1.1 Give ONE word/term for each of the following descriptions - NSC Information Technology - Question 1 - 2016 - Paper 2
Question 1
1.1 Give ONE word/term for each of the following descriptions. Write only the word/term next to the question number (1.1.1–1.1.10) in the ANSWER BOOK.
1.1.1 A compa... show full transcript
Worked Solution & Example Answer:1.1 Give ONE word/term for each of the following descriptions - NSC Information Technology - Question 1 - 2016 - Paper 2
Step 1
1.1.1 A company that has a permanent, fast connection to the Internet and sells Internet access and services at a monthly fee
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Internet Service Provider
Step 2
1.1.2 Initiatives to design, use and dispose of technology in an environmentally friendly way
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Green computing
Step 3
1.1.3 A series of steps that need to be followed when designing a database to ensure that no data redundancy occurs
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Normalisation
Step 4
1.1.4 Software that is stored permanently on the ROM chip of a device, such as a printer, to control the basic operation of the device
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Firmware
Step 5
1.1.5 A protocol used for the transfer of large files between computers by means of an Internet connection
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
FTP - file transfer protocol
Step 6
1.1.6 Software that translates programming instructions written in a high-level language into a file with an '.exe' extension that can be run independently of the programming language
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Compiler
Step 7
1.1.7 A field of study that involves simulation of human decision-making processes by a computer system that is programmed to react on input received from sensors
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Artificial Intelligence
Step 8
1.1.8 This component generates pulses at regular frequencies to control the activities of the motherboard
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
System clock
Step 9
1.1.9 A technology used by devices to automatically give a notification that a new message has arrived
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Push technology
Step 10
1.1.10 The key field in a database table that links to the primary key in another database table in order to create a relationship between the two tables
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Foreign/Secondary key
Step 11
1.2.1 The concept of packaging data and procedures into a single object to prevent access from outside the object is called …
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
B
Step 12
1.2.2 This type of test is performed by end-users and focuses on the functionality of a system and the validation of the fitness for use:
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D
Step 13
1.2.3 A range check …
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
B
Step 14
1.2.4 The deliberate disruption of computer access to an Internet service such as the Web or e-mail by overloading the network with a large number of requests is known as …
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
D
Step 15
1.2.5 Determine the number of times the instructions inside the nested loop will be executed:
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!