Photo AI

1.1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2024 - Paper 2

Question icon

Question 1

1.1-Various-options-are-provided-as-possible-answers-to-the-following-questions-NSC Information Technology-Question 1-2024-Paper 2.png

1.1 Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question numbers (1.1.... show full transcript

Worked Solution & Example Answer:1.1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2024 - Paper 2

Step 1

1.1.1 A storage device that typically uses flash memory to store data, instructions and information:

96%

114 rated

Answer

B. Solid-state drive

Step 2

1.1.2 A text-based name that is linked to the IP address of the server that hosts a website:

99%

104 rated

Answer

C. URL

Step 3

1.1.3 A data structure that allows for the permanent storage of information:

96%

101 rated

Answer

A. Text file

Step 4

1.1.4 What will be the value of X if the following code is executed?

98%

120 rated

Answer

B. 12

Step 5

1.1.5 A ... is a web service that allows users to post short text messages, usually containing between 100 and 200 characters:

97%

117 rated

Answer

C. Microblog

Step 6

1.1.6 A process whereby an infected file is isolated on the hard drive until the infection can be removed:

97%

121 rated

Answer

B. Quarantine

Step 7

1.1.7 A type of mobile application that overlays media or information, over an image on the screen:

96%

114 rated

Answer

C. Augmented reality

Step 8

1.1.8 A small amount of purpose-specific memory inside a processor:

99%

104 rated

Answer

A. Register

Step 9

1.1.9 Software that is permanently stored onto a ROM chip:

96%

101 rated

Answer

C. Firmware

Step 10

1.1.10 Which ONE of the following data types is an ordinal data type?

98%

120 rated

Answer

C. Character

Step 11

1.2.1 A compromised computer or device whose owner is unaware that the computer or device is being controlled remotely by malware.

97%

117 rated

Answer

Zombie / Bot

Step 12

1.2.2 A processing model that consists of software components running on multiple computers but working as a single, powerful system.

97%

121 rated

Answer

Distributed computing

Step 13

1.2.3 A data-searching technique which interprets the intent and contextual meaning behind search phrases to derive more relevant results.

96%

114 rated

Answer

Semantic search

Step 14

1.2.4 A field in a table that can contain duplicate values and is linked to the primary-key field of another table.

99%

104 rated

Answer

Foreign key

Step 15

1.2.5 A process that was designed to own a web-based e-mail functionality where a receiver only downloads e-mails from a server to a client.

96%

101 rated

Answer

POP or POP3

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;