COLUMN A
2.1 A program in an office suite where the copy-down/auto-fill feature is more likely to be used
2.2 A monitor specification indicating image quality
2.3 A critical component of a computing device
2.4 An operator that allows a user to compare two values in conditional functions
2.5 A criterion used to check whether the source of information is objective
2.6 A technology to help avoid security threats on a network
2.7 A company that provides Internet connectivity
2.8 A possible disadvantage of using cloud services
2.9 A protocol that makes it more difficult for a hacker to see what a user is doing online
2.10 A limitation of Bluetooth for data transfer
COLUMN B
A - NSC Computer Application Technology - Question 2 - 2017 - Paper 2
Question 2
COLUMN A
2.1 A program in an office suite where the copy-down/auto-fill feature is more likely to be used
2.2 A monitor specification indicating image quality
2.3 A ... show full transcript
Worked Solution & Example Answer:COLUMN A
2.1 A program in an office suite where the copy-down/auto-fill feature is more likely to be used
2.2 A monitor specification indicating image quality
2.3 A critical component of a computing device
2.4 An operator that allows a user to compare two values in conditional functions
2.5 A criterion used to check whether the source of information is objective
2.6 A technology to help avoid security threats on a network
2.7 A company that provides Internet connectivity
2.8 A possible disadvantage of using cloud services
2.9 A protocol that makes it more difficult for a hacker to see what a user is doing online
2.10 A limitation of Bluetooth for data transfer
COLUMN B
A - NSC Computer Application Technology - Question 2 - 2017 - Paper 2
Step 1
2.1 A program in an office suite where the copy-down/auto-fill feature is more likely to be used
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct term from COLUMN B that matches this description is D. database. Databases often utilize autofill features in applications like spreadsheets.
Step 2
2.2 A monitor specification indicating image quality
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This would correspond to J. resolution. Resolution quantifies the clarity of images displayed on a monitor.
Step 3
2.3 A critical component of a computing device
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This refers to B. CPU (Central Processing Unit), which is essential for executing instructions in computing devices.
Step 4
2.4 An operator that allows a user to compare two values in conditional functions
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The matching term is G. AND. This logical operator is commonly used in programming to compare values.
Step 5
2.5 A criterion used to check whether the source of information is objective
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This aligns with C. bias. Identifying bias is crucial in assessing the objectivity of information.
Step 6
2.6 A technology to help avoid security threats on a network
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This is best matched with K. HTTPS. HTTPS is a protocol designed to provide secure communication over a computer network.
Step 7
2.7 A company that provides Internet connectivity
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This corresponds to T. ISP (Internet Service Provider), which offers Internet access to customers.
Step 8
2.8 A possible disadvantage of using cloud services
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This can be associated with P. privacy concerns, as using cloud services can raise issues regarding data privacy.
Step 9
2.9 A protocol that makes it more difficult for a hacker to see what a user is doing online
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The answer here is K. HTTPS, which encrypts data between the user and the web server, enhancing security.
Step 10
2.10 A limitation of Bluetooth for data transfer
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This limitation is best represented by O. distance, since Bluetooth has a restricted range for connectivity.