Photo AI

1.1.1 The protocol that defines how webpages and their content are transferred across the Web 1.1.2 A collection of 8 bits 1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes 1.1.4 An update that can be downloaded to fix a specific bug in software 1.1.5 The electronic equivalent to junk mail 1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program 1.1.7 The layout of the physical connection of the computers in a network 1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone - English General - NSC Information Technology - Question 1 - 2017 - Paper 2

Question icon

Question 1

1.1.1-The-protocol-that-defines-how-webpages-and-their-content-are-transferred-across-the-Web-1.1.2-A-collection-of-8-bits-1.1.3-Collection-of-programs-designed-to-use-administrator-rights-to-gain-control-of-a-computer-for-dangerous-purposes-1.1.4-An-update-that-can-be-downloaded-to-fix-a-specific-bug-in-software-1.1.5-The-electronic-equivalent-to-junk-mail-1.1.6-A-part-of-a-larger-program-that-runs-independently-but-simultaneously-with-other-parts-of-the-same-program-1.1.7-The-layout-of-the-physical-connection-of-the-computers-in-a-network-1.1.8-The-posting-of-short-text-entries-(140-characters-or-less)-usually-via-a-cellphone-or-smartphone-English General-NSC Information Technology-Question 1-2017-Paper 2.png

1.1.1 The protocol that defines how webpages and their content are transferred across the Web 1.1.2 A collection of 8 bits 1.1.3 Collection of programs designed to u... show full transcript

Worked Solution & Example Answer:1.1.1 The protocol that defines how webpages and their content are transferred across the Web 1.1.2 A collection of 8 bits 1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes 1.1.4 An update that can be downloaded to fix a specific bug in software 1.1.5 The electronic equivalent to junk mail 1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program 1.1.7 The layout of the physical connection of the computers in a network 1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone - English General - NSC Information Technology - Question 1 - 2017 - Paper 2

Step 1

1.1.1 The protocol that defines how webpages and their content are transferred across the Web

96%

114 rated

Answer

HTTP

Step 2

1.1.2 A collection of 8 bits

99%

104 rated

Answer

Byte

Step 3

1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes

96%

101 rated

Answer

Rootkit

Step 4

1.1.4 An update that can be downloaded to fix a specific bug in software

98%

120 rated

Answer

Patch

Step 5

1.1.5 The electronic equivalent to junk mail

97%

117 rated

Answer

SPAM

Step 6

1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program

97%

121 rated

Answer

Thread (Accept multithreading)

Step 7

1.1.7 The layout of the physical connection of the computers in a network

96%

114 rated

Answer

Topology

Step 8

1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone.

99%

104 rated

Answer

Microblogging (Accept tweeting)

Step 9

1.1.9 The latest generation of cellular communication technology

96%

101 rated

Answer

4G/LTE

Step 10

1.1.10 The total amount of data that can be transferred from one point to another in a given period of time

98%

120 rated

Answer

Bandwidth

Step 11

1.2.1 Copyright law is NOT broken when you ...

97%

117 rated

Answer

D. copy your own CD to play on your mp3 player.

Step 12

1.2.2 An algorithm is ...

97%

121 rated

Answer

B. a sequence of logical steps that will solve a problem.

Step 13

1.2.3 A cookie is a(n) ...

96%

114 rated

Answer

C. text file that stores information relating to websites.

Step 14

1.2.4 Which ONE of the following refers to an encryption process used to authenticate the identity of the sender of an e-mail message?

99%

104 rated

Answer

D. Digital signature

Step 15

1.2.5 Which ONE of the following is NOT a suitable application of Bluetooth technology?

96%

101 rated

Answer

B. Wireless communication between PCs in different rooms.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

Other NSC Information Technology topics to explore

Algorithm design

Information Technology - English General

Augmented Reality (AR)

Information Technology - English General

CRUD operations

Information Technology - English General

Caring for and managing data

Information Technology - English General

Characteristics of a good database

Information Technology - English General

Cloud computing

Information Technology - English General

Cloud security

Information Technology - English General

Code optimization

Information Technology - English General

Computer crimes

Information Technology - English General

Computer criminals

Information Technology - English General

Computers providing solutions

Information Technology - English General

Connecting to the internet

Information Technology - English General

Data collection

Information Technology - English General

Data mining

Information Technology - English General

Data structures

Information Technology - English General

Data validation

Information Technology - English General

Data warehousing

Information Technology - English General

Database

Information Technology - English General

Date functions

Information Technology - English General

Defensive programming

Information Technology - English General

Effects of cybercrime

Information Technology - English General

Ethical considerations in computing

Information Technology - English General

Evolution of social networking

Information Technology - English General

Factors influencing performance of a computer

Information Technology - English General

GUI components

Information Technology - English General

How to get rid of anomalies

Information Technology - English General

Improve searching

Information Technology - English General

IoT Technologies enabling IoT

Information Technology - English General

Mobile technologies

Information Technology - English General

Motivating a typical computer system

Information Technology - English General

Network protocols

Information Technology - English General

Object-oriented programming

Information Technology - English General

Online applications

Information Technology - English General

Overview of security concepts

Information Technology - English General

Pattern recognition

Information Technology - English General

Privacy and information sharing

Information Technology - English General

Problem-solving techniques

Information Technology - English General

Problems with databases

Information Technology - English General

Remote access

Information Technology - English General

SQL statements

Information Technology - English General

Safeguards against computer crimes

Information Technology - English General

Sharing concepts

Information Technology - English General

Software Engineering Principles

Information Technology - English General

String manipulation

Information Technology - English General

Text file handling

Information Technology - English General

Two-dimensional arrays

Information Technology - English General

Types of cybercrimes

Information Technology - English General

Virtual Reality (VR)

Information Technology - English General

Virtualisation

Information Technology - English General

;