Photo AI

1.1 A file .. - NSC Computer Application Technology - Question 1 - 2021 - Paper 2

Question icon

Question 1

1.1-A-file-..-NSC Computer Application Technology-Question 1-2021-Paper 2.png

1.1 A file ... specifies the unique location of a file or folder in a file system. 1.2 Which ONE of the following properties does NOT refer to the metadata of a wor... show full transcript

Worked Solution & Example Answer:1.1 A file .. - NSC Computer Application Technology - Question 1 - 2021 - Paper 2

Step 1

1.1 A file ... specifies the unique location of a file or folder in a file system.

96%

114 rated

Answer

The correct answer is B. A file path specifies the unique location of a file or folder within a file system.

Step 2

1.2 Which ONE of the following properties does NOT refer to the metadata of a word processing document?

99%

104 rated

Answer

The answer is B. Size does not refer to the metadata of a document, as metadata generally includes properties such as Author, Format, and Created.

Step 3

1.3 ... is an acronym for the term used to describe human errors and its influence on computer output.

96%

101 rated

Answer

The correct answer is D. GIGO, which stands for 'Garbage In, Garbage Out', refers to the principle that errors in input will produce errors in output.

Step 4

1.4 On older computers the ... will slow down the transfer of data when compared to newer computers.

98%

120 rated

Answer

The answer is C. Hardware typically limits data transfer rates in older systems compared to newer technologies.

Step 5

1.5 The ... will determine the type of language and graphics used in a presentation program.

97%

117 rated

Answer

The answer is A. Layout is crucial as it dictates how language and graphics are arranged in a presentation.

Step 6

1.6 A touch screen is the most effective input device when a user is required to ...

97%

121 rated

Answer

The answer is A. Choose between limited options; touch screens facilitate quick selections effectively.

Step 7

1.7 A ... is an audio file usually delivered over the internet.

96%

114 rated

Answer

The correct answer is D. Podcast, which refers to audio content distributed online.

Step 8

1.8 A ... is a malicious program that is used to initiate a DDoS attack.

99%

104 rated

Answer

The answer is D. A worm is often used in DDoS attacks to replicate and spread across networks.

Step 9

1.9 Which ONE of the following calculated fields will determine value-added tax of 15% in a database query correctly?

96%

101 rated

Answer

The correct choice is B. VAT=([Price]*0.15) is the correct formula for calculating 15% VAT.

Step 10

1.10 Faking an e-mail header to hide the actual origin of the e-mail is known as ...

98%

120 rated

Answer

The answer is A. Phishing, which often involves deceptive practices to manipulate individuals.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;