Photo AI

1.1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2

Question icon

Question 1

1.1-Various-options-are-provided-as-possible-answers-to-the-following-questions-NSC Information Technology-Question 1-2018-Paper 2.png

1.1 Various options are provided as possible answers to the following questions. Choose the answer and write only the letter (A–D) next to the question numbers (1.1.... show full transcript

Worked Solution & Example Answer:1.1 Various options are provided as possible answers to the following questions - NSC Information Technology - Question 1 - 2018 - Paper 2

Step 1

1.1.1 A type of malware that is disguised as a useful program is known as a …

96%

114 rated

Answer

D. trojan horse.

Step 2

1.1.2 Software that may be used for free but with a time and functionality limit:

99%

104 rated

Answer

B. Shareware.

Step 3

1.1.3 Which ONE is NOT a duty of a system analyst?

96%

101 rated

Answer

D. Writes code for the software solution.

Step 4

1.1.4 What will be the value of iAnswer when the following statement is executed?

98%

120 rated

Answer

A. 3.

Step 5

1.1.5 Which formula is represented in the segment of code below?

97%

117 rated

Answer

A. n^p.

Step 6

1.2.1 Part of the ROM where information with regard to the setup of the computer can be saved

97%

121 rated

Answer

CMOS (also accept: BIOS, Firmware).

Step 7

1.2.2 Security based on the measurement and identification of unique physical characteristics of a person, e.g. fingerprints

96%

114 rated

Answer

Biometrics (acceptable examples include Voice recognition, Face/Iris/Fingerprint-scanning).

Step 8

1.2.3 Digital code, attached to an e-mail, used to identify and validate the sender of an electronic message

99%

104 rated

Answer

Digital signature.

Step 9

1.2.4 Software that allows the user to perform maintenance tasks on a computer

96%

101 rated

Answer

Utility software.

Step 10

1.2.5 The method that is used in object-oriented programming to instantiate an object

98%

120 rated

Answer

Constructor.

Step 11

1.2.6 The steps followed to prevent anomalies from occurring in a database

97%

117 rated

Answer

Normalisation.

Step 12

1.2.7 A tool used to identify logical errors by working through the program manually step by step and recording the result of each step in a table

97%

121 rated

Answer

Trace table.

Step 13

1.2.8 Compressing data by losing some insignificant portions of the data

96%

114 rated

Answer

Lossy compression.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;