6.1 There are many factors that can influence a computer's performance - NSC Information Technology - Question 6 - 2020 - Paper 2
Question 6
6.1 There are many factors that can influence a computer's performance.
6.1.1 Give TWO reasons why the use of cache memory allows the CPU to perform tasks faster th... show full transcript
Worked Solution & Example Answer:6.1 There are many factors that can influence a computer's performance - NSC Information Technology - Question 6 - 2020 - Paper 2
Step 1
Give TWO reasons why the use of cache memory allows the CPU to perform tasks faster than when RAM is used.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cache memory is physically closer to the CPU, which reduces the time required to access data compared to RAM.
Cache memory stores frequently accessed data, enabling quicker data retrieval than RAM.
Step 2
Name TWO other physical aspects of the CPU that have a direct influence on system performance.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
CPU clock speed (measured in GHz) – Higher speeds directly improve performance.
The number of cores – More cores can lead to better multi-threaded performance.
Step 3
The available memory (RAM) also has an influence on a computer's performance. Therefore, the operating system allocates additional memory if the available memory is limited.
(a) What is the additional memory which is allocated by the operating system if required, called?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Virtual memory.
Step 4
(b) Explain how the operating system uses the additional memory when required.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The operating system swaps information back and forth between the RAM and the hard disk, effectively using a portion of the disk as a temporary extension of RAM to manage processes when physical RAM is limited.
Step 5
State TWO disadvantages of using an open-source operating system, such as Linux, as an alternative to an operating system such as Microsoft Windows.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Limited software compatibility – Not all software applications are supported on Linux, which may affect user productivity.
Technical knowledge required – Open-source systems may require more technical expertise for installation and troubleshooting compared to user-friendly systems.
Step 6
State TWO advantages associated with the use of cloud computing.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Accessibility – Users can access services and data from anywhere with an internet connection.
Cost savings – Reduces the need for extensive physical hardware and upfront investments.
Step 7
State TWO virtualization techniques employed by companies that offer cloud services.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Server virtualization – Creating virtual servers to optimize resource utilization.
Desktop virtualization – Allowing multiple users to access a shared desktop environment remotely.
Step 8
State TWO advantages of using web-based e-mail rather than an ISP-based e-mail.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Accessibility from any device with internet access, enabling on-the-go communication.
No additional costs for email service maintenance and upgrades.
Step 9
Explain how a search engine uses customized searching to customize search results according to a user's profile.
(a)
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A search engine uses a user's browsing history and preferences to deliver tailored search results, making the results more relevant.
Step 10
(b) Explain what context-aware searches entails.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Context-aware searches analyze data such as location and time to provide more relevant search results.
Step 11
(c) How can the business benefit from context-aware searches?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The business can enhance user engagement by providing more precise search results that align with the user’s needs and context, leading to increased customer satisfaction.
Step 12
Give TWO reasons why the company should consider the development of a mobile app if a website has already been created.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Mobile apps provide a more tailored user experience and quicker access to services.
They allow for push notifications, enabling direct communication with users.
Step 13
Give TWO reasons why you would recommend that they DO NOT switch to a distributed database system.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Increased complexity – A distributed database requires more intricate synchronization and data management.
Higher costs – Maintenance costs may increase due to the need for more extensive infrastructure.
Step 14
Why is a VPN useful to employees?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A VPN provides secure access to the company's internal network from remote locations, safeguarding sensitive data during transmission.
Step 15
Indicate ONE option in the screenshot above that is related to green computing.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Battery saver mode.
Step 16
Define the term mobile hotspot.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A mobile hotspot refers to a device that creates a wireless internet connection using cellular data, allowing multiple devices to connect to the internet.
Step 17
(a) Briefly explain what multitasking is.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Multitasking is the ability of an operating system to manage the execution of multiple tasks or programs simultaneously.
Step 18
(b) How does multiprocessing differ from multitasking?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Multiprocessing involves running multiple processes or threads on different CPU cores, allowing for true simultaneous execution, while multitasking involves context-switching among tasks using the same CPU.
Step 19
Explain what nearby sharing in this context entails.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Nearby sharing allows users to wirelessly transfer files between devices that are in close proximity, facilitating quick data exchange.
Step 20
State TWO possible disadvantages of relying solely on VoIP for communication with customers.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Dependence on internet connectivity – VoIP performance can suffer during high traffic or poor connection conditions.
Call quality issues – Voice calls may be affected by latency, jitter, or packet loss.
Step 21
Make TWO recommendations on how Internet of Things (IoT) technology can be used to ensure that the company does not suffer damage due to possible problems with keeping the temperatures in their fridges at optimal levels.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Implement IoT sensors that monitor and alert staff of temperature changes in real-time, enabling quick corrective actions.
Utilize predictive analytics to anticipate equipment failures and schedule maintenance proactively to prevent temperature breaches.
Step 22
(a) What medium is used by RFID to identify objects?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
RFID uses electromagnetic waves to transmit data and identify objects.
Step 23
(b) State TWO advantages of using RFID rather than barcode technology.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
RFID tags can be scanned from a distance, increasing efficiency in inventory management.
RFID tags can store more data and can be reused, unlike barcodes which are one-time use.