A student was asked to record the type of vehicle that entered the school compound through the school's main gate on a Monday morning. The passage below is an excerpt from the student's report on the assignment. "Report…
See more
2015
Given an internet connected computer, outline a step by step procedure for carrying out the following operations;(a) How to log on to www.mybooks.com and obtain the prices of books W, X, Y, Z and M.(b) How to tabulate th…
See more
2015
(a) Define; (i) Data Security (i) Data risk assessment(b)(i) What is Access Control(ii) List the access control methods in database security.(c) State three roles of a database administrator.
See more
2015
(a)(i) Define application package.(ii) State one use each of any four application packages(b) List two benefits of a presently package(c) Outlines three guidelines for creating a good MS PowerPoint Presentation
See more
2015
(a) Define the following(i) Database(ii) Database management system(b) Mention three functions of a database management system.(c) Mention two ways through which data can be destroyed.(d) State three precautionary measur…
See more
2015
a (i) Define an operating system.
(ii) State two functions of an operating system
(iii) List two differences between an operating system and application system software.b Starting from the Save As dialogue box,…
See more
2015
The exchange of information over a network follows a set of rules called
See more
2015
In a relational database management system, files are organized as relations and
See more
2015
One of the advantages of a parallel database is
See more
2015
A program developed to protect the computer from malicious software is referred to as
See more
2015
The diagram illustrates the relationship between two tables in a database.What type of relationship exists between Tables I and II?
See more
2015
The diagram illustrates the relationship between two tables in a database.The student ID in Tables II is referred to as
See more
2015
Which of these measures would not secure data in database?
See more
2015
The type of file organisation in a DVD-ROM is?
See more
2015
The following are desturctive software except
See more
2015
Which of the following is a computer professional?
See more
2015
Which of the following is not a safety equipment in a computer laboratory?
See more
2015
Which of the following is not a preventive maintenance measure?
See more
2015
A file kept in case of an accident or natural disaster is called
See more
2015
In MS Powerpoint, the action of holding down the left mouse key and moving the mouse around the slide would