Photo AI

6.1 One of the players sent an e-mail with the following e-mail address to the organisers: schoolgaming@windermere.co.za 6.1.1 State the domain name of the e-mail - NSC Information Technology - Question 6 - 2017 - Paper 2

Question icon

Question 6

6.1-One-of-the-players-sent-an-e-mail-with-the-following-e-mail-address-to-the-organisers:--schoolgaming@windermere.co.za--6.1.1-State-the-domain-name-of-the-e-mail-NSC Information Technology-Question 6-2017-Paper 2.png

6.1 One of the players sent an e-mail with the following e-mail address to the organisers: schoolgaming@windermere.co.za 6.1.1 State the domain name of the e-mail.... show full transcript

Worked Solution & Example Answer:6.1 One of the players sent an e-mail with the following e-mail address to the organisers: schoolgaming@windermere.co.za 6.1.1 State the domain name of the e-mail - NSC Information Technology - Question 6 - 2017 - Paper 2

Step 1

6.1.1 State the domain name of the e-mail.

96%

114 rated

Answer

The domain name of the e-mail address is windermere.co.za.

Step 2

6.1.2 Name the e-mail recipients below that will not be disclosed in the e-mail to others.

99%

104 rated

Answer

The e-mail recipients that will not be disclosed are:

  • FROM: Alexander Xavier
  • CC: Peter Jegs, Adam O’s, Brian Porter
  • TO: Martin Maverick
  • BCC: Marlene Heyns, Kerry Mansen

Step 3

6.1.3 What is the general name of malware that refers to the forging of an e-mail header, so that the e-mail appears to originate from a different source?

96%

101 rated

Answer

This type of malware is generally referred to as spoofing.

Step 4

6.2.1 Explain what is meant by SSL.

98%

120 rated

Answer

SSL, or Secure Sockets Layer, is an encryption protocol that secures the transmission of sensitive data over the Internet. It establishes an encrypted link between a web server and a browser.

Step 5

6.2.2 State TWO pieces of information that can be found on a digital certificate.

97%

117 rated

Answer

Two pieces of information that can be found on a digital certificate are:

  1. Identification information of the user
  2. Identification details of the website used.

Step 6

6.3.1 Explain what is meant by archiving files.

97%

121 rated

Answer

Archiving files involves compressing and moving files that are no longer actively used to another storage area, thus freeing up disk space. The original files may be deleted to create more space.

Step 7

6.3.2 Will more disk space be saved if archived files are moved from a physical server to a virtual server? Motivate your answer.

96%

114 rated

Answer

No, moving to a virtual server will not save space. While virtual servers have their own resources, they utilize resources from the physical server. Therefore, the total storage capacity remains the same.

Step 8

6.4.1 Explain what can be done to save bandwidth while streaming.

99%

104 rated

Answer

To save bandwidth while streaming, users can adjust the settings of their applications or devices to lower the quality of the stream. This lessens the amount of data being transmitted.

Step 9

6.4.2 Explain how a firewall could be used to restrict websites.

96%

101 rated

Answer

A firewall can be configured to allow only specific or authorized incoming and outgoing traffic. By blocking unauthorized traffic, it effectively restricts access to certain websites.

Step 10

6.4.3 Why is it usually quicker to use BitTorrent protocol?

98%

120 rated

Answer

Using BitTorrent allows parts of a file to be downloaded from multiple clients simultaneously, thereby increasing download speeds compared to direct downloads from a single server.

Step 11

6.4.4 Is this statement true? Motivate your answer.

97%

117 rated

Answer

The statement is false. BitTorrent is a legitimate protocol for sharing files; however, users must be cautious and ensure they do not download illegal software.

Step 12

6.5.1 Explain what near field communication (NFC) means.

97%

121 rated

Answer

NFC refers to a set of communication standards that enable devices to exchange data over short distances, typically a few centimeters, allowing for peer-to-peer interactions.

Step 13

6.5.2 What is this communication standard called?

96%

114 rated

Answer

The communication standard from which NFC originated is called RFID (Radio Frequency Identification).

Step 14

6.6.1 Motivate why the same application needs to be programmed differently for different operating systems.

99%

104 rated

Answer

Applications need to consider the distinct architecture and features of each operating system, ensuring compatibility and optimal functionality. Each system has its unique APIs and user interfaces.

Step 15

6.6.2 Use an example to explain the concept of backward compatibility.

96%

101 rated

Answer

Backward compatibility allows software designed for older versions of an operating system to function on newer versions. For instance, a game designed for Windows 7 should also run on Windows 10.

Step 16

6.7.1 Why is scalability important?

98%

120 rated

Answer

Scalability is crucial in online games as it ensures that the server can accommodate an increasing number of players without affecting performance or gameplay experience.

Step 17

6.7.2 Why will security be a challenge for a peer-to-peer network?

97%

117 rated

Answer

Security poses a challenge in peer-to-peer networks due to the decentralized nature, making it harder to implement consistent security measures and protect against unauthorized access.

Step 18

6.8.1 Briefly explain what an app is.

97%

121 rated

Answer

An app is a program designed to perform specific tasks on mobile devices, enhancing user convenience and accessibility.

Step 19

6.8.2 Give TWO reasons why gamers might prefer to use an app.

96%

114 rated

Answer

Gamers might prefer an app because:

  1. They can register from anywhere using a mobile device, providing immediate access.
  2. Apps can send notifications, keeping users updated in real-time.

Step 20

6.9 Explain what firmware is.

99%

104 rated

Answer

Firmware is software that is permanently installed on a device's ROM chip, providing low-level control for the device's specific hardware.

Step 21

6.9.2(a) Explain what a plug-in is.

96%

101 rated

Answer

A plug-in is software that adds specific features or functionality to an existing application, enabling enhanced capabilities.

Step 22

6.9.2(b) How does the fact that the headset supports plug-ins benefit the gamer?

98%

120 rated

Answer

The support for plug-ins allows gamers to easily add games or applications that enhance their experience or provide additional functionalities, such as multimedia support.

Step 23

6.9.3 Name TWO possible types of sensors found on gaming devices.

97%

117 rated

Answer

Two types of sensors typically found in gaming devices are:

  1. Motion sensors
  2. Light sensors

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;