1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
2
B
5
C
4
D
5
1.1.2 A digital signature is used …
A
when someone signs an electronic document - NSC Information Technology - Question 1 - 2017 - Paper 2
Question 1
1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
2
B
5
C
4
D
5
1.1.2 A digital signature is used …
A
when someone signs an electronic document.
B
to identif... show full transcript
Worked Solution & Example Answer:1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
2
B
5
C
4
D
5
1.1.2 A digital signature is used …
A
when someone signs an electronic document - NSC Information Technology - Question 1 - 2017 - Paper 2
Step 1
The result of the expression 7 MOD 5 + 10 DIV 3
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To solve this expression, first calculate the modulo and division components:
Calculate 7extMOD5, which yields 2 (since 7 divided by 5 gives 1 with a remainder of 2).
Next, calculate 10extDIV3, which yields 3 (since 10 divided by 3 gives 3 with a remainder of 1).
Finally, add the results: 2+3=5.
Thus, the correct answer is D.
Step 2
A digital signature is used …
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A digital signature is primarily utilized to confirm authenticity and integrity of digital messages or documents. It acts as a means of verifying the identity of the sender, making it important for secure communications. Therefore, the correct answer is B.
Step 3
A Trojan virus is designed to …
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Trojan virus is often disguised as legitimate software, but its purpose is malicious. It typically acts to gain unauthorized access or privileges, which can lead to significant harm. Hence, the correct answer is B.
Step 4
A technique used to make electronic communication appear to originate from a legitimate source is known as …
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This technique is known as spoofing, where a communication is disguised as coming from a trusted source. The aim is to deceive the recipient into trusting the source of the communication, making B the right answer.
Step 5
To establish a relationship between two tables in a database, a link must be made from the …
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
In a relational database, establishing a link between tables typically involves the use of primary and foreign keys. A primary key in one table serves as a reference to a foreign key in another table. Consequently, the correct answer is D.