The shopping complex will use a cabled network to connect all the shops - NSC Information Technology - Question 3 - 2017 - Paper 2
Question 3
The shopping complex will use a cabled network to connect all the shops.
3.1 The cabled LAN in the shopping complex will have access to the Internet.
3.1.1 Give TW... show full transcript
Worked Solution & Example Answer:The shopping complex will use a cabled network to connect all the shops - NSC Information Technology - Question 3 - 2017 - Paper 2
Step 1
Give TWO reasons to motivate the use of UTP cables for the network in the shopping complex.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Easy to Install: UTP cables are straightforward to install, which reduces setup time and costs.
Cost-Effective: The overall cost of UTP cables is lower than that of fiber optic cables, making them a financially viable option for the shopping complex.
Step 2
Which hardware device (Device A) will be used so that the LAN will have Internet access?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The hardware device used will be a Router. This device connects the LAN to the Internet and manages network traffic.
Step 3
Suggest a suitable topology for the LAN.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Star Topology is suitable for the LAN. In this configuration, all devices are connected to a central hub or switch, making it easy to manage and troubleshoot issues.
Step 4
State TWO advantages of using a client-server network rather than a peer-to-peer network.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
More Sophisticated Security: Client-server networks typically offer better security measures as they centralize data management and access controls.
Better Performance: These networks are designed for efficient handling of multiple requests, leading to improved overall performance.
Step 5
Suggest ONE reason for keeping software up to date.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Keeping software up to date ensures that security vulnerabilities are fixed, preventing potential attacks from hackers and malicious software.
Step 6
State TWO responsibilities of the system administrator.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Make Regular Backups: System administrators are responsible for creating backups to prevent data loss.
Manage/Monitor Users' Rights: They oversee and manage user permissions, ensuring the right access levels are maintained.
Step 7
Explain what role password protection plays in the security of data.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Password protection acts as a barrier to prevent unauthorized access to sensitive data. By requiring users to enter a password, it safeguards the information from unauthorized alterations and leaks.
Step 8
Define the term malware.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Malware is defined as software specifically designed to disrupt, damage, or gain unauthorized access to a computer system without the user's consent.
Step 9
Explain how a firewall assists in providing security to computers on a network.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A firewall provides security by monitoring incoming and outgoing network traffic, acting as a barrier between trusted internal networks and untrusted external networks. It prevents unauthorized access and protects sensitive data.
Step 10
What is a cookie in computing terms?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cookie is a text file that stores information on the user's device after visiting a website, allowing sites to remember user preferences and session data.
Step 11
Explain what a dynamic web page is.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A dynamic web page is generated each time a user accesses it, often using server-side scripting to produce customized content based on user interactions or preferences.
Step 12
How are CSSs (cascading style sheets) used in developing a web page?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
CSS is utilized in web page development to define the look and formatting of a web document, allowing developers to separate content from design and enhance the visual appearance of websites.
Step 13
Why is it recommended that the company’s website have a digital certificate?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
It is recommended to have a digital certificate to authenticate the identity of the organization, ensuring users are interacting with a legitimate entity.
Step 14
State TWO details that are found on the digital certificate.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Owner's Public Key: This is used to encrypt communications.
Date of Issue: This indicates when the certificate was issued.