1.1 Choose a term from COLUMN B that matches the description in COLUMN A - NSC Information Technology - Question 1 - 2023 - Paper 2
Question 1
1.1 Choose a term from COLUMN B that matches the description in COLUMN A. Write only the letter (A–Q) next to the question numbers (1.1.1 to 1.1.10) in the ANSWER BO... show full transcript
Worked Solution & Example Answer:1.1 Choose a term from COLUMN B that matches the description in COLUMN A - NSC Information Technology - Question 1 - 2023 - Paper 2
Step 1
1.1.1 A set of data that describes and provides information about other data
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
C
Step 2
1.1.2 A collection of fields that contains data on a specific entity
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A
Step 3
1.1.3 A unit of measurement for network bandwidth and throughput
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
H
Step 4
1.1.4 Technique used to avoid programs from crashing during execution
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
N
Step 5
1.1.5 A network of online content that is indexed and accessed over the internet
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
W
Step 6
1.1.6 Unwanted, unsolicited digital communication that gets sent out in bulk
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
J
Step 7
1.1.7 A software component that adds a specific feature to an existing computer program
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
E
Step 8
1.1.8 A variable in the header of a subroutine used as input to the subroutine
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Q
Step 9
1.1.9 A data compression format for encoding digital audio, most commonly music
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
M
Step 10
1.1.10 A data searching technique where a search query aims to not only find keywords, but also to determine the intent and contextual meaning of the keywords
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
L
Step 11
1.2.1 Which ONE of the following is a protocol that provides privacy to users when they work on a public network like the internet?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
C
Step 12
1.2.2 A group of computers infected by the same malware that work together to perform cyberattacks is known as ...
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
C
Step 13
1.2.3 ... is the process of analysing large volumes of data to find patterns and trends.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D
Step 14
1.2.4 What will be the value of K after the program segment below has been executed?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!