Photo AI

6.1 There are many factors that can influence a computer's performance - NSC Information Technology - Question 6 - 2020 - Paper 2

Question icon

Question 6

6.1-There-are-many-factors-that-can-influence-a-computer's-performance-NSC Information Technology-Question 6-2020-Paper 2.png

6.1 There are many factors that can influence a computer's performance. 6.1.1 Give TWO reasons why the use of cache memory allows the CPU to perform tasks faster th... show full transcript

Worked Solution & Example Answer:6.1 There are many factors that can influence a computer's performance - NSC Information Technology - Question 6 - 2020 - Paper 2

Step 1

6.1.1 Give TWO reasons why the use of cache memory allows the CPU to perform tasks faster than when RAM is used.

96%

114 rated

Answer

Cache memory is faster as it is physically located closer to the CPU, allowing quicker access to frequently used data. Additionally, cache memory stores instructions that the CPU is likely to use soon, significantly speeding up performance compared to RAM.

Step 2

6.1.2 Name TWO other physical aspects of the CPU that have a direct influence on system performance.

99%

104 rated

Answer

  1. The clock speed of the CPU in GHz, which allows it to process instructions faster. 2. The number of cores, which enables parallel processing and enhances overall performance.

Step 3

6.1.3 (a) What is the additional memory which is allocated by the operating system if required, called?

96%

101 rated

Answer

This additional memory is referred to as 'virtual memory.'

Step 4

6.1.3 (b) Explain how the operating system uses the additional memory when required.

98%

120 rated

Answer

The operating system uses virtual memory by swapping data back and forth between the hard disk and the RAM. If the physical RAM is full, it temporarily moves inactive data from RAM to a designated disk space, allowing more active processes to run.

Step 5

6.2 State TWO disadvantages of using an open source operating system, such as Linux.

97%

117 rated

Answer

  1. Compatibility issues may arise as not all software is supported, potentially limiting functionality. 2. Users may encounter a lack of official support, making troubleshooting more challenging.

Step 6

6.3.1 State TWO advantages associated with the use of cloud computing.

97%

121 rated

Answer

  1. Accessibility from any device with internet access, offering flexibility for users. 2. Scalability allows businesses to increase or decrease resources as needed without physical constraints.

Step 7

6.3.2 State TWO virtualisation techniques employed by companies that offer cloud services.

96%

114 rated

Answer

  1. Server virtualization, which allows multiple virtual servers to be hosted on a single physical server, optimizing resource usage. 2. Desktop virtualization, enabling users to access a virtual desktop environment from various devices.

Step 8

6.4.1 State TWO advantages of using web-based e-mail rather than an ISP-based e-mail.

99%

104 rated

Answer

  1. Web-based email can be accessed from anywhere with an internet connection, offering greater flexibility. 2. It usually comes with no additional costs for accessing email services.

Step 9

6.4.2 (a) Explain how a search engine uses customised searching to customise search results according to a user’s profile.

96%

101 rated

Answer

Search engines track user behavior, including search history and preferences, to tailor search results. By analyzing the user's profile data, they can make recommendations that are more aligned with the user's interests.

Step 10

6.4.2 (b) Explain what context-aware searches entails.

98%

120 rated

Answer

Context-aware searches consider situational factors, such as the user's location or time of search, to provide more relevant results tailored to the immediate context.

Step 11

6.4.2 (c) How can the business benefit from context-aware searches?

97%

117 rated

Answer

Businesses gain insight into user behavior, improving marketing strategies by targeting specific demographics and enhancing customer engagement through more relevant content offerings.

Step 12

6.4.3 Give TWO reasons why the company should consider the development of a mobile app if a website has already been created.

97%

121 rated

Answer

  1. A mobile app can provide offline access to resources, allowing users to interact with services without needing a constant internet connection. 2. It enhances user engagement by enabling push notifications for timely updates.

Step 13

6.5 Give TWO reasons why you would recommend that they do NOT switch to a distributed database system.

96%

114 rated

Answer

  1. A distributed database is generally more complex to set up and maintain compared to a centralized system. 2. Synchronization of data can become more challenging, potentially leading to inconsistencies across databases.

Step 14

6.6.1 Why is a VPN useful to employees?

99%

104 rated

Answer

A VPN protects employees' data by encrypting online activities, thereby ensuring secure access to corporate resources while working remotely, which is especially important when using public internet connections.

Step 15

6.6.2 Indicate ONE option in the screenshot above that is related to green computing.

96%

101 rated

Answer

The 'Battery saver' option helps to reduce power consumption, thereby contributing to green computing initiatives.

Step 16

6.6.3 Define the term mobile hotspot.

98%

120 rated

Answer

A mobile hotspot is a portable device that provides internet access by connecting to a mobile network, allowing multiple devices to access the internet simultaneously.

Step 17

6.6.4 (a) Briefly explain what multitasking is.

97%

117 rated

Answer

Multitasking is the ability of an operating system to run multiple applications or processes simultaneously, allowing users to switch between them seamlessly.

Step 18

6.6.4 (b) How does multiprocessing differ from multitasking?

97%

121 rated

Answer

Multiprocessing involves multiple processors or cores handling different tasks simultaneously, while multitasking can occur on a single processor that switches between tasks rapidly.

Step 19

6.6.5 Explain what nearby sharing in this context entails.

96%

114 rated

Answer

Nearby sharing allows devices to exchange files and information wirelessly when they are in close proximity, facilitating easy collaboration and communication between users.

Step 20

6.7 State TWO possible disadvantages of relying solely on VoIP for communication with customers.

99%

104 rated

Answer

  1. Call quality can be affected by internet connection speed and traffic, potentially leading to dropped calls or poor audio. 2. Both parties must have a stable high-speed internet connection to ensure effective communication.

Step 21

6.8 Make TWO recommendations on how IoT technology can be used to ensure the company does not suffer damage due to possible problems with temperature control.

96%

101 rated

Answer

  1. Implement IoT sensors to monitor and control temperature levels in real time, enabling prompt action if anomalies occur. 2. Utilize historical data analysis through IoT to predict and prevent potential temperature-related issues.

Step 22

6.9 (a) What medium is used by RFID to identify objects?

98%

120 rated

Answer

RFID uses radio waves as the medium to identify objects.

Step 23

6.9 (b) State TWO advantages of using RFID rather than barcode technology.

97%

117 rated

Answer

  1. RFID tags can be read without direct line-of-sight, allowing for faster scanning. 2. Multiple RFID tags can be read simultaneously, increasing efficiency in tracking inventory.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;