6.1 An AUP document has been compiled for the library - NSC Information Technology - Question 6 - 2018 - Paper 2
Question 6
6.1 An AUP document has been compiled for the library. One of the points listed in the document states that, where possible, electronic documents should be used inst... show full transcript
Worked Solution & Example Answer:6.1 An AUP document has been compiled for the library - NSC Information Technology - Question 6 - 2018 - Paper 2
Step 1
What does the acronym AUP stand for?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The acronym AUP stands for Acceptable Use Policy.
Step 2
Briefly explain the purpose of having an AUP.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of having an AUP is to provide users with a clear understanding of their rights and responsibilities when using ICT resources and networks. It establishes guidelines for appropriate use to ensure a safe and respectful environment.
Step 3
Explain the concept of file syncing.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
File syncing refers to the process of ensuring that all copies of a file, stored on different devices, are updated and contain the most recent version. This is often achieved through the use of cloud storage services where changes made to a file on one device are automatically reflected on others, thus facilitating collaboration and data integrity.
Step 4
Name TWO skills that a web designer would need when creating a website.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Graphic design skills.
Software programming skills.
Step 5
State TWO factors that a web designer must take into consideration when designing websites to be accessible from mobile devices.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The page must automatically resize for smaller screens.
The website should have a reduced size of image files to ensure quicker loading times.
Step 6
What is metadata?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Metadata is data that provides information about other data. In this context, it refers to additional information that describes the video saved on SSD, such as its format, description, and context.
Step 7
Suggest a suitable format for the compression of videos.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One suitable format for video compression is MPEG-4, which is widely used for its efficiency in maintaining quality while reducing file size.
Step 8
What is a webinar?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A webinar is an online seminar or presentation conducted over the internet. It allows individuals to collaborate, share information, and participate in discussions in real time.
Step 9
How can the students remain informed of changes in the schedules without visiting the website?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Students can remain informed of schedule changes by using suitable applications or services, such as RSS feeds, mobile alerts, or SMS notifications that provide updates directly to their devices.
Step 10
State THREE functions of an operating system.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Provides an interface for users and applications.
Manages processes and tasks, ensuring efficient execution of applications.
Manages memory allocation for running programs.
Step 11
Give ONE reason for using a proprietary operating system rather than an open-source operating system.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One reason for using a proprietary operating system is the availability of technical support and regular updates provided by the company that owns the software, which may not be as reliable with open-source alternatives.
Step 12
Write out the abbreviation RFID.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
RFID stands for Radio Frequency Identification.
Step 13
Explain the difference between a passive RFID tag and an active RFID tag.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A passive RFID tag does not have its own power source and receives power from the RFID reader. In contrast, an active RFID tag has an onboard battery that allows it to transmit signals over longer distances consistently.
Step 14
Give TWO reasons why manual data input (e.g., a person at a keyboard entering data) is one of the last popular data capture techniques.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Manual data input is prone to human errors, such as typos or inconsistent data entry.
It is time-consuming compared to automated data capture methods.
Step 15
What is netiquette?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Netiquette is the set of guidelines and norms governing respectful and appropriate behavior while communicating online, particularly through e-mails or any form of electronic communication.
Step 16
State ONE way in which social networking can impact negatively on cultures around the world.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One way social networking can negatively impact cultures is by promoting the spread of misinformation, which can lead to misunderstandings and conflicts between different cultural groups.
Step 17
Explain what the term encryption means.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Encryption is the process of converting plaintext into coded text using a specific set of rules or algorithms, thereby securing the data from unauthorized access.
Step 18
Explain how public key encryption works.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Public key encryption involves the use of a pair of keys; a public key that is shared openly and a private key that is kept confidential. When a message is sent, it is encrypted using the recipient's public key and can only be decrypted with their private key, ensuring secure communication.
Step 19
What other visual indication is displayed that indicates that the website is secure, besides the yellow lock?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The URL contains 'https://', which indicates that the communication between the user and the website is encrypted.
Step 20
Which TWO pieces of information on the certificate can be used to verify that the website is legitimate?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The certificate is issued by a trusted third-party company, confirming its authenticity.
It is linked to a specific web address, verifying that it is valid for that domain.
Step 21
Explain what social engineering is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Social engineering is the manipulation or tricking of individuals into revealing personal information or performing actions that compromise their security, often by exploiting trust or human psychology.
Step 22
What is a consequence of falling victim to social engineering?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A consequence of falling victim to social engineering can include identity theft or unauthorized access to sensitive information, which can lead to financial loss or damage to personal reputation.
Step 23
Define the term green computing.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Green computing refers to environmentally responsible computing practices, which aim to reduce the overall environmental impact of technology throughout its lifecycle, from design and manufacturing to use and disposal.
Step 24
Suggest any TWO initiatives for the library to implement green computing.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Store records electronically to minimize paper usage.
Encourage staff to turn off computers when not in use to conserve energy.