Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2016 - Paper 2
Question 1
Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question number (1.1–1.5) ... show full transcript
Worked Solution & Example Answer:Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2016 - Paper 2
Step 1
1.1.1 A file with a .dll extension is …
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A file with a .dll extension is a dynamic link library file (B). Dynamic link libraries contain code and data that multiple programs can use simultaneously, improving modularity and reducing memory usage.
Step 2
1.1.2 … is a protocol used to retrieve messages on an Internet/Intranet e-mail server.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The protocol used to retrieve messages from an e-mail server is POP3 (A). This protocol allows clients to download emails from the server.
Step 3
1.1.3 A 64-bit processor refers to the …
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A 64-bit processor refers to the number of basic instructions the processor can recognise (B). It indicates the processor's ability to handle data and memory addresses, contributing to performance.
Step 4
1.1.4 The licence under which most freeware is distributed is known as …
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The licence under which most freeware is distributed is known as EULA (A), which stands for End User License Agreement, outlining how the software can be used.
Step 5
1.1.5 Working away from the company's standard workplace and using the Internet to communicate with the office is known as …
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This practice is known as telecommuting (A). Telecommuting allows employees to work remotely while maintaining communication with their office via the internet.
Step 6
1.2.1 A text file which stores customised settings for a website on your local computer.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'configuration file'. This file contains settings specific to a user's local environment.
Step 7
1.2.2 A technology that automates the configuration process of a device before it can be used.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'plug and play'. It refers to the technology that enables automatic detection of hardware components.
Step 8
1.2.3 A general term for conning techniques used to make electronic communication appear to originate from a legitimate source.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'phishing'. Phishing is a fraudulent technique aimed at obtaining sensitive information.
Step 9
1.2.4 A practice where queries are entered in data fields which then allow unauthorised access to the database.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'SQL injection'. This is a technique used to exploit vulnerabilities in a database.
Step 10
1.2.5 The immediate and real-time delivery of media content to a receiving device over the Internet starting from the time the media file is opened.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'streaming'. Streaming refers to the continuous delivery of content over the internet.
Step 11
1.2.6 Simulation of human decision-making processes by a computer system that is programmed to react on the basis of input from sensors.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'machine learning'. This involves algorithms that learn from data to make decisions.
Step 12
1.2.7 A type of search that is managed by humans rather than by reliance on algorithms.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'manual search'. This refers to human-powered searches for information.
Step 13
1.2.8 The general term for software that allows you to work with electronic databases.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'database management system (DBMS)'. It provides tools for data manipulation and retrieval.
Step 14
1.2.9 A type of website that displays the same information to the user.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'static website'. A static website contains fixed content.
Step 15
1.2.10 local area network in which resources are shared among workstations without using a dedicated server.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'peer-to-peer network'. It allows direct file sharing between computers.