The shopping complex will use a cabled network to connect all the shops - NSC Information Technology - Question 3 - 2017 - Paper 2
Question 3
The shopping complex will use a cabled network to connect all the shops.
3.1 The cabled LAN in the shopping complex will have access to the Internet.
3.1.1 Give TW... show full transcript
Worked Solution & Example Answer:The shopping complex will use a cabled network to connect all the shops - NSC Information Technology - Question 3 - 2017 - Paper 2
Step 1
3.1.1 Give TWO reasons to motivate the use of UTP cables for the network in the shopping complex.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cost-Effectiveness: UTP cables are generally cheaper compared to other types of cables, such as fiber optic cables, making them a budget-friendly choice for large networks.
Ease of Installation: UTP cables are easier to install and require less specialized training, allowing for more straightforward setup and maintenance.
Step 2
3.1.2 Which hardware device (Device A) will be used so that the LAN will have Internet access?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The device that will be used for Internet access is a Router. The router connects the LAN to the Internet and manages the traffic between them.
Step 3
3.1.3 Suggest a suitable topology for the LAN.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Star Topology is suitable for the LAN. In this topology, all devices are connected to a central hub, allowing for easy addition and removal of devices without disrupting the network.
Step 4
3.2 State TWO advantages of using a client-server network rather than a peer-to-peer network.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Improved Security: Client-server networks offer more sophisticated security measures, allowing better control over user access and data protection.
Centralized Management: Resources and data can be managed centrally, which enhances performance and simplifies maintenance.
Step 5
3.3.1 Suggest ONE reason for keeping software up to date.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One reason for keeping software up to date is to fix vulnerabilities that can make the computer susceptible to attacks by hackers and malware.
Step 6
3.3.2 State TWO responsibilities of the system administrator.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Perform Regular Backups: Ensuring data is regularly backed up to prevent loss in case of system failures.
Manage User Accounts: Creating and deleting user accounts while assigning appropriate permissions.
Step 7
3.4.1 Explain what role password protection plays in the security of data.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Password protection is crucial as it prevents unauthorized access to sensitive data and allows only authorized users to alter or view such information.
Step 8
3.4.2 Define the term malware.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Malware is defined as any software designed to harm or exploit any programmable device or network, including viruses, worms, and spyware.
Step 9
3.4.3 Explain how a firewall assists in providing security to computers on a network.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A firewall provides security by monitoring and controlling incoming and outgoing traffic based on predetermined security rules, helping to prevent unauthorized access to the network.
Step 10
3.5.1 What is a cookie in computing terms?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cookie is a text file saved on the user's local drive by the web browser, used for storing information about the user's preferences on a website.
Step 11
3.5.2 Explain what a dynamic web page is.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A dynamic web page is created by software that runs on the web server and generates content each time the page is accessed. This allows different users to see varying content based on their interactions.
Step 12
3.5.3 How are CSSs (cascading style sheets) used in developing a web page?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
CSSs are used to define the styling and layout of web pages. They separate content from design, allowing for greater flexibility and control over how a webpage appears.
Step 13
3.5.4(a) Why is it recommended that the company's website have a digital certificate?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Having a digital certificate is recommended as it helps to authenticate the identity of the person or organization behind the website, ensuring users' trust in the site's legitimacy.
Step 14
3.5.4(b) State TWO details that are found on the digital certificate.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Owner's Public Key: Used to encrypt information sent to the certificate owner.
Date of Issue: Indicates when the digital certificate was issued.