The organisers of the Idols competition will be responsible for the accuracy of all information, as well as to create surveys - NSC Computer Application Technology - Question 10 - 2017 - Paper 2
Question 10
The organisers of the Idols competition will be responsible for the accuracy of all information, as well as to create surveys.
10.1 Explain the difference between a... show full transcript
Worked Solution & Example Answer:The organisers of the Idols competition will be responsible for the accuracy of all information, as well as to create surveys - NSC Computer Application Technology - Question 10 - 2017 - Paper 2
Step 1
10.1 Explain the difference between a survey and an interview.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A survey is a set of written or typed questions given to many or a group of people, typically used to gather data. In contrast, an interview is a verbal interaction where questions are posed to one person, allowing for in-depth responses.
Step 2
10.2 Give TWO reasons why one should always check the reliability and accuracy of information found on the Internet.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
There are no outside checks concerning what is posted on the Internet, which might result in incorrect information.
Information may be outdated or may present bias, misleading the reader.
Step 3
10.3 Explain what information overload is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Information overload occurs when individuals are unable to process the vast amount of information they are exposed to, leading to confusion and difficulty in decision-making.
Step 4
10.4 Which social networking service is associated with the term 'hash-tags'?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Twitter is the social networking service primarily associated with the use of 'hash-tags'.
Step 5
10.5.1 What general name is given to this kind of scam?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Phishing
Step 6
10.5.2 Should the organiser click on the link? Motivate your answer by explaining what would happen if he did.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
No, he should not click on the link. If he does, he might be directed to a fraudulent website that mimics the real banking site, where he would be prompted to enter sensitive information such as his username and password, compromising his security.
Step 7
10.5.3 What is the generic name given to techniques that rely on convincing people to give out information or to grant access by pretending to be someone who has the right to access this information?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Social engineering.
Step 8
10.5.4 Banks offer their online banking clients peace of mind by providing a number of security measures designed to make online banking as safe as possible. Give TWO of these measures, besides the use of encryption.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Logon passwords or PIN codes.
One-time passwords sent via e-mail or text message for e-banking sessions.
Step 9
10.5.5 Briefly explain what a computer virus is by referring to TWO of its general aims in your answer.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A computer virus is malicious software designed to disrupt a user's computer operations. Two of its aims include causing damage to data or programs and creating a bot to carry out tasks without the user's consent.
Step 10
10.5.6 What is a Trojan?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Trojan is a type of malware that disguises itself as a legitimate program. Its aim is to create security loopholes for further malicious attacks on a computer.
Step 11
10.6.1 The horizontal line is not displayed.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To correct the horizontal line not displaying, ensure the <hr /> tag is correctly placed in the HTML code where a line is intended.
Step 12
10.6.2 The heading 'DATES FOR THE IDOLS AUDITIONS' should be smaller.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Modify the heading by using smaller heading tags like <h2> or <h3> instead of <h1>.
Step 13
10.6.3 The text 'Auditions kick off in Cape Town!' should be displayed in red font, but it is displayed in black.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Change the font color of the text to red by using the style attribute or by applying</font> tag with the correct color specification.
Step 14
10.7.1 Study the screenshot below and name the data type that should be used for the Specifications field to enter a variety of text.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Short Text.
Step 15
10.7.2 Why is the AutoNumber data type always suitable to use for a primary key field?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The AutoNumber data type automatically generates unique values which are essential for identifying each record in a database.