Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2021 - Paper 2
Question 1
Various options are given as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question numbers (1.1 to 1.10... show full transcript
Worked Solution & Example Answer:Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2021 - Paper 2
Step 1
1.1 Which ONE of the following options allows for data to become useful information?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is B. Processing. Processing is essential in transforming raw data into meaningful information.
Step 2
1.2 ... is an online income tax return service provided by the South African government to its citizens.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is A. e-Filing. e-Filing is specifically designed for online tax submissions.
Step 3
1.3 A computer connected to the internet that has been compromised by a hacker is known as a ...
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is C. zombie. A 'zombie' refers to a computer that is controlled by a hacker without the owner's knowledge.
Step 4
1.4 Which ONE of the following words would return a result of 4 when used with the LEN function in a spreadsheet?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is B. Text string. A text string with four characters would return a length of 4.
Step 5
1.5 Which ONE of the following options is NOT a function of the operating system?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is B. Provides cloud storage. While some operating systems may interface with cloud storage, it is not a core function of an OS.
Step 6
1.6 ... technology can assist game rangers to monitor and detect poaching activities.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is D. Drone. Drones are utilized for monitoring wildlife and detecting illegal activities.
Step 7
1.7 The ... attribute in HTML specifies the distance between the border of a table cell and the text in the cell.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is A. cellpadding. This attribute controls the spacing inside the cell.
Step 8
1.8 The date and time when a photo was taken can be found in the ... of the photo.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is B. metadata. Metadata contains information about the photo, including the date and time it was taken.
Step 9
1.9 ... uses special high-speed memory to store data that is frequently used to improve computer performance.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is D. Caching. Caching involves storing frequently accessed data for quick retrieval.
Step 10
1.10 Which communication technology enables a person to tap his/her bank card on a device to pay?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is C. NFC. Near Field Communication (NFC) allows for contactless payments.