With an appropriate example of a file type, describe the term lossy compression. May 14, 2016 Read More »
Explain the following: i. Z-mouse ii. Joysticks iii. Touch panels iv. Image scanners v. Data glove b. Explain reflection and shear. May 14, 2016 Read More »
Discuss the main arguments of any two of the following theories on identity negotiation and management. a)Identity Management Theory (11marks) b)Identity Negotiation (11marks) May 14, 2016 Read More »
he deployment of open systems is often criticized as having a very small systems boundary this implies that the environment is much larger with a number of systems that have to interact with each other. These interactions occur though interfaces. Discuss the security concerns these interactions bring to an organization May 14, 2016 Read More »