A transport company has a central depot from where they run their operations - NSC Information Technology - Question 3 - 2022 - Paper 2
Question 3
A transport company has a central depot from where they run their operations.
3.1 The company has decided to use a wired LAN for the computers in the control room a... show full transcript
Worked Solution & Example Answer:A transport company has a central depot from where they run their operations - NSC Information Technology - Question 3 - 2022 - Paper 2
Step 1
3.1.1 Name the type of cable that is commonly used in a wired LAN.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The commonly used type of cable in wired LANs is the Ethernet cable, specifically category 5 (CAT 5) or category 6 (CAT 6) cables.
Step 2
3.1.2 What media is used to transmit data in a WiMAX network?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
In a WiMAX network, data transmission is typically done using radio waves, which allow for wireless communication over long distances.
Step 3
3.1.3 Name the wireless technology widely used to transmit data in LAN networks.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The wireless technology widely used to transmit data in LAN networks is Wi-Fi.
Step 4
3.2.1 What is this type of secure network called?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This type of secure network is called a Virtual Private Network (VPN).
Step 5
3.2.2 (a) What is an IP address?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An IP address is a unique identifier assigned to each device connected to a network, allowing it to communicate with other devices.
Step 6
3.2.2 (b) What is the purpose of a DNS?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of a DNS (Domain Name System) is to translate domain names into IP addresses, enabling users to access websites using easy-to-remember names rather than numerical addresses.
Step 7
3.2.3 What is the function of a network interface card (NIC) in a network?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The function of a NIC is to connect a computer to a network, enabling it to send and receive data over that network.
Step 8
3.2.4 Explain what an intranet is.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An intranet is a private network that is similar to the internet but is restricted to the members of a specific organization, allowing for secure communication and information sharing.
Step 9
3.3.1 What does streaming entail?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Streaming entails the immediate and real-time delivery of media content to a receiving device without the need for downloading it beforehand.
Step 10
3.3.2 How could the company prevent unauthorised users from viewing the content?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The company could prevent unauthorized users from viewing the content by using secure access methods such as requiring a login/password or enabling closed network channels.
Step 11
3.4.1 How can a URL be used to determine whether the site uses SSL technology or not?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A URL can be used to determine if a site uses SSL technology by checking if it starts with 'https://' instead of 'http://', indicating the use of a secure connection.
Step 12
3.4.2 (a) Explain how the encryption process works.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The encryption process works by converting data into a code using a mathematical formula, making it unreadable to unauthorized users. The data can only be decrypted with the appropriate encryption keys.
Step 13
3.4.2 (b) What is the role of the certificate authority in the process of encryption with SSL technology?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The role of the certificate authority (CA) is to verify the identity of the business or organization and issue a digital certificate that asserts the validity of the site's SSL encryption.
Step 14
3.5 Explain the difference between the functions of a router and a modem.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A modem converts the format of a signal for transmission over a specific communication medium, while a router determines the best path for the transmission of data between two points on a network.
Step 15
3.6.1 Name the type of search where the search is based on the meaning of the words, rather than using the words as keywords only.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of search based on the meaning of words is called Semantic Search.
Step 16
3.6.2 Explain the purpose of using SEO by the company.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of using SEO (Search Engine Optimization) is to increase the visibility of the company's website in search engine results, thereby attracting more visitors.
Step 17
3.7.1 Identify the protocol used by this site by studying the information provided in the address bar.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The protocol used by the site is FTP (File Transfer Protocol), as indicated by 'ftp://' in the address bar.
Step 18
3.7.2 What other popular type of file sharing services has largely replaced this type of site?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cloud storage services, such as Google Drive or Dropbox, have largely replaced traditional file sharing sites.
Step 19
3.7.3 Name ONE benefit of using file storage services that are available on the internet.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One benefit of using file storage services available on the internet is accessibility from any device with internet connectivity.