Photo AI

6.1 An AUP document has been compiled for the library - NSC Information Technology - Question 6 - 2018 - Paper 2

Question icon

Question 6

6.1-An-AUP-document-has-been-compiled-for-the-library-NSC Information Technology-Question 6-2018-Paper 2.png

6.1 An AUP document has been compiled for the library. One of the points listed in the document states that, where possible, electronic documents should be used inst... show full transcript

Worked Solution & Example Answer:6.1 An AUP document has been compiled for the library - NSC Information Technology - Question 6 - 2018 - Paper 2

Step 1

What does the acronym AUP stand for?

96%

114 rated

Answer

The acronym AUP stands for Acceptable Use Policy.

Step 2

Briefly explain the purpose of having an AUP.

99%

104 rated

Answer

The purpose of having an AUP is to provide users with a clear understanding of their rights and responsibilities when using ICT resources and networks. It establishes guidelines for appropriate use to ensure a safe and respectful environment.

Step 3

Explain the concept of file syncing.

96%

101 rated

Answer

File syncing refers to the process of ensuring that all copies of a file, stored on different devices, are updated and contain the most recent version. This is often achieved through the use of cloud storage services where changes made to a file on one device are automatically reflected on others, thus facilitating collaboration and data integrity.

Step 4

Name TWO skills that a web designer would need when creating a website.

98%

120 rated

Answer

  1. Graphic design skills.
  2. Software programming skills.

Step 5

State TWO factors that a web designer must take into consideration when designing websites to be accessible from mobile devices.

97%

117 rated

Answer

  1. The page must automatically resize for smaller screens.
  2. The website should have a reduced size of image files to ensure quicker loading times.

Step 6

What is metadata?

97%

121 rated

Answer

Metadata is data that provides information about other data. In this context, it refers to additional information that describes the video saved on SSD, such as its format, description, and context.

Step 7

Suggest a suitable format for the compression of videos.

96%

114 rated

Answer

One suitable format for video compression is MPEG-4, which is widely used for its efficiency in maintaining quality while reducing file size.

Step 8

What is a webinar?

99%

104 rated

Answer

A webinar is an online seminar or presentation conducted over the internet. It allows individuals to collaborate, share information, and participate in discussions in real time.

Step 9

How can the students remain informed of changes in the schedules without visiting the website?

96%

101 rated

Answer

Students can remain informed of schedule changes by using suitable applications or services, such as RSS feeds, mobile alerts, or SMS notifications that provide updates directly to their devices.

Step 10

State THREE functions of an operating system.

98%

120 rated

Answer

  1. Provides an interface for users and applications.
  2. Manages processes and tasks, ensuring efficient execution of applications.
  3. Manages memory allocation for running programs.

Step 11

Give ONE reason for using a proprietary operating system rather than an open-source operating system.

97%

117 rated

Answer

One reason for using a proprietary operating system is the availability of technical support and regular updates provided by the company that owns the software, which may not be as reliable with open-source alternatives.

Step 12

Write out the abbreviation RFID.

97%

121 rated

Answer

RFID stands for Radio Frequency Identification.

Step 13

Explain the difference between a passive RFID tag and an active RFID tag.

96%

114 rated

Answer

A passive RFID tag does not have its own power source and receives power from the RFID reader. In contrast, an active RFID tag has an onboard battery that allows it to transmit signals over longer distances consistently.

Step 14

Give TWO reasons why manual data input (e.g., a person at a keyboard entering data) is one of the last popular data capture techniques.

99%

104 rated

Answer

  1. Manual data input is prone to human errors, such as typos or inconsistent data entry.
  2. It is time-consuming compared to automated data capture methods.

Step 15

What is netiquette?

96%

101 rated

Answer

Netiquette is the set of guidelines and norms governing respectful and appropriate behavior while communicating online, particularly through e-mails or any form of electronic communication.

Step 16

State ONE way in which social networking can impact negatively on cultures around the world.

98%

120 rated

Answer

One way social networking can negatively impact cultures is by promoting the spread of misinformation, which can lead to misunderstandings and conflicts between different cultural groups.

Step 17

Explain what the term encryption means.

97%

117 rated

Answer

Encryption is the process of converting plaintext into coded text using a specific set of rules or algorithms, thereby securing the data from unauthorized access.

Step 18

Explain how public key encryption works.

97%

121 rated

Answer

Public key encryption involves the use of a pair of keys; a public key that is shared openly and a private key that is kept confidential. When a message is sent, it is encrypted using the recipient's public key and can only be decrypted with their private key, ensuring secure communication.

Step 19

What other visual indication is displayed that indicates that the website is secure, besides the yellow lock?

96%

114 rated

Answer

The URL contains 'https://', which indicates that the communication between the user and the website is encrypted.

Step 20

Which TWO pieces of information on the certificate can be used to verify that the website is legitimate?

99%

104 rated

Answer

  1. The certificate is issued by a trusted third-party company, confirming its authenticity.
  2. It is linked to a specific web address, verifying that it is valid for that domain.

Step 21

Explain what social engineering is.

96%

101 rated

Answer

Social engineering is the manipulation or tricking of individuals into revealing personal information or performing actions that compromise their security, often by exploiting trust or human psychology.

Step 22

What is a consequence of falling victim to social engineering?

98%

120 rated

Answer

A consequence of falling victim to social engineering can include identity theft or unauthorized access to sensitive information, which can lead to financial loss or damage to personal reputation.

Step 23

Define the term green computing.

97%

117 rated

Answer

Green computing refers to environmentally responsible computing practices, which aim to reduce the overall environmental impact of technology throughout its lifecycle, from design and manufacturing to use and disposal.

Step 24

Suggest any TWO initiatives for the library to implement green computing.

97%

121 rated

Answer

  1. Store records electronically to minimize paper usage.
  2. Encourage staff to turn off computers when not in use to conserve energy.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;