Photo AI

1.1 A file .. - NSC Computer Application Technology - Question 1 - 2021 - Paper 2

Question icon

Question 1

1.1-A-file-..-NSC Computer Application Technology-Question 1-2021-Paper 2.png

1.1 A file ... specifies the unique location of a file or folder in a file system. 1.2 Which ONE of the following properties does NOT refer to the metadata of a wor... show full transcript

Worked Solution & Example Answer:1.1 A file .. - NSC Computer Application Technology - Question 1 - 2021 - Paper 2

Step 1

1.1 A file ... specifies the unique location of a file or folder in a file system.

96%

114 rated

Answer

The correct answer is B: path. A file path specifies the unique location of a file or folder in a file system.

Step 2

1.2 Which ONE of the following properties does NOT refer to the metadata of a word processing document?

99%

104 rated

Answer

The correct answer is B: Size. Size is a property of the document but does not refer to metadata like Author or Created.

Step 3

1.3 ... is an acronym for the term used to describe human errors and its influence on computer output.

96%

101 rated

Answer

The correct answer is D: GIGO, which stands for 'Garbage In, Garbage Out'.

Step 4

1.4 On older computers the ... will slow down the transfer of data when compared to newer computers.

98%

120 rated

Answer

The correct answer is C: hardware. Older hardware can slow down data transfer rates.

Step 5

1.5 The ... will determine the type of language and graphics used in a presentation program.

97%

117 rated

Answer

The correct answer is A: layout. The layout determines how content is presented, including language and graphics.

Step 6

1.6 A touch screen is the most effective input device when a user is required to ...

97%

121 rated

Answer

The correct answer is A: choose between limited options. Touch screens facilitate quick selection of options.

Step 7

1.7 A ... is an audio file usually delivered over the internet.

96%

114 rated

Answer

The correct answer is D: podcast. Podcasts are audio files distributed over the internet.

Step 8

1.8 A ... is a malicious program that is used to initiate a DDoS attack.

99%

104 rated

Answer

The correct answer is A: bot. Bots can be used to initiate distributed denial-of-service (DDoS) attacks.

Step 9

1.9 Which ONE of the following calculated fields will determine value-added tax of 15% in a database query correctly?

96%

101 rated

Answer

The correct answer is B: VAT=[Price]*0.15. This correctly calculates 15% of the price.

Step 10

1.10 Faking an e-mail header to hide the actual origin of the e-mail is known as ...

98%

120 rated

Answer

The correct answer is A: phishing. Phishing involves hiding the email's true origin to deceive the recipient.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;