6.1 Due to the large funds required up front, the company decides to utilise crowd funding - NSC Information Technology - Question 6 - 2022 - Paper 2
Question 6
6.1 Due to the large funds required up front, the company decides to utilise crowd funding.
6.1.1 Briefly explain what crowd funding is.
6.1.2 The company also man... show full transcript
Worked Solution & Example Answer:6.1 Due to the large funds required up front, the company decides to utilise crowd funding - NSC Information Technology - Question 6 - 2022 - Paper 2
Step 1
Briefly explain what crowd funding is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Crowd funding is the practice of funding a project or venture by raising small amounts of money from a large number of people, typically via the internet or social networks.
Step 2
State TWO advantages of using technology to automate the assembly of new vehicles.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Safer work environment due to reduced human error in repetitive tasks.
Increased productivity as technology can operate continuously without fatigue.
Step 3
Explain how a learning algorithm would be used to improve the manufacturing and sales of new vehicles.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A learning algorithm can observe current manufacturing trends and processes, determining which vehicle features are most popular. It creates a set of rules based on this data to optimize production methods and tailor marketing strategies.
Step 4
Expand the acronym RFID.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Radio Frequency Identification.
Step 5
Explain how passive tags, that are used to pay toll fees, work.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Passive tags function by receiving a radio signal from a reader that activates the tag. The tag then transmits its stored information back to the reader, which deducts the toll fee from the user's account.
Step 6
Name the technology that is used to determine the location of a vehicle.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Global Positioning System (GPS).
Step 7
Why will active tags be needed for satellite tracking?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Active tags use an internal battery to continuously transmit signals, providing a more reliable and consistent means of tracking vehicles over long distances.
Step 8
Package A is uncapped. What does this refer to?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Uncapped refers to having no limit on the amount of data that can be used in a month.
Step 9
Why would you install fibre rather than mobile LTE in a home?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fibre offers faster and more stable internet speeds compared to mobile LTE, making it ideal for activities such as streaming, gaming, and video conferencing.
Step 10
Which hardware device, besides cabling, would you need to connect to the internet using the FTTH service?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A router or ONT (Optical Network Terminal) is required to connect devices to the FTTH service.
Step 11
Will the 70GB Night Surfer Data from package B hold any benefit to the company? Motivate your answer.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Yes, the 70GB Night Surfer Data allows the company to perform data-heavy tasks or updates during off-peak hours, thus reducing costs associated with higher data rates during peak usage.
Step 12
What is a rootkit?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A rootkit is a type of malicious software designed to remotely control a computer without being detected, often giving unauthorized users administrative access.
Step 13
Give ONE simple implication of the rootkit that installed itself on a user’s computer.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
It can open the computer up to hacking or unauthorized access, potentially leading to data theft.
Step 14
Define what social engineering entails.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Social engineering involves manipulating individuals into revealing confidential or personal information that can be used for fraudulent purposes.
Step 15
How does antivirus software identify malware?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Antivirus software identifies malware by scanning files for known signatures and behaviors associated with malicious software.
Step 16
State TWO ways in which artificial intelligence can be used when working with big data.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
AI can help identify patterns in large datasets quickly and accurately.
AI can automate data processing tasks, which increases efficiency and reduces errors.
Step 17
Differentiate between the duplication model and the partitioning model regarding the storage of data for each branch.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The duplication model stores complete copies of the database at each branch, while the partitioning model only stores the relevant portion of the database for each branch, reducing redundancy.
Step 18
What does the process of purging data in a database involve?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Purging data involves deleting or removing outdated or unnecessary records from the database to maintain its efficiency and performance.
Step 19
Why would records need to be purged?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Records need to be purged to limit the size of the database, ensuring it operates efficiently, and to improve overall database performance.
Step 20
Define the concept of virtualisation.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Virtualisation is the creation of a virtual version of a resource, such as a server or storage device, allowing multiple users to share and use the same physical hardware.
Step 21
Give ONE benefit for the user of virtualisation as used in this context.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One benefit of virtualisation is the convenience of managing multiple operating systems or applications on a single physical machine without the need for additional hardware.
Step 22
Is it compulsory for the company to pay for the additional proprietary operating system installed or can it be used for free? Justify your answer.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Yes, the company must pay for the operating system if it requires specific features that are not available for free versions. This payment ensures access to updates and technical support.
Step 23
Why is it important to frequently change a password?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Frequent password changes enhance security by minimizing the risk of unauthorized access and reducing the chance of password leaks.
Step 24
Give TWO reasons why this example is NOT a strong password.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The password 'mfundi' is too short and lacks complexity. It should be more than 8 characters.
It does not contain a mix of uppercase letters, special characters, or numbers, making it easily guessable.
Step 25
State how Quantum computing can be used in the statistical process of preventing the spread of a virus.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Quantum computing can analyze vast amounts of data quickly, helping researchers model and predict virus spread patterns more accurately.
Step 26
State TWO problems of cloud computing which are solved by the use of Edge computing.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Edge computing reduces latency by processing data closer to the source, improving response times.
It decreases the risk of data loss by allowing local data processing rather than solely relying on remote servers.