1.1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2
Question 1
1.1 Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question numbers (1.1.... show full transcript
Worked Solution & Example Answer:1.1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2
Step 1
1.1.1 A type of malware that is disguised as a useful program is known as a …
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D. trojan horse.
Step 2
1.1.2 Software that may be used for free but with a time and functionality limit:
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
B. Shareware.
Step 3
1.1.3 Which ONE is NOT a duty of a system analyst?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D. Writes code for the software solution.
Step 4
1.1.4 What will be the value of iAnswer when the following statement is executed?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A. 3.
Step 5
1.1.5 Which formula is represented in the segment of code below?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A. n^p.
Step 6
1.2.1 Part of the ROM where information with regard to the setup of the computer can be saved
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
CMOS (also accept: BIOS, Firmware).
Step 7
1.2.2 Security based on the measurement and identification of unique physical characteristics of a person, e.g. fingerprints
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Biometrics (acceptable examples include Voice recognition, Face/Iris/Fingerprint-scanning).
Step 8
1.2.3 Digital code, attached to an e-mail, used to identify and validate the sender of an electronic message
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Digital signature.
Step 9
1.2.4 Software that allows the user to perform maintenance tasks on a computer
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Utility software.
Step 10
1.2.5 The method that is used in object-oriented programming to instantiate an object
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Constructor.
Step 11
1.2.6 The steps followed to prevent anomalies from occurring in a database
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Normalisation.
Step 12
1.2.7 A tool used to identify logical errors by working through the program manually step by step and recording the result of each step in a table
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Trace table.
Step 13
1.2.8 Compressing data by losing some insignificant portions of the data
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!