2.1 A program in an office suite where the copy-down/auto-fill feature is more likely to be used
2.2 A monitor specification indicating image quality
2.3 A critical component of a computing device
2.4 An operator that allows a user to compare two values in conditional functions
2.5 A criterion used to check whether the source of information is objective
2.6 A technology to help avoid security threats on a network
2.7 A company that provides Internet connectivity
2.8 A possible disadvantage of using cloud services
2.9 A protocol that makes it more difficult for a hacker to see what a user is doing online
2.10 A limitation of Bluetooth for data transfer - NSC Computer Application Technology - Question 2 - 2017 - Paper 2
Question 2
2.1 A program in an office suite where the copy-down/auto-fill feature is more likely to be used
2.2 A monitor specification indicating image quality
2.3 A critical ... show full transcript
Worked Solution & Example Answer:2.1 A program in an office suite where the copy-down/auto-fill feature is more likely to be used
2.2 A monitor specification indicating image quality
2.3 A critical component of a computing device
2.4 An operator that allows a user to compare two values in conditional functions
2.5 A criterion used to check whether the source of information is objective
2.6 A technology to help avoid security threats on a network
2.7 A company that provides Internet connectivity
2.8 A possible disadvantage of using cloud services
2.9 A protocol that makes it more difficult for a hacker to see what a user is doing online
2.10 A limitation of Bluetooth for data transfer - NSC Computer Application Technology - Question 2 - 2017 - Paper 2
Step 1
2.1 A program in an office suite where the copy-down/auto-fill feature is more likely to be used
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is C. This refers to a 'database' that has features enabling the copy-down/auto-fill functionalities.
Step 2
2.2 A monitor specification indicating image quality
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is K. This usually relates to 'resolution', which defines the clarity and detail of the images displayed.
Step 3
2.3 A critical component of a computing device
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is B. The 'CPU' (Central Processing Unit) is indeed a critical component in computing devices.
Step 4
2.4 An operator that allows a user to compare two values in conditional functions
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is G. The operator 'AND' is used to assess conditions involving two or more values.
Step 5
2.5 A criterion used to check whether the source of information is objective
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is F. '60 Hz' is not the correct choice; rather, this question implies a need for checks on source validity.
Step 6
2.6 A technology to help avoid security threats on a network
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is R. A 'firewall' is widely used to protect networks from various security threats.
Step 7
2.7 A company that provides Internet connectivity
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is T. An 'ISP' (Internet Service Provider) is responsible for providing internet access.
Step 8
2.8 A possible disadvantage of using cloud services
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is P. This relates to 'privacy concerns' which can arise from data being stored on the cloud.
Step 9
2.9 A protocol that makes it more difficult for a hacker to see what a user is doing online
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is H. 'HTTPS' is the encrypted version of HTTP that secures data during transmission.
Step 10
2.10 A limitation of Bluetooth for data transfer
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer is M. 'Wi-Fi hardware' represents capacities exceeding those of Bluetooth in terms of range and speed.