Photo AI

A large transport company wants to incorporate information communication technology in their many areas of business in light of the 4th industrial revolution - NSC Information Technology - Question 6 - 2022 - Paper 2

Question icon

Question 6

A-large-transport-company-wants-to-incorporate-information-communication-technology-in-their-many-areas-of-business-in-light-of-the-4th-industrial-revolution-NSC Information Technology-Question 6-2022-Paper 2.png

A large transport company wants to incorporate information communication technology in their many areas of business in light of the 4th industrial revolution. 6.1 T... show full transcript

Worked Solution & Example Answer:A large transport company wants to incorporate information communication technology in their many areas of business in light of the 4th industrial revolution - NSC Information Technology - Question 6 - 2022 - Paper 2

Step 1

Due to the large funds required up front, the company decides to utilise crowd funding. Briefly explain what crowd funding is.

96%

114 rated

Answer

Crowd funding refers to the practice of raising money for a project or venture by soliciting contributions from a large number of people, typically via the internet. This method allows individuals to fund their ideas or businesses without relying solely on traditional financial institutions.

Step 2

State TWO advantages of using technology to automate the assembly of new vehicles.

99%

104 rated

Answer

  1. Safer work environment: Automation reduces the risk of human error and accidents on the production line, making it a safer place for workers.
  2. Increased productivity: Automated systems can operate continuously and consistently, leading to faster production times and higher output.

Step 3

Explain how a learning algorithm could be used to improve the manufacturing and sales of new vehicles.

96%

101 rated

Answer

A learning algorithm can observe the current manufacturing processes and identify patterns in vehicle production, such as which models are most popular. By analyzing historical data, the algorithm can create a set of rules that streamline production methods, optimizing overall efficiency and inventory management, ultimately improving sales performance.

Step 4

Expand the acronym RFID.

98%

120 rated

Answer

RFID stands for Radio Frequency Identification.

Step 5

Explain how passive tags, that are used to pay toll fees, work.

97%

117 rated

Answer

Passive RFID tags do not have their own power source. Instead, they harness energy from the reader's radio signal to transmit data. When the tag is within range of the reader, it reflects back its unique identification number, which is used to process the toll fee.

Step 6

The company uses satellite tracking on their vehicles. Name the technology that is used to determine the location of a vehicle.

97%

121 rated

Answer

The technology used is GPS (Global Positioning System).

Step 7

Why will active tags be needed for satellite tracking?

96%

114 rated

Answer

Active tags are required for satellite tracking because they have their own power source, which enables them to transmit data over greater distances continuously and provide more accurate location tracking compared to passive tags.

Step 8

Package A is uncapped. What does this refer to?

99%

104 rated

Answer

Being uncapped means there is no limit to the amount of data that can be used in a month; users can consume as much data as they need without incurring additional fees.

Step 9

FTTH means 'fibre to the home'. Why would you install fibre rather than mobile LTE in a home?

96%

101 rated

Answer

Fibre offers faster and more reliable internet connectivity compared to mobile LTE, making it ideal for households that rely heavily on internet usage, such as for streaming or remote work.

Step 10

Which hardware device, besides cabling, would you need to connect to the internet using the FTTH service?

98%

120 rated

Answer

You would need a router or ONT (Optical Network Terminal) to connect to the FTTH service.

Step 11

Will the 70GB Night Surfer Data from package B hold any benefit to the company? Motivate your answer.

97%

117 rated

Answer

The 70GB Night Surfer Data could benefit the company if it allows for cost-effective data usage during off-peak hours, enabling more efficient data consumption without incurring additional charges, particularly for tasks that require large amounts of data.

Step 12

What is a rootkit?

97%

121 rated

Answer

A rootkit is a form of malware designed to allow unauthorized access to a computer or network while hiding its presence. It can manipulate system processes and files to maintain control over the infected system.

Step 13

Give ONE simple implication of the rootkit that installed itself under employee data.

96%

114 rated

Answer

One implication is that it can allow attackers to gain administrative privileges on the system, leading to potential data breaches or unauthorized access to sensitive employee information.

Step 14

Define what social engineering entails.

99%

104 rated

Answer

Social engineering involves manipulating individuals into divulging confidential information by exploiting human psychology rather than technical hacking techniques.

Step 15

How does antivirus software identify malware?

96%

101 rated

Answer

Antivirus software identifies malware by scanning files for known virus signatures, behavioral patterns, and unusual activities that may indicate malicious intent.

Step 16

State TWO ways in which artificial intelligence can be used when working with big data.

98%

120 rated

Answer

  1. Data analysis: AI algorithms can analyze large datasets to find trends or anomalies that would be difficult for humans to detect.
  2. Predictive modeling: AI can create models to predict future events or customer behavior based on historical data.

Step 17

Differentiate between the duplication model and the partitioning model regarding the storage of data for each branch.

97%

117 rated

Answer

In the duplication model, each branch stores a complete copy of the entire database, making it easier to access all information locally. In contrast, the partitioning model divides the database into segments, where each branch only stores the portion relevant to its operations, which helps in optimizing storage and processing efficiency.

Step 18

What does the process of purging data in a database involve?

97%

121 rated

Answer

Purging data involves deleting or removing outdated or unnecessary records from the database to free up space and maintain data integrity.

Step 19

Why would records need to be purged?

96%

114 rated

Answer

Records need to be purged to limit the size of the database, enhance performance, and ensure compliance with data privacy regulations.

Step 20

Define the concept of virtualisation.

99%

104 rated

Answer

Virtualisation is the process of creating virtual versions of physical computing resources, allowing multiple operating systems and applications to run on a single physical machine.

Step 21

Give ONE benefit for the user of virtualisation as used in this context.

96%

101 rated

Answer

One benefit is the convenience of managing multiple applications on a single device, which reduces hardware costs and simplifies updates.

Step 22

Is it compulsory for the company to pay for the additional proprietary operating system, or can it be used for free? Justify your answer.

98%

120 rated

Answer

Yes, the company must pay for the proprietary operating system to avoid committing piracy, as using it without a license violates copyright laws.

Step 23

Why is it important to frequently change a password?

97%

117 rated

Answer

Frequent password changes enhance security by reducing the risk of unauthorized access due to compromised passwords or password leaks.

Step 24

Give TWO reasons why this example is NOT a strong password.

97%

121 rated

Answer

  1. Password too short: The password 'mfundi' does not meet the recommended length, which should be more than 8 characters.
  2. Lacks complexity: It only uses lowercase letters and does not include uppercase letters, numbers, or special characters.

Step 25

State how Quantum computing can be used in the statistical process of preventing the spread of a virus.

96%

114 rated

Answer

Quantum computing can be utilized to quickly analyze and process large datasets related to virus interactions, enabling researchers to understand infection patterns and model the spread more accurately.

Step 26

State TWO problems of cloud computing which are solved by the use of Edge computing.

99%

104 rated

Answer

  1. Latency issues: Edge computing reduces latency by processing data closer to the source rather than relying on distant servers.
  2. Bandwidth limitations: It minimizes the amount of data sent to the cloud, thus alleviating bandwidth strain and improving overall system performance.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;