(i) Firewall- a filters some information from the internet
(ii) Providing resources to other devices on the network
(iii) -Coaxial cable
-Fiber optic
-Twisted pair cable
(iv) -Security and privacy issues
-Spread of malicious software
(v) Star topology
maurice.mutuku answered the question on November 14, 2019 at 14:17
-
List two programs that can be used by Web Developers.
(Solved)
List two programs that can be used by Web Developers.
Date posted:
November 14, 2019
.
Answers (1)
-
Differentiate between peer to peer and server based network.
(Solved)
Differentiate between peer to peer and server based network.
Date posted:
November 14, 2019
.
Answers (1)
-
Explain the following terms as used in desktop publishing.
(Solved)
Explain the following terms as used in desktop publishing.
a. Embedded object.
b. Autoflow.
Date posted:
November 14, 2019
.
Answers (1)
-
The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell...
(Solved)
The formula =$M30+Q$20 was typed in cell R15 and then copied to cell M24 of a spreadsheet. Write the formula as it appears in cell M24.
Date posted:
November 14, 2019
.
Answers (1)
-
Give any two characteristics of master file.
(Solved)
Give any two characteristics of master file.
Date posted:
November 8, 2019
.
Answers (1)
-
List three paragraph formatting features of word processors.
(Solved)
List three paragraph formatting features of word processors.
Date posted:
November 8, 2019
.
Answers (1)
-
Briefly explain the following terms as used in spreadsheet.
(i) Cell
(ii) Range
(iii) Value
(iv) Function
(Solved)
Briefly explain the following terms as used in spreadsheet.
(i) Cell
(ii) Range
(iii) Value
(iv) Function
Date posted:
November 8, 2019
.
Answers (1)
-
Study the following pseudocode and answer the questions that follow.
(Solved)
Study the following pseudocode and answer the questions that follow.

i. Determine the value of N and X.
ii. Draw a flowchart of the above pseudocode.
Date posted:
November 8, 2019
.
Answers (1)
-
Explain any two ways in which computers have been made user-friendly for persons that are physically challenged.
(Solved)
Explain any two ways in which computers have been made user-friendly for persons that are physically challenged.
Date posted:
November 8, 2019
.
Answers (1)
-
Work out 3210-1910 in 8-bit binary notation;
(Solved)
Work out 3210-1910 in 8-bit binary notation;
(i) As a signed magnitude representation using ones complements.
(ii) Using two’s complement
Date posted:
November 7, 2019
.
Answers (1)
-
The information in figure 3 below is maintained by the patron of wildlife club in a school. Study it and answer the questions that follow.
(Solved)
The information in figure 3 below is maintained by the patron of wildlife club in a school. Study it and answer the questions that follow.

(a) Describe the field values, records and file.
(b) State the most appropriate primary key for the list.
(c)State the most appropriate data types for the fields:
(i) Admission number
(ii) Membership number.
(d) If a database was to be created for the list; forms, tables, queries and reports are likely to be used.
(i) State the purpose of each of these objects.
(ii) Which objects cannot be used to store the data in the list?
(e) (i) How many field values are in the list?
(ii) How many records are in the list?
Date posted:
November 7, 2019
.
Answers (1)
-
An airline uses an information system whereby if a passenger at station A books a plane seat, this transaction is immediately shown at stations A...
(Solved)
An airline uses an information system whereby if a passenger at station A books a plane seat, this transaction is immediately shown at stations A and B such that no other passenger can book the same seat.
(I) Name this data processing mode.
(II) State two advantages of this data processing mode.
Date posted:
November 7, 2019
.
Answers (1)
-
List two factors that dictate the cost of a computer system.
(Solved)
List two factors that dictate the cost of a computer system.
Date posted:
November 7, 2019
.
Answers (1)
-
Give three hardware considerations that should be made before installing an operating system.
(Solved)
Give three hardware considerations that should be made before installing an operating system.
Date posted:
November 7, 2019
.
Answers (1)
-
Differentiate between a word and a word length as used in data representation.
(Solved)
Differentiate between a word and a word length as used in data representation.
Date posted:
November 6, 2019
.
Answers (1)
-
Using two's complement, show how the arithmetic below would be carried out on a 8 – bit computer system. (+54) – (+29).
(Solved)
Using two's complement, show how the arithmetic below would be carried out on a 8 – bit computer system. (+54) – (+29).
Date posted:
November 6, 2019
.
Answers (1)
-
A car rental firm leases its cars for Kshs. 2500.00 per day. The manager gives a discount based on the number of days that the...
(Solved)
A car rental firm leases its cars for Kshs. 2500.00 per day. The manager gives a discount based on the number of days that the car is rented. If the rental period is greater than or equals to 7 days then a 25% discount is given. Write a pseudo-code to accept a car number and the rental period, and calculate the total amount earned by the company when a car is leased.
Date posted:
November 6, 2019
.
Answers (1)
-
State any two laws governing protection of information.
(Solved)
State any two laws governing protection of information.
Date posted:
November 6, 2019
.
Answers (1)
-
Distinguish between an integrated software and a software suite.
(Solved)
Distinguish between an integrated software and a software suite.
Date posted:
November 6, 2019
.
Answers (1)
-
State any two sensory devices used in virtual reality.
(Solved)
State any two sensory devices used in virtual reality.
Date posted:
October 29, 2019
.
Answers (1)