The travel agents must be able to conduct business from their office building or by using their mobile office - NSC Information Technology - Question 6 - 2017 - Paper 2
Question 6
The travel agents must be able to conduct business from their office building or by using their mobile office. Internet access is required as most of the business is... show full transcript
Worked Solution & Example Answer:The travel agents must be able to conduct business from their office building or by using their mobile office - NSC Information Technology - Question 6 - 2017 - Paper 2
Step 1
6.1.1 Except for making calls and accessing the network, state ONE way in which a smartphone can be useful as a business tool.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A smartphone can be useful as a business tool because it allows agents to access emails, facilitating effective communication with clients and colleagues.
Step 2
6.1.2 Discuss TWO disadvantages of doing business using a smartphone.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Data input can be challenging due to the small screen size, which may lead to errors and inefficiency.
Limited battery life can disrupt workflows, especially if phones are not charged regularly.
Step 3
6.1.3 Which online service is used to ensure that travel agents will have access to the latest versions of their documents on all of their devices at all times?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Online syncing services such as Google Drive or Dropbox allow travel agents to access the latest versions of their documents on all devices.
Step 4
6.2 State TWO methods that the agency can use to control access to the building electronically.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Biometric scanners that use fingerprints or facial recognition for authorized entry.
RFID cards that must be scanned to gain access.
Step 5
6.3.1 Write out the abbreviation AUP in full.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
AUP stands for Acceptable Use Policy.
Step 6
6.3.2 Except for the example given, name TWO other aspects that should be included in the travel agency's AUP.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Policy on using personal devices within the workplace.
Guidelines on acceptable internet usage to prevent security breaches.
Step 7
6.3.3 Motivate TWO reasons why the prohibition of social networking sites at work is justified.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Social networking can lead to distractions, reducing overall productivity in the workplace.
It may expose the company to security risks, such as the theft of sensitive information through unauthorized sharing.
Step 8
6.4.1 What is an intranet?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An intranet is a private network accessible only to an organization's staff, often used to share information and resources securely.
Step 9
6.4.2 Suggest a way in which the travel agents could gain access to the travel agency's intranet securely when working on their tablet computers from home.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Travel agents could log on to a VPN (Virtual Private Network) to securely access the agency's intranet from home.
Step 10
6.5.1 What is the function of an NIC?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The NIC (Network Interface Card) allows a computer to connect to a network, directing data to and from the device.
Step 11
6.5.2 What is the purpose of a MAC address?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A MAC address serves as a unique identifier for a network interface, ensuring that data is correctly routed to the appropriate device.
Step 12
6.6.1 It has been argued that the image scanner function is a waste of money. Suggest another way in which travel documents can be captured as images to be saved on the computer system.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Travel documents can be captured using a digital camera or smartphone to take photos and upload them directly to the system.
Step 13
6.6.2 Besides sharing of the printer, give TWO other reasons for the networked devices.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Improved management of devices ensures that resources are used efficiently.
Enhanced communication between connected devices allows for quick data sharing.
Step 14
6.6.3 A client has succeeded in sending a document from his tablet to the printer. Which technology will allow a user, not connected to a cabled network, to print on the printer?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Wireless technologies such as Wi-Fi or Bluetooth would enable a user to print on the printer without being connected to a cabled network.
Step 15
6.7.1 What software is needed to run cloud applications?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A web browser that supports cloud-based interfaces is needed to run cloud applications.
Step 16
6.7.2 State TWO advantages of using SaaS as an integrated product.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
SaaS eliminates the need to purchase software licenses, reducing upfront costs.
It provides access to the latest software versions and updates without manual installations.
Step 17
6.7.3 Explain how cloud computing uses virtualization to provide powerful online services.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cloud computing utilizes virtualization by allowing multiple users to share powerful server resources simultaneously, making it more cost-effective and scalable.
Step 18
6.7.4 Briefly describe TWO disadvantages of cloud computing.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cloud services require a stable internet connection; disruptions can lead to accessibility issues.
Data security concerns arise as sensitive information is stored off-site.
Step 19
6.8.1 Online transactions are encrypted. Explain the term encryption.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Encryption is a process that transforms data into a secure format, making it unreadable to unauthorized users, thereby ensuring confidentiality during transmission.
Step 20
6.8.2 Briefly explain the public key encryption method.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Public key encryption uses a pair of keys: a public key to encrypt data and a private key to decrypt it, ensuring secure communication between parties.
Step 21
6.8.3 State ONE disadvantage of using BitCoin to pay online.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One disadvantage is that transactions made with Bitcoin cannot be cancelled or reversed, leading to potential loss if mistakes occur.
Step 22
6.9.1 What is BitTorrent?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
BitTorrent is a peer-to-peer file sharing protocol that allows users to distribute data over the internet efficiently.
Step 23
6.9.2 State TWO benefits of using BitTorrent.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
It allows for efficient sharing of large files across a network without putting too much load on any single server.
Many users can download popular files quickly, as the workload is distributed among multiple peers.
Step 24
6.10 Give TWO examples when downloading software will not be regarded as piracy.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Downloading software that is available under a free license or as freeware.
Downloading shareware versions that are explicitly offered for trial purposes.