Give four general rules that must be observed to keep within the law when working with data and information
0 Comments
List four ways in which data integrity can be compromised
Identify the underlined parts of the following email address:
Assume that cell F5 to F10 in a spreadsheet contains numeric value of salary earned by some workers and cell F12 contains the value of 5%. Write a formula that will be used to increase the value stored in cell F5 by 5 percent which will then be copied to other cells.=F5*(1+$F$12) or =F5+ (F5*$F$12)
Differentiate between cropping and resizing as used in DTP.
State the meaning of computer malwareA malicious program designed to harm or disrupt the normal functioning of a computer system e.g. clogging computer memory, unjustified background programs, replicating files etc.
List four signs of a computer system invaded by a virus
The information below is maintained by the sales lady at the school canteen. Study it and answer the questions that follow.(a) Describe the basic data types used in this spreadsheet (4mks)
(b) Provide a single formula that would be used to
|
Categories
All
Archives
December 2024
|
Can't find what you are looking for? Don't worry, Use the Search Box Below.
Primary Resources
College Resources
|
Secondary Resources
|
Contact Us
Manyam Franchise
P.O Box 1189 - 40200 Kisii Tel: 0728 450 424 Tel: 0738 619 279 E-mail - sales@manyamfranchise.com |