5.1 Voice calling is used in many IM apps - NSC Computer Application Technology - Question 5 - 2018 - Paper 2
Question 5
5.1 Voice calling is used in many IM apps. What network communications protocol makes this feature possible?
5.2 NFC is a communication medium available on many mob... show full transcript
Worked Solution & Example Answer:5.1 Voice calling is used in many IM apps - NSC Computer Application Technology - Question 5 - 2018 - Paper 2
Step 1
What network communications protocol makes this feature possible?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The network communications protocol that makes voice calling possible in many IM apps is VOIP (Voice Over Internet Protocol).
Step 2
How would one transfer files using NFC between two devices that have the NFC setting switched on?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To transfer files using NFC, both devices should have the NFC feature enabled. Users need to place the devices very close to each other or tap them together to initiate the transfer. The device sending the file will select the file to be shared, and the receiving device will confirm the action to receive the files.
Step 3
State TWO uses of NFC.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Making payments using mobile wallets like Google Pay or Apple Pay.
Initiating an action or launching an application on a device by tapping another device.
Step 4
Give TWO possible reasons why an e-mail is not delivered to some recipients on a distribution list.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The recipient's mailbox is full, preventing the email from being received.
The e-mail address is incorrect or does not exist, leading to delivery failures.
Step 5
With reference to online shopping, what is the purpose of a shopping cart?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of a shopping cart in online shopping is to allow the user to store, add, or remove products/items before completing a transaction. It facilitates organization and ensures that customers can review their selections.
Step 6
State TWO disadvantages of using a smartphone as a Wi-Fi hotspot.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Battery life is depleted quicker when the smartphone is acting as a hotspot due to increased data usage.
Overall internet experience may be slower when multiple devices connect to the hotspot, affecting browsing speed.
Step 7
How can you make your own website available to the public on the internet?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To make your own website available to the public on the internet, you can use a suitable online web development or hosting service, such as WordPress. Alternatively, you can use an Internet Service Provider (ISP) to host your website or obtain a fixed IP address for your local server.
Step 8
Give TWO reasons why a shop would ask customers to log on using a password.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Access to the network can be limited to only customers, ensuring that unauthorized users are prevented from accessing it.
To manage the number of users and avoid network congestion, giving all users a fair share of the internet access.
Step 9
Give TWO reasons why it is necessary to limit the access rights of users on a LAN.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Preventing access to certain files or folders to maintain privacy and data security.
Blocking access to certain programs to prevent unauthorized use and maintain system integrity.