SECTION A: SHORT QUESTIONS
QUESTION 1
Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2
Question 1
SECTION A: SHORT QUESTIONS
QUESTION 1
Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A t... show full transcript
Worked Solution & Example Answer:SECTION A: SHORT QUESTIONS
QUESTION 1
Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2
Step 1
The most common protocol used to send e-mail is known as …
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The most common protocol used to send e-mail is SMTP (Simple Mail Transfer Protocol). Therefore, the answer is C.
Step 2
Which ONE of the following refers to an encryption process used to authenticate the identity of the sender of an e-mail message?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct term for an encryption process that authenticates the identity of the sender of an e-mail message is a Digital certificate. Therefore, the answer is D.
Step 3
Which ONE of the following refers to a data structure that is non-volatile?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A data structure that is non-volatile is a Text file. Non-volatile means that the data is not lost when power is removed. Thus, the answer is D.
Step 4
Which of the above assignment statements will cause a compilation/syntax error?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The assignment statements (ii) K := R + 2; and (ii) R := K div 5; will cause a compilation/syntax error because R is not yet initialized as an integer type. Thus, the answer is D.
Step 5
Determine the value of sAnswer after the execution of the statements below.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
After executing the statements, sAnswer will contain 'nfoT'. The insert operation places 'T' in the second position of 'nfo', leading to the value 'nfoT'. Therefore, the answer is A.
Step 6
Give ONE word/term for each of the following descriptions. 1.3.1
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term for web applications designed to deliver desktop functions online is Rich Internet Applications (RIA).
Step 7
Give ONE word/term for each of the following descriptions. 1.3.2
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of information system that gathers and analyzes data is known as a Decision Support System (DSS).
Step 8
Give ONE word/term for each of the following descriptions. 1.3.3
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Downloaded software that bombards the user with advertisements is referred to as Adware.
Step 9
Give ONE word/term for each of the following descriptions. 1.3.4
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A remotely controlled network of zombie computers is called a Botnet.
Step 10
Give ONE word/term for each of the following descriptions. 1.3.5
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A type of memory that stores the BIOS settings is known as CMOS (Complementary Metal-Oxide-Semiconductor).
Step 11
Give ONE word/term for each of the following descriptions. 1.3.6
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The process of testing the accuracy of captured data is referred to as Data verification.
Step 12
Give ONE word/term for each of the following descriptions. 1.3.7
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A person who gains unauthorized access to data to steal information is known as a Black hat hacker/cracker.
Step 13
Give ONE word/term for each of the following descriptions. 1.3.8
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Specialized hardware and software designed to be used at till points is called Point of Sale (POS) system.
Step 14
Give ONE word/term for each of the following descriptions. 1.3.9
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
E-mail sent to people that advertise unrelated products is referred to as Spam.