Photo AI

The learners who are helping with stocktaking are using their own mobile devices to record data and to communicate with each other and the administrators - NSC Information Technology - Question 6 - 2016 - Paper 2

Question icon

Question 6

The-learners-who-are-helping-with-stocktaking-are-using-their-own-mobile-devices-to-record-data-and-to-communicate-with-each-other-and-the-administrators-NSC Information Technology-Question 6-2016-Paper 2.png

The learners who are helping with stocktaking are using their own mobile devices to record data and to communicate with each other and the administrators. 6.1 Surve... show full transcript

Worked Solution & Example Answer:The learners who are helping with stocktaking are using their own mobile devices to record data and to communicate with each other and the administrators - NSC Information Technology - Question 6 - 2016 - Paper 2

Step 1

6.1.1 Name TWO security techniques that the school could implement to provide access control to the server room.

96%

114 rated

Answer

The school could implement the following security techniques:

  1. Biometrics - Utilizing fingerprint or facial recognition systems to ensure only authorized personnel can access the server room.
  2. Access Control Cards - Implementing security cards that individuals need to swipe or scan to gain entry into the server room.

Step 2

6.1.2 (a) Explain the benefit of using compression.

99%

104 rated

Answer

Using compression reduces the size of video files. This results in faster file transfer rates and decreased storage space requirements, allowing for more efficient use of bandwidth and data storage.

Step 3

6.1.2 (b) Briefly explain what lossy compression entails.

96%

101 rated

Answer

Lossy compression is a method that reduces file size by permanently eliminating certain data. This means that some quality is sacrificed for a more compact file, which may not be suitable for all applications, especially where detail is important.

Step 4

6.1.3 (a) Explain what an audit trail is.

98%

120 rated

Answer

An audit trail is a systematic record that tracks changes made to data. It documents who accessed the information and what actions were taken, thereby providing a history that can be reviewed for security and accountability.

Step 5

6.1.3 (b) Name TWO types of information that should be recorded for audit purposes.

97%

117 rated

Answer

For audit purposes, the following information should be recorded:

  1. Stock Items - Details regarding which items were checked or modified.
  2. Date of Issuing and Returning Items - Documenting when items were accessed, returned, or transferred.

Step 6

6.2.1 What does it mean to encrypt data?

97%

121 rated

Answer

To encrypt data means to convert it into an unreadable format using a specific algorithm or set of rules. This ensures that only authorized parties can access the original data using the appropriate decryption key.

Step 7

6.2.2 Briefly explain the difference between the public key and private key in this security standard.

96%

114 rated

Answer

In a public/private key encryption system, the public key is available to anyone to encrypt messages meant for the holder of the private key, which is kept confidential. The private key is used to decrypt messages that were encrypted with the corresponding public key, ensuring secure communication.

Step 8

6.3.1 Suggest TWO different techniques that will make secure access to the server containing the security footage possible.

99%

104 rated

Answer

Two techniques that can ensure secure access are:

  1. Virtual Private Network (VPN) - This creates a secure connection over the Internet, allowing remote access to the server safely.
  2. Remote Desktop - Utilizing remote desktop applications can allow authorized personnel to securely access the server from remote locations.

Step 9

6.3.2 Differentiate between an intranet and an extranet.

96%

101 rated

Answer

An intranet is a private network that provides access to authorized members within an organization, such as school staff, allowing them to share information internally. An extranet, on the other hand, allows external users (e.g., security personnel) limited access to specific information, often secured by passwords and unique usernames.

Step 10

6.4 Suggest TWO ways in which the learners can extend the battery life of their mobile devices while they are using these devices.

98%

120 rated

Answer

Learners can extend battery life by:

  1. Turning off Bluetooth/Wi-Fi - Disabling these features when not needed reduces power consumption.
  2. Changing the brightness settings of the display - Lowering screen brightness can significantly save battery life.

Step 11

6.5.1 Briefly explain what RFID technology is.

97%

117 rated

Answer

RFID (Radio Frequency Identification) technology uses radio waves to automatically identify and track tags attached to objects. These tags contain electronically stored information that can be read wirelessly.

Step 12

6.5.2 State TWO advantages of using RFID technology when doing stocktaking.

97%

121 rated

Answer

Two advantages of using RFID for stocktaking are:

  1. Ability to Read Multiple Tags Simultaneously - RFID can scan many items at once, improving efficiency in inventory management.
  2. No Need for Physical Handling - RFID tags can be read without direct line-of-sight or requiring manual scanning, streamlining the stocktaking process.

Step 13

6.6.1 Explain what Bluetooth technology is.

96%

114 rated

Answer

Bluetooth technology is a short-range wireless communication protocol that enables devices to connect and exchange data over short distances, typically within a range of 10 meters.

Step 14

6.6.2 Give ONE reason why Bluetooth is a suitable technology to use in this case.

99%

104 rated

Answer

Bluetooth is suitable because it is easy to set up, allowing users to connect their devices quickly without needing complex configurations.

Step 15

6.7.1 To what does a cloud-based service refer?

96%

101 rated

Answer

A cloud-based service refers to any service that is provided over the Internet, allowing users to access resources and applications remotely without needing to store data locally.

Step 16

6.7.2 Explain what outsourcing is in this context.

98%

120 rated

Answer

Outsourcing in this context means hiring external service providers to manage the school's cloud services instead of handling these tasks in-house. This allows the school to focus on its core activities while benefiting from specialized expertise.

Step 17

6.7.3 State TWO benefits for the school if they were to outsource the data service.

97%

117 rated

Answer

Benefits of outsourcing data services for the school include:

  1. Cost Savings - The school does not need to invest in expensive hardware or software, as these are managed by the service provider.
  2. Access to Expertise - The school can benefit from the knowledge and skills of professionals who specialize in managing cloud services.

Step 18

6.7.4 What is this technique called?

97%

121 rated

Answer

This technique is called virtualization, which allows multiple virtual machines to run on a single physical server, creating the illusion of dedicated resources for each user.

Step 19

6.7.5 State TWO duties of the database administrator.

96%

114 rated

Answer

The duties of a database administrator include:

  1. Backup and Restoration Plans - Ensuring data is regularly backed up and can be restored in case of loss or corruption.
  2. General Maintenance of the Database - Overseeing the performance, security, and optimization of the database systems.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;