Photo AI

Your school is launching a major drive to embrace the digital era - NSC Information Technology - Question 6 - 2017 - Paper 2

Question icon

Question 6

Your-school-is-launching-a-major-drive-to-embrace-the-digital-era-NSC Information Technology-Question 6-2017-Paper 2.png

Your school is launching a major drive to embrace the digital era. The expansion of their network, linked with increased Internet availability, has made it possible ... show full transcript

Worked Solution & Example Answer:Your school is launching a major drive to embrace the digital era - NSC Information Technology - Question 6 - 2017 - Paper 2

Step 1

6.1 Name TWO IT-related jobs that will be created when setting up and expanding the network.

96%

114 rated

Answer

Two IT-related jobs that will be created include:

  • IT technician
  • Network administrator

Step 2

6.2.1 (a) Explain the term biometrics.

99%

104 rated

Answer

Biometrics refers to the use of personal characteristics of individuals, such as fingerprints or facial recognition, to authenticate their identity.

Step 3

6.2.1 (b) Give a suitable example of biometrics to be used in this scenario.

96%

101 rated

Answer

A suitable example of biometrics that can be used is fingerprint recognition.

Step 4

6.2.2 State TWO disadvantages of using RFID cards for this application.

98%

120 rated

Answer

Two disadvantages of using RFID cards are:

  • Cards can be lost or stolen, leading to potential unauthorized access.
  • Cards can be cloned, which poses a security risk.

Step 5

6.3.1 What is virtual memory?

97%

117 rated

Answer

Virtual memory is a feature of an operating system that uses hard drive space to extend the available RAM, allowing more applications to run simultaneously.

Step 6

6.3.2 Which software implements and manages virtual memory in a computer system?

97%

121 rated

Answer

The operating system (OS) implements and manages virtual memory in a computer system.

Step 7

6.3.3 How can the use of virtual memory be limited?

96%

114 rated

Answer

The use of virtual memory can be limited by:

  • Adding more RAM to the system.
  • Closing applications that are not in use.

Step 8

6.4 Distinguish between the results when a file is compressed using lossless compression and lossy compression.

99%

104 rated

Answer

Lossless compression ensures that no data is lost during the compression process, allowing the original file to be perfectly reconstructed. In contrast, lossy compression sacrifices some data and quality for a smaller file size, meaning the original file cannot be fully restored.

Step 9

6.5.1 Explain what a protocol is.

96%

101 rated

Answer

A protocol is a set of rules defining how data is transmitted across a network, including encoding and decoding techniques for data transmission.

Step 10

6.5.2 What is the SMT protocol used for?

98%

120 rated

Answer

The SMT protocol is used for sending emails over the Internet.

Step 11

6.6.1 What is a distributed database?

97%

117 rated

Answer

A distributed database is a type of database that is spread across multiple servers in different geographic locations, allowing data to be processed and accessed more efficiently.

Step 12

6.6.2 State TWO advantages of using a distributed database.

97%

121 rated

Answer

Two advantages include:

  • It can handle a larger number of simultaneous users.
  • It helps reduce congestion as data can be accessed locally.

Step 13

6.7.1 Briefly describe the main feature of Web 1.0.

96%

114 rated

Answer

The main feature of Web 1.0 is that it primarily consists of static web pages where content is mostly read-only, allowing little to no user interaction.

Step 14

6.7.2 (a) Explain why Web 3.0 is referred to as the Semantic Web.

99%

104 rated

Answer

Web 3.0 is referred to as the Semantic Web because it aims to enhance the ability to interpret information in a way that allows better understanding and usability, enabling humans and machines to communicate more effectively.

Step 15

6.7.2 (b) What is this feature called?

96%

101 rated

Answer

This feature is called the 'Internet of Things' (IoT).

Step 16

6.8.1 What is a webinar?

98%

120 rated

Answer

A webinar is an online seminar or presentation that is conducted over the Internet.

Step 17

6.8.2 State ONE way in which the staff member may benefit from signing up for the webinar.

97%

117 rated

Answer

One way the staff member may benefit is by expanding their knowledge base on education techniques.

Step 18

6.9.1 What does the acronym SaaS stand for?

97%

121 rated

Answer

SaaS stands for 'Software as a Service.'

Step 19

6.9.2 Explain how cloud applications work in general.

96%

114 rated

Answer

Cloud applications work by processing data and storing files on remote servers in the cloud instead of on local devices. Users access these applications through a web browser, allowing for flexibility and accessibility from various devices.

Step 20

6.9.3 State TWO disadvantages of using online software services.

99%

104 rated

Answer

Two disadvantages include:

  • Dependency on an Internet connection; if the service is down, access is lost.
  • Security concerns regarding data privacy and storage.

Step 21

6.10 Explain what an RSS service is.

96%

101 rated

Answer

An RSS service is a web-based feed that automatically provides users with updated content, allowing them to stay informed without having to regularly check the source.

Step 22

6.11.1 Suggest TWO ways of using social networking sites responsibly.

98%

120 rated

Answer

Two ways to use social networking sites responsibly include:

  • Limiting time spent online and ensuring that social media use does not interfere with important work.
  • Being cautious about sharing personal information.

Step 23

6.11.2 Give TWO reasons why cybercrime is prevalent.

97%

117 rated

Answer

Two reasons include:

  • The relative anonymity of the Internet makes it difficult to trace criminals.
  • General disregard for online safety among users leads to increased vulnerabilities.

Step 24

6.11.3 What term is used to describe this crime?

97%

121 rated

Answer

The term used to describe this crime is 'piggybacking.'

Step 25

6.12.1 What is a drone?

96%

114 rated

Answer

A drone is a machine that has certain autonomous flight capabilities but is still controlled by a human.

Step 26

6.12.2 State TWO possible benefits of using a 3D printer for printing the parts of the drone.

99%

104 rated

Answer

Two benefits of using a 3D printer include:

  • The ability to create parts quickly and with precision.
  • Reducing costs compared to traditional manufacturing methods.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;