Photo AI

QUESTION 1: MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2024 - Paper 2

Question icon

Question 1

QUESTION-1:-MULTIPLE-CHOICE-QUESTIONS--Various-options-are-given-as-possible-answers-to-the-following-questions-NSC Computer Application Technology-Question 1-2024-Paper 2.png

QUESTION 1: MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the following questions. Choose the answer and write only the letter (A–D) ne... show full transcript

Worked Solution & Example Answer:QUESTION 1: MULTIPLE-CHOICE QUESTIONS Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2024 - Paper 2

Step 1

1.1 Which type of chart is recommended to illustrate a trend over a period of time?

96%

114 rated

Answer

The recommended chart type to illustrate a trend over a period of time is a Line chart (B). Line charts effectively display continuous data over time.

Step 2

1.2 Combining multiple technologies into a single device is known as …

99%

104 rated

Answer

This process is known as convergence (B). Convergence allows different technologies to interoperate within a single device.

Step 3

1.3 A printer that can copy and scan is an example of a(n) … device.

96%

101 rated

Answer

Multifunctional (A) devices are capable of performing more than one function, such as printing, scanning, and copying.

Step 4

1.4 This step of the information cycle can only take place after the data and instructions are in the RAM of the device:

98%

120 rated

Answer

The correct step is Processing (D). Processing occurs once data is loaded into the device's RAM for execution.

Step 5

1.5 NFC cannot be used for …

97%

117 rated

Answer

NFC (Near Field Communication) cannot be used for unlocking your car doors (A). It is primarily used for contactless payment and data sharing.

Step 6

1.6 The process of tricking users into following a hidden link on a web page is known as …

97%

121 rated

Answer

This process is known as spoofing (B). Spoofing deceives users into clicking on malicious links.

Step 7

1.7 A trend whereby objects and devices are connected to each other via the internet:

96%

114 rated

Answer

This trend is known as IoT (C), which stands for the Internet of Things, allowing devices to communicate over the internet.

Step 8

1.8 When an internet service is given a higher priority than other services, it is called …

99%

104 rated

Answer

This is referred to as bandwidth (D), which is allocated differently based on service priority.

Step 9

1.9 A/N … is normally the last step in a two-factor (two-step) authentication.

96%

101 rated

Answer

The answer is validation text (B), which is typically sent as a text message for authentication.

Step 10

1.10 Which word processing feature cannot be used to make multiple changes at the same time, when formatting a document?

98%

120 rated

Answer

The feature that cannot be used for simultaneous changes is Find and Replace (B), which is designed for searching and replacing specific text.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;