COMPUTER STUDIES QUESTIONS WITH ANSWERS
Give four general rules that must be observed to keep within the law when working with data and information
0 Comments
List four ways in which data integrity can be compromised
Identify the underlined parts of the following email address:
Assume that cell F5 to F10 in a spreadsheet contains numeric value of salary earned by some workers and cell F12 contains the value of 5%. Write a formula that will be used to increase the value stored in cell F5 by 5 percent which will then be copied to other cells.=F5*(1+$F$12) or =F5+ (F5*$F$12)
Differentiate between cropping and resizing as used in DTP.
State the meaning of computer malwareA malicious program designed to harm or disrupt the normal functioning of a computer system e.g. clogging computer memory, unjustified background programs, replicating files etc.
List four signs of a computer system invaded by a virus
The information below is maintained by the sales lady at the school canteen. Study it and answer the questions that follow.(a) Describe the basic data types used in this spreadsheet (4mks)
(b) Provide a single formula that would be used to
|
Categories
All
Archives
December 2024
|
We Would Love to Have You Visit Soon! |
Hours24 HR Service
|
Telephone0728 450425
|
|
8-4-4 materialsLevels
Subjects
|
cbc materialsE.C.D.E
Lower Primary
Upper Primary
Lower Secondary
Upper Secondary
|
teacher support
Other Blogs
|