-
Explain 4 approaches that can be employed to recover from deadlocks.
Date posted:
April 23, 2019
-
Outline four basics operations associated with a change in state of a process.
Date posted:
April 23, 2019
-
Outline various expressions of a computer memory's capacities.
Date posted:
April 22, 2019
-
Describe the two types of computer random access memory.
Date posted:
April 22, 2019
-
Explain at least three types of read only memory and state its various characteristics.
Date posted:
April 22, 2019
-
Briefly explain various categories of printers
Date posted:
April 22, 2019
-
What is disk initializing?
Date posted:
April 18, 2019
-
Differentiate between tab key and home key.
Date posted:
April 18, 2019
-
Indicate an area of application for
i) Joystick
ii) Graphic tablet
Date posted:
April 18, 2019
-
Define the term register.
Date posted:
April 18, 2019
-
In relation to the control unit of the CPU, explain the three stages of the fetch execute cycle.
Date posted:
April 18, 2019
-
What is system review?
Date posted:
April 18, 2019
-
List two types of system maintenance
Date posted:
April 18, 2019
-
List any four data collection media that can be used to collect data.
Date posted:
April 17, 2019
-
Give two differences between interpreting and compiling a high level language.
Date posted:
April 17, 2019
-
Give a reason or formatting a document.
Date posted:
April 17, 2019
-
List any two methods one can use to test a program
Date posted:
April 17, 2019
-
Give two disadvantages of using e- commerce rather than the conventional method of carrying out business
Date posted:
April 17, 2019
-
Define the term e-mail
Date posted:
April 17, 2019
-
Give a reasons why a communication satellite has to rotate at the same rate as the earth.
Date posted:
April 17, 2019
-
Explain the concept of ‘ Line of sight’ in wireless communication
Date posted:
April 17, 2019
-
Explain the meaning of the term bolding
Date posted:
April 17, 2019
-
Give the function of a surge suppressor
Date posted:
April 17, 2019
-
Explain briefly the difference between bound and unbound controls
Date posted:
April 17, 2019
-
Define the term control as used in report and form design
Date posted:
April 17, 2019
-
Explain two uses of forms in database design.
Date posted:
April 17, 2019
-
Give any two reasons why passwords may not be reliable as security control measures.
Date posted:
April 17, 2019
-
Briefly describe how the following data security measures function
i) Audit trail
ii) Log files
iii) Fire walls
Date posted:
April 17, 2019
-
Write the acronym BIOS in full.
Date posted:
April 17, 2019
-
Describe the use of the following utilities
i) Linkers
ii) Debuggers
iii) Loaders
Date posted:
April 17, 2019