1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
B
C
D
1.1.2 A digital signature is used …
A
B
C
D
1.1.3 A Trojan virus is designed to …
A
B
C
D
1.1.4 A technique used to make electronic communication appear to originate from a legitimate source is known as …
A
B
C
D
1.1.5 To establish a relationship between two tables in a database, a link must be made from the …
A
B
C
D
1.2 Give ONE word/term for each of the following descriptions - NSC Information Technology - Question 1 - 2017 - Paper 2
Question 1
1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
B
C
D
1.1.2 A digital signature is used …
A
B
C
D
1.1.3 A Trojan virus is designed to …
A
B
C
D
1.1.4 A tec... show full transcript
Worked Solution & Example Answer:1.1 The result of the expression 7 MOD 5 + 10 DIV 3:
A
B
C
D
1.1.2 A digital signature is used …
A
B
C
D
1.1.3 A Trojan virus is designed to …
A
B
C
D
1.1.4 A technique used to make electronic communication appear to originate from a legitimate source is known as …
A
B
C
D
1.1.5 To establish a relationship between two tables in a database, a link must be made from the …
A
B
C
D
1.2 Give ONE word/term for each of the following descriptions - NSC Information Technology - Question 1 - 2017 - Paper 2
Step 1
The result of the expression 7 MOD 5 + 10 DIV 3:
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To solve this, first evaluate the modulo and division: 7 MOD 5 = 2 and 10 DIV 3 = 3. Thus, the result is 2 + 3 = 5. The correct option is D.
Step 2
A digital signature is used …
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A digital signature is used to verify the authenticity and integrity of a message. The correct option is B.
Step 3
A Trojan virus is designed to …
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Trojan virus is designed to gain access to the system and harm it under the guise of legitimate software. The correct option is B.
Step 4
A technique used to make electronic communication appear to originate from a legitimate source is known as …
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This technique is known as spoofing, which deceives users into believing the communication is from a trusted source. The correct option is B.
Step 5
To establish a relationship between two tables in a database, a link must be made from the …
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To establish a relationship, a primary key in one table must be linked to a foreign key in another table. The correct option is D.
Step 6
The amount of data an ISP allows a user to upload and download in a particular time period
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This is referred to as a CAP or Data bundle.
Step 7
A website that is regularly updated with news and events in chronological order
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This is known as a Blog or Weblog.
Step 8
A person who breaks into a system to steal data electronically or to make unauthorised changes to electronic data
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Such a person is referred to as a Cracker or Hacker.
Step 9
An Internet service that translates a domain name to an IP address, e.g. www.abcd.com translates to 169.150.100.123
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This service is known as DNS (Domain Name System).
Step 10
The protocol used for secure encrypted transfer of data on the Internet
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This protocol is HTTPS or SSL.
Step 11
The process whereby the existing firmware is wiped and replaced by an updated version
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This process is known as Flushing the ROM.
Step 12
An Internet-based alternative to text messaging, in which multimedia can be exchanged in real time via applications, such as WhatsApp
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This is often referred to as Instant messaging (IM).
Step 13
A common format for storing digital music by combining efficient compression techniques and good quality sound
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This format is typically MP3 (MPEG-1 Audio Layer 3).
Step 14
Gaining unauthorised access to and making use of a connection in an unsecured Wi-Fi network
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This practice is known as Piggybacking.
Step 15
The diagnostic testing that occurs once a computer is powered on.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!