Your school is launching a major drive to embrace the digital era - NSC Information Technology - Question 6 - 2017 - Paper 2
Question 6
Your school is launching a major drive to embrace the digital era. The expansion of their network, linked with increased Internet availability, has made it possible ... show full transcript
Worked Solution & Example Answer:Your school is launching a major drive to embrace the digital era - NSC Information Technology - Question 6 - 2017 - Paper 2
Step 1
Name TWO IT-related jobs that will be created when setting up and expanding the network.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
IT Technician
Network Engineer
Step 2
Explain the term biometrics.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Biometrics refers to the use of personal characteristics to authenticate the identity of a person. This includes unique physical traits such as fingerprints, facial recognition, and iris patterns.
Step 3
Give a suitable example of biometrics to be used in this scenario.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A suitable example of biometrics in this scenario could be fingerprint recognition.
Step 4
State TWO disadvantages of using RFID cards for this application.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
RFID cards can be lost or stolen, compromising security.
They can be cloned, allowing unauthorized access.
Step 5
What is virtual memory?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Virtual memory is a technique that uses hard drive space as an extension of RAM. This allows a computer to run more applications than its physical memory can support.
Step 6
Which software implements and manages virtual memory in a computer system?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The operating system, such as Windows or Linux, implements and manages virtual memory.
Step 7
How can the use of virtual memory be limited?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The use of virtual memory can be limited by increasing the physical RAM or by closing applications that are not currently in use.
Step 8
Distinguish between the results when a file is compressed using lossless compression and lossy compression.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Lossless compression results in no data loss, preserving the original file quality, while lossy compression may lose some insignificant data, resulting in reduced file quality.
Step 9
Explain what a protocol is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A protocol is a set of rules for transmitting data across a network. It governs how data is encoded, transmitted, and decoded during communication.
Step 10
What is the SMT protocol used for?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The SMT protocol is typically used for sending emails.
Step 11
What is a distributed database?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A distributed database is a database that is spread over multiple servers in different locations, allowing for improved data access and redundancy.
Step 12
State TWO advantages of using a distributed database.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
It eliminates congestion on a single server by distributing workloads.
It allows for greater availability as data can be accessed from multiple locations.
Step 13
Briefly describe the main feature of Web 1.0.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The main feature of Web 1.0 is that it consists primarily of static web pages with limited interactivity, focusing on read-only information.
Step 14
Explain why Web 3.0 is referred to as the Semantic Web.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Web 3.0 is referred to as the Semantic Web because it focuses on the ability to interpret information like humans do, enabling better user needs and personalization.
Step 15
What is this feature called?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This feature is called the Internet of Things (IoT), where devices communicate independently with one another.
Step 16
What is a webinar?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A webinar is an online seminar or presentation that allows interaction between the presenter and participants over the Internet.
Step 17
State ONE way in which the staff member may benefit from signing up for the webinar.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One way the staff member may benefit is by expanding their knowledge base regarding educational practices.
Step 18
What does the acronym SaaS stand for?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SaaS stands for 'Software as a Service'.
Step 19
Explain how cloud applications work in general.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cloud applications operate by processing most functions in the cloud, where data is stored on remote servers. Users access these applications via their internet browsers without needing installation on local machines.
Step 20
State TWO disadvantages of using online software services.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The software is not owned, leading to recurring costs for access.
If the service provider's server is down, users cannot access their information.
Step 21
Explain what an RSS service is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An RSS service is a web-based content delivery system that automatically provides users with updates about new content on websites they follow.
Step 22
Suggest TWO ways of using social networking sites responsibly.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Limit time spent on the web and turn off notifications while working.
Refrain from sharing personal information online.
Step 23
Give TWO reasons why cybercrime is prevalent.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Increased anonymity online makes it difficult to trace criminals.
Many users are unaware of security risks, leading to negligence.
Step 24
What term is used to describe this crime?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term used is 'piggybacking'.
Step 25
What is a drone?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A drone is a machine that can fly autonomously or be remotely controlled, typically equipped with cameras and sensors.
Step 26
State TWO possible benefits of using a 3D printer for printing the parts of the drone.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
It allows for rapid prototyping, enabling quick adjustments to designs.
Parts can be printed on-demand, reducing waste and storage issues.