Identify two factors that led to the growth of Athens as an urban centre. (Answered)
State two functions of early urban centers in Egypt. (Answered)
Discuss the impacts of the agrarian and industrial development on urbanization. (Answered)
Identify the problems facing Johannesburg. (Answered)
Give the functions of Johannesburg as a modern urban centre in Africa. (Answered)
Identify the steps which have been taken by the Kenyan government to solve the problems facing
Nairobi (Answered)
Discuss the functions of Nairobi as a modern urban
centre. (Answered)
Explain the factors that led to the growth of Nairobi as a modern urban centre in
Africa. (Answered)
Give the main reasons for the growth of London. (Answered)
Discuss the problems facing London as an urban centre. (Answered)
State the functions of London as an urban centre. (Answered)
Identify the reasons which led to the decline of the ancient city in Athens. (Answered)
Explain the factors for the rapid growth of urban centres in Europe. (Answered)
State the factors that led to the development Kilwa into a town. (Answered)
Which was the main factor that led to the decline of the ancient town of Meroe? (Answered)
Discuss the problems facing modern Cairo. (Answered)
Identify the functions of Cairo as an early urban centre. (Answered)
State the factors for the growth of Cairo into an urban centre. (Answered)
Explain the factors which lead to the decline of early urban centers in Africa. (Answered)
Identify the economic factors that led to the rise of early urbanization in Africa (Answered)
Explain the factors that led to the growth of early urban Centres (Answered)
Name three early urban Centres in Africa. (Answered)
Define the term urbanization. (Answered)
Differentiate between the terms eavesdropping and tapping as used in data
security (Answered)
Give an example of computer fraud. (Answered)
Define the term computer fraud. (Answered)
Explain five data security practices that can be carried out by an organization. (Answered)
Define the term cyberterrorism. (Answered)
Define the term data control. (Answered)
Define the following terms.
i)Virus hoaxes
ii)Computer worm
iii)Trojan
iv)Phishing
v)Adware
vi)Identity theft (Answered)
Mention the risk to data associated with the opening and responding to spam
mail. (Answered)
Give one law which relates to data and information systems used in Kenya. (Answered)
Describe two areas covered by laws relating to information system. (Answered)
Describe the following methods of detection and protection of computer
crimes: (Answered)
Describe how a firewall works. (Answered)
Mention two examples of cyberterrorism. (Answered)
Describe the following computer crimes; (Answered)
Give four precaution that can be taken against computer viruses in a school. (Answered)
List three ways through which viruses get into a computer system. (Answered)
Give three symptoms of computer infected by viruses. (Answered)
Mention three features of computer viruses. (Answered)
Define the term computer virus. (Answered)
Define the following terms;
i)Password
ii)Authentication (Answered)
Give three items that may be covered by computer ethics. (Answered)
Define the term computer ethics. (Answered)
Define the term spyware. (Answered)
Differentiate between data encryption and use of password. (Answered)
State one function of firewall. (Answered)
State three precautions a bank can take to prevent illegal data alterations. (Answered)
State any three functions of an antivirus software. (Answered)