 
  
             
  
             
  
         Write the following web scripting in full.
i) HTML
ii) XML.(Answered)
  Write the following web scripting in full.
i) HTML
ii) XML.(Answered) List eight characteristics of a system.(Answered)
  List eight characteristics of a system.(Answered) What is a web scripting language?(Answered)
  What is a web scripting language?(Answered) State two advantages of observation as a method of data collection.(Answered)
  State two advantages of observation as a method of data collection.(Answered) Define the term algorithm as applied in computer programming.(Answered)
  Define the term algorithm as applied in computer programming.(Answered) Define the term economic feasibility as used in system development.(Answered)
  Define the term economic feasibility as used in system development.(Answered) Define the term encapsulation as applied in object-oriented programming.(Answered)
  Define the term encapsulation as applied in object-oriented programming.(Answered) Give two advantages of using automated methods of data collection.(Answered)
  Give two advantages of using automated methods of data collection.(Answered) State the importance of training staff when a new system is being implemented.(Answered)
  State the importance of training staff when a new system is being implemented.(Answered) Define the term problem-oriented programming language.(Answered)
  Define the term problem-oriented programming language.(Answered) Write the following programming languages acronyms in full.
i)COBOL
ii)BASIC
iii)FORTRAN.(Answered)
  Write the following programming languages acronyms in full.
i)COBOL
ii)BASIC
iii)FORTRAN.(Answered) Name three control structures used in programming.(Answered)
  Name three control structures used in programming.(Answered) State two advantages of using a questionnaire as a method of data collection.(Answered)
  State two advantages of using a questionnaire as a method of data collection.(Answered) List three benefits of structured programming.(Answered)
  List three benefits of structured programming.(Answered) Define the term structured programming.(Answered)
  Define the term structured programming.(Answered) State two factors that may lead to system entropy.(Answered)
  State two factors that may lead to system entropy.(Answered) Give two differences between low level and high level programming languages.(Answered)
  Give two differences between low level and high level programming languages.(Answered) Give three methods of gathering data during system development process.(Answered)
  Give three methods of gathering data during system development process.(Answered) Mention four categories of high level languages.(Answered)
  Mention four categories of high level languages.(Answered) Mention why a programmer who intends to write code in machine language must first understand the Central Processing Unit (CPU) architecture of the target computer.(Answered)
  Mention why a programmer who intends to write code in machine language must first understand the Central Processing Unit (CPU) architecture of the target computer.(Answered) Give three reasons that make organizations automate their operations.(Answered)
  Give three reasons that make organizations automate their operations.(Answered) Differentiate between machine and assembly programming languages.(Answered)
  Differentiate between machine and assembly programming languages.(Answered) Mention two types of low-level languages.(Answered)
  Mention two types of low-level languages.(Answered) Define the term low level language as applied in computer programming.(Answered)
  Define the term low level language as applied in computer programming.(Answered) Mention the purpose of linking during program compiling.(Answered)
  Mention the purpose of linking during program compiling.(Answered) Give two differences between interpreted and compiled program.(Answered)
  Give two differences between interpreted and compiled program.(Answered) Give the differences between an interpreter and a compiler.(Answered)
  Give the differences between an interpreter and a compiler.(Answered) Mention three types of language translators.(Answered)
  Mention three types of language translators.(Answered) Name the language translator that converts an assembly language into machine code(Answered)
  Name the language translator that converts an assembly language into machine code(Answered) Define the following terms as applied in computer programming.
a) Source program
b) Object code
c) Translator.(Answered)
  Define the following terms as applied in computer programming.
a) Source program
b) Object code
c) Translator.(Answered) Define the term program syntax.(Answered)
  Define the term program syntax.(Answered) Define the term programming language.(Answered)
  Define the term programming language.(Answered) Define the term programming.(Answered)
  Define the term programming.(Answered) Define the term computer program.(Answered)
  Define the term computer program.(Answered) State two advantages of these file access methods.
i) Random
ii) Indexed sequential.(Answered)
  State two advantages of these file access methods.
i) Random
ii) Indexed sequential.(Answered) Distinguish between a static and a dynamic field. Give an example in each case.(Answered)
  Distinguish between a static and a dynamic field. Give an example in each case.(Answered) Explain five types of computer processing files.(Answered)
  Explain five types of computer processing files.(Answered) Explain two ways in which data verification can be done.(Answered)
  Explain two ways in which data verification can be done.(Answered) Explain a situation where the batch processing would be appropriate.
(Answered)
  Explain a situation where the batch processing would be appropriate.
(Answered) Explain three methods used to detect input errors.(Answered)
  Explain three methods used to detect input errors.(Answered) Describe the following file organization methods:
i) Sequential
ii) Indexed sequential
iii) Random.(Answered)
  Describe the following file organization methods:
i) Sequential
ii) Indexed sequential
iii) Random.(Answered) Describe using examples the following computational errors.
i) Overflow
ii) Truncation
iii) Rounding off.(Answered)
  Describe using examples the following computational errors.
i) Overflow
ii) Truncation
iii) Rounding off.(Answered) Describe any stages of data collection.(Answered)
  Describe any stages of data collection.(Answered) List two qualities of good information.(Answered)
  List two qualities of good information.(Answered) Explain three common operations carried out on files.(Answered)
  Explain three common operations carried out on files.(Answered) List three file organization methods.(Answered)
  List three file organization methods.(Answered) State two characteristics of a master file.(Answered)
  State two characteristics of a master file.(Answered) Front-end processor are quite useful in real time systems. State any three reasons why they are important.(Answered)
  Front-end processor are quite useful in real time systems. State any three reasons why they are important.(Answered) Mention five characteristics of real-time system.(Answered)
  Mention five characteristics of real-time system.(Answered) Define the term real-time processing.(Answered)
  Define the term real-time processing.(Answered) List four stages of data processing cycle.(Answered)
  List four stages of data processing cycle.(Answered) State five possible ways of protecting data integrity(Answered)
  State five possible ways of protecting data integrity(Answered) Explain three ways in which data integrity is measured.(Answered)
  Explain three ways in which data integrity is measured.(Answered) State four advantages of computerized filing system over the traditional one.(Answered)
  State four advantages of computerized filing system over the traditional one.(Answered) Distinguish between online processing and real time processing. Give an application area of each.(Answered)
  Distinguish between online processing and real time processing. Give an application area of each.(Answered) With the aid of an example, describe the following data processing modes.
a) Batch processing
b) Timesharing processing
c) Distributed processing
(Answered)
  With the aid of an example, describe the following data processing modes.
a) Batch processing
b) Timesharing processing
c) Distributed processing
(Answered) Explain how a random file is accessed.(Answered)
  Explain how a random file is accessed.(Answered) State two disadvantages of random file organization method as used in microcomputers.(Answered)
  State two disadvantages of random file organization method as used in microcomputers.(Answered) Name the file organization method used in microcomputer.(Answered)
  Name the file organization method used in microcomputer.(Answered) List three areas where on-line processing could be used. In each area, mention how is used.(Answered)
  List three areas where on-line processing could be used. In each area, mention how is used.(Answered) State two differences between batch processing and on-line processing.(Answered)
  State two differences between batch processing and on-line processing.(Answered) List three types of data processing files and their functions.(Answered)
  List three types of data processing files and their functions.(Answered) Define the term computer file.(Answered)
  Define the term computer file.(Answered) State one appropriate storage media for each of the following file organization methods:
a) Serial 
b) Random (Answered)
  State one appropriate storage media for each of the following file organization methods:
a) Serial 
b) Random (Answered) List three methods of data entry into a computer.(Answered)
  List three methods of data entry into a computer.(Answered) List four possible causes of loss of data integrity.(Answered)
  List four possible causes of loss of data integrity.(Answered) List three factors that determine the methods of data access in a computer.(Answered)
  List three factors that determine the methods of data access in a computer.(Answered) State a situation where these error checking methods are appropriate in data processing:
a) Check digit
b) Parity check(Answered)
  State a situation where these error checking methods are appropriate in data processing:
a) Check digit
b) Parity check(Answered) Explain three major elements of a computer file.(Answered)
  Explain three major elements of a computer file.(Answered) State the purpose of the following files and give examples where each may be required in a school:
a) Back-up file.
b) Report file.(Answered)
  State the purpose of the following files and give examples where each may be required in a school:
a) Back-up file.
b) Report file.(Answered) Differentiate between sequential file and serial file organization methods.(Answered)
  Differentiate between sequential file and serial file organization methods.(Answered) Differentiate between file organization and file access.(Answered)
  Differentiate between file organization and file access.(Answered) Mention two advantages and two disadvantages of multiprocessing.(Answered)
  Mention two advantages and two disadvantages of multiprocessing.(Answered) Mention the mode of processing that is suitable for the following;
a) Booking vehicles,
b) Payroll processing.(Answered)
  Mention the mode of processing that is suitable for the following;
a) Booking vehicles,
b) Payroll processing.(Answered) Give one area where distributed processing is used.(Answered)
  Give one area where distributed processing is used.(Answered) State two disadvantages of distributed systems.(Answered)
  State two disadvantages of distributed systems.(Answered) State two disadvantages of real time processing.(Answered)
  State two disadvantages of real time processing.(Answered) Explain two advantages of batch processing.(Answered)
  Explain two advantages of batch processing.(Answered) Define batch processing.(Answered)
  Define batch processing.(Answered) State two benefits of a harsh (random) access file.(Answered)
  State two benefits of a harsh (random) access file.(Answered) Distinguish between master file and transaction file.(Answered)
  Distinguish between master file and transaction file.(Answered) Define these terms:
i) Data logging
ii) Interactive processing.(Answered)
  Define these terms:
i) Data logging
ii) Interactive processing.(Answered) Mention three validation checks that can be carried out on data during data input.(Answered)
  Mention three validation checks that can be carried out on data during data input.(Answered) Differentiate between data validation and data verification.(Answered)
  Differentiate between data validation and data verification.(Answered) State four factors to consider when choosing a mode of data processing.(Answered)
  State four factors to consider when choosing a mode of data processing.(Answered) Distinguish between index sequential and non-index sequential file access methods.(Answered)
  Distinguish between index sequential and non-index sequential file access methods.(Answered) List two types of transcription error.(Answered)
  List two types of transcription error.(Answered) Define the term transcription error as used in data processing.(Answered)
  Define the term transcription error as used in data processing.(Answered) List four parameters that measures data integrity.(Answered)
  List four parameters that measures data integrity.(Answered) Define the term data integrity.(Answered)
  Define the term data integrity.(Answered) State any two disadvantages of a multiprogramming data processing mode.(Answered)
  State any two disadvantages of a multiprogramming data processing mode.(Answered) Differentiate between multiprocessing and multiprogramming as a modes of electronic data processing.(Answered)
  Differentiate between multiprocessing and multiprogramming as a modes of electronic data processing.(Answered) Explain two benefits of distributed data processing in an organization.(Answered)
  Explain two benefits of distributed data processing in an organization.(Answered) Define the term distributed data processing.(Answered)
  Define the term distributed data processing.(Answered) List three types or errors that can occur during data collection stage of data processing cycle.(Answered)
  List three types or errors that can occur during data collection stage of data processing cycle.(Answered) list four stages of data collection.(Answered)
  list four stages of data collection.(Answered) Outline four stages of data processing cycle.(Answered)
  Outline four stages of data processing cycle.(Answered) List two advantages of real time processing.(Answered)
  List two advantages of real time processing.(Answered) State one area where real time processing is used.(Answered)
  State one area where real time processing is used.(Answered) A computer user typed 437 as 473 and 439 as 430. Name the type of error in each case.(Answered)
  A computer user typed 437 as 473 and 439 as 430. Name the type of error in each case.(Answered)