Network technologies are applied in many areas of everyday life - NSC Information Technology - Question 3 - 2017 - Paper 2
Question 3
Network technologies are applied in many areas of everyday life.
3.1 Computers used for administrative tasks are normally connected in a network.
An Ethernet LAN co... show full transcript
Worked Solution & Example Answer:Network technologies are applied in many areas of everyday life - NSC Information Technology - Question 3 - 2017 - Paper 2
Step 1
3.1.1 Name ONE type of cable that is commonly used in an Ethernet network.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One type of cable commonly used in an Ethernet network is UTP (Unshielded Twisted Pair) cable, often referred to as CAT 5 or CAT 6.
Step 2
3.1.2 Which topology allows every computer to be connected with its own cable to a switch?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The topology that allows every computer to be connected with its own cable to a switch is known as the Star topology.
Step 3
3.1.3 Which network protocol would be used to:
(a) Access the Internet
(b) Browse web pages
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
(a) The network protocol used to access the Internet is TCP/IP (Transmission Control Protocol/Internet Protocol).
(b) To browse web pages, the protocol used is HTTP (Hypertext Transfer Protocol) or HTTPS (HTTP Secure).
Step 4
3.2 What is the benefit of using a virtual private network (VPN)?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The benefit of using a virtual private network (VPN) is that it creates a secure connection over a public network, ensuring privacy and data security for users.
Step 5
3.3.1 What is this type of data capturing called?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This type of data capturing is called 'Invisible Data Capturing'.
Step 6
3.3.2 Give ONE example of a real-life situation in which this type of data capturing takes place AND name the type of information that can be captured.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of a real-life situation is when users make online purchases using credit cards. The type of information that can be captured includes personal data such as buying habits and location.
Step 7
3.3.3 What is user profiling mostly used for?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
User profiling is mostly used for targeted marketing, helping businesses to tailor their advertising strategies based on user preferences.
Step 8
3.4 Name THREE types of code a website can implement to provide interactivity.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Three types of code a website can implement for interactivity are:
JavaScript
HTML5
PHP
Step 9
3.5.1 What is a cookie?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cookie is a small text file stored on the user's local computer that is used to save user settings and preferences for a website.
Step 10
3.5.2 What is the effect of deleting cookies for the user?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The effect of deleting cookies is that the next time the user opens the webpage, only default settings will be available, potentially leading to a less personalized experience.
Step 11
3.6 State TWO disadvantages of using VoIP.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two disadvantages of using VoIP are:
The need for a stable internet connection.
Poor call quality when using a slow connection.
Step 12
3.7 What is the purpose of a GPS?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of a GPS (Global Positioning System) is to allow users to locate the position of devices or people, providing navigation capabilities.
Step 13
3.8.1 Explain what DRM software is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
DRM (Digital Rights Management) software is designed to protect digital content by using encryption and managing access rights, preventing unauthorized use and distribution.
Step 14
3.8.2 Give ANY ONE area of application of DRM software.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One area of application of DRM software is in the distribution of digital books, ensuring copyright protection for authors and publishers.