The travel agents must be able to conduct business from their office building or by using their mobile office - NSC Information Technology - Question 6 - 2017 - Paper 2
Question 6
The travel agents must be able to conduct business from their office building or by using their mobile office. Internet access is required as most of the business is... show full transcript
Worked Solution & Example Answer:The travel agents must be able to conduct business from their office building or by using their mobile office - NSC Information Technology - Question 6 - 2017 - Paper 2
Step 1
6.1.1 Except for making calls and accessing the network, state ONE way in which a smartphone can be useful as a business tool.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A smartphone can be useful as a business tool by allowing travel agents to access email, enabling them to communicate with clients and other stakeholders seamlessly.
Step 2
6.1.2 Discuss TWO disadvantages of doing business using a smartphone.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One disadvantage is that it can be difficult to input data on a small screen, which may slow down workflow. Another disadvantage is that the battery life of smartphones can be limited, requiring regular charging, which can be inconvenient during long working hours.
Step 3
6.1.3 Which online service is used to ensure that travel agents will have access to the latest versions of their documents on all of their devices at all times?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An online synchronization service, such as Google Drive or Dropbox, is used to ensure that travel agents will have access to the latest versions of their documents on all devices.
Step 4
6.2 State TWO methods that the agency can use to control access to the building electronically.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two methods the agency can use include biometric scanners, which can authenticate users based on physical characteristics, and RFID cards, which can grant access when scanned at entry points.
Step 5
6.3.1 Write out the abbreviation AUP in full.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
AUP stands for Acceptable Use Policy.
Step 6
6.3.2 Except for the example given, name TWO other aspects that should be included in the travel agency's AUP.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The AUP should include guidelines on what storage devices may be used and what actions will be taken against violations of the policy.
Step 7
6.3.3 Motivate TWO reasons why the prohibition of social networking sites at work is justified.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One reason is that social networking can serve as a distraction, reducing employee productivity. Another reason is that it can consume bandwidth, which may affect the performance of company operations.
Step 8
6.4.1 What is an intranet?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An intranet is a local private network that is only accessible to the organization’s members and can be accessed through a browser as webpages.
Step 9
6.4.2 Suggest a way in which the travel agents could gain access to the travel agency's intranet securely when working on their tablet computers from home.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Travel agents could gain access by logging onto a VPN (Virtual Private Network), which would encrypt their connection and protect data while accessing the intranet remotely.
Step 10
6.5.1 What is the function of an NIC?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The NIC, or Network Interface Card, allows a computer to connect to a network, facilitating the sending and receiving of data.
Step 11
6.5.2 What is the purpose of a MAC address?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of a MAC address is to uniquely identify a device on a network, ensuring that it can communicate with other devices without conflicts.
Step 12
6.6.1 Suggest another way in which travel documents can be captured as images to be saved on the computer system.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Another way to capture travel documents as images is by using a digital camera or smartphone to take photos of the documents.
Step 13
6.6.2 Besides sharing of the printer, provide TWO other reasons for the networked devices.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Networked devices allow for centralized data management and improved communication among multiple users in the office.
Step 14
6.6.3 Which technology will allow a user, not connected to a cabled network, to print on the printer?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Bluetooth technology will allow a user, not connected to a cabled network, to print on the printer.
Step 15
6.7.1 What software is needed to run cloud applications?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A web browser is needed to run cloud applications, allowing users to access cloud-based services and applications.
Step 16
6.7.2 State TWO advantages of using SaaS as an integrated product.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two advantages of using SaaS include that it can be installed on multiple devices and that updates are done automatically to ensure users have the latest version.
Step 17
6.7.3 Explain how cloud computing uses virtualization to provide powerful online services.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cloud computing utilizes virtualization by allowing multiple users to share resources on a virtual server. This means that the resources of powerful computers are distributed to provide services effectively.
Step 18
6.7.4 Briefly describe TWO disadvantages of cloud computing.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two disadvantages of cloud computing are the dependency on a stable internet connection and the fact that data security can be a concern since it is stored off-site.
Step 19
6.8.1 Explain the term encryption.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Encryption refers to the process of converting data into a coded format, making it unreadable to unauthorized users and ensuring that only those with the key can access the original information.
Step 20
6.8.2 Briefly explain the public key encryption method.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The public key encryption method involves using a public key to encrypt data and a private key to decrypt it. The public key can be shared openly, while the private key is kept secret.
Step 21
6.8.3 State ONE disadvantage of using BitCoin to pay online.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One disadvantage of using BitCoin is that transactions cannot be reversed, making it difficult to dispute or recover funds if an error occurs.
Step 22
6.9.1 What is BitTorrent?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
BitTorrent is a peer-to-peer file sharing protocol used to transfer large files across a network or the Internet efficiently.
Step 23
6.9.2 State TWO benefits of using BitTorrent.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Two benefits of using BitTorrent are that many users can download large files concurrently, which reduces the load on any single server, and it allows users to be part of the distribution process, making the download process more efficient.
Step 24
6.10 Give TWO examples when downloading software will not be regarded as piracy.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Downloading software will not be regarded as piracy when it is obtained from the original publisher as freeware, or when it is downloaded as part of a trial period provided by the software developer.