3.1 Explain the function of a network switch - NSC Information Technology - Question 3 - 2019 - Paper 2
Question 3
3.1 Explain the function of a network switch.
3.2 State the common use/purpose of EACH of the following technologies:
3.2.1 Wi-Fi
3.2.2 Bluetooth
3.2.3 3G
3.3 An E... show full transcript
Worked Solution & Example Answer:3.1 Explain the function of a network switch - NSC Information Technology - Question 3 - 2019 - Paper 2
Step 1
Explain the function of a network switch.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A network switch is a device that connects computers within a network. It receives data packets from one device and determines the targeted recipient device by analyzing the packet's destination address. The switch then forwards the data to the appropriate device, effectively directing the flow of network traffic.
Step 2
State the common use/purpose of EACH of the following technologies:
3.2.1 Wi-Fi
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Wi-Fi is used to connect devices wirelessly to a local area network (LAN) or to the internet. It allows users to access the network without cables, providing mobility and convenience.
Step 3
State the common use/purpose of EACH of the following technologies:
3.2.2 Bluetooth
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Bluetooth technology is utilized for short-range communications, allowing devices such as laptops, smartphones, and tablets to wirelessly exchange data over short distances.
Step 4
State the common use/purpose of EACH of the following technologies:
3.2.3 3G
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
3G technology enables mobile devices to access the internet and use multimedia services. It provides faster data transfer rates compared to previous generations, facilitating smooth internet browsing and streaming.
Step 5
Name TWO types of cables that are commonly used in an Ethernet network.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Twisted Pair Cable (often UTP or STP)
Coaxial Cable (also known as coax)
Step 6
Draw a diagram to illustrate the layout of a star topology network for the four computers.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A star topology diagram should depict four computers connected to a central device (switch/router). Each computer should have its own cable linking it directly to the switch. This layout ensures that if one connection fails, the others remain unaffected.
Step 7
State TWO disadvantages of using a peer-to-peer network.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Peer-to-peer networks usually have lower security because each device can access the shared resources directly, making it more vulnerable to unauthorized access.
They can be more challenging to manage and maintain compared to client-server networks, especially as the number of devices increases.
Step 8
Explain what is meant by the term encryption.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Encryption refers to the process of converting data into a format that is unreadable to unauthorized users. This is usually done using algorithms and keys, ensuring that only those with the correct key can access or understand the information.
Step 9
Give ONE reason why services, such as Skype, use encryption processes.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Skype utilizes encryption to ensure the privacy of its users by securing their communication from potential eavesdroppers, thus protecting personal information and conversations.
Step 10
Encryption software is often used to control access to media files to prevent unauthorised copying of digital books or movies.
What is this category of encryption software called?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This category of encryption software is known as Digital Rights Management (DRM).
Step 11
Briefly describe how the inference/decision engine functions.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The inference engine is the component of an expert system that processes the data given to it, often derived from user inputs. It accesses the knowledge base to retrieve relevant information and deduces new facts or makes decisions to generate an output.
Step 12
What does the term fuzzy logic refer to?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fuzzy logic is a form of logic that allows for reasoning with imprecise or uncertain information. It operates on degrees of truth rather than the standard true or false binary, enabling better decision-making in complex scenarios.
Step 13
What is meant by the term distributed computing?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Distributed computing refers to a model where a system’s resources are spread across multiple computers, enabling them to collaborate and share workloads simultaneously to solve a single problem efficiently.