Photo AI

3.1 Sharing resources is an important benefit of using networks - NSC Information Technology - Question 3 - 2018 - Paper 2

Question icon

Question 3

3.1-Sharing-resources-is-an-important-benefit-of-using-networks-NSC Information Technology-Question 3-2018-Paper 2.png

3.1 Sharing resources is an important benefit of using networks. State TWO other benefits of having a computer network in a company. 3.2 In laptop computers NICs ar... show full transcript

Worked Solution & Example Answer:3.1 Sharing resources is an important benefit of using networks - NSC Information Technology - Question 3 - 2018 - Paper 2

Step 1

State TWO other benefits of having a computer network in a company.

96%

114 rated

Answer

  1. Fast and efficient communication among employees, enabling quick decision-making and collaboration.

  2. Centralization of data, which ensures that data is always up-to-date and accessible from multiple devices.

Step 2

Explain the function of an NIC when providing network connectivity.

99%

104 rated

Answer

A Network Interface Card (NIC) is responsible for encoding and decoding data so that it can be transmitted over the network. It converts data into a format suitable for the network medium and allows for communication between devices.

Step 3

What medium is used to send and receive data in a Wi-Fi network?

96%

101 rated

Answer

Radio waves are the medium used for transmitting and receiving data in a Wi-Fi network.

Step 4

Name a type of network cable that has a very low level of attenuation of signal.

98%

120 rated

Answer

Fibre optic cables are used for their very low level of signal attenuation, allowing data to be transmitted over longer distances without loss of quality.

Step 5

Explain how poor signal strength can be addressed when setting up wireless communication networks.

97%

117 rated

Answer

Poor signal strength can be enhanced by strategically placing access points or by using repeaters to boost the signal. Adjusting the antennas for optimal line of sight, and using devices like boosters or amplifiers can also help in increasing signal strength.

Step 6

Give TWO reasons why companies providing wireless internet access prefer to use WiMAX instead of Wi-Fi.

97%

121 rated

Answer

  1. WiMAX offers greater range compared to Wi-Fi, making it suitable for wider area coverage.

  2. WiMAX supports higher bandwidth and faster data transfer, which is essential for businesses requiring efficient internet access.

Step 7

Explain what is meant by the term Semantic Web.

96%

114 rated

Answer

The Semantic Web refers to a web that is designed to allow computers and devices to filter and understand content intelligently, enabling better navigation and interaction without requiring human intervention.

Step 8

What is the purpose of metadata in the Semantic Web?

99%

104 rated

Answer

Metadata serves to supply additional context, aiding in optimising searches and providing improved results based on specific data criteria.

Step 9

Which protocol is used to download e-mail?

96%

101 rated

Answer

POP3 (Post Office Protocol version 3) is typically used for downloading e-mail.

Step 10

Differentiate between notifications and push technology in terms of the way e-mail is handled on a mobile device.

98%

120 rated

Answer

Notifications alert the user with a sound or message when a new email arrives. Push technology actively sends the e-mail to the device and notifies the user in real-time, automatically downloading the email.

Step 11

Explain how a cloud-service can be used to make large files available to an e-mail recipient, without attaching the files to the e-mail.

97%

117 rated

Answer

A cloud service allows users to upload large files to a shared space. Instead of sending the files as attachments, an email with a link to the uploaded file is sent, enabling the recipient to access it directly.

Step 12

Explain the term phishing.

97%

121 rated

Answer

Phishing is a cybercrime technique used to deceive users into providing sensitive information by impersonating a legitimate organisation.

Step 13

Give ONE example of phishing.

96%

114 rated

Answer

A common example of phishing is an email that appears to be from a bank asking users to confirm their account details by clicking a link that leads to a fraudulent website.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;