3.1 Computers used for administrative tasks are normally connected in a network - NSC Information Technology - Question 3 - 2017 - Paper 2
Question 3
3.1 Computers used for administrative tasks are normally connected in a network. An Ethernet LAN could be used for this purpose.
3.1.1 Name ONE type of cable that i... show full transcript
Worked Solution & Example Answer:3.1 Computers used for administrative tasks are normally connected in a network - NSC Information Technology - Question 3 - 2017 - Paper 2
Step 1
3.1.1 Name ONE type of cable that is commonly used in an Ethernet network.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One commonly used type of cable in an Ethernet network is UTP (Unshielded Twisted Pair) cable.
Step 2
3.1.2 Which topology allows every computer to be connected with its own cable to a switch?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The topology that allows every computer to be connected with its own cable to a switch is called the Star topology.
Step 3
3.1.3 Which network protocol would be used to:
(a) Access the Internet
(b) Browse web pages
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
(a) The network protocol used to access the Internet is TCP/IP (Transmission Control Protocol/Internet Protocol).
(b) The network protocol used to browse web pages is HTTP (Hypertext Transfer Protocol) or HTTPS (HTTP Secure).
Step 4
3.2 What is the benefit of using a virtual private network (VPN)?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A virtual private network (VPN) provides a secure connection over the Internet, allowing users to access resources remotely while protecting their privacy and data from potential threats.
Step 5
3.3.1 What is this type of data capturing called?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This type of data capturing is called 'Invisible data capturing' or 'data harvesting'.
Step 6
3.3.2 Give ONE example of a real-life situation in which this type of data capturing takes place AND name the type of information that can be captured.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of this is when individuals use credit cards to make online purchases. The type of information that can be captured includes purchasing behavior and personal preferences.
Step 7
3.3.3 What is user profiling mostly used for?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
User profiling is primarily used for targeted marketing, enabling companies to tailor advertisements and offers based on individual user behavior and preferences.
Step 8
3.4 Name THREE types of code a website can implement to provide interactivity.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Three types of code a website can implement to provide interactivity include:
JavaScript
PHP
AJAX
Step 9
3.5.1 What is a cookie?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cookie is a small text file stored on a user's local computer that is used to save user settings and preferences for a website.
Step 10
3.5.2 What is the effect of deleting cookies for the user?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The effect of deleting cookies for the user includes loss of interactivity, as websites may revert to default settings the next time they are accessed.
Step 11
3.6 State TWO disadvantages of using VoIP.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two disadvantages of using VoIP are:
Both parties need a stable internet connection.
Call quality can be poor, especially on slow connections.
Step 12
3.7 What is the purpose of a GPS?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of GPS (Global Positioning System) is to allow users to locate the position of devices or people anywhere on Earth using satellite signals.
Step 13
3.8.1 Explain what DRM software is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
DRM (Digital Rights Management) software refers to tools that manage access rights to digital content and prevent unauthorized use, distribution, or reproduction of that content.
Step 14
3.8.2 Give ONE area of application of DRM software.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One area of application of DRM software is in digital media, such as the distribution of digital books and music.