1.1.1 ... is a wireless technology that allows devices to communicate wirelessly over short distances, typically 10 m or less - NSC Information Technology - Question 1 - 2022 - Paper 2
Question 1
1.1.1 ... is a wireless technology that allows devices to communicate wirelessly over short distances, typically 10 m or less.
A WAN
B Bluetooth
C Wi-Fi Mini
D ... show full transcript
Worked Solution & Example Answer:1.1.1 ... is a wireless technology that allows devices to communicate wirelessly over short distances, typically 10 m or less - NSC Information Technology - Question 1 - 2022 - Paper 2
Step 1
1.1.1 ... is a wireless technology that allows devices to communicate wirelessly over short distances, typically 10 m or less.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is B (Bluetooth) because it is known for enabling short-range wireless communication between devices.
Step 2
1.1.2 A ... is a small text file used to store customised settings for a website on your local computer.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is D (cookie), which is a small piece of data stored on the client side to help manage user preferences.
Step 3
1.1.3 A rule-based form of artificial intelligence where human experience is coded into a computer to make it possible for the computer to make decisions:
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is A (Expert system), as it applies rules and knowledge to solve specific problems.
Step 4
1.1.4 A DDoS attack makes a website unusable due to ...
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is C (Extremely high volumes of traffic that request data from the website). This describes how DDoS attacks overwhelm a site by flooding it with requests.
Step 5
1.1.5 Determine the value of sWord if the following code is executed:
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
After analyzing the code, the execution results in sWord being assigned the letters at positions divisible by 5 in reverse order. Thus, the correct answer is D (ytoe).