Photo AI

Network technologies are applied in many areas of everyday life - NSC Information Technology - Question 3 - 2017 - Paper 2

Question icon

Question 3

Network-technologies-are-applied-in-many-areas-of-everyday-life-NSC Information Technology-Question 3-2017-Paper 2.png

Network technologies are applied in many areas of everyday life. 3.1 Computers used for administrative tasks are normally connected in a network. An Ethernet LAN co... show full transcript

Worked Solution & Example Answer:Network technologies are applied in many areas of everyday life - NSC Information Technology - Question 3 - 2017 - Paper 2

Step 1

3.1.1 Name ONE type of cable that is commonly used in an Ethernet network.

96%

114 rated

Answer

One common type of cable used in an Ethernet network is UTP (Unshielded Twisted Pair).

Step 2

3.1.2 Which topology allows every computer to be connected with its own cable to a switch?

99%

104 rated

Answer

The topology that allows every computer to be connected with its own cable to a switch is known as the Star topology.

Step 3

3.1.3 Which network protocol would be used to: (a) Access the Internet (b) Browse web pages

96%

101 rated

Answer

(a) The network protocol used to access the Internet is typically TCP/IP (Transmission Control Protocol/Internet Protocol).

(b) To browse web pages, the HTTP or HTTPS protocol is used.

Step 4

3.2 What is the benefit of using a virtual private network (VPN)?

98%

120 rated

Answer

The main benefit of using a VPN is that it provides a secure connection over the Internet, allowing users to protect their data from eavesdropping and to maintain privacy while accessing online services.

Step 5

3.3.1 What is this type of data capturing called?

97%

117 rated

Answer

This type of data capturing is commonly referred to as 'invisible data capturing'.

Step 6

3.3.2 Give ONE example of a real-life situation in which this type of data capturing takes place AND name the type of information that can be captured.

97%

121 rated

Answer

An example of this type of data capturing is when a user makes a purchase online using a credit card. The type of information that can be captured includes the user's buying habits and personal information such as name, address, and spending patterns.

Step 7

3.3.3 What is user profiling mostly used for?

96%

114 rated

Answer

User profiling is mostly used for targeted marketing, allowing companies to tailor advertisements and content to individual preferences and behaviors.

Step 8

3.4 Name THREE types of code a website can implement to provide interactivity.

99%

104 rated

Answer

Three types of code that a website can implement for interactivity include:

  1. JavaScript
  2. AJAX
  3. Server-side scripting languages (such as PHP).

Step 9

3.5.1 What is a cookie?

96%

101 rated

Answer

A cookie is a small text file stored on a user's local computer that is used to save user settings and preferences for a website.

Step 10

3.5.2 What is the effect of deleting cookies for the user?

98%

120 rated

Answer

One effect of deleting cookies is that the next time a user opens a webpage, only the default settings will be available, potentially leading to a less personalized experience.

Step 11

3.6 State TWO disadvantages of using VoIP.

97%

117 rated

Answer

Two disadvantages of using VoIP are:

  1. Both parties need to be connected to the Internet, which may not always be available.
  2. Call quality can suffer if either party has a slow Internet connection.

Step 12

3.7 What is the purpose of a GPS?

97%

121 rated

Answer

The purpose of GPS (Global Positioning System) is to allow users to locate the position of devices or people through navigation capabilities and geotagging.

Step 13

3.8.1 Explain what DRM software is.

96%

114 rated

Answer

DRM (Digital Rights Management) software is any technology that uses encryption to manage and protect the rights to digital content, preventing unauthorized copying and distribution.

Step 14

3.8.2 Give ONE area of application of DRM software.

99%

104 rated

Answer

One area of application of DRM software is in digital books, where it is used to control access and prevent illegal copying.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;