Your school is launching a major drive to embrace the digital era - NSC Information Technology - Question 6 - 2017 - Paper 2
Question 6
Your school is launching a major drive to embrace the digital era. The expansion of their network, linked with increased Internet availability, has made it possible ... show full transcript
Worked Solution & Example Answer:Your school is launching a major drive to embrace the digital era - NSC Information Technology - Question 6 - 2017 - Paper 2
Step 1
Name TWO IT-related jobs that will be created when setting up and expanding the network.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
IT Technician
Network Engineer
Step 2
Explain the term biometrics.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Biometrics refers to the use of personal characteristics to authenticate the identity of a person. Commonly, it involves unique psychological traits or physical characteristics, such as fingerprints or retinal patterns.
Step 3
Give a suitable example of biometrics to be used in this scenario.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A suitable example of biometrics to be used in this scenario could be fingerprint recognition.
Step 4
State TWO disadvantages of using RFID cards for this application.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
RFID cards can be lost or stolen, which poses a security risk.
They can be cloned, potentially allowing unauthorized access.
Step 5
What is virtual memory?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Virtual memory is hard drive space that is reserved by the operating system to extend the available memory beyond the physical RAM. It allows the execution of larger applications or multiple applications simultaneously.
Step 6
Which software implements and manages virtual memory in a computer system?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The Operating System (OS) implements and manages virtual memory.
Step 7
How can the use of virtual memory be limited?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The use of virtual memory can be limited by:
Adding more RAM to the system.
Closing applications that are not in use.
Step 8
Distinguish between the results when a file is compressed using lossless compression and lossy compression.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Lossless compression ensures that no data is lost during the compression process, making it possible to restore the original file exactly. In contrast, lossy compression may lose some insignificant data, resulting in a file that cannot be restored to its original form.
Step 9
Explain what a protocol is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A protocol is a set of rules for transmission of data across a network. It encompasses procedures for encoding and decoding data, ensuring reliable communication between devices.
Step 10
What is the SMT protocol used for?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The SMT protocol is used for sending e-mails across the Internet.
Step 11
What is a distributed database?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A distributed database is a system where parts of a database are spread over multiple servers located in different geographic locations, allowing for improved efficiency and reliability.
Step 12
State TWO advantages of using a distributed database.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Eliminates congestion on a single server, allowing for a larger number of simultaneous users.
If one server fails, other databases can still be accessed, ensuring lower risk of data loss.
Step 13
Briefly describe the main feature of Web 1.0.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The main feature of Web 1.0 is that it consists mainly of static web pages. Users have limited interaction, primarily consuming content rather than engaging with it.
Step 14
Explain why Web 3.0 is referred to as the Semantic Web.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Web 3.0 is referred to as the Semantic Web because it aims to make Internet data machine-readable, allowing for more intelligent searches and better user personalization, enabling computers and users to understand information more effectively.
Step 15
What is this feature called?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This feature is called interoperability, allowing devices to communicate effectively with one another.
Step 16
What is a webinar?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A webinar is an online seminar that allows participants to engage in discussions, presentations, or training sessions through the internet.
Step 17
State ONE way in which the staff member may benefit from signing up for the webinar.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One way the staff member may benefit is by expanding their knowledge base through access to educational content and expert speakers.
Step 18
What does the acronym SaaS stand for?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SaaS stands for Software as a Service.
Step 19
Explain how cloud applications work in general.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cloud applications operate by running on remote servers rather than local devices. Users access these applications over the Internet through web browsers or apps, which means that most processing is done in the cloud, reducing the strain on local resources.
Step 20
State TWO disadvantages of using online software services.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Software is not owned by the user; they must subscribe and pay to use it.
If the cloud service goes down, users cannot access their documents or services.
Step 21
Explain what an RSS service is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An RSS service is a web or news feed that provides automatic updates to users, allowing them to receive new content without manually checking websites.
Step 22
Suggest TWO ways of using social networking sites responsibly.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Limit time spent online and set notifications for important tasks to avoid distraction.
Avoid sharing personal information that could be misused.
Step 23
Give TWO reasons why cybercrime is prevalent.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Difficulty in tracing the identity of the perpetrator makes online crimes easier to commit.
Increased use of the internet leads to greater opportunities for cybercrime.
Step 24
What term is used to describe this crime?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term used to describe this crime is 'Piggybacking.'
Step 25
What is a drone?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A drone is a machine that has certain autonomous flight capabilities but can still be controlled by a human.
Step 26
State TWO possible benefits of using a 3D printer for printing the parts of the drone.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Parts can be designed and printed quickly, allowing for rapid prototyping and adjustments.
Reduces costs by minimizing materials wasted compared to traditional manufacturing processes.