Photo AI

6.1 Due to the large funds required up front, the company decides to utilise crowd funding - NSC Information Technology - Question 6 - 2022 - Paper 2

Question icon

Question 6

6.1-Due-to-the-large-funds-required-up-front,-the-company-decides-to-utilise-crowd-funding-NSC Information Technology-Question 6-2022-Paper 2.png

6.1 Due to the large funds required up front, the company decides to utilise crowd funding. 6.1.1 Briefly explain what crowd funding is. 6.1.2 The company also man... show full transcript

Worked Solution & Example Answer:6.1 Due to the large funds required up front, the company decides to utilise crowd funding - NSC Information Technology - Question 6 - 2022 - Paper 2

Step 1

Briefly explain what crowd funding is.

96%

114 rated

Answer

Crowd funding is the practice of funding a project or venture by raising small amounts of money from a large number of people, typically via the internet or social networks.

Step 2

State TWO advantages of using technology to automate the assembly of new vehicles.

99%

104 rated

Answer

  1. Safer work environment due to reduced human error in repetitive tasks.
  2. Increased productivity as technology can operate continuously without fatigue.

Step 3

Explain how a learning algorithm would be used to improve the manufacturing and sales of new vehicles.

96%

101 rated

Answer

A learning algorithm can observe current manufacturing trends and processes, determining which vehicle features are most popular. It creates a set of rules based on this data to optimize production methods and tailor marketing strategies.

Step 4

Expand the acronym RFID.

98%

120 rated

Answer

Radio Frequency Identification.

Step 5

Explain how passive tags, that are used to pay toll fees, work.

97%

117 rated

Answer

Passive tags function by receiving a radio signal from a reader that activates the tag. The tag then transmits its stored information back to the reader, which deducts the toll fee from the user's account.

Step 6

Name the technology that is used to determine the location of a vehicle.

97%

121 rated

Answer

Global Positioning System (GPS).

Step 7

Why will active tags be needed for satellite tracking?

96%

114 rated

Answer

Active tags use an internal battery to continuously transmit signals, providing a more reliable and consistent means of tracking vehicles over long distances.

Step 8

Package A is uncapped. What does this refer to?

99%

104 rated

Answer

Uncapped refers to having no limit on the amount of data that can be used in a month.

Step 9

Why would you install fibre rather than mobile LTE in a home?

96%

101 rated

Answer

Fibre offers faster and more stable internet speeds compared to mobile LTE, making it ideal for activities such as streaming, gaming, and video conferencing.

Step 10

Which hardware device, besides cabling, would you need to connect to the internet using the FTTH service?

98%

120 rated

Answer

A router or ONT (Optical Network Terminal) is required to connect devices to the FTTH service.

Step 11

Will the 70GB Night Surfer Data from package B hold any benefit to the company? Motivate your answer.

97%

117 rated

Answer

Yes, the 70GB Night Surfer Data allows the company to perform data-heavy tasks or updates during off-peak hours, thus reducing costs associated with higher data rates during peak usage.

Step 12

What is a rootkit?

97%

121 rated

Answer

A rootkit is a type of malicious software designed to remotely control a computer without being detected, often giving unauthorized users administrative access.

Step 13

Give ONE simple implication of the rootkit that installed itself on a user’s computer.

96%

114 rated

Answer

It can open the computer up to hacking or unauthorized access, potentially leading to data theft.

Step 14

Define what social engineering entails.

99%

104 rated

Answer

Social engineering involves manipulating individuals into revealing confidential or personal information that can be used for fraudulent purposes.

Step 15

How does antivirus software identify malware?

96%

101 rated

Answer

Antivirus software identifies malware by scanning files for known signatures and behaviors associated with malicious software.

Step 16

State TWO ways in which artificial intelligence can be used when working with big data.

98%

120 rated

Answer

  1. AI can help identify patterns in large datasets quickly and accurately.
  2. AI can automate data processing tasks, which increases efficiency and reduces errors.

Step 17

Differentiate between the duplication model and the partitioning model regarding the storage of data for each branch.

97%

117 rated

Answer

The duplication model stores complete copies of the database at each branch, while the partitioning model only stores the relevant portion of the database for each branch, reducing redundancy.

Step 18

What does the process of purging data in a database involve?

97%

121 rated

Answer

Purging data involves deleting or removing outdated or unnecessary records from the database to maintain its efficiency and performance.

Step 19

Why would records need to be purged?

96%

114 rated

Answer

Records need to be purged to limit the size of the database, ensuring it operates efficiently, and to improve overall database performance.

Step 20

Define the concept of virtualisation.

99%

104 rated

Answer

Virtualisation is the creation of a virtual version of a resource, such as a server or storage device, allowing multiple users to share and use the same physical hardware.

Step 21

Give ONE benefit for the user of virtualisation as used in this context.

96%

101 rated

Answer

One benefit of virtualisation is the convenience of managing multiple operating systems or applications on a single physical machine without the need for additional hardware.

Step 22

Is it compulsory for the company to pay for the additional proprietary operating system installed or can it be used for free? Justify your answer.

98%

120 rated

Answer

Yes, the company must pay for the operating system if it requires specific features that are not available for free versions. This payment ensures access to updates and technical support.

Step 23

Why is it important to frequently change a password?

97%

117 rated

Answer

Frequent password changes enhance security by minimizing the risk of unauthorized access and reducing the chance of password leaks.

Step 24

Give TWO reasons why this example is NOT a strong password.

97%

121 rated

Answer

  1. The password 'mfundi' is too short and lacks complexity. It should be more than 8 characters.
  2. It does not contain a mix of uppercase letters, special characters, or numbers, making it easily guessable.

Step 25

State how Quantum computing can be used in the statistical process of preventing the spread of a virus.

96%

114 rated

Answer

Quantum computing can analyze vast amounts of data quickly, helping researchers model and predict virus spread patterns more accurately.

Step 26

State TWO problems of cloud computing which are solved by the use of Edge computing.

99%

104 rated

Answer

  1. Edge computing reduces latency by processing data closer to the source, improving response times.
  2. It decreases the risk of data loss by allowing local data processing rather than solely relying on remote servers.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;