Photo AI

1.1 Verskeie opsies word as moontlike antwoord op die volgende vrae gegee - English General - NSC Information Technology - Question 1 - 2024 - Paper 2

Question icon

Question 1

1.1-Verskeie-opsies-word-as-moontlike-antwoord-op-die-volgende-vrae-gegee-English General-NSC Information Technology-Question 1-2024-Paper 2.png

1.1 Verskeie opsies word as moontlike antwoord op die volgende vrae gegee. Kies die antwoord en skryf slegs die letter (A–D) langs die vraagnommers (1.1.1 tot 1.1.10... show full transcript

Worked Solution & Example Answer:1.1 Verskeie opsies word as moontlike antwoord op die volgende vrae gegee - English General - NSC Information Technology - Question 1 - 2024 - Paper 2

Step 1

1.1.1 'n Bergingstoestel wat tipies flitsgeheue ('flash memory') gebruik om data, instrukies en inligting te stoor:

96%

114 rated

Answer

B. Vaste-toestandandrywer ('Solid-state drive')

Step 2

1.1.2 'n Netwerkbeskrywing naam wat gekoppeld word aan die IP-adres van die gebruiker nader aan webtuise huise:

99%

104 rated

Answer

C. URL

Step 3

1.1.3 'n Datastuktoe wat dit moontlik maak om data permanent te stoor:

96%

101 rated

Answer

A. Teksleër

Step 4

1.1.4 Watter waarde van X wees as die volgende kode uitgevoer word:

98%

120 rated

Answer

A. 12

Step 5

1.1.5 'n ... is 'n webdiens wat gebruikers toelaat om kort teksboodskappe, wat gewoonlik tussen 100 en 200 karakters bevat, te plaas:

97%

117 rated

Answer

C. Mikroblo(g) ('Microblog')

Step 6

1.1.6 'n Proses waardeur 'n lêer wat infekteer is, op die hardeskyf geisoleer word totdat die infeksie verwyder kan word:

97%

121 rated

Answer

B. Kwarantyn ('Quarantine')

Step 7

1.1.7 'n Tipe mobiele toepassing wat media of inligting bo-oor 'n beeld op die skerm plaas:

96%

114 rated

Answer

C. Aangepaste realiteit ('Augmented reality')

Step 8

1.1.8 'n Klein hoeveelheid data spesifiek geneem in 'n werking:

99%

104 rated

Answer

A. Aandrywer

Step 9

1.1.9 Watter EEN van die volgende datatypes is 'n ordinale datatype ('ordinal data type')?

96%

101 rated

Answer

C. Character

Step 10

1.2.1 'n Gekompromiseerde ('compromised') rekenaar of toestel waarin die eenmaal onbewus is dat die rekenaar of toestel 'n afstand deur kwaadwillige sagteware ('malware') beheer.

98%

120 rated

Answer

Zombies / Bot

Step 11

1.2.2 'n Verwerkingmodel wat uit sagteware-komponente bestaan wat onafhanklike rekenaars uitvoer word, maar wat 'n enkele, kragtige sisteel saamwerk.

97%

117 rated

Answer

Verspreide verwerking ('Distributed computing')

Step 12

1.2.3 'n Data-soektekniek wat die bedoelde en konteksbetrokke leer van soektipes interpreteer.

97%

121 rated

Answer

Semantiese soektog

Step 13

1.2.4 Gee EEN woord/term wat duplikatkwessies aanraak en die daat sal verlig, sodat een rekord geteiken word nie.

96%

114 rated

Answer

Vreemde-sleutel ('foreign key')

Step 14

1.2.5 POP of POP3

99%

104 rated

Answer

POP of POP3

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

Other NSC Information Technology topics to explore

Algorithm design

Information Technology - English General

Augmented Reality (AR)

Information Technology - English General

CRUD operations

Information Technology - English General

Caring for and managing data

Information Technology - English General

Characteristics of a good database

Information Technology - English General

Cloud computing

Information Technology - English General

Cloud security

Information Technology - English General

Code optimization

Information Technology - English General

Computer crimes

Information Technology - English General

Computer criminals

Information Technology - English General

Computers providing solutions

Information Technology - English General

Connecting to the internet

Information Technology - English General

Data collection

Information Technology - English General

Data mining

Information Technology - English General

Data structures

Information Technology - English General

Data validation

Information Technology - English General

Data warehousing

Information Technology - English General

Database

Information Technology - English General

Date functions

Information Technology - English General

Defensive programming

Information Technology - English General

Effects of cybercrime

Information Technology - English General

Ethical considerations in computing

Information Technology - English General

Evolution of social networking

Information Technology - English General

Factors influencing performance of a computer

Information Technology - English General

GUI components

Information Technology - English General

How to get rid of anomalies

Information Technology - English General

Improve searching

Information Technology - English General

IoT Technologies enabling IoT

Information Technology - English General

Mobile technologies

Information Technology - English General

Motivating a typical computer system

Information Technology - English General

Network protocols

Information Technology - English General

Object-oriented programming

Information Technology - English General

Online applications

Information Technology - English General

Overview of security concepts

Information Technology - English General

Pattern recognition

Information Technology - English General

Privacy and information sharing

Information Technology - English General

Problem-solving techniques

Information Technology - English General

Problems with databases

Information Technology - English General

Remote access

Information Technology - English General

SQL statements

Information Technology - English General

Safeguards against computer crimes

Information Technology - English General

Sharing concepts

Information Technology - English General

Software Engineering Principles

Information Technology - English General

String manipulation

Information Technology - English General

Text file handling

Information Technology - English General

Two-dimensional arrays

Information Technology - English General

Types of cybercrimes

Information Technology - English General

Virtual Reality (VR)

Information Technology - English General

Virtualisation

Information Technology - English General

;