Photo AI

QUESTION 1: MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2023 - Paper 2

Question icon

Question 1

QUESTION-1:-MULTIPLE-CHOICE-QUESTIONS--Various-options-are-given-as-possible-answers-to-the-following-questions-NSC Computer Application Technology-Question 1-2023-Paper 2.png

QUESTION 1: MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the following questions. Choose the answer and write only the letter (A–D) ne... show full transcript

Worked Solution & Example Answer:QUESTION 1: MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2023 - Paper 2

Step 1

Which ONE of the following can be considered a strong password?

96%

114 rated

Answer

A strong password should be difficult to guess, which means it typically includes a combination of uppercase and lowercase letters, numbers, and special characters. Given the options:

  • A (qwerty1234) is weak due to its predictability.
  • B (Sunshine) is also weak because it is a common word.
  • C (Spr!ng+w@t3r) contains a mix of characters and is therefore a strong option.
  • D (Password) is a well-known weak password.

Thus, the best answer is C.

Step 2

You need to backup an entire hard drive. Which of the following devices is best suited for this purpose?

99%

104 rated

Answer

To back up an entire hard drive, a device with ample storage capacity is needed.

  • A (Portable hard drive) is suitable as it is designed for extensive file storage.
  • B (Flash disk) typically has less capacity.
  • C (DVD) can hold only limited data.
  • D (Cloud storage) allows for backups but depends on internet connectivity and available space.

The most appropriate choice is A.

Step 3

A … component is unlikely to be found in a new computer.

96%

101 rated

Answer

Among the listed components:

  • A (motherboard) is essential in all computers.
  • B (solid state drive) is common in modern computers.
  • C (processor) is necessary for computing.
  • D (DVD-writer) is increasingly becoming obsolete as users lean towards digital sources.

Thus, the best answer is D.

Step 4

A … is NOT an example of a peripheral.

98%

120 rated

Answer

Peripherals are external devices connected to a computer:

  • A (printer) is a peripheral.
  • B (motherboard) is a fundamental component of the computer itself.
  • C (keyboard) is a peripheral input device.
  • D (monitor) is a peripheral output device.

So, the answer is B.

Step 5

The URL of a website refers to …

97%

117 rated

Answer

The URL (Uniform Resource Locator) identifies the location of a website:

  • A (a way for users to identify a website) is accurate.
  • B (the relative ranking of the website) refers more to SEO.
  • C (the password needed) does not define what a URL is.
  • D (the e-mail address) is unrelated to a URL.

Therefore, the best answer is A.

Step 6

If you think the web page you are viewing is outdated (old), you can …

97%

121 rated

Answer

To refresh content on a web page:

  • A (change to a different ISP) won't typically update content.
  • B (update your antivirus software) is irrelevant to webpage viewing.
  • C (change to a 4G connection) may improve speed but not the content.
  • D (refresh the page) is the correct choice to see updates.

Thus, the answer is D.

Step 7

Which upgrade will most likely improve the performance of a PC?

96%

114 rated

Answer

To enhance PC performance:

  • A (Adding more memory) directly impacts multitasking and speed.
  • B (Increasing refresh rate) is mainly about display quality.
  • C (Adding a second hard drive) can help but not as directly as RAM.
  • D (Installing a video capture card) focuses on specific tasks.

Thus, the best option is A.

Step 8

... refers to the use of resource material without acknowledgement.

99%

104 rated

Answer

The definition applies to various ethical issues:

  • A (Data theft) refers to illegally obtaining information.
  • B (Plagiarism) is the correct term for using someone else's work without credit.
  • C (Identity theft) relates to personal data misuse.
  • D (Data cloning) does not correspond to this definition.

Hence, the answer is B.

Step 9

Which ONE of the following should NOT be used as a data source?

96%

101 rated

Answer

Data sources must be reliable:

  • A (A spreadsheet worksheet) can be trustworthy.
  • B (A database report) is credible.
  • C (A word processing document) is often not structured for data processing.
  • D (A Notepad text file) is typically unorganized.

Thus, the best answer is C.

Step 10

For which ONE of the following fields in a database will you most likely use an input mask?

98%

120 rated

Answer

Input masks ensure proper data input:

  • A (The cellphone number of a client) typically uses an input mask to ensure formatting.
  • B (The surname of a client) does not require restrictions.
  • C (The number of items ordered) is numerical but often not masked.
  • D (The web address) needs specific formatting but is less common for masks.

Thus, the answer is A.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;