Inapakia....
Bonyeza na Ushikilie kuvuta kuzunguka |
|||
Bonyeza Hapa Kufunga |
Swali 1 Ripoti
Which of the following statements are true about computer?
I.Constructed from electronic components. II. It has self regeneration capability.
III. It has facility for storage of data and programs. IV.It has provision tor input and output of data.
Maelezo ya Majibu
The true statements about a computer are: I. Constructed from electronic components: A computer is an electronic device that is constructed using various electronic components such as transistors, capacitors, resistors, etc. III. It has facility for storage of data and programs: A computer has a storage device, such as a hard disk, that allows it to store data and programs for later use. IV. It has provision for input and output of data: A computer has various input devices such as a keyboard and mouse, which allow users to input data, and output devices such as a monitor or printer, which allow users to receive information from the computer. II. It has self-regeneration capability: This statement is not true. While computers are designed to detect and correct errors, they do not have the ability to regenerate or repair themselves without human intervention. Therefore, the statements that are true about computers are I, III, and IV.
Swali 5 Ripoti
An input device that converts an image into text is known as?
Maelezo ya Majibu
The input device that converts an image into text is known as an Optical Character Reader (OCR). OCR is a technology that uses specialized software to recognize text characters within an image and then converts them into a digital format that can be edited, searched, and processed like any other text data. OCR technology can be used for a variety of applications such as digitizing printed documents, translating languages, and recognizing handwritten text. In summary, an OCR is a tool that helps to convert an image of printed or handwritten text into digital text that can be easily edited and manipulated.
Swali 7 Ripoti
A suite of software that controls and manages the basic operation of a computer is?
Maelezo ya Majibu
The suite of software that controls and manages the basic operation of a computer is called system software. It includes programs that provide essential functionalities like managing hardware resources, running other software applications, and providing a user interface for interacting with the computer. Examples of system software include operating systems like Windows, macOS, and Linux, device drivers, system utilities, and firmware. System software is different from application software, which is designed to perform specific tasks like word processing, spreadsheet management, or video editing.
Swali 8 Ripoti
Which of the file organization methods can be accessed both randomly and sequentially?
Maelezo ya Majibu
The file organization method that can be accessed both randomly and sequentially is the Indexed Sequential Files. Indexed Sequential Files use an index to organize data records, allowing for both sequential and random access. The records are stored in sequence based on a primary key field, and the index keeps track of the location of each record. This allows for sequential access by reading the records in order, or random access by searching for a specific record based on its key value. For example, imagine a library catalog that is organized using an Indexed Sequential File. The books in the library are stored in order by their call numbers (i.e., the primary key field), and an index is kept that maps each call number to its location in the library. A patron could browse the catalog sequentially by looking at each book in order, or they could search for a specific book by using the index to find its location. Overall, Indexed Sequential Files provide the flexibility of both sequential and random access, making them a popular choice for applications that require both types of access.
Swali 9 Ripoti
A Collection of software that allows the computer to operate is called?
Maelezo ya Majibu
The collection of software that allows a computer to operate is called an Operating System (OS). An Operating System is a software that manages computer hardware and provides common services for computer programs. It acts as an interface between the hardware components of the computer and the applications that run on it. The operating system is responsible for managing resources such as memory, CPU time, and input/output operations. It also provides a user interface that enables users to interact with the computer and run applications. General-purpose software and specific software are not appropriate terms to describe the collection of software that allows a computer to operate. General-purpose software refers to software that can perform a variety of functions, such as word processing, spreadsheet management, and email communication. Specific software, on the other hand, is designed to perform a particular task, such as graphic design or accounting. Utility software, on the other hand, refers to software that performs specific tasks to maintain the performance and functionality of a computer system, such as virus scanners, disk defragmenters, and backup tools. However, utility software alone cannot allow a computer to operate; it needs an operating system to function. Therefore, the collection of software that allows a computer to operate is called an Operating System.
Swali 12 Ripoti
Data transfer can be initiated through the following media except?
Figure 1 28. The topology
Maelezo ya Majibu
Data transfer cannot be initiated through trunking pipe. Trunking pipes are used to protect and route cables, but they are not capable of initiating data transfer themselves. On the other hand, coaxial cable, fibre cable, and twisted pair cable are all examples of media that can be used to initiate data transfer. Coaxial cable uses a central conductor surrounded by insulation and a grounded shield to transmit signals, while fibre cable uses thin strands of glass or plastic to transmit light signals, and twisted pair cable uses pairs of copper wires twisted together to transmit electrical signals. Each of these media has its own advantages and disadvantages, and the choice of which one to use will depend on factors such as distance, bandwidth requirements, and cost.
Swali 13 Ripoti
The disk operating system will label three hard drives as?
Maelezo ya Majibu
The labeling of hard drives depends on the specific operating system being used. However, it is common for disk operating systems to label hard drives as letters starting from "C". This is because the first two letters, "A" and "B", are reserved for floppy drives. So, the most common labeling of hard drives is "C, D, and E".
Swali 14 Ripoti
To send a created MS PowerPoint document using email to a use the document can be added as?
Maelezo ya Majibu
Swali 15 Ripoti
The following actions are sources of breaches in computing except?
Maelezo ya Majibu
Swali 17 Ripoti
A personnel who deals with the computer and its management is called?
Maelezo ya Majibu
Swali 18 Ripoti
Machine Language instructions are expressed in?
Maelezo ya Majibu
Machine language instructions are expressed in binary. Binary is a system of representing numbers using only two digits, 0 and 1. Computers understand and process data in binary form, making it the most basic and fundamental language for computers. Machine language instructions are written using binary code, which the computer can directly execute without any further translation.
Swali 19 Ripoti
The Windows PC and the Apple Macintosh are examples of two different?
Maelezo ya Majibu
Swali 20 Ripoti
Data that is copied from an application is store the?
Maelezo ya Majibu
Data that is copied from an application is stored in the clipboard. The clipboard is a temporary storage location that allows you to copy and paste information between different applications or within the same application. When you copy data, it is stored in the clipboard, which is a type of memory that holds the data until you paste it elsewhere. Once you paste the data, it is removed from the clipboard, and the clipboard is ready to store new data. Therefore, the clipboard acts as a buffer that allows you to move information from one place to another, making it a useful tool for working with multiple applications or files.
Swali 21 Ripoti
Modern computers compared to earlier computers are?
Maelezo ya Majibu
Modern computers are faster and smaller compared to earlier computers. They can perform many tasks much faster and have more storage capacity for things like music, videos, and photos. They also often come in compact designs that make them more portable. However, it is important to note that technology is constantly evolving, so it's possible for there to be newer computers that are even faster and smaller than current ones.
Swali 22 Ripoti
The type of printer which works on the same principle as a photocopier is?
Maelezo ya Majibu
Swali 23 Ripoti
Effects of file insecurity include the following except?
Maelezo ya Majibu
The effects of file insecurity include virus infection, file corruption, and data loss. However, encrypted data is not an effect of file insecurity. When files are insecure, they can be easily infected by viruses and malware, which can cause harm to the computer and compromise sensitive data. File corruption can occur due to various reasons such as hardware failure, software errors, or virus attacks. This can lead to files becoming unreadable or unusable, which can cause significant inconvenience and loss of important information. Data loss is also a common effect of file insecurity, which can occur due to accidental deletion, system failure, or hardware damage. Encrypted data, on the other hand, is a security measure that is used to protect files and data from unauthorized access. It is not an effect of file insecurity, but rather a way to prevent file insecurity from happening. Encryption involves converting the original data into a code that is unreadable without a specific decryption key. This helps to ensure that sensitive data is kept safe and secure, even if the files themselves are compromised.
Swali 25 Ripoti
One major difference between paper spreadsheet and electronic spreadsheet is?
Maelezo ya Majibu
Swali 27 Ripoti
After several 'save' and 'delete' operations, the too small be used productively. This describes?
Maelezo ya Majibu
Swali 29 Ripoti
A cell with a red triangle in the top-right comer in a spreadsheet application signifies?
Maelezo ya Majibu
Swali 30 Ripoti
In BCD encoding system, 25, will be represented as?
Maelezo ya Majibu
In BCD (Binary Coded Decimal) encoding system, 25 will be represented as 00100101. BCD is a system that represents each digit of a decimal number with its equivalent binary code. In BCD, each decimal digit is represented by a four-bit binary code. Therefore, the decimal number 25 is represented in BCD as follows: The binary representation of 2 is 0010, and the binary representation of 5 is 0101. So, combining the binary codes for both digits, we get 0010 0101, which is equivalent to the decimal number 25 in BCD representation. Therefore, the correct option is 00100101.
Swali 31 Ripoti
The map of Nigeria is an example of ?
Maelezo ya Majibu
The map of Nigeria is an example of graphic data. Graphic data refers to any visual representation of information or data, such as graphs, charts, diagrams, and maps. In this case, the map of Nigeria is a visual representation of the geographic features and boundaries of the country. It shows the different regions, states, and cities within Nigeria, as well as its neighboring countries and bodies of water. The map uses a combination of colors, symbols, and labels to convey information about Nigeria's geography in a clear and easily understandable way.
Swali 32 Ripoti
The following symbols are used in flowcharting except the?
Maelezo ya Majibu
The answer is "close symbol." Flowcharts are diagrams that are used to represent the flow of a process or system. They use different symbols to represent different elements of the process, such as starting points, decision points, and actions. Terminal symbols, also known as start/end symbols, are used to indicate the beginning or end of a process or flowchart. Process symbols are used to represent actions or steps in the process, while input/output symbols are used to represent data inputs or outputs. However, there is no such thing as a "close symbol" in flowcharting. There are, however, symbols such as the decision symbol, which is used to indicate a point in the process where a decision needs to be made based on a condition or set of conditions. In summary, the correct answer is "close symbol" because there is no such symbol used in flowcharting.
Swali 33 Ripoti
The set of instructions written by computer experts to solve specific task of the user is called?
Maelezo ya Majibu
The set of instructions written by computer experts to solve a specific task of the user is called application software. Application software is a type of computer software that is designed to perform specific tasks, such as word processing, spreadsheet management, and media editing. It is created by developers to meet the needs of users, and it is installed onto a computer to help the user perform a certain task. Examples of application software include Microsoft Word, Excel, and Adobe Photoshop. Operating systems, system software, and utility software are different types of software. The operating system is the primary software that manages all of the hardware and software resources of a computer, while system software includes programs that help manage and maintain the computer, such as device drivers, security software, and system utilities. Utility software refers to programs that are designed to perform specific tasks, such as disk cleanup, backup, and optimization.
Swali 34 Ripoti
The scanner and the floppy disk are?
Maelezo ya Majibu
A scanner and a floppy disk are respectively an input device and a storage device. A scanner is a device used to convert a physical document or image into a digital format. It works by using a light source to capture an image and then digitize it. This means that it takes information from the physical world and converts it into a form that a computer can understand and process, making it an input device. On the other hand, a floppy disk is a type of removable storage device used to store and transfer data. It works by using magnetic storage to store data on a disk that can be easily removed and used in another computer. This means that it takes information from the computer and stores it in a physical form that can be accessed later, making it a storage device.
Swali 35 Ripoti
To hold row and column titles in places so that they do not scroll when the user scrolls a worksheet, click the?
Maelezo ya Majibu
To hold row and column titles in place so that they do not scroll when the user scrolls a worksheet in Microsoft Excel, you can use the Freeze Panes command on the Windows menu. This command allows you to select a row or column that you want to keep in place, and then freeze that row or column so that it remains visible when you scroll through the rest of the worksheet. This feature is helpful when you have a large spreadsheet with many rows and columns, and you want to keep the headers or labels in view as you work with the data. The other options listed in the question (Hold Titles, Split, and Show Grid) do not have the same function as Freeze Panes and will not allow you to hold row and column titles in place.
Swali 36 Ripoti
Three major types of language translators are?
Maelezo ya Majibu
The three major types of language translators are: Assembler, Compiler, and Interpreter. An Assembler is a translator that converts assembly language code, which is a low-level programming language, into machine language code that a computer can understand and execute. Assembly language is specific to a particular computer architecture, so an assembler is also specific to that architecture. A Compiler is a translator that converts high-level programming language code, which is more human-readable, into machine language code that a computer can understand and execute. The process of compilation involves several stages, including lexical analysis, syntax analysis, semantic analysis, code generation, and optimization. Once compiled, the resulting machine code can be run repeatedly without needing to recompile the source code. An Interpreter is a translator that works by executing high-level programming language code directly, without the need to first compile it into machine language code. Interpreters translate code line-by-line, executing each line immediately before moving on to the next one. This process is slower than compilation, but it allows for greater flexibility and interactivity during development, as changes to the source code can be tested immediately without needing to recompile.
Swali 37 Ripoti
A company known as CIBITO has the following memory modules in four of its computers as shown in Table 1 Use the information in Table 1 to answer questions 11 to 13.
MEMORY MODULE |
MEMORY TYPE | NUMBER OF PINS |
P | SIMM | 30 |
Q | SIMM | 72 |
R | SO DIMM | 72 |
S | DIMM | 168 |
Table 1
Which of the memory modules is appropriate for a notebook computer?
Maelezo ya Majibu
Swali 38 Ripoti
Which of the following is true when data maintained in MS Excel workbook is linked to a word document? The word document
Maelezo ya Majibu
Swali 39 Ripoti
The output of a NAND gate is 1 when?
Maelezo ya Majibu
A NAND gate is a logic gate that produces an output of 0 only when all its inputs are 1. In all other cases, the output is 1. So, if any of the inputs is 0, the output will be 1. If all the inputs are 1, the output will be 0. To put it another way, the NAND gate behaves like an "inverted AND" gate. It produces an output of 1 when any of the inputs is 0, and only produces an output of 0 when all the inputs are 1. This behavior makes the NAND gate a very useful building block in digital circuits, as it can be used to implement any other logical function.
Swali 41 Ripoti
A computer program that gathers information about a person or organization without their knowledge or consent is known as?
Maelezo ya Majibu
Swali 42 Ripoti
Which of the options labeled I to IV give two stages involved in booting?
I. Power On self test II. Loading of Operating System IIl. Loading of email IV. Power On Safe Mode
Maelezo ya Majibu
Swali 46 Ripoti
In MS Excel, the cell that contains the pointer or cursor is called?
Maelezo ya Majibu
The cell that contains the pointer or cursor in Microsoft Excel is referred to as the "Active Cell". An active cell is the cell that is selected and ready to accept data or a formula. You can tell which cell is active because its border is highlighted with a different color or pattern. When you start typing, the data will be entered into the active cell.
Swali 47 Ripoti
In Microsoft PowerPoint, two kinds of sound effect files that can be added to a presentation are?
Maelezo ya Majibu
The two kinds of sound effect files that can be added to a presentation in Microsoft PowerPoint are .wav files and .mid files. .wav files are audio files that contain sound recordings, such as music or voice recordings. They are widely used for sound effects and background music in presentations. .mid files are musical instrument digital interface files that contain musical notes and instructions for playing them. They are used to add background music or sound effects to a presentation that are specifically composed or synthesized for the presentation.
Swali 49 Ripoti
Spreadsheet packages can be used for? .
Maelezo ya Majibu
Spreadsheet packages are software programs that allow users to create, manipulate and analyze data in the form of tables, charts and graphs. They are mainly used for budgeting and inventory management because they offer powerful tools for financial analysis and data organization. With a spreadsheet package, you can create and format tables with columns and rows to track expenses, sales, and other important data. You can also use formulas and functions to automatically calculate totals, averages, and other important metrics. In addition to budgeting and inventory, spreadsheet packages can also be used for a wide range of other tasks, such as analyzing data trends, creating charts and graphs to visualize data, and performing mathematical calculations. Some spreadsheet packages even offer features for collaborating on documents and sharing data with others in real-time. However, spreadsheet packages are not designed for database management, word processing, drawing, or painting. For those tasks, you would need to use other software programs designed specifically for those purposes.
Swali 51 Ripoti
(a) i() What is firewall? (ii) List two methods used in protecting the computer system.
(b) Explain the following stages of the System Development Life Cycle: (i) feasibility study; (ii) design; (iii) maintenance.
(a) (i) A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a private internal network and the public Internet, protecting sensitive data and systems from unauthorized access, hacking attempts, and other security threats.
(ii) Two methods used in protecting computer systems are:
(b) (i) Feasibility Study: The feasibility study is the first stage of the System Development Life Cycle. It involves evaluating a proposed system to determine whether it is technically, economically, and operationally feasible. This stage helps to identify potential risks and challenges and determine if the proposed system is worth pursuing.
(ii) Design: The design stage involves creating a detailed blueprint of the proposed system, including its architecture, components, and interfaces. This stage also involves defining system requirements and specifications, and determining the methods and technologies to be used in building the system.
(iii) Maintenance: The maintenance stage is the ongoing process of monitoring and updating the system to ensure that it continues to meet its requirements and perform as expected. This may involve fixing bugs and other technical issues, updating software, and making other improvements to the system. It is an important part of the System Development Life Cycle as it helps to maintain the integrity and reliability of the system over time.
Maelezo ya Majibu
(a) (i) A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a private internal network and the public Internet, protecting sensitive data and systems from unauthorized access, hacking attempts, and other security threats.
(ii) Two methods used in protecting computer systems are:
(b) (i) Feasibility Study: The feasibility study is the first stage of the System Development Life Cycle. It involves evaluating a proposed system to determine whether it is technically, economically, and operationally feasible. This stage helps to identify potential risks and challenges and determine if the proposed system is worth pursuing.
(ii) Design: The design stage involves creating a detailed blueprint of the proposed system, including its architecture, components, and interfaces. This stage also involves defining system requirements and specifications, and determining the methods and technologies to be used in building the system.
(iii) Maintenance: The maintenance stage is the ongoing process of monitoring and updating the system to ensure that it continues to meet its requirements and perform as expected. This may involve fixing bugs and other technical issues, updating software, and making other improvements to the system. It is an important part of the System Development Life Cycle as it helps to maintain the integrity and reliability of the system over time.
Swali 52 Ripoti
(a) (i) identify Figure 1. (ii) Name the parts labeled I, J, K and L in Figure 1
(b)(i) Define the documentation stage in Program Development Life Cycle. (ii) List three characteristics of a good computer program.
(a)
i)Flow chart diagram
ii) Name the parts
(b)
Maelezo ya Majibu
(a)
i)Flow chart diagram
ii) Name the parts
(b)
Swali 53 Ripoti
(a) A musician intends to record music on a storage medium. List four ways that the music file can organized in the storage medium.
(b) State two basic operations on computer file. (c) Explain the following computer terms: (i) file (ii) re cord
(a) Four ways that a music file can be organized on a storage medium are:
(b) The two basic operations on computer files are:
(c)
(i) A file is a collection of information or data that is stored on a computer system. It can be a document, image, video, or any other type of digital information. Files can be stored on a variety of storage media such as hard drives, flash drives, CDs, DVDs, or in the cloud. A file is usually identified by its file name and extension, which tells the computer what type of file it is.
(ii) A record is a collection of related data fields that are stored together as a single unit. It can be thought of as a row in a table, where each column represents a different data field. Records are used in databases to store and organize large amounts of data. For example, in a customer database, each record might represent a different customer, with fields for their name, address, phone number, and other information. Records can be accessed and manipulated using a database management system.
Maelezo ya Majibu
(a) Four ways that a music file can be organized on a storage medium are:
(b) The two basic operations on computer files are:
(c)
(i) A file is a collection of information or data that is stored on a computer system. It can be a document, image, video, or any other type of digital information. Files can be stored on a variety of storage media such as hard drives, flash drives, CDs, DVDs, or in the cloud. A file is usually identified by its file name and extension, which tells the computer what type of file it is.
(ii) A record is a collection of related data fields that are stored together as a single unit. It can be thought of as a row in a table, where each column represents a different data field. Records are used in databases to store and organize large amounts of data. For example, in a customer database, each record might represent a different customer, with fields for their name, address, phone number, and other information. Records can be accessed and manipulated using a database management system.
Swali 54 Ripoti
TEST OF PRACTICAL KNOWLEDGE QUESTION
As a database administrator for a company, create a table named tbl-Employee in a database application package containing the fields:
"Employee Name", "Department", "Assumption Date", Address and "Designation".
(a) Enter the data as shown in the table tbl-Employee
tbl-Employee
Employee Name |
Department | Assumption Date | Address | Designation |
Kate Willikie |
General Office | 03/08/18 | 3 Lagos Crescent | Secretary |
James Elliot |
Security | 27/11/10 | 2 Cocoa House Villa. | CSO |
Paul Akinson |
Admin | 03/11/12 | 12 Millo Avenue | HRM |
Abdul Kaduna |
Registry | 05/06/16 | 2 Park Lane Rd | Clerk |
David Madu |
Management | 22/03/94 | 34 Lakeside | MD |
(b)Sort the data using the Assumption date from oldest to newest.
(c) Create a report in tabular, landscape using the tbl-Employee table.
(d) Insert your full name and index number as a label on the report.
(e) Save the report as rpt-Employee.
(f) Print your work and submit to the supervisor.
To create a table named "tbl-Employee" in a database application package, you would need to use a database management system and write a SQL (Structured Query Language) script to create the table and specify the fields. The fields you need to include are: "Employee Name", "Department", "Assumption Date", "Address", and "Designation".
Here's an example of the SQL script to create the table:
CREATE TABLE tbl-Employee (
EmployeeName varchar(50),
Department varchar(50),
AssumptionDate date,
Address varchar(100),
Designation varchar(50)
);
Next, you can insert the data into the table using the following SQL script:
INSERT INTO tbl-Employee (EmployeeName, Department, AssumptionDate, Address, Designation)
VALUES
('Kate Willikie', 'General Office', '03/08/18', '3 Lagos Crescent', 'Secretary'),
('James Elliot', 'Security', '27/11/10', '2 Cocoa House Villa.', 'CSO'),
('Paul Akinson', 'Admin', '03/11/12', '12 Millo Avenue', 'HRM'),
('Abdul Kaduna', 'Registry', '05/06/16', '2 Park Lane Rd', 'Clerk'),
('David Madu', 'Management', '22/03/94', '34 Lakeside', 'MD');
To sort the data by the "Assumption Date" field from oldest to newest, you can use the following SQL script:
SELECT * FROM tbl-Employee
ORDER BY AssumptionDate ASC;
For the report, you can use a reporting tool or generate a SQL script to format the data into a tabular, landscape report. You can add your full name and index number as a label on the report by including it as a header or footer in the report.
Finally, you can save the report as "rpt-Employee" and print it for submission to your supervisor.
Maelezo ya Majibu
To create a table named "tbl-Employee" in a database application package, you would need to use a database management system and write a SQL (Structured Query Language) script to create the table and specify the fields. The fields you need to include are: "Employee Name", "Department", "Assumption Date", "Address", and "Designation".
Here's an example of the SQL script to create the table:
CREATE TABLE tbl-Employee (
EmployeeName varchar(50),
Department varchar(50),
AssumptionDate date,
Address varchar(100),
Designation varchar(50)
);
Next, you can insert the data into the table using the following SQL script:
INSERT INTO tbl-Employee (EmployeeName, Department, AssumptionDate, Address, Designation)
VALUES
('Kate Willikie', 'General Office', '03/08/18', '3 Lagos Crescent', 'Secretary'),
('James Elliot', 'Security', '27/11/10', '2 Cocoa House Villa.', 'CSO'),
('Paul Akinson', 'Admin', '03/11/12', '12 Millo Avenue', 'HRM'),
('Abdul Kaduna', 'Registry', '05/06/16', '2 Park Lane Rd', 'Clerk'),
('David Madu', 'Management', '22/03/94', '34 Lakeside', 'MD');
To sort the data by the "Assumption Date" field from oldest to newest, you can use the following SQL script:
SELECT * FROM tbl-Employee
ORDER BY AssumptionDate ASC;
For the report, you can use a reporting tool or generate a SQL script to format the data into a tabular, landscape report. You can add your full name and index number as a label on the report by including it as a header or footer in the report.
Finally, you can save the report as "rpt-Employee" and print it for submission to your supervisor.
Swali 55 Ripoti
(a)(i) Define the term encryption. (ii) Tick two authentication techniques involved in security measure from Table 1.
Table 1
(ii) Outline two features of data encryption. (b) While exchanging data with a friend through your mobile phone, you observed that it took a longer time than usual. Outline four factors that may be responsible for the delay in the data transfer.
TECHNIQUE |
TICK() |
Firewall |
|
Biometric |
|
Password |
|
Intranet |
(a)(i) Encryption is the process of converting plain or readable data into a coded or unreadable format using an algorithm. This process helps to secure the confidentiality of sensitive information and prevents unauthorized access or interception of data.
(a)(ii) Two authentication techniques involved in security measure from Table 1 are:
(a)(iii) Two features of data encryption are:
(b) Four factors that may be responsible for the delay in data transfer through mobile phone are:
Maelezo ya Majibu
(a)(i) Encryption is the process of converting plain or readable data into a coded or unreadable format using an algorithm. This process helps to secure the confidentiality of sensitive information and prevents unauthorized access or interception of data.
(a)(ii) Two authentication techniques involved in security measure from Table 1 are:
(a)(iii) Two features of data encryption are:
(b) Four factors that may be responsible for the delay in data transfer through mobile phone are:
Je, ungependa kuendelea na hatua hii?