1.1.1 The process used to reverse a database transaction and restore the data to a previous state is called …
A default state revert - NSC Information Technology - Question 1 - 2019 - Paper 2
Question 1
1.1.1 The process used to reverse a database transaction and restore the data to a previous state is called …
A default state revert.
B revert.
C state restor... show full transcript
Worked Solution & Example Answer:1.1.1 The process used to reverse a database transaction and restore the data to a previous state is called …
A default state revert - NSC Information Technology - Question 1 - 2019 - Paper 2
Step 1
The process used to reverse a database transaction and restore the data to a previous state is called …
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is: D - rollback. This process undoes any changes made to the database since a certain point, effectively reverting to the previous state.
Step 2
The technology that combines JavaScript with a browser command and allows the browser to update only a small part of a web page is called …
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is: B - AJAX. AJAX (Asynchronous JavaScript and XML) allows for the asynchronous transfer of data from the server without requiring a full page reload.
Step 3
A type of reasoning that works with probabilities in order to arrive at a decision is called …
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is: C - fuzzy logic. Fuzzy logic is used in various fields, including artificial intelligence, to handle reasoning that is approximate rather than fixed and exact.
Step 4
A method of encryption that utilises two separate keys to encrypt and decrypt data is known as …
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is: D - public key encryption. This method uses a pair of keys: a public key for encryption and a private key for decryption.
Step 5
… is a built-in Delphi function that returns the integer part of a floating point number.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The correct answer is: C - Trunc(). This function is commonly used to truncate the decimal part of a floating point number and return only the integer portion.