6.1 The company has an online version of their magazine hosted on a website - NSC Information Technology - Question 6 - 2021 - Paper 2
Question 6
6.1 The company has an online version of their magazine hosted on a website. Users can interact with videos and dynamic content which can be customised for each user... show full transcript
Worked Solution & Example Answer:6.1 The company has an online version of their magazine hosted on a website - NSC Information Technology - Question 6 - 2021 - Paper 2
Step 1
Give ONE example of a local or server-side scripting language.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One example of a local or server-side scripting language is PHP, which allows developers to create dynamic web content by running scripts on the server.
Step 2
Explain the main purpose of running a CSS on a website.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The main purpose of running a CSS (Cascading Style Sheets) on a website is to separate content from design. This allows web developers to design the layout and appearance of web pages just once and automatically update the design on all web pages, enhancing consistency and saving time.
Step 3
What is the purpose of using SQL on a website?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SQL (Structured Query Language) is used on a website to interact with databases. It allows for the retrieval, insertion, and deletion of data stored in a database, enabling dynamic content to be displayed based on user interactions.
Step 4
Name TWO hardware components on the motherboard of a computer that can be upgraded.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two hardware components on the motherboard that can be upgraded are the RAM (Random Access Memory) and the CPU (Central Processing Unit).
Step 5
Name TWO benefits of using desktop computers over laptops.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two benefits of using desktop computers over laptops are: 1. Larger screens that enhance user experience, and 2. Easier repair and upgrade options due to modular design.
Step 6
Suggest a way, other than defragmenting the hard disks, to improve the speed of the computers without adding additional hardware components.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One way to improve the speed of the computers without adding hardware is to run a system cleanup to remove unnecessary files or disable specific features that may be slowing down performance.
Step 7
Suggest TWO ways in which the computers can be disposed of in an eco-friendly manner.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two ways to dispose of computers in an eco-friendly manner are: 1. Recycling the materials to prevent e-waste, and 2. Donating working parts to organizations that can use them.
Step 8
What is office automation?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Office automation refers to the use of technology to perform routine office tasks and processes that were previously done manually. It includes tasks such as data entry, scheduling, and communication, aimed at increasing efficiency and reducing human intervention.
Step 9
State TWO advantages of office automation to workers.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two advantages of office automation to workers are: 1. It saves time by handling repetitive tasks automatically, and 2. It increases accuracy in data processing, reducing the chances of human error.
Step 10
How would the employees be able to connect to the company’s Wi-Fi network?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Employees would be able to connect to the company’s Wi-Fi network by using a hotspot or access point equipped with a Wi-Fi modem, along with a wireless network interface card (NIC) on their devices.
Step 11
What problem with attenuation?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Attenuation refers to the loss of signal strength as it travels through a medium. This results in a weakened signal and can lead to data transmission errors or decreased performance in network communications.
Step 12
Give TWO reasons why WiMAX technology is considered to be more suitable than Wi-Fi technology.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two reasons why WiMAX technology is considered more suitable than Wi-Fi are: 1. It has a wider range of coverage, allowing for connectivity over greater distances, and 2. It offers faster speeds and higher bandwidth, making it ideal for data-intensive applications.
Step 13
Describe the concept microblogging.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Microblogging is the practice of posting short messages or updates online, typically in real-time. These posts can include text, images, videos, and links, and are often limited in character count, allowing users to share thoughts quickly and efficiently with their audience.
Step 14
State TWO potential health problems caused by the excessive use of social media.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two potential health problems caused by excessive use of social media are: 1. Anxiety due to constant comparison with others, and 2. Eye strain from prolonged screen time.
Step 15
Expand the abbreviation IoT.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The abbreviation IoT stands for 'Internet of Things.'
Step 16
State TWO ways in which IoT devices connect to the internet.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two ways in which IoT devices connect to the internet are: 1. Through Wi-Fi or wireless connectivity, and 2. By using cellular networks.
Step 17
What is distributed computing?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Distributed computing is a computational model where processing tasks are distributed across multiple computing devices that work together to solve a single problem, allowing for enhanced processing power and efficiency.
Step 18
Give ONE example where distributed computing could be used.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One example of where distributed computing could be used is in weather modelling, where data from multiple sources is processed collectively to create accurate predictions.
Step 19
Define the concept blockchain technology.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Blockchain technology is a decentralized digital ledger system that securely records transactions across multiple computers in such a way that the registered information cannot be altered retroactively, ensuring transparency and security.
Step 20
Explain how a multi-factor authentication system works.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A multi-factor authentication system works by requiring users to provide two or more verification factors to gain access to a system or application. This could include something they know (like a password), something they have (like a smartphone for a code), or something they are (like a fingerprint).
Step 21
Why does electronic media use DRM?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Electronic media uses Digital Rights Management (DRM) to protect content from unauthorized access or copying. It employs encryption techniques to control access to the content and prevent illegal distribution.
Step 22
State TWO tasks that can be performed with files in the folder with Read permissions.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two tasks that can be performed with files in the folder with Read permissions are: 1. List the files in the folder, and 2. Open files for viewing.
Step 23
Who would be allocated the 'Full control' permission?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The 'Full control' permission would typically be allocated to an Administrator or any person in charge of managing the files in the folder.