3.1 Having a large computer network presents potential challenges - NSC Information Technology - Question 3 - 2021 - Paper 2
Question 3
3.1 Having a large computer network presents potential challenges.
3.1.1 Describe what a computer network is.
3.1.2 What type of network could be used by an intern... show full transcript
Worked Solution & Example Answer:3.1 Having a large computer network presents potential challenges - NSC Information Technology - Question 3 - 2021 - Paper 2
Step 1
3.1.1 Describe what a computer network is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A computer network is a collection of interconnected devices that communicate over a medium to share resources such as hardware, software, and data. This setup allows users to send and receive information efficiently.
Step 2
3.1.2 What type of network could be used by an international company such as this?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An international company may use a Wide Area Network (WAN) to facilitate communication between branches located across different geographical regions.
Step 3
3.1.3 State TWO disadvantages of using a computer network.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A high level of expertise is required to manage and maintain the network effectively.
The risk of malware spreading across the network, potentially compromising sensitive data.
Step 4
3.2.1 Define the term topology.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Topology refers to the arrangement or layout of devices in a network, influencing how data is transmitted between them.
Step 5
3.2.2 Explain what a star topology entails.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
In a star topology, each device is connected to a central hub or switch, allowing for independent communication. This structure simplifies the detection of failures since a fault in one connection does not affect others.
Step 6
3.3.1 Give TWO reasons why a company would benefit from VoIP technology.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
VoIP technology often reduces communication costs compared to traditional phone systems.
It enables advanced features such as video conferencing, document sharing, and simultaneous communication across multiple platforms.
Step 7
3.3.2 Besides the device you are using, state ONE other requirement needed to make a phone call using VoIP software.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An internet connection is required to facilitate voice communication over the VoIP network.
Step 8
3.4.1 (a) What is the purpose of a web browser?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of a web browser is to access and display web pages from the internet, allowing users to navigate between different sites.
Step 9
3.4.1 (b) Why can a web browser not be used on its own when searching for information?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A web browser requires a search engine to find specific content, as it typically displays web pages rather than conducting searches on their own.
Step 10
3.4.2 (a) What is a cookie in this context?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cookie is a small text file stored on a user's device that contains information about their preferences and settings for a particular website.
Step 11
3.4.2 (b) Explain how a cookie will enhance the browsing experience of users.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cookies improve the browsing experience by remembering user preferences and automatically applying them on repeat visits, making navigation smoother and more personalized.
Step 12
3.4.3 Explain what a click farm is.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Click farms are operations where individuals or automated bots are paid to generate false clicks or likes on web pages, artificially boosting the popularity or visibility of products and services.
Step 13
3.5.1 Differentiate between the terms range and bandwidth.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Range refers to the distance a signal can travel within a network, whereas bandwidth defines the capacity of the connection, indicating how much data can be transmitted in a given time period.
Step 14
3.5.2 Differentiate between shaping and throttling in this context.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Shaping prioritizes certain types of network traffic to ensure efficient use during congestion, while throttling restricts bandwidth for all activities when the network is overwhelmed.
Step 15
3.6.1 Explain the purpose of a digital certificate when SSL encryption is used.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of a digital certificate is to verify the authenticity and legitimacy of a person or organization, ensuring secure connections through SSL encryption.
Step 16
3.6.2 How would you identify a website that is encrypted with a secure connection?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A website with a secure connection typically has 'https://' in its URL and displays a lock symbol in the browser's address bar.
Step 17
3.7.1 Define the term computer worm.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A computer worm is a type of malware that replicates itself to spread to other devices, often exploiting vulnerabilities in software or operating systems.
Step 18
3.7.2 State ONE activity performed by your electronic device that indicates that the device could be infected with a computer worm.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An unusual slowdown in system performance despite no new applications being installed may indicate a computer worm infection.
Step 19
3.7.3 Briefly explain how a firewall can protect a network from being compromised.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A firewall monitors incoming and outgoing network traffic, deciding whether to allow or block data packets based on predefined security rules, thus preventing unauthorized access.
Step 20
3.7.4 Give the term used to describe a person that is hired by a company to hack into the company's network to test their level of security.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This person is known as a penetration tester or ethical hacker.