As a database administrator for a company, create a table named tbl-Employee in a database application package containing the fields:"Employee Name", "Department", "Assumption Date", Address and "Designation".(a) Enter t…
See more
2019
Use a spreadsheet application to do the following. (a) In cell A1, type "My One Week Expenses On Five items".(b) In row 2, type column-by-column the following: "ITEM", 1ST DAY, "2ND DAY, "3RD DAY", *4TH DAY, "5THDAY", "6…
See more
2019
Using a word Processing application package, create a vising card for a system administrator of a software company using the following specifications:(a) Size of the card is 3.5" x 2", (b) Office and Residential Address…
See more
2019
(a)(i) Define the term encryption. (ii) Tick two authentication techniques involved in security measure from Table 1.Table 1 (ii) Outline two features of data encryption. (b) While exchanging data with a friend through y…
See more
2019
(a) (i) identify Figure 1. (ii) Name the parts labeled I, J, K and L in Figure 1(b)(i) Define the documentation stage in Program Development Life Cycle. (ii) List three characteristics of a good computer program.
See more
2019
(a) Explain the following terms: (i) storage device; (ii) virtual memory.(b) Two storage devices have capacities 2KB and 2MB respectively. (i) Calculate the number of bits that each of 2KB and 2MB can hold. 2 KB: 2 MB(i)…
See more
2019
(a) A musician intends to record music on a storage medium. List four ways that the music file can organized in the storage medium.(b) State two basic operations on computer file. (c) Explain the following computer terms…
See more
2019
(a) i() What is firewall? (ii) List two methods used in protecting the computer system.(b) Explain the following stages of the System Development Life Cycle: (i) feasibility study; (ii) design; (iii) maintenance.
See more
2019
Password reset disk should be created?
See more
2019
A computer program that gathers information about a person or organization without their knowledge or consent is known as?
See more
2019
Which of the file organization methods can be accessed both randomly and sequentially?
See more
2019
Effects of file insecurity include the following except?
See more
2019
The following actions are sources of breaches in computing except?
See more
2019
In BCD encoding system, 25, will be represented as?
See more
2019
Multiply 101\(_2\) by 11\(_2\)
See more
2019
A bit as used in computing in digital communication is?
See more
2019
Which of the options labeled I to IV give two stages involved in booting?I. Power On self test II. Loading of Operating System IIl. Loading ofemail IV. Power On Safe Mode
See more
2019
The disk operating system will label three hard drivesas?
See more
2019
After several 'save' and 'delete' operations, the too small be used productively. This describes?
See more
2019
Data that is copied from an application is store the?