Photo AI

5.1 State TWO advantages of grid computing - NSC Computer Application Technology - Question 5 - 2021 - Paper 2

Question icon

Question 5

5.1-State-TWO-advantages-of-grid-computing-NSC Computer Application Technology-Question 5-2021-Paper 2.png

5.1 State TWO advantages of grid computing. 5.2 Consider the diagram of a network below and answer the questions that follow. ![Network Diagram] 5.2.1 Identify de... show full transcript

Worked Solution & Example Answer:5.1 State TWO advantages of grid computing - NSC Computer Application Technology - Question 5 - 2021 - Paper 2

Step 1

State TWO advantages of grid computing.

96%

114 rated

Answer

  1. It allows for the utilization of numerous combined resources, which increases computational power.
  2. It can take over tasks if one computer fails, ensuring continuity and reliability.

Step 2

Identify devices A, B and C in the network diagram.

99%

104 rated

Answer

A - Switch/Router/Hub B - (Print/NAS) Server C - Router/Modem/Gateway

Step 3

What type of network is Network D?

96%

101 rated

Answer

Network D is a Local Area Network (LAN) or Client-Server network.

Step 4

Give TWO reasons why it is better to turn off a Bluetooth connection on a tablet or smartphone when connectivity is not required.

98%

120 rated

Answer

  1. It reduces the risk of unauthorized access or hacking attempts, which can occur when Bluetooth is left on.
  2. It conserves battery life, as Bluetooth connections can drain power even when not actively in use.

Step 5

Suggest TWO changes that would make the following password more secure, without changing the length of the password: 1b007f0e.

97%

117 rated

Answer

  1. Include at least one special character, such as '1b007f0$'.
  2. Include at least one uppercase letter, for instance, '1B007f0e'.

Step 6

Why is it necessary to enter this OTP if you have already signed in with your username and password?

97%

121 rated

Answer

Entering the OTP provides an extra layer of security to ensure that only the authorized user can access the account, particularly in case the login details are stolen.

Step 7

Why would you use the Bcc feature in an e-mail program when sending an e-mail?

96%

114 rated

Answer

The Bcc feature hides the addresses of other recipients, maintaining privacy and preventing unwanted replies from multiple recipients.

Step 8

What type of communication medium is used in long-distance undersea cables, such as SEACOM, that connect Africa to other continents for internet access?

99%

104 rated

Answer

The communication medium used in undersea cables is typically optical fiber.

Step 9

Give TWO disadvantages of FTP technology.

96%

101 rated

Answer

  1. The transfer process may be complex and more difficult to manage compared to other upload methods.
  2. FTP lacks encryption, making it vulnerable to security risks during file transfers.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;