Photo AI

An example of a popular, free, online office suite - NSC Computer Application Technology - Question 2 - 2016 - Paper 2

Question icon

Question 2

An-example-of-a-popular,-free,-online-office-suite----NSC Computer Application Technology-Question 2-2016-Paper 2.png

An example of a popular, free, online office suite

Worked Solution & Example Answer:An example of a popular, free, online office suite - NSC Computer Application Technology - Question 2 - 2016 - Paper 2

Step 1

A function that can be used as an alternative to the RIGHT and/or LEFT spreadsheet function

96%

114 rated

Answer

The function that can serve as an alternative to the RIGHT and LEFT functions in spreadsheets is the MID function. This function allows you to extract a substring from a string, using specified starting positions and lengths.

Step 2

The general class of software under which Trojans and worms fall

99%

104 rated

Answer

Trojans and worms fall under the category of malware. This general class of software is designed to cause harm to computers or networks.

Step 3

A website that documents a person's life, opinions and interest in the form of videos

96%

101 rated

Answer

A website that fulfills this purpose is commonly recognized as a vlog, where users create video content to share their experiences and viewpoints.

Step 4

A word processing feature showing each user's contributions or alterations to the content of a shared document

98%

120 rated

Answer

This feature is known as 'track changes'. It allows users to see edits made by different individuals in collaborative documents.

Step 5

A device that can be used to store data permanently

97%

117 rated

Answer

A device suitable for permanent data storage includes a Solid State Drive (SSD) or a Hard Disk Drive (HDD). These devices retain information even when powered off.

Step 6

A potential social problem associated with social networking websites

97%

121 rated

Answer

One significant social problem linked to social networking sites is cyberbullying. This phenomenon involves the use of electronic communication to intimidate or harass individuals, and can have serious emotional consequences.

Step 7

The process where users are redirected to a different website than the one whose address they entered in the web browser

96%

114 rated

Answer

This practice is often referred to as phishing. It is a malicious tactic used to deceive users into disclosing sensitive information by redirecting them to fraudulent sites.

Step 8

The unit in which the quality of printing is measured

99%

104 rated

Answer

The quality of printing is typically measured in DPI, which stands for Dots Per Inch. This metric indicates the resolution of printed images.

Step 9

A database design feature that creates a list of options for the user to choose from when entering data in a field

96%

101 rated

Answer

This design feature is known as a lookup wizard. It facilitates user interaction by providing predefined options, enhancing data entry efficiency.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;