Photo AI

The shopping complex will use a cabled network to connect all the shops - NSC Information Technology - Question 3 - 2017 - Paper 2

Question icon

Question 3

The-shopping-complex-will-use-a-cabled-network-to-connect-all-the-shops-NSC Information Technology-Question 3-2017-Paper 2.png

The shopping complex will use a cabled network to connect all the shops. 3.1 The cabled LAN in the shopping complex will have access to the Internet. 3.1.1 Give TW... show full transcript

Worked Solution & Example Answer:The shopping complex will use a cabled network to connect all the shops - NSC Information Technology - Question 3 - 2017 - Paper 2

Step 1

3.1.1 Give TWO reasons to motivate the use of UTP cables for the network in the shopping complex.

96%

114 rated

Answer

  1. Ease of Installation: UTP cables are relatively straightforward to install compared to fiber optics, which may require specialized skills.

  2. Cost-Effectiveness: UTP cables are generally cheaper than fiber cables, making them a more affordable option for large-scale installations such as a shopping complex.

Step 2

3.1.2 Which hardware device (Device A) will be used so that the LAN will have Internet access?

99%

104 rated

Answer

Router: A router will be used to connect Device A to the Internet, enabling access for the LAN.

Step 3

3.1.3 Suggest a suitable topology for the LAN.

96%

101 rated

Answer

Star Topology: This topology is ideal for the LAN as it connects all devices to a central hub or switch, improving performance and fault tolerance.

Step 4

3.2 State TWO advantages of using a client-server network rather than a peer-to-peer network.

98%

120 rated

Answer

  1. Enhanced Security: Client-server networks offer more sophisticated security measures, safeguarding sensitive data.

  2. Better Performance: They can handle multiple users effectively, providing faster and more reliable service compared to peer-to-peer setups.

Step 5

3.3.1 Suggest ONE reason for keeping software up to date.

97%

117 rated

Answer

Fixing Vulnerabilities: Regular updates fix flaws that may make the computer system vulnerable to hackers, thereby enhancing overall security.

Step 6

3.3.2 State TWO responsibilities of the system administrator.

97%

121 rated

Answer

  1. Regular Backups: Ensuring that data is backed up periodically to prevent losses in case of system failures.

  2. User Management: Creating or deleting user accounts and managing their permissions on the system.

Step 7

3.4.1 Explain what role password protection plays in the security of data.

96%

114 rated

Answer

Unauthorized Access Prevention: Password protection safeguards data by restricting access to only those with the correct credentials, thus protecting against unauthorized changes or theft.

Step 8

3.4.2 Define the term malware.

99%

104 rated

Answer

Malware: Malware refers to malicious software designed specifically to install itself without user consent and negatively affect the computer system.

Step 9

3.4.3 Explain how a firewall assists in providing security to computers on a network.

96%

101 rated

Answer

Security Monitoring: A firewall monitors communication ports and traffic between the network and the external internet, preventing unauthorized access and potential threats.

Step 10

3.5.1 What is a cookie in computing terms?

98%

120 rated

Answer

Cookie: A cookie is a small text file saved on the local hard drive after visiting a website, storing users' preferences and configuration settings.

Step 11

3.5.2 Explain what a dynamic web page is.

97%

117 rated

Answer

Dynamic Web Page: A dynamic web page is generated by a server each time it's accessed, meaning different users may see different content based on their interactions.

Step 12

3.5.3 How are CSSs (cascading style sheets) used in developing a web page?

97%

121 rated

Answer

Web Page Formatting: CSS is used to define the layout and appearance of a web page, allowing developers to apply styles to individual components without altering the HTML structure.

Step 13

3.5.4(a) Why is it recommended that the company's website have a digital certificate?

96%

114 rated

Answer

Trust and Security: A digital certificate authenticates the identity of the website, ensuring that users can trust it and protecting sensitive information transmitted.

Step 14

3.5.4(b) State TWO details that are found on the digital certificate.

99%

104 rated

Answer

  1. Owner's Public Key: This is used for encrypting information that can only be decrypted by the owner.

  2. Certificate Authority: The name of the organization that issues the certificate, providing additional verification of the website's legitimacy.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;