Total of 659 Questions.     



Share To Friends Via:
        

Questions Categories:



1.   State two advantages of multiplexing in data communication systems (Answered)
State two advantages of multiplexing in data communication systems .
Posted On:Mon 22, January 2024 22:22:22 pm
2.   Distinguish between CSMA/CD and token ring media access methods (Answered)
Distinguish between CSMA/CD and token ring media access methods .
Posted On:Mon 22, January 2024 22:21:42 pm
3.   Define the term node as used in data transmission (Answered)
Define the term node as used in data transmission .
Posted On:Mon 22, January 2024 22:21:03 pm
4.   Explain three functions of the data link layer (Answered)
Explain three functions of the data link layer .
Posted On:Mon 22, January 2024 22:20:22 pm
5.   With aid of a diagram, describe the User Datagram Protocol (UDP) datagram (Answered)
With aid of a diagram, describe the User Datagram Protocol (UDP) datagram .
Posted On:Mon 22, January 2024 22:18:08 pm
6.   Differentiate between malware and ransom ware as applied in network security (Answered)
Differentiate between malware and ransom ware as applied in network security .
Posted On:Mon 22, January 2024 22:15:12 pm
7.   Explain each of the following terms as used in the internet (6 marks) i. Bookmark ii. Plug-in iii. Search engine (Answered)
Explain each of the following terms as used in the internet (6 marks) i. Bookmark ii. Plug-in iii. Search engine .
Posted On:Mon 22, January 2024 22:14:21 pm
8.   Explain two roles of the Domain Naming Server (DNS) (Answered)
Explain two roles of the Domain Naming Server (DNS) .
Posted On:Mon 22, January 2024 22:13:31 pm
9.   With aid of a diagram, describe TCP/IP layer model (Answered)
With aid of a diagram, describe TCP/IP layer model .
Posted On:Mon 22, January 2024 22:02:54 pm
10.   Explain three functions of the session layer as used in OSI (Answered)
Explain three functions of the session layer as used in OSI .
Posted On:Mon 22, January 2024 21:56:28 pm
11.   Differentiate between star and hybrid network topologies (Answered)
Differentiate between star and hybrid network topologies .
Posted On:Mon 22, January 2024 21:54:46 pm
12.   Distinguish between network and host addresses as applied in IP addressing (Answered)
Distinguish between network and host addresses as applied in IP addressing .
Posted On:Mon 22, January 2024 21:54:01 pm
13.   With aid of a diagram, describe the structure of a coaxial cable (Answered)
With aid of a diagram, describe the structure of a coaxial cable .
Posted On:Mon 22, January 2024 21:53:01 pm
14.   Bring your own device (BYOD) poses some risks to software cooperate networks. Explain two potential risks that are likely to be experienced (Answered)
Bring your own device (BYOD) poses some risks to software cooperate networks. Explain two potential risks that are likely to be experienced .
Posted On:Mon 22, January 2024 21:48:15 pm
15.   Differentiate between hub and repeater as used in computer networks (Answered)
Differentiate between hub and repeater as used in computer networks .
Posted On:Mon 22, January 2024 21:47:40 pm
16.   Define the term latency as applied in network troubleshooting (Answered)
Define the term latency as applied in network troubleshooting .
Posted On:Mon 22, January 2024 21:47:05 pm
17.   Describe two components of a data communication system (Answered)
Describe two components of a data communication system .
Posted On:Mon 22, January 2024 21:46:30 pm
18.   Outline two functions of a network operating system (NOS) (Answered)
Outline two functions of a network operating system (NOS) .
Posted On:Mon 22, January 2024 21:45:52 pm
19.   Outline two typical features of 10BaseT network (Answered)
Outline two typical features of 10BaseT network .
Posted On:Mon 22, January 2024 21:45:05 pm
20.   Outline three benefits of OSI model in data communication (Answered)
Outline three benefits of OSI model in data communication .
Posted On:Mon 22, January 2024 21:44:25 pm
21.   What is a computer Network (Answered)
What is a computer Network .
Posted On:Mon 22, January 2024 21:43:45 pm
22.   Explain each of the following as used in Data communication (6 marks) a) Simplex Communication system b) Duplex Communication system c) Full Duplex Communication system (Answered)
Explain each of the following as used in Data communication (6 marks) a) Simplex Communication system b) Duplex Communication system c) Full Duplex Communication system .
Posted On:Mon 22, January 2024 21:42:52 pm
23.   Differentiate between Circuit switching and Packet switching as used in data communication (Answered)
Differentiate between Circuit switching and Packet switching as used in data communication .
Posted On:Mon 22, January 2024 21:42:15 pm
24.   Differentiate between Data Communication Equipment (DCE) and Data Terminal Equipment (DTE) (Answered)
Differentiate between Data Communication Equipment (DCE) and Data Terminal Equipment (DTE) .
Posted On:Mon 22, January 2024 21:41:41 pm
25.   Give 3 functions of a protocol in data communication (Answered)
Give 3 functions of a protocol in data communication .
Posted On:Mon 22, January 2024 21:40:56 pm
26.   What is a protocol as used in computer data communication (Answered)
What is a protocol as used in computer data communication .
Posted On:Mon 22, January 2024 21:09:34 pm
27.   Derive the truth table for each of the following logic gates having two inputs. (i)NOR gate (ii)NAND gate (iii)XNOR gate (Answered)
Derive the truth table for each of the following logic gates having two inputs. (i)NOR gate (ii)NAND gate (iii)XNOR gate .
Posted On:Tue 27, December 2022 08:01:27 am
28.   Peter, John and Mary intend to purchase 15, 16, 18 books and 9, 11, 15 pens each respectively. In shop A a book cost Kshs 250 and a pen costs Kshs 175 while in shop B, a book cost Ksh 225 while a pen costs Kshs 190. i) Represent this information in matrix form. ii) Using matrix method, determine the total cost the three students would spend to acquire the items from shop A and from shop B. (Answered)
Peter, John and Mary intend to purchase 15, 16, 18 books and 9, 11, 15 pens each respectively. In shop A a book cost Kshs 250 and a pen costs Kshs 175 while in shop B, a book cost Ksh 225 while a pen costs Kshs 190. i) Represent this information in matrix form. ii) Using matrix method, determine the total cost the three students would spend to acquire the items from shop A and from shop B. .
Posted On:Tue 27, December 2022 07:56:08 am
29.   State two differences between discrete variable and a continuous variable (Answered)
State two differences between discrete variable and a continuous variable .
Posted On:Tue 27, December 2022 07:52:41 am
30.   Explain the term random variable as used in probability (Answered)
Explain the term random variable as used in probability .
Posted On:Tue 27, December 2022 07:51:54 am
31.   Kihoto self-help group comprises of 58 members. They intend to choose 3 officials from the group to represent them in a conference. Determine the number of ways the 3 members can be chosen (Answered)
Kihoto self-help group comprises of 58 members. They intend to choose 3 officials from the group to represent them in a conference. Determine the number of ways the 3 members can be chosen .
Posted On:Tue 27, December 2022 07:50:46 am
32.   Simplify the expression (A+B)(A+C) stating the law of Boolean algebra applied at each step (Answered)
Simplify the expression (A+B)(A+C) stating the law of Boolean algebra applied at each step .
Posted On:Tue 27, December 2022 07:48:10 am
33.   Most computers use Universal Serial Bus (USB) ports to allow the attachment of devices. Describe two benefits of using USB ports. (Answered)
Most computers use Universal Serial Bus (USB) ports to allow the attachment of devices. Describe two benefits of using USB ports. .
Posted On:Tue 13, September 2022 10:12:14 am
34.   Name the most suitable input or output device for each of the following uses. Give a different device in each case. (Answered)
Name the most suitable input or output device for each of the following uses. Give a different device in each case. .
Posted On:Tue 13, September 2022 09:53:57 am
35.   Sensors are one type of input device. For each of the following situations, name a different sensor that could be used. (i) air conditioning in an office building (ii) maintaining correct growing conditions in a greenhouse (iii) detecting an intruder in a building (Answered)
Sensors are one type of input device. For each of the following situations, name a different sensor that could be used. (i) air conditioning in an office building (ii) maintaining correct growing conditions in a greenhouse (iii) detecting an intruder in a building .
Posted On:Tue 13, September 2022 09:47:45 am
36.   Advantages of Round Robin Scheduling algorithm (Answered)
Advantages of Round Robin Scheduling algorithm .
Posted On:Fri 2, September 2022 06:00:44 am
37.   What are the disadvantages of technical documentation of a program (Answered)
What are the disadvantages of technical documentation of a program .
Posted On:Tue 28, June 2022 14:11:47 pm
38.   What are the advantages of Technical documentation of a program (Answered)
What are the advantages of Technical documentation of a program .
Posted On:Tue 28, June 2022 14:09:40 pm
39.   What is an EDF scheduler? What is its advantage over a rate monotic scheduler? (Answered)
What is an EDF scheduler? What is its advantage over a rate monotic scheduler? .
Posted On:Mon 6, June 2022 06:56:16 am
40.   In a real-time system with a periodic task set,, how are priorities assigned to each of the periodic tasks? (Answered)
In a real-time system with a periodic task set,, how are priorities assigned to each of the periodic tasks? .
Posted On:Mon 6, June 2022 06:55:29 am
41.   The traditional UNIX scheduler is a priority-based round robin scheduler (also called a multi-level round robin schduler). How does the scheduler go about favouring I/O bound jobs over long-running CPU-bound jobs? (Answered)
The traditional UNIX scheduler is a priority-based round robin scheduler (also called a multi-level round robin schduler). How does the scheduler go about favouring I/O bound jobs over long-running CPU-bound jobs? .
Posted On:Mon 6, June 2022 06:54:50 am
42.   Describe round robin scheduling. What is the parameter associated with the scheduler? What is the issue in chosing the parameter (Answered)
Describe round robin scheduling. What is the parameter associated with the scheduler? What is the issue in chosing the parameter .
Posted On:Mon 6, June 2022 06:54:12 am
43.   What is the difference between preemptive scheduling and non-preemptive scheduling? What is the issue with the latter? (Answered)
What is the difference between preemptive scheduling and non-preemptive scheduling? What is the issue with the latter? .
Posted On:Mon 6, June 2022 06:53:23 am
44.   Why is it generally correct to favour I/O bound processes over CPU-bound processes? (Answered)
Why is it generally correct to favour I/O bound processes over CPU-bound processes? .
Posted On:Mon 6, June 2022 06:52:40 am
45.   Name four disk-arm scheduling algorithms. Outline the basic algorithm for each. (Answered)
Name four disk-arm scheduling algorithms. Outline the basic algorithm for each. .
Posted On:Mon 6, June 2022 06:51:27 am
46.   What is disk interleaving? What problem is it trying to solve? (Answered)
What is disk interleaving? What problem is it trying to solve? .
Posted On:Mon 6, June 2022 06:49:24 am
47.   Explain how the producer-consumer problem is relevant to operating system I/O. (Answered)
Explain how the producer-consumer problem is relevant to operating system I/O. .
Posted On:Mon 6, June 2022 06:48:38 am
48.   Compare I/O based on polling with interrupt-driven I/O. In what situation would you favour one technique over the other? (Answered)
Compare I/O based on polling with interrupt-driven I/O. In what situation would you favour one technique over the other? .
Posted On:Mon 6, June 2022 06:48:03 am
49.   Device controllers are generally becoming more complex in the functionality they provide (e.g. think about the difference between implementing a serial port with a flip-flop controlled by the CPU and a multi-gigabit network adapter with the TCP/IP stack on the card itself). What effect might this have on the operating system and system performance? (Answered)
Device controllers are generally becoming more complex in the functionality they provide (e.g. think about the difference between implementing a serial port with a flip-flop controlled by the CPU and a multi-gigabit network adapter with the TCP/IP stack on the card itself). What effect might this have on the operating system and system performance? .
Posted On:Mon 6, June 2022 06:47:03 am
50.   Describe buffering in the I/O subsystem of an operating system. Give reasons why it is required, and give a case where it is an advantage, and a case where it is a disadvantage (Answered)
Describe buffering in the I/O subsystem of an operating system. Give reasons why it is required, and give a case where it is an advantage, and a case where it is a disadvantage .
Posted On:Mon 6, June 2022 06:46:21 am
Page 1 of 14



About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com