The IT learners are going to run an Internet café from the local community centre where they have been allocated one room - NSC Information Technology - Question 6 - 2016 - Paper 2
Question 6
The IT learners are going to run an Internet café from the local community centre where they have been allocated one room. The venue must be set up to allow the comp... show full transcript
Worked Solution & Example Answer:The IT learners are going to run an Internet café from the local community centre where they have been allocated one room - NSC Information Technology - Question 6 - 2016 - Paper 2
Step 1
6.1.1 Which technology do RFID tags use?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
RFID tags use radio waves to transmit information. They work through the principle of electromagnetic fields, allowing data to be read when the tag is within range of an RFID reader.
Step 2
6.1.2 Give TWO advantages of having an RFID tag on the hardware.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Items can be tracked efficiently, allowing for better inventory management and loss prevention.
RFID tags do not require a direct line of sight to be read, enabling quicker and more convenient scanning.
Step 3
6.2.1 Motivate the need for a network administrator.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A network administrator is essential to manage and maintain the network infrastructure, ensuring that all devices are connected, performing efficiently, and secure from outside threats. Their role includes troubleshooting any issues that arise, maintaining network performance, and overseeing user access.
Step 4
6.2.2 All users will be issued a once-off password which must be changed when they log on to the computer. Besides using letters and digits, state TWO other requirements so that passwords will be strong.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Passwords should include both uppercase and lowercase letters to increase complexity.
Passwords must include special characters (e.g. !, @, #) to further enhance security.
Step 5
6.2.3 Name and briefly discuss TWO types of remote access technology.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Remote Desktop Protocol (RDP): This allows users to connect to a remote computer via the internet, enabling them to control the system as if they were physically present.
Virtual Private Network (VPN): A VPN provides a secure connection to the network through encrypted tunnels, allowing safe access to resources remotely.
Step 6
6.2.4 How can the administrator safeguard the computers against virus attacks?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To safeguard the computers against virus attacks, the administrator should install reputable antivirus software and ensure it is regularly updated. Keeping the operating system and all software up to date is also crucial in protecting against vulnerabilities.
Step 7
6.2.5 Besides issuing passwords and avoiding virus attacks, state TWO other responsibilities of the network administrator.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Allocating user rights: This involves setting up permissions for different users in order to protect sensitive information.
Managing backups: Regularly performing backups of data ensures that critical information is not lost in case of hardware failure or other issues.
Step 8
6.3.1 What is spam e-mail?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Spam e-mail refers to unsolicited messages sent in bulk, often intended to advertise products or services. These emails can clutter inboxes and sometimes lead to phishing scams.
Step 9
6.3.2 Suggest TWO ways in which a user may avoid identity theft.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Use strong passwords and change them regularly to protect personal information.
Avoid sharing personal details on social media and be cautious about the information provided on unfamiliar websites.
Step 10
6.3.3 Which technique is used to ensure that Skype calls are secure?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The technique used to ensure that Skype calls are secure is encryption, which protects the communication data from eavesdroppers.
Step 11
6.3.4 What is the purpose of a digital certificate?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A digital certificate is used to authenticate the identity of a website or organization, ensuring that users are connecting to legitimate entities to prevent fraud or impersonation.
Step 12
6.3.5 State TWO practical ways in which users can check the validity of the information that they find on the web when they do research.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Check whether the author of the information is reputable, such as looking for qualifications or affiliations.
Compare the information with that found on multiple reliable sources to verify its accuracy.
Step 13
6.3.6 Explain the concept Internet of Things.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The Internet of Things (IoT) refers to the interconnected network of devices that can communicate and exchange data over the internet. These devices include everyday objects like smart home appliances, wearables, and vehicles, allowing them to collect and share data to improve efficiency or user experience.
Step 14
6.3.7 Give them TWO ideas to improve the battery life of their devices.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Users can reduce screen brightness or set the device to automatically adjust brightness to conserve battery life.
Disabling unnecessary features like GPS, Bluetooth, and Wi-Fi when not in use can significantly extend battery longevity.
Step 15
6.3.8 Explain what a rootkit is.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A rootkit is a collection of software tools that allow an unauthorized user to gain control over a computer system without being detected. It can manipulate the system to hide its presence and enable further exploitation.
Step 16
6.4.1 What type of network is supported by BitTorrent?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
BitTorrent operates over a peer-to-peer network, allowing users to distribute data across multiple nodes efficiently, rather than relying on a single source.
Step 17
6.4.2 State ONE other disadvantage of using BitTorrent.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One disadvantage of using BitTorrent is that it can expose the IP address of users, making their internet activity potentially traceable.
Step 18
6.5.1 Motivate using a file-sharing service instead of sending a document by e-mail.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Using a file-sharing service can accommodate larger files that exceed email size limits. Additionally, it allows for real-time collaboration and version control, enabling multiple users to access and edit the document simultaneously.
Step 19
6.5.2 List THREE benefits that a file-syncing service offers.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Automatic syncing: All changes made to files are reflected across devices without user intervention.
Version history: Users can access previous versions of files, ensuring that work is recoverable.
Access from anywhere: Files can be accessed remotely, enhancing flexibility.
Step 20
6.6 State THREE aspects to consider when designing apps for users of mobile devices.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
User interface simplicity: The app should have an intuitive design that is easy to navigate on smaller screens.
Performance optimization: It is crucial to ensure the app runs efficiently without draining device resources.
Security: Incorporating strong security measures is vital to protect user data and privacy.