(a) With reference to database management system, state:
one difference between fragmentation and replication.
(a) Name two computer professionals that use CorelDraw in the performance of their duties
(b)(i) List three tools in the CorelDraw toolbox.
(ii) Give one function of each tool listed 3(b)(i)
(c) State two uses of CorelDraw as an application software.
(a)(i) What is malware in computing?
(ii) List three types of malware
(b) State three symptoms of malware infection
(c) Give two ways of preventing malware infection
State one function for each of the following utility program
(a) Disk space analyzer
(b) Backup utility
(c) Register cleaner
(d) File manager
(e) Uninstaller
Which of the following data elements ranks highest in size?
The following terms describe the importance of data security except data
The allocation and de-allocation of computing resources in a computer is the function of
Use the information below to answer questions 13 and 14.
A student in the school hostel was able to upload some personal details on the school portal via the school’s WiFi .
The ISP and the hostel are both domiciled in the school premises.
The physical infrastructure through which internet traffic are exchanged between the ISP in the school illustrated above and other ISP s is called
Use the information below to answer questions 13 and 14.
A student in the school hostel was able to upload some personal details on the school portal via the school’s WiFi .
The ISP and the hostel are both domiciled in the school premises.
What type of network is illustrated above?
The equipment shown in Figure 1 is used for
A computer system under use was found to be unusually slow, freezes often and very dusty. What is needed to correct this problem?
The process of drawing inference from a piece of information is called
Computer ethical practises include the following except
Use Table 1 to answer questions 35 and 36.
Table 1: TableStudent
Reg No | House |
Age |
18/001 | Yellow | 14 |
18/002 | Blue | 15 |
18/003 | Yellow | 15 |
The attributes in Table 1 are
Use Table 1 to answer questions 35 and 36.
Table 1: TableStudent
Reg No | House |
Age |
18/001 | Yellow | 14 |
18/002 | Blue | 15 |
18/003 | Yellow | 15 |
Columns 2 and 3 in Table 1 cannot be used as primary key because both fields contain
Figure 5 is an MS PowerPoint application interface. The part used to apply motion effect to different objects of a slide is labelled
People who use cathode ray tube monitor without antiglare screen are susceptible to
Macromedia Dreamweaver application is used for
Artificial intelligence is a feature of
The following precautionary measures are taken against virus infection except
A digital platform for the delivery of public sector information and seminar to citizens is called