Skip to content
Swalijibu
Home
KCSE KCPE PAST PAPERS
Ask us a Question
CM Answers Sample Page CM QUESTIONS ARCHIVES My First Question My Resolved Question CM Answers Sample Page Questions
Login/Register Blog
  • Answers
  • Ask us a Question
    GENERAL
    KCPE PAST PAPERS HISTORY & GOVERNMENT BUSINESS STUDIES AGRICULTURE C.R.E COMPUTER STUDIES GEOGRAPHY GRADE 7 Questions or Answers SWALIJIBU KCPE FORM 4 EXAMS HISTORY AND GOVERNMENT HISTORY PAPER 1 GRADE 7 CURRICULUM DESIGNS Computer Studies Paper 1 Form 4 Mocks C.R.E PAPER 2 Questions or Answers SWALIJIBU KCPE FORM 4 EXAMS HISTORY AND GOVERNMENT HISTORY PAPER 1 GRADE 7 CURRICULUM DESIGNS Computer Studies Paper 1 Form 4 Mocks C.R.E PAPER 2 GEOGRAPHY FORM 1 AGRICULTURE PAPER 1 QUESTIONS C.R.E PAPER 1 KCSE 2013 PDF DOCUMENTS physics paper 1 FORM 4 TERM 2 NOTES JESUS
    CM Answers Sample Page
  • Answers
  • COMPUTER STUDIES

    • COMPUTER STUDIES PAPER 1 REVISION KIT MODEL22042023 pdf
    • KCSE 2014 COMPUTER STUDIES PAPER 1 QUESTIONS
    • FORM 1 COMPUTER STUDIES SIMPLIFIED NOTES
    • Name any three examples of DTP packages.
    • With reference to spreadsheets, differentiate between a range and a cell.
    • Below is an e-mail address,kerae@yahoo.com. Briefly explain what each component of the address means
    • Define the term ‘search engine’ giving two examples
    • A computer student saved a document in My Documents; briefly describe how he would transfer this document to a new location named my Computer
    • Differentiate between the process of moving text and copying text
    • List four features of a word processor
    • State and briefly explain two types of registers.
    • Give a reason for performing disk defragmentation
    • Explain two disadvantages of magnetic tapes over compact disks
    • Differentiate between buffers and registers with reference to special purpose memories
    • State three functions of network operating systems giving two examples
    Ask us a Question
    Read More
    Join Our Telegram Group
    Join Our Whatsapp Group

    Describe two methods used to secure data in a database.

    Describe two methods used to secure data in a database.

    1. Password protection.
    2. User and group permissions.
    3. User – level security.
    4. Data encryption.

    Virus-free.www.avast.com

    Print Friendly, PDF & Email
    Post Views: 8
    Tell your friends about this content:


    Related posts:

    1. Explain the meaning of the following terms as used in DTP.
    2. Make a clear difference between a Website and Web portals.
    3. State one advantages of using wireless transmission media to connect to the internet.
    4. Explain the importance of control structure in program development.
    5. State the stage of program development in which:
    6. Outline the seven open systems interconnection ( OSI ) reference model Layers in their order in network.
    7. Differentiate the function SUM and SUMIF as used in spreadsheet.
    8. Describe each of the following data processing methods and give an example of where used.
    9. Make a clear difference between:-
    10. Differentiate Database administrator and web administrator.
    11. Define the term accreditation as used in education
    12. QUESTION ON BINARY ARITHMETICS
    13. Explain two disadvantages of magnetic tapes over compact disks
    14. Give a reason for performing disk defragmentation
    15. With reference to spreadsheets, differentiate between a range and a cell.
    Questions or Answers

    Leave a Reply Cancel reply0

    You must be logged in to post a comment.

    Swalijibu
      Ask us a Question
      GENERAL
      CM Answers Sample Page
    • Answers

    © 2023 Swalijibu