The magazine publishing company has branches all around the world that operates on a large scale - NSC Information Technology - Question 3 - 2021 - Paper 2
Question 3
The magazine publishing company has branches all around the world that operates on a large scale.
3.1 Having a large computer network presents potential challenges.... show full transcript
Worked Solution & Example Answer:The magazine publishing company has branches all around the world that operates on a large scale - NSC Information Technology - Question 3 - 2021 - Paper 2
Step 1
3.1.1 Describe what a computer network is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A computer network is defined as a collection of multiple devices that are interconnected through a communication medium. This setup allows the devices to communicate with each other and share software, hardware, data, and information.
Step 2
3.1.2 What type of network could be used by an international company such as this?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An international company could utilize a Wide Area Network (WAN) or the Internet to connect their branches located in different parts of the world.
Step 3
3.1.3 State TWO disadvantages of using a computer network.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A sophisticated security system is required to protect the network from cyber threats.
If there is a server malfunction, it can disrupt the entire network, leading to potential data loss.
Step 4
3.2.1 Define the term topology.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Topology refers to the layout or arrangement of devices in a network.
Step 5
3.2.2 Explain what a star topology entails.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A star topology requires all devices to be connected to a central hub or switch. This allows for easy management and isolation of devices, as communication between devices goes through the hub.
Step 6
3.3.1 Give TWO reasons why a company would benefit from VoIP technology.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
VoIP technology typically offers lower communication costs, making it more economical for companies.
It allows for additional features like video conferencing, which can enhance collaboration.
Step 7
3.3.2 Besides the device you are using, state ONE other requirement needed to make a phone call using VoIP software.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An internet connection is required to make a phone call using VoIP software.
Step 8
3.4.1 (a) What is the purpose of a web browser?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A web browser is designed to display web pages and allows users to navigate the internet.
Step 9
3.4.1 (b) Why can a web browser not be used on its own when searching for information?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A web browser needs a search engine to find content because it does not inherently know how to locate specific information on the web.
Step 10
3.4.2 (a) What is a cookie in this context?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
In this context, a cookie is a small text file that is stored on a user's device containing preferences or settings for a website.
Step 11
3.4.2 (b) Explain how a cookie will enhance the browsing experience of users.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cookies enhance the browsing experience by remembering user preferences, so when they revisit a website, it can tailor the content to their prior settings, providing a more personalized experience.
Step 12
3.4.3 Explain what a click farm is.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Click farms are organizations that pay individuals or use bots to repeatedly click on websites to artificially boost their traffic and increase the perceived popularity or ranking of a web page.
Step 13
3.5.1 Differentiate between the terms range and bandwidth.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Range refers to the distance over which data can be transmitted, while bandwidth indicates the amount of data that can be sent or received over a network in a given time period.
Step 14
3.5.2 Differentiate between shaping and throttling in this context.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Shaping occurs when certain activities are prioritized over others to manage bandwidth when the network is busy, while throttling limits bandwidth for all activities to prevent excessive usage.
Step 15
3.6.1 Explain the purpose of a digital certificate when SSL encryption is used.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A digital certificate verifies the identity of a person or organization and establishes a secure connection using SSL encryption.
Step 16
3.6.2 How would you identify a website that is encrypted with a secure connection?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A secure website will have an 's' in its URL (e.g., https://www.Google.com) and usually displays a lock symbol in the address bar.
Step 17
3.7.1 Define the term computer worm.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A computer worm is a type of malware that exploits weaknesses in systems or applications to replicate itself and spread without direct user interaction.
Step 18
3.7.2 State ONE activity performed by your electronic device that indicates that the device could be infected with a computer worm.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A noticeable decrease in hard drive space can indicate a computer worm infection, even if no extra files have been added by the user.
Step 19
3.7.3 Briefly explain how a firewall can protect a network from being hacked.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A firewall monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Step 20
3.7.4 Give the term used to describe a person that is hired by a company to hack into the company's network to test their level of security.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'White hat hacker' or 'penetration tester,' referring to an ethical hacker who assesses the security of a network.