DATA PROCESSING OBJ (MORE SOLUTIONS LOADING….)
1-10: DCDABCAAAD
DATA PROCESSING OBJ (MORE SOLUTIONS LOADING….)
1-10: DCDABCAAAD
11-20: CACACBBCBD
21-30: BDDDDBCAAD
31-40: ABBAABBADD
======================================
DATA PROCESSING ESSAY (MORE SOLUTIONS LOADING….)
(1a)
(i) Disk formatting is the configuring process of a data storage media such as a hard disk drive, floppy disk or flash drive for initial usage.
(ii) Data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
(iii) Virus scan: This is the process where antivirus search through your system to locate and remove any malicious threats on your device.
(1b)
(i) It is used for intra bank transfer
(ii) It is used for inter bank transfers
(iii) It is used to check account balance
(iv) It is used for printing of mini statement of account
===================
(2a)
TABULATE:
=DVD ROM=
– External
(iii) Removable
(vi) Indirect access
=HARD DISK=
(i) Internal
(iv) Not removable
Random/Direct access
=MAGNETIC TAPE=
(ii) External
(v) Removable
(vii) Indirect access
(2b)
(i) Google Sheets
(ii) Lotus Symphony
(iii) Microsoft Excel
===================
(3ai)
(i) By size/capacity.
(ii) By purpose
(iii) By type
(3aii)
ANALOG COMPUTERS:
(i) Analog computers works with continuous values or these types of systems process continuous data.
(ii) Analog computer has very low or limited memory and it can store less amount of data.
(iii) Their circuit is made up of electrical and mechanical components.
DIGITAL COMPUTERS:
(i) Digital computers works with discrete values or these types of systems process discrete data.
(ii) Digital computer has very big memory it can store large amount of data.
(iii) Their circuit consists of a large number of tiny electrical switches.
(3b)
(i) ICT has opened up a wide range of new communication methods, allowing you to contact others more or less instantaneously, and for less money and over greater distances than ever before.
(ii) It has created new collaborative models to increase the efficiency of workers, promoting innovation,
(iii) It has d improved education and access to basic services
(3c)
(i) Guided Media
(ii) Shielded Twisted Pair (STP)
===================
(5a)
(i) Insert the flash drive into a usb port on your computer.
(ii) With your microsoft word document open, click the “file” tab and select “save as.”
(iii) Click the “save in” drop-down menu at the top of the save as dialog box.
(iv) Navigate to and click the flash drive. the flash drive is typically drive letter “e” or “f.”
(v) Type the name of your document into the file name field and click “save” to save the file to the flash drive.
(5b)
(i) Navigate to the location where you want to create the folder that is the desktop of the computer.
(ii) Hold down the ctrl, shift, and n keys at the same time.
(iii) Enter your desired folder name that is “assignment”
(iv) Navigate to the location where you want to create the folder.
(v) Then save to finish
(5c)
(i) Open the folder that contains the word documents you want to print.
(ii) Press [ctrl], and select the files you want to print. (if the files are adjacent, select the first file in the list, press [shift], and select the last file in the list.)
(iii) Right-click the selection, and select print from the shortcut menu.
(iv) Select the desired print options, and click ok. (the selected options will apply to all of the documents.)
===================
(6ai)
(i) Fingerprint.
(ii) Facial Recognition.
(6aii)
(i) Modems.
(ii) Multiplexers.
(6aiii)
(i) RCA (Stereo audio output)
(6aiv)
(i) Finger print
(ii) Signature
(6bi)
Difference is that to access that on internet an Internet Service Provider (ISP) and a router to connect to the ISP while it is not needed for that of storage
(6bii)
Biometric recognition creates a specific link between an individual and a data record.
(6c)
(i) Data collection
(ii) Data input
(6d)
(i) TO: Email address
(ii) CC: To send to multiple Email
(iii) BCC: When you want the message to be shared, but you want to keep it secret who gets the message
(iv) To the reader
(v) The content of the message
(6di)
(I)TO: For input of receivers Email Address
(II) CC: It helps to send to multiple emails
(III) BCC: It is used when you want the message to be shared that you want to keep it secret who get the message
(IV) This is where email title or subject is written
(V) This conveys the content of the message
(6dii)
Cc stands for carbon copy which means that whose address appears after the Cc: header would receive a copy of the message. Also, the Cc header would also appear inside the header of the received message. While Bcc stands for blind carbon copy which is similar to that of Cc except that the Email address of the recipients specified in this field do not appear in the received message header and the recipients in the To or Cc fields will not know that a copy sent to these address.
Copyright © 2024 | WordPress Theme by MH Themes
Leave a Reply