Photo AI

6.1 Due to the large funds required up front, the company decides to utilise crowd funding - NSC Information Technology - Question 6 - 2022 - Paper 2

Question icon

Question 6

6.1-Due-to-the-large-funds-required-up-front,-the-company-decides-to-utilise-crowd-funding-NSC Information Technology-Question 6-2022-Paper 2.png

6.1 Due to the large funds required up front, the company decides to utilise crowd funding. Briefly explain what crowd funding is. 6.1.2 The company also manufactu... show full transcript

Worked Solution & Example Answer:6.1 Due to the large funds required up front, the company decides to utilise crowd funding - NSC Information Technology - Question 6 - 2022 - Paper 2

Step 1

Due to the large funds required up front, the company decides to utilise crowd funding. Briefly explain what crowd funding is.

96%

114 rated

Answer

Crowd funding is the practice of funding a project or venture by raising money from a large number of people, typically via the internet or social networks. Individual contributions are usually small, allowing many individuals to support a common goal.

Step 2

The company also manufactures new vehicles and incorporates technology in this process to move towards automation. (a) State TWO advantages of using technology to automate the assembly of new vehicles.

99%

104 rated

Answer

  1. Safer work environment: Automation helps reduce the risk of workplace accidents by minimizing human intervention in dangerous tasks.
  2. Greater precision and consistency: Automated systems provide high accuracy in assembly, leading to fewer errors and better overall product quality.

Step 3

(b) A learning algorithm could be used to improve the manufacturing and sales of new vehicles. Explain how a learning algorithm would be used to achieve this goal.

96%

101 rated

Answer

A learning algorithm can analyze vast amounts of data generated during the manufacturing process. By observing current trends and identifying patterns, it can suggest optimal manufacturing techniques or strategies. This allows the company to adapt its production lines based on consumer preferences, enhancing efficiency and increasing sales.

Step 4

Employees travelling to work use RFID tags to pay the toll fees for the road they travel on. 6.2.1 Expand the acronym RFID.

98%

120 rated

Answer

RFID stands for Radio Frequency Identification.

Step 5

6.2.2 Explain how passive tags, that are used to pay toll fees, work.

97%

117 rated

Answer

Passive tags work by receiving a signal from an RFID reader at the toll gate. The tag communicates back with the reader, transmitting its stored information and automatically deducting the correct toll amount from the holder's account.

Step 6

6.2.3 The company uses satellite tracking on their vehicles. (a) Name the technology that is used to determine the location of a vehicle.

97%

121 rated

Answer

The technology used to determine the location of a vehicle is GPS (Global Positioning System).

Step 7

(b) Why will active tags be needed for satellite tracking?

96%

114 rated

Answer

Active tags are needed for satellite tracking because they have their own power source, allowing them to transmit signals continuously and over longer distances, which is essential for reliable tracking in remote areas.

Step 8

6.3 The company needs to review their internet packages. 6.3.1 Package A is uncapped. What does this refer to?

99%

104 rated

Answer

Being uncapped means that there is no limit on the amount of data that can be used in a month, allowing users to browse as much as they want without incurring additional charges.

Step 9

6.3.2 FTTH means 'fibre to the home'. Why would you install fibre rather than mobile LTE in a home?

96%

101 rated

Answer

One reason to install fibre rather than mobile LTE is that fibre offers faster connection speeds and greater reliability, particularly for high-demand applications such as streaming, gaming, and remote work.

Step 10

6.3.3 Which hardware device, besides cabling, would you need to connect to the internet using the FTTH service?

98%

120 rated

Answer

You would need an Optical Network Terminal (ONT) device to connect to the FTTH service.

Step 11

6.3.4 Will the 70GB Night Surfer Data from package B hold any benefit to the company? Motivate your answer.

97%

117 rated

Answer

The 70GB Night Surfer Data could benefit the company if they plan to perform heavy data usage during off-peak hours. This can be cost-effective by allowing them to utilize the data at night when internet traffic is lower, and potentially reducing costs.

Step 12

6.4 A security consultant warns of security threats that employee computers will be exposed to when connecting to the internet. 6.4.1 What is a rootkit?

97%

121 rated

Answer

A rootkit is a type of malicious software designed to enable unauthorized access to a computer system while concealing its existence.

Step 13

(a) Give ONE simple implication of the rootkit that installed itself on the computer.

96%

114 rated

Answer

One implication is that it can open the computer for hacking and illegally accessing data, putting sensitive information at risk.

Step 14

(b) Define what social engineering entails.

99%

104 rated

Answer

Social engineering entails manipulating individuals into divulging confidential or personal information, often through deceptive tactics.

Step 15

6.4.3 How does antivirus software identify malware?

96%

101 rated

Answer

Antivirus software identifies malware by scanning files for known signatures and behaviors that match those of malicious programs. It uses databases of known malware definitions to detect and remove threats.

Step 16

6.5 Big data regarding all the customer’s information is stored by the company. 6.5.1 State TWO ways in which artificial intelligence can be used when working with big data.

98%

120 rated

Answer

  1. Finding connections among datasets: AI can identify hidden relationships and patterns in vast amounts of data.
  2. Analyzing unstructured data: AI techniques like natural language processing can help in understanding and organizing unstructured data, such as customer feedback.

Step 17

6.5.2 Differentiate between the duplication model and the partitioning model regarding the storage of data for each branch.

97%

117 rated

Answer

In the duplication model, each database copy contains a complete set of data, whereas in the partitioning model, each database only stores part of the data. This means that partitioning reduces redundancy and optimizes storage, especially for organizations with multiple branches.

Step 18

6.5.3 Part of data maintenance in a database includes purging. (a) What does the process of purging data in a database involve?

97%

121 rated

Answer

Purging data involves deleting or removing outdated or unnecessary records from the database to ensure efficient operation and compliance with data policies.

Step 19

(b) Why would records need to be purged?

96%

114 rated

Answer

Records need to be purged to limit the size of the database, enhance performance, and improve the overall effectiveness of data management.

Step 20

6.6 Virtualisation allows for more efficient utilisation of physical computer hardware. 6.6.1 Define the concept of virtualisation.

99%

104 rated

Answer

Virtualisation is the process of creating virtual versions of physical computing resources, allowing multiple simulated environments to run on a single hardware platform.

Step 21

(a) Give ONE benefit for the user of virtualisation as used in this context.

96%

101 rated

Answer

One benefit of virtualisation is the convenience of having multiple operating systems or applications running on a single device, saving space and enhancing system management.

Step 22

6.6.3 Is it compulsory for the company to pay for the additional proprietary operating system, or can it be used for free? Justify your answer.

98%

120 rated

Answer

The company must pay for the proprietary operating system to avoid committing piracy and to ensure proper support and updates. Free alternatives may exist, but they might not offer the same level of service.

Step 23

6.7 The company forces all the employees with an e-mail account to change passwords every 60 days. 6.7.1 Why is it important to frequently change a password?

97%

117 rated

Answer

Frequent password changes are important to enhance security, reducing the risk of unauthorized access and protecting sensitive information from potential breaches.

Step 24

6.7.2 One of the employees, Mfundi Mnumzana, uses the following password: mfundi. Give TWO reasons why this example is NOT a strong password.

97%

121 rated

Answer

  1. The password is too short, as it should contain at least eight characters.
  2. It lacks complexity, as it does not include uppercase letters, numbers, or special characters, making it easier to guess.

Step 25

6.7.3 Quantum and Edge computing are two of the many technologies used to prevent the spread of viruses. (a) State how Quantum computing can be used in the statistical process of preventing the spread of a virus.

96%

114 rated

Answer

Quantum computing can be utilized to process and analyze vast datasets quickly, enabling the identification of patterns and correlations that traditional computers might miss, thus aiding in predicting and preventing virus outbreaks.

Step 26

(b) State TWO problems of cloud computing which are solved by the use of Edge computing.

99%

104 rated

Answer

  1. Latency reduction: Edge computing processes data closer to the source, minimizing delays in data transfer.
  2. Bandwidth conservation: By performing data processing locally, Edge computing reduces the amount of data sent to the cloud, saving bandwidth and improving efficiency.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;