Photo AI

Your school is launching a major drive to embrace the digital era - NSC Information Technology - Question 6 - 2017 - Paper 2

Question icon

Question 6

Your-school-is-launching-a-major-drive-to-embrace-the-digital-era-NSC Information Technology-Question 6-2017-Paper 2.png

Your school is launching a major drive to embrace the digital era. The expansion of their network, linked with increased Internet availability, has made it possible ... show full transcript

Worked Solution & Example Answer:Your school is launching a major drive to embrace the digital era - NSC Information Technology - Question 6 - 2017 - Paper 2

Step 1

Name TWO IT-related jobs that will be created when setting up and expanding the network.

96%

114 rated

Answer

  1. IT Technician
  2. Network Engineer

Step 2

Explain the term biometrics.

99%

104 rated

Answer

Biometrics refers to the use of personal characteristics to authenticate the identity of a person. Commonly, it involves unique psychological traits or physical characteristics, such as fingerprints or retinal patterns.

Step 3

Give a suitable example of biometrics to be used in this scenario.

96%

101 rated

Answer

A suitable example of biometrics to be used in this scenario could be fingerprint recognition.

Step 4

State TWO disadvantages of using RFID cards for this application.

98%

120 rated

Answer

  1. RFID cards can be lost or stolen, which poses a security risk.
  2. They can be cloned, potentially allowing unauthorized access.

Step 5

What is virtual memory?

97%

117 rated

Answer

Virtual memory is hard drive space that is reserved by the operating system to extend the available memory beyond the physical RAM. It allows the execution of larger applications or multiple applications simultaneously.

Step 6

Which software implements and manages virtual memory in a computer system?

97%

121 rated

Answer

The Operating System (OS) implements and manages virtual memory.

Step 7

How can the use of virtual memory be limited?

96%

114 rated

Answer

The use of virtual memory can be limited by:

  1. Adding more RAM to the system.
  2. Closing applications that are not in use.

Step 8

Distinguish between the results when a file is compressed using lossless compression and lossy compression.

99%

104 rated

Answer

Lossless compression ensures that no data is lost during the compression process, making it possible to restore the original file exactly. In contrast, lossy compression may lose some insignificant data, resulting in a file that cannot be restored to its original form.

Step 9

Explain what a protocol is.

96%

101 rated

Answer

A protocol is a set of rules for transmission of data across a network. It encompasses procedures for encoding and decoding data, ensuring reliable communication between devices.

Step 10

What is the SMT protocol used for?

98%

120 rated

Answer

The SMT protocol is used for sending e-mails across the Internet.

Step 11

What is a distributed database?

97%

117 rated

Answer

A distributed database is a system where parts of a database are spread over multiple servers located in different geographic locations, allowing for improved efficiency and reliability.

Step 12

State TWO advantages of using a distributed database.

97%

121 rated

Answer

  1. Eliminates congestion on a single server, allowing for a larger number of simultaneous users.
  2. If one server fails, other databases can still be accessed, ensuring lower risk of data loss.

Step 13

Briefly describe the main feature of Web 1.0.

96%

114 rated

Answer

The main feature of Web 1.0 is that it consists mainly of static web pages. Users have limited interaction, primarily consuming content rather than engaging with it.

Step 14

Explain why Web 3.0 is referred to as the Semantic Web.

99%

104 rated

Answer

Web 3.0 is referred to as the Semantic Web because it aims to make Internet data machine-readable, allowing for more intelligent searches and better user personalization, enabling computers and users to understand information more effectively.

Step 15

What is this feature called?

96%

101 rated

Answer

This feature is called interoperability, allowing devices to communicate effectively with one another.

Step 16

What is a webinar?

98%

120 rated

Answer

A webinar is an online seminar that allows participants to engage in discussions, presentations, or training sessions through the internet.

Step 17

State ONE way in which the staff member may benefit from signing up for the webinar.

97%

117 rated

Answer

One way the staff member may benefit is by expanding their knowledge base through access to educational content and expert speakers.

Step 18

What does the acronym SaaS stand for?

97%

121 rated

Answer

SaaS stands for Software as a Service.

Step 19

Explain how cloud applications work in general.

96%

114 rated

Answer

Cloud applications operate by running on remote servers rather than local devices. Users access these applications over the Internet through web browsers or apps, which means that most processing is done in the cloud, reducing the strain on local resources.

Step 20

State TWO disadvantages of using online software services.

99%

104 rated

Answer

  1. Software is not owned by the user; they must subscribe and pay to use it.
  2. If the cloud service goes down, users cannot access their documents or services.

Step 21

Explain what an RSS service is.

96%

101 rated

Answer

An RSS service is a web or news feed that provides automatic updates to users, allowing them to receive new content without manually checking websites.

Step 22

Suggest TWO ways of using social networking sites responsibly.

98%

120 rated

Answer

  1. Limit time spent online and set notifications for important tasks to avoid distraction.
  2. Avoid sharing personal information that could be misused.

Step 23

Give TWO reasons why cybercrime is prevalent.

97%

117 rated

Answer

  1. Difficulty in tracing the identity of the perpetrator makes online crimes easier to commit.
  2. Increased use of the internet leads to greater opportunities for cybercrime.

Step 24

What term is used to describe this crime?

97%

121 rated

Answer

The term used to describe this crime is 'Piggybacking.'

Step 25

What is a drone?

96%

114 rated

Answer

A drone is a machine that has certain autonomous flight capabilities but can still be controlled by a human.

Step 26

State TWO possible benefits of using a 3D printer for printing the parts of the drone.

99%

104 rated

Answer

  1. Parts can be designed and printed quickly, allowing for rapid prototyping and adjustments.
  2. Reduces costs by minimizing materials wasted compared to traditional manufacturing processes.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;