3.1 State the function of EACH of the following components in a network:
(a) Switch
(b) Wireless access point
(c) Router
(d) Server
3.1.2 A firewall is essential in a network to safeguard against breaches in security - NSC Information Technology - Question 3 - 2023 - Paper 2
Question 3
3.1 State the function of EACH of the following components in a network:
(a) Switch
(b) Wireless access point
(c) Router
(d) Server
3.1.2 A firewall is essentia... show full transcript
Worked Solution & Example Answer:3.1 State the function of EACH of the following components in a network:
(a) Switch
(b) Wireless access point
(c) Router
(d) Server
3.1.2 A firewall is essential in a network to safeguard against breaches in security - NSC Information Technology - Question 3 - 2023 - Paper 2
Step 1
Function of (a) Switch
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The switch connects various devices within a network, enabling data transfer between them and regenerating signals to maintain the integrity of the data being sent.
Step 2
Function of (b) Wireless access point
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The wireless access point sends and receives data via radio waves, facilitating wireless connectivity for devices to access the network.
Step 3
Function of (c) Router
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The router directs data to its correct destination and manages communication between different networks, effectively connecting users to the internet.
Step 4
Function of (d) Server
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A server provides resources to clients in a network, sharing data and network resources, while also managing access and security.
Step 5
3.1.2 Name TWO other types of security measures
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Using anti-virus/anti-malware software to protect against threats.
Keeping all software up to date to ensure vulnerabilities are patched.
Step 6
3.1.3 State TWO other possible causes
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A large number of users connected to the access point, leading to congestion.
Electromagnetic interference from other devices affecting signal strength.
Step 7
3.1.4 Explain the process of torrenting
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Torrenting involves downloading files that are split into smaller segments. These segments are sourced from multiple users (peers) who share them. The process reduces the load on any single user and allows for faster downloads by accessing multiple sources simultaneously.
Step 8
3.1.5 (a) State the component identifying star topology
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The component in FIGURE 1 that indicates a star topology is the switch, which connects all devices in a centralized fashion.
Step 9
3.1.5 (b) State the biggest disadvantage of star topology
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The single biggest disadvantage of using a star topology is that if the central switch fails, the entire network becomes inoperative.
Step 10
3.2.1 Explain the difference
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A file syncing service ensures that all devices have the latest version of files, keeping them updated across platforms. In contrast, a backup service focuses on creating copies of files for recovery purposes in case of data loss.
Step 11
3.2.2 State TWO disadvantages
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Users require internet access to access their stored data.
There is a risk of data loss if the cloud service provider goes out of business.
Step 12
3.2.3 Motivate why optical fibre
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Optical fibre is recommended for uploading large amounts of data due to its high bandwidth capacity and speed, allowing for efficient data transfer compared to other communication mediums.
Step 13
3.3.1 State whether a cookie is stored
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cookie is stored locally on the user's device.
Step 14
3.3.2 Give an example
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of data stored by a cookie is the user's location preferences on a website.
Step 15
3.3.3 Motivate why an app is preferred
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An app is often preferred because it can provide a more user-friendly experience, allowing for faster loading times, personalized notifications, and easier access to features than a web browser.
Step 16
3.4.1 (a) What does a virtual community refer
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A virtual community refers to people who connect online based on shared interests or beliefs, forming a digital space for interaction.
Step 17
3.4.1 (b) Name ONE advancement
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One advancement from Web 1.0 to Web 2.0 is the development of dynamic webpages that allow for user interaction and content creation.
Step 18
3.4.2 (a) What is the IoT?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The IoT, or Internet of Things, refers to the network of interconnected devices that communicate with each other and can exchange data.
Step 19
3.4.2 (b) Explain by example how IoT is used
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of IoT in a smart home is a smart thermostat that adjusts the temperature based on user preferences and input from other devices.