Photo AI

Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2016 - Paper 2

Question icon

Question 1

Various-options-are-provided-as-possible-answers-to-the-following-questions-NSC Information Technology-Question 1-2016-Paper 2.png

Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question number (1.1–1.5) ... show full transcript

Worked Solution & Example Answer:Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2016 - Paper 2

Step 1

1.1.1 A file with a .dll extension is …

96%

114 rated

Answer

A file with a .dll extension is a dynamic link library file (B). Dynamic link libraries contain code and data that multiple programs can use simultaneously, improving modularity and reducing memory usage.

Step 2

1.1.2 … is a protocol used to retrieve messages on an Internet/Intranet e-mail server.

99%

104 rated

Answer

The protocol used to retrieve messages from an e-mail server is POP3 (A). This protocol allows clients to download emails from the server.

Step 3

1.1.3 A 64-bit processor refers to the …

96%

101 rated

Answer

A 64-bit processor refers to the number of basic instructions the processor can recognise (B). It indicates the processor's ability to handle data and memory addresses, contributing to performance.

Step 4

1.1.4 The licence under which most freeware is distributed is known as …

98%

120 rated

Answer

The licence under which most freeware is distributed is known as EULA (A), which stands for End User License Agreement, outlining how the software can be used.

Step 5

1.1.5 Working away from the company's standard workplace and using the Internet to communicate with the office is known as …

97%

117 rated

Answer

This practice is known as telecommuting (A). Telecommuting allows employees to work remotely while maintaining communication with their office via the internet.

Step 6

1.2.1 A text file which stores customised settings for a website on your local computer.

97%

121 rated

Answer

The term is 'configuration file'. This file contains settings specific to a user's local environment.

Step 7

1.2.2 A technology that automates the configuration process of a device before it can be used.

96%

114 rated

Answer

The term is 'plug and play'. It refers to the technology that enables automatic detection of hardware components.

Step 8

1.2.3 A general term for conning techniques used to make electronic communication appear to originate from a legitimate source.

99%

104 rated

Answer

The term is 'phishing'. Phishing is a fraudulent technique aimed at obtaining sensitive information.

Step 9

1.2.4 A practice where queries are entered in data fields which then allow unauthorised access to the database.

96%

101 rated

Answer

The term is 'SQL injection'. This is a technique used to exploit vulnerabilities in a database.

Step 10

1.2.5 The immediate and real-time delivery of media content to a receiving device over the Internet starting from the time the media file is opened.

98%

120 rated

Answer

The term is 'streaming'. Streaming refers to the continuous delivery of content over the internet.

Step 11

1.2.6 Simulation of human decision-making processes by a computer system that is programmed to react on the basis of input from sensors.

97%

117 rated

Answer

The term is 'machine learning'. This involves algorithms that learn from data to make decisions.

Step 12

1.2.7 A type of search that is managed by humans rather than by reliance on algorithms.

97%

121 rated

Answer

The term is 'manual search'. This refers to human-powered searches for information.

Step 13

1.2.8 The general term for software that allows you to work with electronic databases.

96%

114 rated

Answer

The term is 'database management system (DBMS)'. It provides tools for data manipulation and retrieval.

Step 14

1.2.9 A type of website that displays the same information to the user.

99%

104 rated

Answer

The term is 'static website'. A static website contains fixed content.

Step 15

1.2.10 local area network in which resources are shared among workstations without using a dedicated server.

96%

101 rated

Answer

The term is 'peer-to-peer network'. It allows direct file sharing between computers.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;