1.1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2022 - Paper 2
Question 1
1.1 Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question numbers (1.1.... show full transcript
Worked Solution & Example Answer:1.1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2022 - Paper 2
Step 1
1.1.1 A process where a single program is broken up into multiple parts that can be processed simultaneously and independently:
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
C Multithreading. This option correctly describes a process that allows different parts of a program to run concurrently, making efficient use of the CPU.
Step 2
1.1.2 The following is a type of volatile memory:
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
B Disk cache. This type of memory is used to store frequently accessed data for quick retrieval, and is cleared when the power is off.
Step 3
1.1.3 A ... is a file which includes visual media and is made available for download.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
C Vodcast. This term specifically refers to a video podcast, combining both video and podcasting elements.
Step 4
1.1.4 A programming language used exclusively for manipulating data in a database:
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A SQL. SQL, or Structured Query Language, is specifically designed for managing and manipulating relational databases.
Step 5
1.1.5 Given the following statement:
iAnswer := 12 + 4/2 * (9 MOD 2);
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
B 13. The calculation follows the order of operations, where 4/2 evaluates to 2, and 9 MOD 2 evaluates to 1. Therefore, the expression simplifies to 12 + 2 * 1, resulting in 13.
Step 6
1.2.1 Any activity regarding creating, editing or deleting of data managed by a database management system (DBMS)
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
H Transaction. This refers to any operation that modifies data in a database.
Step 7
1.2.2 A data structure that stores a set of values of the same data type
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
K Array. An array is a data structure that can hold a fixed number of elements of the same type.
Step 8
1.2.3 A method used to bypass the normal authentication procedure on a network in order to obtain unauthorised access
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
J Backdoor. This term refers to a method of bypassing normal authentication measures to gain access.
Step 9
1.2.4 A programming language that can be used to add interactivity to a website
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
I R/Python. Both languages can be used for web interactivity, particularly in data-driven applications.
Step 10
1.2.5 Protection for any published work that helps to prevent that work from being used without permission from the author
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Copyright. Copyright protects the rights of authors over their published work.
Step 11
1.2.6 The process of having sets of the same data file on separate devices automatically being updated to the latest copy
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
O Synchronising. This process keeps files up to date between different storage locations.
Step 12
1.2.7 A program that enables the operating system to control a device
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
E Driver. Drivers allow the OS to communicate with hardware devices.
Step 13
1.2.8 Advanced settings for shared files, used by the server administrator to specify the type of access to the files
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
B User Rights. This refers to the permissions set by admins regarding file access.
Step 14
1.2.9 A field of computer science that usually involves data analytics, machine learning and rule-based decision-making to create the ability of automated decision-making
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D Artificial Intelligence. This field encompasses technologies that enable machines to learn and make decisions.
Step 15
1.2.10 The ability of a system to increase or decrease its resources depending on the number of users
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
C Scalability. Scalability is a key attribute of systems that can adapt to changing loads.