Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2021 - Paper 2
Question 1
Various options are given as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question numbers (1.1 to 1.10... show full transcript
Worked Solution & Example Answer:Various options are given as possible answers to the following questions - NSC Computer Application Technology - Question 1 - 2021 - Paper 2
Step 1
1.1 Which ONE of the following options allows for data to become useful information?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is B: Processing, as it transforms raw data into meaningful information.
Step 2
1.2 ... is an online income tax return service provided by the South African government to its citizens.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is A: e-Filing. This service allows citizens to submit their tax returns online.
Step 3
1.3 A computer connected to the internet that has been compromised by a hacker is known as a ...
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is C: zombie, which refers to a computer that is under the control of a hacker.
Step 4
1.4 Which ONE of the following words would return a result of 4 when used with the LEN function in a spreadsheet?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is B: Text string, as the LEN function counts the number of characters in a text.
Step 5
1.5 Which ONE of the following options is NOT a function of the operating system?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is B: Provides cloud storage, as managing storage is not a direct function of an operating system.
Step 6
1.6 ... technology can assist game rangers to monitor and detect poaching activities.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is D: Drone, which is often used for surveillance and monitoring.
Step 7
1.7 The ... attribute in HTML specifies the distance between the border of a table cell and the text in the cell.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is A: cellpadding, which sets the space between cell borders and cell content.
Step 8
1.8 The date and time when a photo was taken can be found in the ... of the photo.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is B: metadata, which includes information about the image, such as date and time.
Step 9
1.9 ... uses special high-speed memory to store data that is frequently used to improve computer performance.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is A: Syncing, as it helps in keeping data updated in special memory for efficiency.
Step 10
1.10 Which communication technology enables a person to tap his/her bank card on a device to pay?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct option is C: NFC (Near Field Communication), which allows for contactless payments.