Computer Studies questions and answers


Share Via:
        



Total of 477 Questions.

  Computer Studies Topics:


1.   Distinguish between transposition and transcription error in data processing.(Answered)
Distinguish between transposition and transcription error in data processing..
Posted On:Thu 16, September 2021 06:28:26 am
2.   Define the term datum? Give an example..(Answered)
Define the term datum? Give an example...
Posted On:Sun 22, August 2021 06:56:13 am
3.   Differentiate between the terms eavesdropping and tapping as used in data security(Answered)
Differentiate between the terms eavesdropping and tapping as used in data security.
Posted On:Thu 15, July 2021 06:21:06 am
4.   Give an example of computer fraud.(Answered)
Give an example of computer fraud..
Posted On:Thu 15, July 2021 06:20:17 am
5.   Define the term computer fraud.(Answered)
Define the term computer fraud..
Posted On:Thu 15, July 2021 06:19:40 am
6.   Explain five data security practices that can be carried out by an organization.(Answered)
Explain five data security practices that can be carried out by an organization..
Posted On:Thu 15, July 2021 06:19:00 am
7.   Define the term cyberterrorism.(Answered)
Define the term cyberterrorism..
Posted On:Thu 15, July 2021 06:17:42 am
8.   Define the term data control.(Answered)
Define the term data control..
Posted On:Thu 15, July 2021 06:17:06 am
9.   Define the following terms. i)Virus hoaxes ii)Computer worm iii)Trojan iv)Phishing v)Adware vi)Identity theft(Answered)
Define the following terms. i)Virus hoaxes ii)Computer worm iii)Trojan iv)Phishing v)Adware vi)Identity theft.
Posted On:Thu 15, July 2021 06:15:07 am
10.   Mention the risk to data associated with the opening and responding to spam mail.(Answered)
Mention the risk to data associated with the opening and responding to spam mail..
Posted On:Thu 15, July 2021 06:12:00 am
11.   Give one law which relates to data and information systems used in Kenya.(Answered)
Give one law which relates to data and information systems used in Kenya..
Posted On:Thu 15, July 2021 06:11:16 am
12.   Describe two areas covered by laws relating to information system.(Answered)
Describe two areas covered by laws relating to information system..
Posted On:Thu 15, July 2021 06:10:15 am
13.   Describe the following methods of detection and protection of computer crimes:(Answered)
Describe the following methods of detection and protection of computer crimes:.
Posted On:Thu 15, July 2021 06:09:06 am
14.   Describe how a firewall works.(Answered)
Describe how a firewall works..
Posted On:Thu 15, July 2021 06:07:22 am
15.   Mention two examples of cyberterrorism.(Answered)
Mention two examples of cyberterrorism..
Posted On:Thu 15, July 2021 06:06:11 am
16.   Describe the following computer crimes;(Answered)
Describe the following computer crimes;.
Posted On:Thu 15, July 2021 06:05:35 am
17.   Give four precaution that can be taken against computer viruses in a school.(Answered)
Give four precaution that can be taken against computer viruses in a school..
Posted On:Thu 15, July 2021 06:03:40 am
18.   List three ways through which viruses get into a computer system.(Answered)
List three ways through which viruses get into a computer system..
Posted On:Thu 15, July 2021 06:02:36 am
19.   Give three symptoms of computer infected by viruses.(Answered)
Give three symptoms of computer infected by viruses..
Posted On:Thu 15, July 2021 06:01:41 am
20.   Mention three features of computer viruses.(Answered)
Mention three features of computer viruses..
Posted On:Thu 15, July 2021 06:00:40 am
21.   Define the term computer virus.(Answered)
Define the term computer virus..
Posted On:Thu 15, July 2021 05:59:50 am
22.   Define the following terms; i)Password ii)Authentication(Answered)
Define the following terms; i)Password ii)Authentication.
Posted On:Thu 15, July 2021 05:59:03 am
23.   Give three items that may be covered by computer ethics.(Answered)
Give three items that may be covered by computer ethics..
Posted On:Thu 15, July 2021 05:57:49 am
24.   Define the term computer ethics.(Answered)
Define the term computer ethics..
Posted On:Thu 15, July 2021 05:56:49 am
25.   Define the term spyware.(Answered)
Define the term spyware..
Posted On:Thu 15, July 2021 05:56:10 am
26.   Differentiate between data encryption and use of password.(Answered)
Differentiate between data encryption and use of password..
Posted On:Thu 15, July 2021 05:55:18 am
27.   State one function of firewall.(Answered)
State one function of firewall..
Posted On:Thu 15, July 2021 05:54:33 am
28.   State three precautions a bank can take to prevent illegal data alterations.(Answered)
State three precautions a bank can take to prevent illegal data alterations..
Posted On:Thu 15, July 2021 05:53:52 am
29.   State any three functions of an antivirus software.(Answered)
State any three functions of an antivirus software..
Posted On:Thu 15, July 2021 05:52:58 am
30.   State ways in which piracy in the software industry can be minimized.(Answered)
State ways in which piracy in the software industry can be minimized..
Posted On:Thu 15, July 2021 05:52:08 am
31.   State two ways of recovering data lost through accidental erasure.(Answered)
State two ways of recovering data lost through accidental erasure..
Posted On:Thu 15, July 2021 05:51:14 am
32.   Natural disasters can cause Loss of data and programs. State two ways of ensuring that data/programs are not lost if a disaster strikes.(Answered)
Natural disasters can cause Loss of data and programs. State two ways of ensuring that data/programs are not lost if a disaster strikes..
Posted On:Thu 15, July 2021 05:49:17 am
33.   Other than hacking and cracking, explain any other three computer crimes.(Answered)
Other than hacking and cracking, explain any other three computer crimes..
Posted On:Thu 15, July 2021 05:48:01 am
34.   State two control measures a company can implement to restrict hackers from accessing its information system.(Answered)
State two control measures a company can implement to restrict hackers from accessing its information system..
Posted On:Thu 15, July 2021 05:46:20 am
35.   State one benefit of hacking to an organization’s computer system.(Answered)
State one benefit of hacking to an organization’s computer system..
Posted On:Thu 15, July 2021 05:45:11 am
36.   State four destructive activities that crackers can perform on a computer.(Answered)
State four destructive activities that crackers can perform on a computer..
Posted On:Thu 15, July 2021 05:44:27 am
37.   Define the term computer server.(Answered)
Define the term computer server..
Posted On:Thu 15, July 2021 05:43:05 am
38.   Mention four forms of unauthorized access(Answered)
Mention four forms of unauthorized access.
Posted On:Thu 15, July 2021 05:42:28 am
39.   List four possible threats to data security.(Answered)
List four possible threats to data security..
Posted On:Thu 15, July 2021 05:41:54 am
40.   Give two ways of updating an antivirus software(Answered)
Give two ways of updating an antivirus software.
Posted On:Thu 15, July 2021 05:41:16 am
41.   Differentiate between data security and privacy.(Answered)
Differentiate between data security and privacy..
Posted On:Thu 15, July 2021 05:40:34 am
42.   Name three types of computer viruses.(Answered)
Name three types of computer viruses..
Posted On:Thu 15, July 2021 05:39:45 am
43.   Mention three ways of ensuring efficient back up of data.(Answered)
Mention three ways of ensuring efficient back up of data..
Posted On:Thu 15, July 2021 05:39:15 am
44.   Explain three causes of data loss or program corruption in a computer system.(Answered)
Explain three causes of data loss or program corruption in a computer system..
Posted On:Thu 15, July 2021 05:38:30 am
45.   Define the following terms: a)Private data b)Confidential data c)Data security.(Answered)
Define the following terms: a)Private data b)Confidential data c)Data security..
Posted On:Thu 15, July 2021 05:37:13 am
46.   Give two types of firewall.(Answered)
Give two types of firewall..
Posted On:Thu 15, July 2021 05:36:08 am
47.   Define the term firewall.(Answered)
Define the term firewall..
Posted On:Thu 15, July 2021 05:35:27 am
48.   Differentiate between a hacker and a cracker.(Answered)
Differentiate between a hacker and a cracker..
Posted On:Thu 15, July 2021 05:34:50 am
49.   Give the importance of carrying out audit trail in an information system.(Answered)
Give the importance of carrying out audit trail in an information system..
Posted On:Thu 15, July 2021 05:33:37 am
50.   Give two ways in which software piracy can be reduced.(Answered)
Give two ways in which software piracy can be reduced..
Posted On:Thu 15, July 2021 05:32:46 am
51.   Define the term system sabotage as applied in computing.(Answered)
Define the term system sabotage as applied in computing..
Posted On:Thu 15, July 2021 05:31:14 am
52.   Define the term log files.(Answered)
Define the term log files..
Posted On:Thu 15, July 2021 05:30:25 am
53.   Define the term mail etiquette as applied in sending e-mail.(Answered)
Define the term mail etiquette as applied in sending e-mail..
Posted On:Sun 25, April 2021 22:01:29 pm
54.   Write the following acronyms in full. i)GSM ii)GPRS(Answered)
Write the following acronyms in full. i)GSM ii)GPRS.
Posted On:Sun 25, April 2021 22:00:29 pm
55.   Give factors to consider when choosing an Internet Service Provider.(Answered)
Give factors to consider when choosing an Internet Service Provider..
Posted On:Sun 25, April 2021 21:59:40 pm
56.   Outline the role of an Internet Service Provider (ISP).(Answered)
Outline the role of an Internet Service Provider (ISP)..
Posted On:Sun 25, April 2021 21:58:55 pm
57.   The acronym ARPA is associated with the historical development of the internet. Write it in full(Answered)
The acronym ARPA is associated with the historical development of the internet. Write it in full.
Posted On:Sun 25, April 2021 21:58:15 pm
58.   Define the term internet.(Answered)
Define the term internet..
Posted On:Sun 25, April 2021 21:57:36 pm
59.   State two advantages of using wireless transmission media to connect to the internet.(Answered)
State two advantages of using wireless transmission media to connect to the internet..
Posted On:Sun 25, April 2021 21:54:54 pm
60.   List eight activities that can be carried out on an active webpage.(Answered)
List eight activities that can be carried out on an active webpage..
Posted On:Sun 25, April 2021 21:53:08 pm
61.   Outline the steps one would follow to download a file from an active webpage.(Answered)
Outline the steps one would follow to download a file from an active webpage..
Posted On:Sun 25, April 2021 21:52:18 pm
62.   Differentiate betweenWorld Wide Web (WWW) and the internet.(Answered)
Differentiate betweenWorld Wide Web (WWW) and the internet..
Posted On:Sun 25, April 2021 21:51:31 pm
63.   Mention one reason for deleting mails from the inbox.(Answered)
Mention one reason for deleting mails from the inbox..
Posted On:Sun 25, April 2021 21:50:45 pm
64.   Differentiate between a webpage and a website.(Answered)
Differentiate between a webpage and a website..
Posted On:Sun 25, April 2021 21:50:07 pm
65.   State five features of a web browser.(Answered)
State five features of a web browser..
Posted On:Sun 25, April 2021 21:48:54 pm
66.   State five importance of the internet to the society.(Answered)
State five importance of the internet to the society..
Posted On:Sun 25, April 2021 21:47:50 pm
67.   List three advantages and disadvantages of e-learning.(Answered)
List three advantages and disadvantages of e-learning..
Posted On:Sun 25, April 2021 21:46:23 pm
68.   Define the following terms as used in the internet: i)search engine ii)Newsgroup iii)Browsing iv)Internet blog(Answered)
Define the following terms as used in the internet: i)search engine ii)Newsgroup iii)Browsing iv)Internet blog.
Posted On:Sun 25, April 2021 21:44:36 pm
69.   An e-mail address is given as mwananchi@gmail.com. Identify each part of this address.(Answered)
An e-mail address is given as mwananchi@gmail.com. Identify each part of this address..
Posted On:Sun 25, April 2021 21:43:09 pm
70.   Write down six features of electronic mail.(Answered)
Write down six features of electronic mail..
Posted On:Sun 25, April 2021 21:30:55 pm
71.   Distinguish between the terms sign in and sign up as used with e-mails.(Answered)
Distinguish between the terms sign in and sign up as used with e-mails..
Posted On:Sun 25, April 2021 21:29:44 pm
72.   Other than congesting the inbox, state any other potential harm that unsolicited mail can bring about.(Answered)
Other than congesting the inbox, state any other potential harm that unsolicited mail can bring about..
Posted On:Sun 25, April 2021 21:28:56 pm
73.   E-mail users often get unsolicited mail in their inbox. Give the term used to refer to such mails(Answered)
E-mail users often get unsolicited mail in their inbox. Give the term used to refer to such mails.
Posted On:Sun 25, April 2021 21:27:03 pm
74.   State any four negative effects of internet to the society.(Answered)
State any four negative effects of internet to the society..
Posted On:Sun 25, April 2021 21:26:08 pm
75.   Name two e-mail software.(Answered)
Name two e-mail software..
Posted On:Sun 25, April 2021 21:24:58 pm
76.   List three precautions that should be taken when downloading software from the internet(Answered)
List three precautions that should be taken when downloading software from the internet.
Posted On:Sun 25, April 2021 21:24:26 pm
77.   Differentiate between bcc and cc as used in e-mail software.(Answered)
Differentiate between bcc and cc as used in e-mail software..
Posted On:Sun 25, April 2021 21:23:24 pm
78.   Describe the term global village as used in the internet.(Answered)
Describe the term global village as used in the internet..
Posted On:Sun 25, April 2021 21:21:41 pm
79.   Define the following terms as used with e-mail software. a)attachment b)cc c)bcc d)recipient(Answered)
Define the following terms as used with e-mail software. a)attachment b)cc c)bcc d)recipient.
Posted On:Sun 25, April 2021 21:09:07 pm
80.   Write the following acronyms in full: a)HTML b)HTTP c)WWW d)URL(Answered)
Write the following acronyms in full: a)HTML b)HTTP c)WWW d)URL.
Posted On:Sun 25, April 2021 21:07:09 pm
81.   Define the term information superhighway.(Answered)
Define the term information superhighway..
Posted On:Sun 25, April 2021 21:03:12 pm
82.   Mention two: a)Internet search engines b)Web browsers (Answered)
Mention two: a)Internet search engines b)Web browsers .
Posted On:Sun 25, April 2021 21:02:21 pm
83.   Give three reasons why email has not completely replaced post office mail in Kenya.(Answered)
Give three reasons why email has not completely replaced post office mail in Kenya..
Posted On:Sun 25, April 2021 21:00:40 pm
84.   State the meaning of the following domains types: i)Com ii)edu iii)org iv)mil(Answered)
State the meaning of the following domains types: i)Com ii)edu iii)org iv)mil.
Posted On:Sun 25, April 2021 20:59:33 pm
85.   List one protocol used on the Internet.(Answered)
List one protocol used on the Internet..
Posted On:Sun 25, April 2021 20:58:44 pm
86.   Define the term uploading(Answered)
Define the term uploading.
Posted On:Sun 25, April 2021 20:58:01 pm
87.   Define the term downloading.(Answered)
Define the term downloading..
Posted On:Sun 25, April 2021 20:57:12 pm
88.   Define the term E-learning.(Answered)
Define the term E-learning..
Posted On:Sun 25, April 2021 20:55:54 pm
89.   State any three disadvantages of e-mail over a postal mail.(Answered)
State any three disadvantages of e-mail over a postal mail..
Posted On:Sun 25, April 2021 20:54:30 pm
90.   State any three advantages of email over a postal mail.(Answered)
State any three advantages of email over a postal mail..
Posted On:Sun 25, April 2021 20:53:24 pm
91.   State any four services provided by the internet.(Answered)
State any four services provided by the internet..
Posted On:Sun 25, April 2021 20:52:20 pm
92.   Write the acronym ISP in full.(Answered)
Write the acronym ISP in full..
Posted On:Sun 25, April 2021 20:51:41 pm
93.   Give four examples of ISPs in Kenya.(Answered)
Give four examples of ISPs in Kenya..
Posted On:Sun 25, April 2021 20:50:43 pm
94.   Define the term protocol as used with the internet.(Answered)
Define the term protocol as used with the internet..
Posted On:Sun 25, April 2021 20:49:55 pm
95.   Define the term modulation as used in data communication.(Answered)
Define the term modulation as used in data communication..
Posted On:Sun 25, April 2021 20:49:07 pm
96.   Give the functions of a modem in data communication.(Answered)
Give the functions of a modem in data communication..
Posted On:Sun 25, April 2021 20:48:22 pm
97.   List three main component contained in the header of an e-mail compose window.(Answered)
List three main component contained in the header of an e-mail compose window..
Posted On:Sun 25, April 2021 20:47:36 pm
98.   List any two components needed for internet connection.(Answered)
List any two components needed for internet connection..
Posted On:Sun 25, April 2021 20:46:54 pm
99.   State three factors to be considered before designing a publication.(Answered)
State three factors to be considered before designing a publication..
Posted On:Sun 25, April 2021 20:41:55 pm
100.   Describe three ways of ensuring that an online publication is secure from unauthorized access.(Answered)
Describe three ways of ensuring that an online publication is secure from unauthorized access..
Posted On:Sun 25, April 2021 20:41:17 pm
Page 4 of 5
More Questions Categories: