Photo AI

Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2021 - Paper 2

Question icon

Question 1

Various-options-are-given-as-possible-answers-to-the-following-questions-NSC Computer Application Technology-Question 1-2021-Paper 2.png

Various options are given as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question numbers (1.1 to 1.10... show full transcript

Worked Solution & Example Answer:Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2021 - Paper 2

Step 1

1.1 Which ONE of the following options allows for data to become useful information?

96%

114 rated

Answer

The correct answer is B. Processing. Processing is essential in transforming raw data into meaningful information.

Step 2

1.2 ... is an online income tax return service provided by the South African government to its citizens.

99%

104 rated

Answer

The correct answer is A. e-Filing. e-Filing is specifically designed for online tax submissions.

Step 3

1.3 A computer connected to the internet that has been compromised by a hacker is known as a ...

96%

101 rated

Answer

The correct answer is C. zombie. A 'zombie' refers to a computer that is controlled by a hacker without the owner's knowledge.

Step 4

1.4 Which ONE of the following words would return a result of 4 when used with the LEN function in a spreadsheet?

98%

120 rated

Answer

The correct answer is B. Text string. A text string with four characters would return a length of 4.

Step 5

1.5 Which ONE of the following options is NOT a function of the operating system?

97%

117 rated

Answer

The correct answer is B. Provides cloud storage. While some operating systems may interface with cloud storage, it is not a core function of an OS.

Step 6

1.6 ... technology can assist game rangers to monitor and detect poaching activities.

97%

121 rated

Answer

The correct answer is D. Drone. Drones are utilized for monitoring wildlife and detecting illegal activities.

Step 7

1.7 The ... attribute in HTML specifies the distance between the border of a table cell and the text in the cell.

96%

114 rated

Answer

The correct answer is A. cellpadding. This attribute controls the spacing inside the cell.

Step 8

1.8 The date and time when a photo was taken can be found in the ... of the photo.

99%

104 rated

Answer

The correct answer is B. metadata. Metadata contains information about the photo, including the date and time it was taken.

Step 9

1.9 ... uses special high-speed memory to store data that is frequently used to improve computer performance.

96%

101 rated

Answer

The correct answer is D. Caching. Caching involves storing frequently accessed data for quick retrieval.

Step 10

1.10 Which communication technology enables a person to tap his/her bank card on a device to pay?

98%

120 rated

Answer

The correct answer is C. NFC. Near Field Communication (NFC) allows for contactless payments.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;