Categories
10405 Resources
KASNEB Examinations Information Booklet
KASNEB is a state corporation established in 1969 that administers professional and vocational examinations in accounting, finance, and related fields. It offers vocational certificate courses, the Certificate in Accounting and Management Skills course, and professional exams.
58 Pages
847 Views
0 Downloads
744.97 KB
Uploaded: 2025-02-08
CICT PAPER NO.6 SECTION 2: COMPUTER SUPPORT & MAINTENANCE
A microprocessor is a component that performs the instructions and tasks involved in computer processing. In a computer system, the microprocessor is the central unit that executes and manages the logical instructions passed to it.
19 Pages
988 Views
0 Downloads
1.19 MB
Uploaded: 2025-02-08
CICT SECTION 5: SOFTWARE ENGINEERING STUDY NOTES
This document outlines the key concepts in software engineering. It discusses software development lifecycles and paradigms, including waterfall, rapid prototyping, and evolutionary models. It also summarizes software quality factors like maintainability, reliability, and usability. Finally, it describes software engineering principles like requirements analysis, design tools, testing, documentation, and maintenance. The overall document provides a high-level overview of the main topics and processes in software engineering.
176 Pages
865 Views
0 Downloads
2.56 MB
Uploaded: 2025-02-08
BIT 4203: DISTRIBUTED MULTIMEDIA SYSTEMS
Purpose of this course is to introduce the learners to Multimedia concepts, graphic design and application development. To specify, implement, test a multimedia system in business/industry.
161 Pages
1421 Views
1 Downloads
1.88 MB
Uploaded: 2025-02-08
MIT 5101: COMPUTER APPLICATIONS IN EDUCATION
This document provides an instruction manual for the course MIT 5101: Computer Applications in Education. It contains 9 chapters that cover topics such as the history of computers, basic computer hardware, software types, operating systems, word processing, spreadsheets, databases, presentations, and computer networks. Each chapter includes learning objectives, content explanations, and review questions. The manual aims to provide a comprehensive understanding of computers and their applications in education.
102 Pages
1410 Views
2 Downloads
979.21 KB
Uploaded: 2025-02-08
BIT 1105: COMPUTER ARCHITECTURE NOTES
This document provides an instruction manual for a computer architecture course. It covers several topics related to computer hardware and software components.
87 Pages
1070 Views
0 Downloads
808.37 KB
Uploaded: 2025-02-08
CICT SECTION 6: SYSTEM SECURITY STUDY NOTES
This paper is intended to equip the candidate with the knowledge, skills and attitude that will enable him/her to secure lCT systems in an organization.
257 Pages
750 Views
0 Downloads
2.6 MB
Uploaded: 2025-02-08
CICT SECTION 6: INFORMATION SYSTEM PROJECT MANAGEMENT NOTES
This paper is intended to equip the candidate with the knowledge, skills and attitude that will enable him/her to manage information systems projects.
180 Pages
760 Views
0 Downloads
1.91 MB
Uploaded: 2025-02-08
CICT SECTION 5: MOBILE APPLICATION DEVELOPMENT NOTES
A candidate who passes this paper should be able to: Identify mobile applications, platforms and architecture, Develop mobile applications Using development tools and strategies, Test mobile applications & Secure mobile applications.
218 Pages
822 Views
1 Downloads
2.96 MB
Uploaded: 2025-02-08
BIT 4108: INFORMATION SYSTEMS AUDIT
An IS audit is the process of collecting and evaluating evidence of an org IS, practices
and operations with a view of establishing whether they are inline with organizational
goals.
56 Pages
1015 Views
1 Downloads
1.12 MB
Uploaded: 2025-02-08
CICT SECTION 6: RESEARCH METHODS STUDY NOTES
This paper is intended to equip the candidate with the knowledge, skills and attitude that will enable him/her to design and carry out research on information systems.
75 Pages
589 Views
0 Downloads
688.14 KB
Uploaded: 2025-02-08
Web Application Security
Trending!
1.1 Definition of terms
There are several terms related to computer Security and Cryptography. In this section, we
briefly explain five major terms.
1.11 Computer security
Computer Security is the degree to which information systems are protected against
destruction, disruption, deletion, unauthorized access and unauthorized changes. The term
Cyber Security, Information System Security and System Security can be used interchangeably
for purposes of this unit.
88 Pages
2332 Views
0 Downloads
12.14 MB
Uploaded: 2025-02-08
BBIT 3206: EVENT DRIVEN PROGRAMMING
An application is a collection of objects that work together to accomplish something useful. In Visual Basic(VB) the application is called a Project. A Project could be a the management of student records, banking application, Video store, the calculation of mortgages, a booking service or the Payroll system for employees etc.
92 Pages
1003 Views
0 Downloads
1.64 MB
Uploaded: 2025-02-08
SOCIAL INFORMATICS QUESTIONS AND ANSWERS
Trending!
Download questions and answers to social informatics and get yourself ahead of others.
6 Pages
2244 Views
1 Downloads
62.19 KB
Uploaded: 2025-02-08
BIT 4102: COMPUTER GRAPHICS NOTES
Computer graphics are graphics created using computers and, more generally, the representation and manipulation of image data by a computer with help from specialized software and hardware. The development of computer graphics has made computers easier to interact with, and better for understanding and interpreting many types of data. Developments in computer graphics have had a profound impact on many types of media and have revolutionized animation, movies and the video game industry.
136 Pages
1046 Views
1 Downloads
1.92 MB
Uploaded: 2025-02-08
Python for Data Science
Trending!
The volume of data that one has to deal has exploded to unimaginable levels in the past decade, and at the same time, the price of data storage has systematically reduced. Private companies and research institutions capture terabytes of data about their users’ interactions, business, social media, and also sensors from devices such as mobile phones and automobiles. The challenge of this era is to make sense of this sea of data. This is where big data analytics comes into picture.
Big Data Analytics largely involves collecting data from different sources, merge it in a way that it becomes available to be consumed by analysts and finally deliver data products useful to the organization business. The process of converting large amounts of unstructured raw data, retrieved from different sources to a data product useful for organizations forms the core of Big Data Analytics.
63 Pages
2344 Views
0 Downloads
7.76 MB
Uploaded: 2025-02-08
DEVELOPMENTAL PSYCHOLOGY
Term paper on Developmental Psychology
7 Pages
219 Views
0 Downloads
192.16 KB
Uploaded: 2025-02-08
Management
Trending!
Management notes for a health facility
8 Pages
3015 Views
0 Downloads
296.11 KB
Uploaded: 2025-02-08
Behaviour Modification
Behavoiur Modification Term paper
4 Pages
198 Views
0 Downloads
17.46 KB
Uploaded: 2025-02-08
Introduction to Coding
Guide for students ready to learn computer codig and programming
17 Pages
1342 Views
0 Downloads
613.01 KB
Uploaded: 2025-02-07