1.1.1 The protocol that defines how webpages and their content are transferred across the Web
1.1.2 A collection of 8 bits
1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
1.1.4 An update that can be downloaded to fix a specific bug in software
1.1.5 The electronic equivalent to junk mail
1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program
1.1.7 The layout of the physical connection of the computers in a network
1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone - NSC Information Technology - Question 1 - 2017 - Paper 2
Question 1
1.1.1 The protocol that defines how webpages and their content are transferred across the Web
1.1.2 A collection of 8 bits
1.1.3 Collection of programs designed to u... show full transcript
Worked Solution & Example Answer:1.1.1 The protocol that defines how webpages and their content are transferred across the Web
1.1.2 A collection of 8 bits
1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
1.1.4 An update that can be downloaded to fix a specific bug in software
1.1.5 The electronic equivalent to junk mail
1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program
1.1.7 The layout of the physical connection of the computers in a network
1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone - NSC Information Technology - Question 1 - 2017 - Paper 2
Step 1
1.1.1 The protocol that defines how webpages and their content are transferred across the Web
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
HTTP
Step 2
1.1.2 A collection of 8 bits
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Byte
Step 3
1.1.3 Collection of programs designed to use administrator rights to gain control of a computer for dangerous purposes
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Rootkit
Step 4
1.1.4 An update that can be downloaded to fix a specific bug in software
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Patch
Step 5
1.1.5 The electronic equivalent to junk mail
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SPAM
Step 6
1.1.6 A part of a larger program that runs independently but simultaneously with other parts of the same program
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Thread (Accept multithreading)
Step 7
1.1.7 The layout of the physical connection of the computers in a network
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Topology
Step 8
1.1.8 The posting of short text entries (140 characters or less) usually via a cellphone or smartphone.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Microblogging (Accept tweeting)
Step 9
1.1.9 The latest generation of cellular communication technology
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
4G/LTE
Step 10
1.1.10 The total amount of data that can be transferred from one point to another in a given period of time
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Bandwidth
Step 11
1.2.1 Copyright law is NOT broken when you ...
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D. copy your own CD to play on your mp3 player.
Step 12
1.2.2 An algorithm is ...
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
B. a sequence of logical steps that will solve a problem.
Step 13
1.2.3 A cookie is a(n) ...
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
C. text file that stores information relating to websites.
Step 14
1.2.4 Which ONE of the following refers to an encryption process used to authenticate the identity of the sender of an e-mail message?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D. Digital signature
Step 15
1.2.5 Which ONE of the following is NOT a suitable application of Bluetooth technology?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
B. Wireless communication between PCs in different rooms.