Get premium membership and access questions with answers, video lessons as well as revision papers.
- Name four examples of document readers.(Solved)
Name four examples of document readers.
Date posted: September 30, 2019.
- State the main component that formed the basis for second generation computers.(Solved)
State the main component that formed the basis for second generation computers.
Date posted: September 30, 2019.
- Using twos complements compute the following using 8 bits:
2010 - 2510(Solved)
Using twos complements compute the following using 8 bits:
2010 - 2510
Date posted: September 30, 2019.
- Compute the value of x in the following expressions:
(i) 24.3510 = X2
(ii) 6ABH = X10(Solved)
Compute the value of x in the following expressions:
(i) 24.3510 = X2
(ii) 6ABH = X10
Date posted: September 30, 2019.
- Identify any three duties of an information system manager(Solved)
Identify any three duties of an information system manager
Date posted: September 30, 2019.
- List three sources of viruses(Solved)
List three sources of viruses
Date posted: September 30, 2019.
- Differentiate between private data and confidential data(Solved)
Differentiate between private data and confidential data
Date posted: September 30, 2019.
- Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees(Solved)
Explain how you can defend your files from the following risks
(i) Fire in the computer
(ii) Hackers
(iii) Virus attack
(iv) Disgruntled ex-employees
Date posted: September 30, 2019.
- The various services are to be provided by servers. Briefly describe the services provided by
(i) Print server
(ii) Internet server
(iii) Intranet server
(Solved)
The various services are to be provided by servers. Briefly describe the services provided by
(i) Print server
(ii) Internet server
(iii) Intranet server
Date posted: September 30, 2019.
- (a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal...(Solved)
(a) Design a flowchart for a simple program that can be used to categorize people according to age. If the person is above or equal 18 years, output “Adult” otherwise output “Young”
(b) What is the difference between looping and selection.
Date posted: September 30, 2019.
- Differentiate between a router and a gateway.(Solved)
Differentiate between a router and a gateway.
Date posted: September 30, 2019.
- What is system implementation?(Solved)
What is system implementation?
Date posted: September 30, 2019.
- Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form(Solved)
Work out the following
(a) 1110.1012 - 101.012
(b) Convert EFE16 into decimal form
Date posted: September 30, 2019.
- Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya(Solved)
Highlight three Acts of Parliament or laws that govern the use of ICT in Kenya
Date posted: September 30, 2019.
- State four problems that may occur during printing and how to solve them.(Solved)
State four problems that may occur during printing and how to solve them.
Date posted: September 30, 2019.
- Explain how you would unfreeze a computer running windows which has stopped responding to commands(Solved)
Explain how you would unfreeze a computer running windows which has stopped responding to commands
Date posted: September 30, 2019.
- (i) Define the term “system registry”(ii) State three causes of system registry failure(Solved)
(i) Define the term “system registry”
(ii) State three causes of system registry failure
Date posted: September 30, 2019.
- Differentiate between compatibility and interoperability in relation to computer software and hardware.(Solved)
Differentiate between compatibility and interoperability in relation to computer software and hardware.
Date posted: September 30, 2019.
- Most distributions of Linux operating system are available to users under General Public Licence (GPL)
(a) Explain the meaning of GPL
(b) State four examples of...(Solved)
Most distributions of Linux operating system are available to users under General Public Licence (GPL)
(a) Explain the meaning of GPL
(b) State four examples of Linux distributions available under GPL
Date posted: September 30, 2019.
- State three advantages of LED over incandescent and fluorescent illuminating devices.(Solved)
State three advantages of LED over incandescent and fluorescent illuminating devices.
Date posted: September 30, 2019.
- Differentiate between Core 2 Duo and Quad Core processors in terms of internal architecture(Solved)
Differentiate between Core 2 Duo and Quad Core processors in terms of internal architecture
Date posted: September 30, 2019.
- Define Macro(Solved)
Define Macro
Date posted: September 30, 2019.
- The traffic lights serve as output devices for a computerized traffic system. Name the appropriate input device for this system.(Solved)
The traffic lights serve as output devices for a computerized traffic system. Name the appropriate input device for this system.
Date posted: September 30, 2019.
- Describe three ways in which computers have positively impacted on education.(Solved)
Describe three ways in which computers have positively impacted on education.
Date posted: September 30, 2019.
- (a) What is the hexadecimal equivalent of 7478(b) Use one’s compliment to solve 610(Solved)
(a) What is the hexadecimal equivalent of 7478
(b) Use one’s compliment to solve 610
Date posted: September 30, 2019.
- Explain the meaning of the following terms as used in computer programming.
i) Syntax
ii) Semantics(Solved)
Explain the meaning of the following terms as used in computer programming.
i) Syntax
ii) Semantics
Date posted: September 30, 2019.
- State TWO circumstances under which interviews may be used as a method of gathering information(Solved)
State TWO circumstances under which interviews may be used as a method of gathering information
Date posted: September 30, 2019.
- Define an information system.(Solved)
Define an information system.
Date posted: September 30, 2019.
- Most computerized security systems make use of biometric analysis. Name Physical features of human being that can be considered for this analysis.(Solved)
Most computerized security systems make use of biometric analysis. Name Physical features of human being that can be considered for this analysis.
Date posted: September 30, 2019.
- Describe THREE computer crimes taking place in society citing control measures that can be put in place to curb them.(Solved)
Describe THREE computer crimes taking place in society citing control measures that can be put in place to curb them.
Date posted: September 30, 2019.