1.1.1 A file with a .dll extension is .. - NSC Information Technology - Question 1 - 2016 - Paper 2
Question 1
1.1.1 A file with a .dll extension is ...
A dynamic link library file.
1.1.2 ... is a protocol used to retrieve messages on an Internet/Intranet e-mail server.
SMTP.... show full transcript
Worked Solution & Example Answer:1.1.1 A file with a .dll extension is .. - NSC Information Technology - Question 1 - 2016 - Paper 2
Step 1
1.1.1 A file with a .dll extension is ...
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A dynamic link library file.
Step 2
1.1.2 ... is a protocol used to retrieve messages on an Internet/Intranet e-mail server.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SMTP.
Step 3
1.1.3 A 64-bit processor refers to the ....
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
number of basic instructions the processor can recognise.
Step 4
1.1.4 The licence under which most freeware is distributed is known as ...
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
EULA.
Step 5
1.1.5 Working away from the company's standard workplace and using the Internet to communicate with the office is known as ...
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
telecommuting.
Step 6
1.2.1 A text file which stores customised settings for a website on your local computer.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Web.config file.
Step 7
1.2.2 A technology that automates the configuration process of a device before it can be used.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Zero-touch provisioning.
Step 8
1.2.3 A general term for conning techniques used to make electronic communication appear to originate from a legitimate source.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Phishing.
Step 9
1.2.4 A practice where queries are entered in data fields which then allow unauthorised access to the database.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SQL injection.
Step 10
1.2.5 The immediate and real-time delivery of media content to a receiving device over the Internet starting from the time the media file is opened.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Streaming.
Step 11
1.2.6 Simulation of human decision-making processes by a computer system that is programmed to react on the basis of input gained from sensors.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Artificial Intelligence.
Step 12
1.2.7 A type of search that is managed by humans rather than by reliance on algorithms.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Manual search.
Step 13
1.2.8 The general term for software that allows you to work with electronic databases.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Database management system.
Step 14
1.2.9 A type of website that displays the same information to all users.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Static website.
Step 15
1.2.10 A local area network in which resources are shared among workstations without using a dedicated server.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!