5.1 Voice calling is used in many IM apps - NSC Computer Application Technology - Question 5 - 2018 - Paper 2
Question 5
5.1 Voice calling is used in many IM apps. What network communications protocol makes this feature possible?
5.2 NFC is a communication medium available on many mob... show full transcript
Worked Solution & Example Answer:5.1 Voice calling is used in many IM apps - NSC Computer Application Technology - Question 5 - 2018 - Paper 2
Step 1
What network communications protocol makes this feature possible?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The network communications protocol that makes voice calling in many IM apps possible is VOIP (Voice Over Internet Protocol).
Step 2
How would one transfer files using NFC between two devices that have the NFC setting switched on?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To transfer files using NFC, the two devices should be placed very close to each other, allowing them to establish a connection. Then, a user can select the file to be sent, and once the devices recognize each other, the transfer will initiate.
Step 3
State TWO uses of NFC.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two uses of NFC include:
Making payments through mobile wallets,
Initiating actions or launching apps by tapping devices together.
Step 4
Give TWO possible reasons why an e-mail is not delivered to some recipients on a distribution list.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two possible reasons could be:
The recipient's mailbox is full, preventing new messages from being accepted.
The e-mail address is incorrect or does not exist, leading to delivery failure.
Step 5
What is the purpose of a shopping cart?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of a shopping cart in online shopping is to allow the user to store or add/remove products/items before a transaction is completed. It serves as a temporary storage space for the products the user intends to purchase.
Step 6
State TWO disadvantages of using a smartphone as a Wi-Fi hotspot.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two disadvantages include:
The battery life of the smartphone may deplete quicker when used as a hotspot.
The overall internet experience may be slower compared to dedicated Wi-Fi routers.
Step 7
How can you make your own website available to the public on the internet?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
You can make your own website available to the public on the internet by using a suitable online web development or hosting service, like WordPress, or by obtaining a fixed IP address for your local server.
Step 8
Give TWO reasons why a shop would ask customers to log on using a password.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two reasons why a shop would ask customers to log on using a password could be:
To limit access to the network to only their customers, ensuring a secure connection.
To prevent unauthorized access to sensitive information or restrict access to certain files or folders.
Step 9
Give TWO reasons why it is necessary to limit the access rights of users on a LAN.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two reasons for limiting access rights on a LAN include:
Preventing access to certain shared files and folders to secure sensitive information.
Blocking access to certain programs that could jeopardize network security.