1a)
1. documents can easily be send electronically
2. can use certain features like hyperlinks
3. spell /grammar check easy to erase and fix mistakes and edit text
4. It is easier to make changes to your document .
1. documents can easily be send electronically
2. can use certain features like hyperlinks
3. spell /grammar check easy to erase and fix mistakes and edit text
4. It is easier to make changes to your document .
1bi)
presentation program is a software package used to display information in the form of a
slide show.
presentation program is a software package used to display information in the form of a
slide show.
1c)
1. Smooth tool – Smooth object by dragging along its outline.
2. Crop tool – Remove the areas outside a selection.
===================
(3a)
software that handles the storage, retrieval, and updating of data in a computer system.
1. Smooth tool – Smooth object by dragging along its outline.
2. Crop tool – Remove the areas outside a selection.
===================
(3a)
software that handles the storage, retrieval, and updating of data in a computer system.
3aii)
MySQL
Microsoft Access
MySQL
Microsoft Access
3aiii)
A file is a collection of records which have common properties. Each file has its own file reference which is unique. The file reference indicates the subject or contexts of the records.
While
A record can be an image, text based or in electronic or physical format.
A file is a collection of records which have common properties. Each file has its own file reference which is unique. The file reference indicates the subject or contexts of the records.
While
A record can be an image, text based or in electronic or physical format.
3bi) Normalization is a process of organizing the data in database to avoid data redundancy, insertion anomaly , update anomaly & deletion anomaly
3Bii)
*Insertion Anomalies:Insertion anomalies occur when we
try to insert data into a flawed table.
*Deletion Anomalies:- Deletion anomalies occur when we
delete data from a flawed schema.
*Update Anomalies:- Update anomalies occur when we
change data in a flawed schema.
*Insertion Anomalies:Insertion anomalies occur when we
try to insert data into a flawed table.
*Deletion Anomalies:- Deletion anomalies occur when we
delete data from a flawed schema.
*Update Anomalies:- Update anomalies occur when we
change data in a flawed schema.
3c.
Pick tool
Shape tool
Zoom tool
Freehand tool
Pick tool
Shape tool
Zoom tool
Freehand tool
4b) log files – A log file is a recording of everything that goes in and out of a particular server
Firewall- A firewall is a system designed to prevent unauthorized access to or from a private network.
Encryption – Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.
Backup- backup refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event.
4ci)
Primary key uniquely identify a record in the table. While,
Foreign key is a field in the table that is primary key in another table.
Primary key uniquely identify a record in the table. While,
Foreign key is a field in the table that is primary key in another table.
Primary Key can’t accept null values. While,
Foreign key can accept multiple null value.
Foreign key can accept multiple null value.
4cii) Vision problems
Headache
Obesity
Headache
Obesity
5a)
i)Transmission is the act of transferring something from one spot to another, like a radio or TV broadcast, or a disease going from one person to another.
i)Transmission is the act of transferring something from one spot to another, like a radio or TV broadcast, or a disease going from one person to another.
Runsloaded.com.ng posts all exam expo answer earlier than others
============================
============================
GOODLUCK!!!
You Might Also Like
No comments:
Post a Comment