Network technologies are applied in many areas of everyday life - NSC Information Technology - Question 3 - 2017 - Paper 2
Question 3
Network technologies are applied in many areas of everyday life.
3.1 Computers used for administrative tasks are normally connected in a network.
An Ethernet LAN co... show full transcript
Worked Solution & Example Answer:Network technologies are applied in many areas of everyday life - NSC Information Technology - Question 3 - 2017 - Paper 2
Step 1
3.1.1 Name ONE type of cable that is commonly used in an Ethernet network.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One common type of cable used in an Ethernet network is UTP (Unshielded Twisted Pair).
Step 2
3.1.2 Which topology allows every computer to be connected with its own cable to a switch?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The topology that allows every computer to be connected with its own cable to a switch is known as the Star topology.
Step 3
3.1.3 Which network protocol would be used to:
(a) Access the Internet
(b) Browse web pages
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
(a) The network protocol used to access the Internet is typically TCP/IP (Transmission Control Protocol/Internet Protocol).
(b) To browse web pages, the HTTP or HTTPS protocol is used.
Step 4
3.2 What is the benefit of using a virtual private network (VPN)?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The main benefit of using a VPN is that it provides a secure connection over the Internet, allowing users to protect their data from eavesdropping and to maintain privacy while accessing online services.
Step 5
3.3.1 What is this type of data capturing called?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This type of data capturing is commonly referred to as 'invisible data capturing'.
Step 6
3.3.2 Give ONE example of a real-life situation in which this type of data capturing takes place AND name the type of information that can be captured.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of this type of data capturing is when a user makes a purchase online using a credit card. The type of information that can be captured includes the user's buying habits and personal information such as name, address, and spending patterns.
Step 7
3.3.3 What is user profiling mostly used for?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
User profiling is mostly used for targeted marketing, allowing companies to tailor advertisements and content to individual preferences and behaviors.
Step 8
3.4 Name THREE types of code a website can implement to provide interactivity.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Three types of code that a website can implement for interactivity include:
JavaScript
AJAX
Server-side scripting languages (such as PHP).
Step 9
3.5.1 What is a cookie?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cookie is a small text file stored on a user's local computer that is used to save user settings and preferences for a website.
Step 10
3.5.2 What is the effect of deleting cookies for the user?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One effect of deleting cookies is that the next time a user opens a webpage, only the default settings will be available, potentially leading to a less personalized experience.
Step 11
3.6 State TWO disadvantages of using VoIP.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two disadvantages of using VoIP are:
Both parties need to be connected to the Internet, which may not always be available.
Call quality can suffer if either party has a slow Internet connection.
Step 12
3.7 What is the purpose of a GPS?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of GPS (Global Positioning System) is to allow users to locate the position of devices or people through navigation capabilities and geotagging.
Step 13
3.8.1 Explain what DRM software is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
DRM (Digital Rights Management) software is any technology that uses encryption to manage and protect the rights to digital content, preventing unauthorized copying and distribution.
Step 14
3.8.2 Give ONE area of application of DRM software.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One area of application of DRM software is in digital books, where it is used to control access and prevent illegal copying.