The travel agents must be able to conduct business from their office building or by using their mobile office - NSC Information Technology - Question 6 - 2017 - Paper 2
Question 6
The travel agents must be able to conduct business from their office building or by using their mobile office. Internet access is required as most of the business is... show full transcript
Worked Solution & Example Answer:The travel agents must be able to conduct business from their office building or by using their mobile office - NSC Information Technology - Question 6 - 2017 - Paper 2
Step 1
6.1.1 Except for making calls and accessing the network, state ONE way in which a smartphone can be useful as a business tool.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A smartphone can be useful as a business tool by allowing users to access emails, which facilitates communication and efficient management of tasks while away from the office.
Step 2
6.1.2 Discuss TWO disadvantages of doing business using a smartphone.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One disadvantage is that the small screen size can make data entry cumbersome and difficult. Another disadvantage is the limited battery life, which can hinder productivity if the device is not regularly charged.
Step 3
6.1.3 Which online service is used to ensure that travel agents will have access to the latest versions of their documents on all of their devices at all times?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An online syncing service, such as Google Drive or Dropbox, ensures that travel agents have the latest versions of their documents accessible on all their devices.
Step 4
6.2 State TWO methods that the agency can use to control access to the building electronically.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The agency can implement biometric scanners for fingerprint access and use keypads with passwords for securing entry.
Step 5
6.3.1 Write out the abbreviation AUP in full.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
AUP stands for Acceptable Use Policy.
Step 6
6.3.2 Except for the example given, name TWO other aspects that should be included in the travel agency's AUP.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The AUP should include guidelines on the acceptable use of storage devices and regulations regarding the websites that may be accessed during work hours.
Step 7
6.3.3 Motivate TWO reasons why the prohibition of social networking sites at work is justified.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Social networking sites can lead to distractions, which reduce productivity, and they can also misuse bandwidth, potentially hindering essential business processes.
Step 8
6.4.1 What is an intranet?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An intranet is a private network accessible only to an organization's staff, often found as webpages on a browser, providing internal information and communication resources.
Step 9
6.4.2 Suggest a way in which the travel agents could gain access to the travel agency's intranet securely when working on their tablet computers from home.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Travel agents could log on to a VPN (Virtual Private Network) to access the intranet securely from their home.
Step 10
6.5.1 What is the function of an NIC?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The NIC, or Network Interface Card, allows the computer to connect to the network, controlling the flow of data into and out of the device.
Step 11
6.5.2 What is the purpose of a MAC address?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A MAC address serves as a unique identifier for a device on a network, ensuring that data is sent to the correct destination.
Step 12
6.6.1 Suggest another way in which travel documents can be captured as images to be saved on the computer system.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Another method for capturing travel documents as images could be using a digital camera or a smartphone camera.
Step 13
6.6.2 Besides sharing of the printer, give TWO other reasons for the networking of devices.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Networking devices allows for improved communication between them and facilitates centralized management of resources.
Step 14
6.6.3 Which technology will allow a user, not connected to a cabled network, to print on the printer?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Bluetooth or Wi-Fi technology will allow a user to print on the printer wirelessly.
Step 15
6.7.1 What software is needed to run cloud applications?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A web browser that can run a cloud-based interface is necessary to access and use cloud applications.
Step 16
6.7.2 State TWO advantages of using SaaS as an integrated product.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One advantage is that SaaS eliminates the need for purchasing licenses, allowing access on multiple devices. Another advantage is that it generally provides automatic updates, ensuring users always have the latest version.
Step 17
6.7.3 Explain how cloud computing uses virtualization to provide powerful online services.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cloud computing utilizes virtualization to allow multiple users to share resources on a virtual server, enhancing efficiency and resource management.
Step 18
6.7.4 Briefly describe TWO disadvantages of cloud computing.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One disadvantage is the dependency on a stable internet connection, as services may become inaccessible during outages. Another is potential security risks, especially with sensitive data hosted online.
Step 19
6.8.1 Explain the term encryption.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Encryption refers to the process of scrambling data according to a specific algorithm, making it unreadable without the proper decryption key.
Step 20
6.8.2 Briefly explain the public key encryption method.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Public key encryption uses a pair of keys: a public key to encrypt data and a private key to decrypt it, ensuring secure communication between parties.
Step 21
6.8.3 State ONE disadvantage of using BitCoin to pay online.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One disadvantage of using BitCoin is that transactions are irreversible, which can lead to issues if mistakes are made.
Step 22
6.9.1 What is BitTorrent?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
BitTorrent is a peer-to-peer file sharing protocol that allows users to distribute files over the Internet.
Step 23
6.9.2 State TWO benefits of using BitTorrent.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
BitTorrent allows users to download large files efficiently and helps distribute the cost of hosting files among many users.
Step 24
6.10 Give TWO examples when downloading software will not be regarded as piracy.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Downloading software that is provided as freeware or shareware is typically not regarded as piracy. Additionally, downloading proprietary software for personal use under an agreement is also permitted.