The learners who are helping with stocktaking are using their own mobile devices to record data and to communicate with each other and the administrators - NSC Information Technology - Question 6 - 2016 - Paper 2
Question 6
The learners who are helping with stocktaking are using their own mobile devices to record data and to communicate with each other and the administrators.
6.1 Surve... show full transcript
Worked Solution & Example Answer:The learners who are helping with stocktaking are using their own mobile devices to record data and to communicate with each other and the administrators - NSC Information Technology - Question 6 - 2016 - Paper 2
Step 1
6.1.1 Name TWO security techniques that the school could implement to provide access control to the server room.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The school could implement the following security techniques:
Biometrics - Utilizing fingerprint or facial recognition systems to ensure only authorized personnel can access the server room.
Access Control Cards - Implementing security cards that individuals need to swipe or scan to gain entry into the server room.
Step 2
6.1.2 (a) Explain the benefit of using compression.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Using compression reduces the size of video files. This results in faster file transfer rates and decreased storage space requirements, allowing for more efficient use of bandwidth and data storage.
Step 3
6.1.2 (b) Briefly explain what lossy compression entails.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Lossy compression is a method that reduces file size by permanently eliminating certain data. This means that some quality is sacrificed for a more compact file, which may not be suitable for all applications, especially where detail is important.
Step 4
6.1.3 (a) Explain what an audit trail is.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An audit trail is a systematic record that tracks changes made to data. It documents who accessed the information and what actions were taken, thereby providing a history that can be reviewed for security and accountability.
Step 5
6.1.3 (b) Name TWO types of information that should be recorded for audit purposes.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
For audit purposes, the following information should be recorded:
Stock Items - Details regarding which items were checked or modified.
Date of Issuing and Returning Items - Documenting when items were accessed, returned, or transferred.
Step 6
6.2.1 What does it mean to encrypt data?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To encrypt data means to convert it into an unreadable format using a specific algorithm or set of rules. This ensures that only authorized parties can access the original data using the appropriate decryption key.
Step 7
6.2.2 Briefly explain the difference between the public key and private key in this security standard.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
In a public/private key encryption system, the public key is available to anyone to encrypt messages meant for the holder of the private key, which is kept confidential. The private key is used to decrypt messages that were encrypted with the corresponding public key, ensuring secure communication.
Step 8
6.3.1 Suggest TWO different techniques that will make secure access to the server containing the security footage possible.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two techniques that can ensure secure access are:
Virtual Private Network (VPN) - This creates a secure connection over the Internet, allowing remote access to the server safely.
Remote Desktop - Utilizing remote desktop applications can allow authorized personnel to securely access the server from remote locations.
Step 9
6.3.2 Differentiate between an intranet and an extranet.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An intranet is a private network that provides access to authorized members within an organization, such as school staff, allowing them to share information internally. An extranet, on the other hand, allows external users (e.g., security personnel) limited access to specific information, often secured by passwords and unique usernames.
Step 10
6.4 Suggest TWO ways in which the learners can extend the battery life of their mobile devices while they are using these devices.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Learners can extend battery life by:
Turning off Bluetooth/Wi-Fi - Disabling these features when not needed reduces power consumption.
Changing the brightness settings of the display - Lowering screen brightness can significantly save battery life.
Step 11
6.5.1 Briefly explain what RFID technology is.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
RFID (Radio Frequency Identification) technology uses radio waves to automatically identify and track tags attached to objects. These tags contain electronically stored information that can be read wirelessly.
Step 12
6.5.2 State TWO advantages of using RFID technology when doing stocktaking.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two advantages of using RFID for stocktaking are:
Ability to Read Multiple Tags Simultaneously - RFID can scan many items at once, improving efficiency in inventory management.
No Need for Physical Handling - RFID tags can be read without direct line-of-sight or requiring manual scanning, streamlining the stocktaking process.
Step 13
6.6.1 Explain what Bluetooth technology is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Bluetooth technology is a short-range wireless communication protocol that enables devices to connect and exchange data over short distances, typically within a range of 10 meters.
Step 14
6.6.2 Give ONE reason why Bluetooth is a suitable technology to use in this case.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Bluetooth is suitable because it is easy to set up, allowing users to connect their devices quickly without needing complex configurations.
Step 15
6.7.1 To what does a cloud-based service refer?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cloud-based service refers to any service that is provided over the Internet, allowing users to access resources and applications remotely without needing to store data locally.
Step 16
6.7.2 Explain what outsourcing is in this context.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Outsourcing in this context means hiring external service providers to manage the school's cloud services instead of handling these tasks in-house. This allows the school to focus on its core activities while benefiting from specialized expertise.
Step 17
6.7.3 State TWO benefits for the school if they were to outsource the data service.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Benefits of outsourcing data services for the school include:
Cost Savings - The school does not need to invest in expensive hardware or software, as these are managed by the service provider.
Access to Expertise - The school can benefit from the knowledge and skills of professionals who specialize in managing cloud services.
Step 18
6.7.4 What is this technique called?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This technique is called virtualization, which allows multiple virtual machines to run on a single physical server, creating the illusion of dedicated resources for each user.
Step 19
6.7.5 State TWO duties of the database administrator.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The duties of a database administrator include:
Backup and Restoration Plans - Ensuring data is regularly backed up and can be restored in case of loss or corruption.
General Maintenance of the Database - Overseeing the performance, security, and optimization of the database systems.