6.1 One of the players sent an e-mail with the following e-mail address to the organisers:
schoolgaming@windermere.co.za
6.1.1 State the domain name of the e-mail - NSC Information Technology - Question 6 - 2017 - Paper 2
Question 6
6.1 One of the players sent an e-mail with the following e-mail address to the organisers:
schoolgaming@windermere.co.za
6.1.1 State the domain name of the e-mail.... show full transcript
Worked Solution & Example Answer:6.1 One of the players sent an e-mail with the following e-mail address to the organisers:
schoolgaming@windermere.co.za
6.1.1 State the domain name of the e-mail - NSC Information Technology - Question 6 - 2017 - Paper 2
Step 1
6.1.1 State the domain name of the e-mail.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The domain name of the e-mail address is windermere.co.za.
Step 2
6.1.2 Name the e-mail recipients below that will not be disclosed in the e-mail to others.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The e-mail recipients that will not be disclosed are:
FROM: Alexander Xavier
CC: Peter Jegs, Adam O’s, Brian Porter
TO: Martin Maverick
BCC: Marlene Heyns, Kerry Mansen
Step 3
6.1.3 What is the general name of malware that refers to the forging of an e-mail header, so that the e-mail appears to originate from a different source?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This type of malware is generally referred to as spoofing.
Step 4
6.2.1 Explain what is meant by SSL.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SSL, or Secure Sockets Layer, is an encryption protocol that secures the transmission of sensitive data over the Internet. It establishes an encrypted link between a web server and a browser.
Step 5
6.2.2 State TWO pieces of information that can be found on a digital certificate.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two pieces of information that can be found on a digital certificate are:
Identification information of the user
Identification details of the website used.
Step 6
6.3.1 Explain what is meant by archiving files.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Archiving files involves compressing and moving files that are no longer actively used to another storage area, thus freeing up disk space. The original files may be deleted to create more space.
Step 7
6.3.2 Will more disk space be saved if archived files are moved from a physical server to a virtual server? Motivate your answer.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
No, moving to a virtual server will not save space. While virtual servers have their own resources, they utilize resources from the physical server. Therefore, the total storage capacity remains the same.
Step 8
6.4.1 Explain what can be done to save bandwidth while streaming.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To save bandwidth while streaming, users can adjust the settings of their applications or devices to lower the quality of the stream. This lessens the amount of data being transmitted.
Step 9
6.4.2 Explain how a firewall could be used to restrict websites.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A firewall can be configured to allow only specific or authorized incoming and outgoing traffic. By blocking unauthorized traffic, it effectively restricts access to certain websites.
Step 10
6.4.3 Why is it usually quicker to use BitTorrent protocol?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Using BitTorrent allows parts of a file to be downloaded from multiple clients simultaneously, thereby increasing download speeds compared to direct downloads from a single server.
Step 11
6.4.4 Is this statement true? Motivate your answer.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The statement is false. BitTorrent is a legitimate protocol for sharing files; however, users must be cautious and ensure they do not download illegal software.
Step 12
6.5.1 Explain what near field communication (NFC) means.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
NFC refers to a set of communication standards that enable devices to exchange data over short distances, typically a few centimeters, allowing for peer-to-peer interactions.
Step 13
6.5.2 What is this communication standard called?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The communication standard from which NFC originated is called RFID (Radio Frequency Identification).
Step 14
6.6.1 Motivate why the same application needs to be programmed differently for different operating systems.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Applications need to consider the distinct architecture and features of each operating system, ensuring compatibility and optimal functionality. Each system has its unique APIs and user interfaces.
Step 15
6.6.2 Use an example to explain the concept of backward compatibility.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Backward compatibility allows software designed for older versions of an operating system to function on newer versions. For instance, a game designed for Windows 7 should also run on Windows 10.
Step 16
6.7.1 Why is scalability important?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Scalability is crucial in online games as it ensures that the server can accommodate an increasing number of players without affecting performance or gameplay experience.
Step 17
6.7.2 Why will security be a challenge for a peer-to-peer network?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Security poses a challenge in peer-to-peer networks due to the decentralized nature, making it harder to implement consistent security measures and protect against unauthorized access.
Step 18
6.8.1 Briefly explain what an app is.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An app is a program designed to perform specific tasks on mobile devices, enhancing user convenience and accessibility.
Step 19
6.8.2 Give TWO reasons why gamers might prefer to use an app.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Gamers might prefer an app because:
They can register from anywhere using a mobile device, providing immediate access.
Apps can send notifications, keeping users updated in real-time.
Step 20
6.9 Explain what firmware is.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Firmware is software that is permanently installed on a device's ROM chip, providing low-level control for the device's specific hardware.
Step 21
6.9.2(a) Explain what a plug-in is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A plug-in is software that adds specific features or functionality to an existing application, enabling enhanced capabilities.
Step 22
6.9.2(b) How does the fact that the headset supports plug-ins benefit the gamer?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The support for plug-ins allows gamers to easily add games or applications that enhance their experience or provide additional functionalities, such as multimedia support.
Step 23
6.9.3 Name TWO possible types of sensors found on gaming devices.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two types of sensors typically found in gaming devices are: