The company has decided to use a wired LAN for the computers in the control room and one wireless connection point for all other devices at the depot - NSC Information Technology - Question 3 - 2022 - Paper 2
Question 3
The company has decided to use a wired LAN for the computers in the control room and one wireless connection point for all other devices at the depot.
3.1.1 Name th... show full transcript
Worked Solution & Example Answer:The company has decided to use a wired LAN for the computers in the control room and one wireless connection point for all other devices at the depot - NSC Information Technology - Question 3 - 2022 - Paper 2
Step 1
3.1.1 Name the type of cable that is commonly used in a wired LAN.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A common type of cable used in a wired LAN is the UTP (Unshielded Twisted Pair) cable, specifically Category 5e or Category 6. These cables are widely used due to their efficiency in transmitting data over short distances.
Step 2
3.1.2 What media is used to transmit data in a WiMAX network?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
In a WiMAX network, data is transmitted using radio waves. This wireless technology allows for high-speed internet access over a wide area.
Step 3
3.1.3 Name the wireless technology widely used to transmit data in LAN networks.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The widely used wireless technology for transmitting data in LAN networks is Wi-Fi. It provides a wireless local area network that allows devices to connect to the internet.
Step 4
3.2.1 What is this type of secure network called?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This type of secure network is called a Virtual Private Network (VPN). It allows secure access to the network over the internet.
Step 5
3.2.2 A DNS works with IP addresses.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
(a) An IP address is a unique identifier for a device on a network, represented as a numerical label.
(b) The purpose of a DNS (Domain Name System) is to translate domain names into IP addresses, allowing browsers to locate and access websites.
Step 6
3.2.3 What is the function of a network interface card (NIC) in a network?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The NIC (Network Interface Card) functions as the hardware component that connects a computer or device to a network. It encodes and decodes data for transmission.
Step 7
3.2.4 Explain what an intranet is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An intranet is a private network that operates similarly to the internet but is restricted to a specific organization. It allows for secure communication and access to internal resources.
Step 8
3.3.1 What does streaming entail?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Streaming entails the immediate and real-time delivery of media content to a receiving device. It allows users to watch or listen to content without needing to download it first.
Step 9
3.3.2 How could the company prevent unauthorized users from viewing the content?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The company could prevent unauthorized users from viewing content by implementing security measures such as using a closed channel for transmission or requiring a login/password to access the stream.
Step 10
3.4.1 How can a URL be used to determine whether the site uses SSL technology or not?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A URL can indicate the use of SSL technology by starting with 'https://' instead of 'http://'. The 's' signifies that the connection is secure.
Step 11
3.4.2 SSL technology includes encryption and the use of a certificate authority.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
(a) The encryption process works by using complex mathematical algorithms to change readable data into a coded format that cannot be deciphered without a key. The data is secured using public and private keys.
(b) The certificate authority (CA) verifies the legitimacy of the website and issues a digital certificate, ensuring that the communication is secure.
Step 12
3.5 Explain the difference between the functions of a router and a modem.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A modem converts the signal from the internet into a format that can be used by a network. In contrast, a router directs data packets between devices on the same network and determines the best path for data transmission.
Step 13
3.6.1 Name the type of search where the search is based on the meaning of the words, rather than using the words as keywords only.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of search based on the meaning of words, rather than just keywords, is called Semantic Search.
Step 14
3.6.2 Explain the purpose of using SEO by the company.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of using SEO (Search Engine Optimization) is to enhance the visibility of the company's website in search engine results. By optimizing content and structure, the company can attract more visitors.
Step 15
3.7.1 Identify the protocol used by this site by studying the information provided in the address bar.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The protocol used by the site is FTP (File Transfer Protocol), as indicated by 'ftp://' in the address bar.
Step 16
3.7.2 What other popular type of file sharing services has largely replaced this type of site?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cloud storage services such as Google Drive or Dropbox have largely replaced traditional FTP sites for file sharing.
Step 17
3.7.3 Name ONE benefit of using file storage services that are available on the internet.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One benefit of using file storage services is accessibility from any device with an internet connection, allowing users to access their files anywhere.