Photo AI

1.1.1 The protocol that defines how webpages and their content are transferred across the Web 1.1.2 A collection of 8 bits 1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes 1.1.4 An update that can be downloaded to fix a specific bug in software 1.1.5 The electronic equivalent to junk mail 1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program 1.1.7 The layout of the physical connection of the computers in a network 1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone - NSC Information Technology - Question 1 - 2017 - Paper 2

Question icon

Question 1

1.1.1-The-protocol-that-defines-how-webpages-and-their-content-are-transferred-across-the-Web-1.1.2-A-collection-of-8-bits-1.1.3-Collection-of-programs-designed-to-use-administrator-rights-to-gain-control-of-a-computer-for-dangerous-purposes-1.1.4-An-update-that-can-be-downloaded-to-fix-a-specific-bug-in-software-1.1.5-The-electronic-equivalent-to-junk-mail-1.1.6-A-part-of-a-larger-program-that-runs-independently-but-simultaneously-with-other-parts-of-the-same-program-1.1.7-The-layout-of-the-physical-connection-of-the-computers-in-a-network-1.1.8-The-posting-of-short-text-entries-(140-characters-or-less)-usually-via-a-cellphone-or-smartphone-NSC Information Technology-Question 1-2017-Paper 2.png

1.1.1 The protocol that defines how webpages and their content are transferred across the Web 1.1.2 A collection of 8 bits 1.1.3 Collection of programs designed to u... show full transcript

Worked Solution & Example Answer:1.1.1 The protocol that defines how webpages and their content are transferred across the Web 1.1.2 A collection of 8 bits 1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes 1.1.4 An update that can be downloaded to fix a specific bug in software 1.1.5 The electronic equivalent to junk mail 1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program 1.1.7 The layout of the physical connection of the computers in a network 1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone - NSC Information Technology - Question 1 - 2017 - Paper 2

Step 1

1.1.1 The protocol that defines how webpages and their content are transferred across the Web

96%

114 rated

Answer

HTTP

Step 2

1.1.2 A collection of 8 bits

99%

104 rated

Answer

Byte

Step 3

1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes

96%

101 rated

Answer

Rootkit

Step 4

1.1.4 An update that can be downloaded to fix a specific bug in software

98%

120 rated

Answer

Patch

Step 5

1.1.5 The electronic equivalent to junk mail

97%

117 rated

Answer

SPAM

Step 6

1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program

97%

121 rated

Answer

Thread (Accept multithreading)

Step 7

1.1.7 The layout of the physical connection of the computers in a network

96%

114 rated

Answer

Topology

Step 8

1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone.

99%

104 rated

Answer

Microblogging (Accept tweeting)

Step 9

1.1.9 The latest generation of cellular communication technology

96%

101 rated

Answer

4G/LTE

Step 10

1.1.10 The total amount of data that can be transferred from one point to another in a given period of time

98%

120 rated

Answer

Bandwidth

Step 11

1.2.1 Copyright law is NOT broken when you ...

97%

117 rated

Answer

D. copy your own CD to play on your mp3 player.

Step 12

1.2.2 An algorithm is ...

97%

121 rated

Answer

B. a sequence of logical steps that will solve a problem.

Step 13

1.2.3 A cookie is a(n) ...

96%

114 rated

Answer

C. text file that stores information relating to websites.

Step 14

1.2.4 Which ONE of the following refers to an encryption process used to authenticate the identity of the sender of an e-mail message?

99%

104 rated

Answer

D. Digital signature

Step 15

1.2.5 Which ONE of the following is NOT a suitable application of Bluetooth technology?

96%

101 rated

Answer

B. Wireless communication between PCs in different rooms.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;