during power on self test (POST)
(Solved)
Briefly explain what happen during power on self test (POST)
Date posted:
October 1, 2019
.
Answers (1)
-
State the following types of transcription errors:
i. 3455 instead of 3456
ii. Simth instead of Smith
(Solved)
State the following types of transcription errors:
i. 3455 instead of 3456
ii. Simth instead of Smith
Date posted:
October 1, 2019
.
Answers (1)
-
Using one’s complement, calculate 510 – 910. Use six bit in your calculation.
(Solved)
Using one’s complement, calculate 510 – 910. Use six bit in your calculation.
Date posted:
October 1, 2019
.
Answers (1)
-
Convert 0.110112 to its decimal equivalent
(Solved)
Convert 0.110112 to its decimal equivalent
Date posted:
October 1, 2019
.
Answers (1)
-
Convert binary number 11010110.10012 into octal number.
(Solved)
Convert binary number 11010110.10012 into octal number.
Date posted:
October 1, 2019
.
Answers (1)
-
Find the sum of binary number 101.1012 and 110.1002
(Solved)
Find the sum of binary number 101.1012 and 110.1002
Date posted:
October 1, 2019
.
Answers (1)
-
Name two files that are created in mail merging process
(Solved)
Name two files that are created in mail merging process
Date posted:
October 1, 2019
.
Answers (1)
-
Citing relevant examples state two advantages of integrated software as opposed to single purpose.
(Solved)
Citing relevant examples state two advantages of integrated software as opposed to single purpose.
Date posted:
October 1, 2019
.
Answers (1)
-
What is the role of special purpose memories in the microprocessor?
(Solved)
What is the role of special purpose memories in the microprocessor?
Date posted:
October 1, 2019
.
Answers (1)
-
The following are symbols of some keys found on the keyboard. Name the keys represented by the symbols.
(Solved)
The following are symbols of some keys found on the keyboard. Name the keys represented by the symbols.

Date posted:
October 1, 2019
.
Answers (1)
-
Outline the ‘line of sight’ principle in wireless transmission.
(Solved)
Outline the ‘line of sight’ principle in wireless transmission.
Date posted:
September 30, 2019
.
Answers (1)
-
Name four examples of document readers.
(Solved)
Name four examples of document readers.
Date posted:
September 30, 2019
.
Answers (1)
-
State the main component that formed the basis for second generation computers.
(Solved)
State the main component that formed the basis for second generation computers.
Date posted:
September 30, 2019
.
Answers (1)
-
Differentiate between private data and confidential data
(Solved)
Differentiate between private data and confidential data
Date posted:
September 30, 2019
.
Answers (1)
-
Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees
(Solved)
Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees
Date posted:
September 30, 2019
.
Answers (1)
-
(a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal...
(Solved)
(a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal 18 years, output “Adult” otherwise output “Young”
(b) What is the difference between looping and selection.
Date posted:
September 30, 2019
.
Answers (1)