Photo AI

1.1 The result of the expression 7 MOD 5 + 10 DIV 3: A B C D 1.1.2 A digital signature is used … A B C D 1.1.3 A Trojan virus is designed to … A B C D 1.1.4 A technique used to make electronic communication appear to originate from a legitimate source is known as … A B C D 1.1.5 To establish a relationship between two tables in a database, a link must be made from the … A B C D 1.2 Give ONE word/term for each of the following descriptions - NSC Information Technology - Question 1 - 2017 - Paper 2

Question icon

Question 1

1.1-The-result-of-the-expression-7-MOD-5-+-10-DIV-3:-A-B-C-D--1.1.2-A-digital-signature-is-used-…-A-B-C-D--1.1.3-A-Trojan-virus-is-designed-to-…-A-B-C-D--1.1.4-A-technique-used-to-make-electronic-communication-appear-to-originate-from-a-legitimate-source-is-known-as-…-A-B-C-D--1.1.5-To-establish-a-relationship-between-two-tables-in-a-database,-a-link-must-be-made-from-the-…-A-B-C-D--1.2-Give-ONE-word/term-for-each-of-the-following-descriptions-NSC Information Technology-Question 1-2017-Paper 2.png

1.1 The result of the expression 7 MOD 5 + 10 DIV 3: A B C D 1.1.2 A digital signature is used … A B C D 1.1.3 A Trojan virus is designed to … A B C D 1.1.4 A tec... show full transcript

Worked Solution & Example Answer:1.1 The result of the expression 7 MOD 5 + 10 DIV 3: A B C D 1.1.2 A digital signature is used … A B C D 1.1.3 A Trojan virus is designed to … A B C D 1.1.4 A technique used to make electronic communication appear to originate from a legitimate source is known as … A B C D 1.1.5 To establish a relationship between two tables in a database, a link must be made from the … A B C D 1.2 Give ONE word/term for each of the following descriptions - NSC Information Technology - Question 1 - 2017 - Paper 2

Step 1

The result of the expression 7 MOD 5 + 10 DIV 3:

96%

114 rated

Answer

To solve this, first evaluate the modulo and division: 7 MOD 5 = 2 and 10 DIV 3 = 3. Thus, the result is 2 + 3 = 5. The correct option is D.

Step 2

A digital signature is used …

99%

104 rated

Answer

A digital signature is used to verify the authenticity and integrity of a message. The correct option is B.

Step 3

A Trojan virus is designed to …

96%

101 rated

Answer

A Trojan virus is designed to gain access to the system and harm it under the guise of legitimate software. The correct option is B.

Step 4

A technique used to make electronic communication appear to originate from a legitimate source is known as …

98%

120 rated

Answer

This technique is known as spoofing, which deceives users into believing the communication is from a trusted source. The correct option is B.

Step 5

To establish a relationship between two tables in a database, a link must be made from the …

97%

117 rated

Answer

To establish a relationship, a primary key in one table must be linked to a foreign key in another table. The correct option is D.

Step 6

The amount of data an ISP allows a user to upload and download in a particular time period

97%

121 rated

Answer

This is referred to as a CAP or Data bundle.

Step 7

A website that is regularly updated with news and events in chronological order

96%

114 rated

Answer

This is known as a Blog or Weblog.

Step 8

A person who breaks into a system to steal data electronically or to make unauthorised changes to electronic data

99%

104 rated

Answer

Such a person is referred to as a Cracker or Hacker.

Step 9

An Internet service that translates a domain name to an IP address, e.g. www.abcd.com translates to 169.150.100.123

96%

101 rated

Answer

This service is known as DNS (Domain Name System).

Step 10

The protocol used for secure encrypted transfer of data on the Internet

98%

120 rated

Answer

This protocol is HTTPS or SSL.

Step 11

The process whereby the existing firmware is wiped and replaced by an updated version

97%

117 rated

Answer

This process is known as Flushing the ROM.

Step 12

An Internet-based alternative to text messaging, in which multimedia can be exchanged in real time via applications, such as WhatsApp

97%

121 rated

Answer

This is often referred to as Instant messaging (IM).

Step 13

A common format for storing digital music by combining efficient compression techniques and good quality sound

96%

114 rated

Answer

This format is typically MP3 (MPEG-1 Audio Layer 3).

Step 14

Gaining unauthorised access to and making use of a connection in an unsecured Wi-Fi network

99%

104 rated

Answer

This practice is known as Piggybacking.

Step 15

The diagnostic testing that occurs once a computer is powered on.

96%

101 rated

Answer

This is referred to as POST (Power-on self-test).

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;