3.1 Sharing resources is an important benefit of using networks - NSC Information Technology - Question 3 - 2018 - Paper 2
Question 3
3.1 Sharing resources is an important benefit of using networks.
State TWO other benefits of having a computer network in a company.
3.2 In laptop computers NICs ar... show full transcript
Worked Solution & Example Answer:3.1 Sharing resources is an important benefit of using networks - NSC Information Technology - Question 3 - 2018 - Paper 2
Step 1
State TWO other benefits of having a computer network in a company.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fast and efficient communication among employees, enabling quick decision-making and collaboration.
Centralization of data, which ensures that data is always up-to-date and accessible from multiple devices.
Step 2
Explain the function of an NIC when providing network connectivity.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Network Interface Card (NIC) is responsible for encoding and decoding data so that it can be transmitted over the network. It converts data into a format suitable for the network medium and allows for communication between devices.
Step 3
What medium is used to send and receive data in a Wi-Fi network?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Radio waves are the medium used for transmitting and receiving data in a Wi-Fi network.
Step 4
Name a type of network cable that has a very low level of attenuation of signal.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fibre optic cables are used for their very low level of signal attenuation, allowing data to be transmitted over longer distances without loss of quality.
Step 5
Explain how poor signal strength can be addressed when setting up wireless communication networks.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Poor signal strength can be enhanced by strategically placing access points or by using repeaters to boost the signal. Adjusting the antennas for optimal line of sight, and using devices like boosters or amplifiers can also help in increasing signal strength.
Step 6
Give TWO reasons why companies providing wireless internet access prefer to use WiMAX instead of Wi-Fi.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
WiMAX offers greater range compared to Wi-Fi, making it suitable for wider area coverage.
WiMAX supports higher bandwidth and faster data transfer, which is essential for businesses requiring efficient internet access.
Step 7
Explain what is meant by the term Semantic Web.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The Semantic Web refers to a web that is designed to allow computers and devices to filter and understand content intelligently, enabling better navigation and interaction without requiring human intervention.
Step 8
What is the purpose of metadata in the Semantic Web?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Metadata serves to supply additional context, aiding in optimising searches and providing improved results based on specific data criteria.
Step 9
Which protocol is used to download e-mail?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
POP3 (Post Office Protocol version 3) is typically used for downloading e-mail.
Step 10
Differentiate between notifications and push technology in terms of the way e-mail is handled on a mobile device.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Notifications alert the user with a sound or message when a new email arrives. Push technology actively sends the e-mail to the device and notifies the user in real-time, automatically downloading the email.
Step 11
Explain how a cloud-service can be used to make large files available to an e-mail recipient, without attaching the files to the e-mail.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cloud service allows users to upload large files to a shared space. Instead of sending the files as attachments, an email with a link to the uploaded file is sent, enabling the recipient to access it directly.
Step 12
Explain the term phishing.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Phishing is a cybercrime technique used to deceive users into providing sensitive information by impersonating a legitimate organisation.
Step 13
Give ONE example of phishing.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A common example of phishing is an email that appears to be from a bank asking users to confirm their account details by clicking a link that leads to a fraudulent website.