7.1 Name the principle or give the acronym that describes how human error or invalid data affects the quality and accuracy of output - NSC Computer Application Technology - Question 7 - 2016 - Paper 2
Question 7
7.1 Name the principle or give the acronym that describes how human error or invalid data affects the quality and accuracy of output.
7.2 Many websites insist that ... show full transcript
Worked Solution & Example Answer:7.1 Name the principle or give the acronym that describes how human error or invalid data affects the quality and accuracy of output - NSC Computer Application Technology - Question 7 - 2016 - Paper 2
Step 1
Name the principle or give the acronym that describes how human error or invalid data affects the quality and accuracy of output.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The principle is known as GIGO, which stands for 'Garbage In, Garbage Out.' This principle implies that the quality of output is determined by the quality of the input.
Step 2
State TWO properties or characteristics of a strong password.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A strong password should include a mixture of letters, numbers, and special characters.
It should have a minimum length of 8 characters and avoid easily identifiable information, such as birth dates or names.
Step 3
Name a feature of instant messaging applications or social networks that can help reduce online harassment or bullying.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One feature is the ability to block or unfriend users, which helps prevent unwanted interactions and protects users from harassment.
Step 4
State ONE potential negative effect or consequence of using pirated software.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Using pirated software may lead to legal consequences, including potential criminal charges for copyright infringement and associated fines.
Step 5
State TWO indications that might suggest that an e-mail is a phishing e-mail.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The e-mail address appears suspicious, such as using a strange domain name.
There is an urgency in the request, asking the user to click on a link to provide additional information.
Step 6
What is the most likely reason why e-mail programs are set up to reject or block program or executable (.exe) files?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
E-mail programs typically block .exe files due to the risk of potential malware that could be embedded in such files, which can compromise the security of the recipient's system.
Step 7
Suggest a way to trick the e-mail program into accepting this file as an attachment.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One method is to change the file extension of the .exe file to something non-executable, such as .txt or .zip, before attaching it to the e-mail.
Step 8
What is the name given to the set of guidelines used when composing an e-mail such as 'Do not send very large attachments?'
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
These guidelines are known as 'Netiquette,' which encompasses the etiquette and appropriate behavior expected in online communication.