6.1 The diagram below is an example of a WLAN - NSC Information Technology - Question 6 - 2021 - Paper 2
Question 6
6.1 The diagram below is an example of a WLAN. Wi-Fi access points have been placed at various places in the shopping mall.
6.1.1 What medium is used to transfer Wi... show full transcript
Worked Solution & Example Answer:6.1 The diagram below is an example of a WLAN - NSC Information Technology - Question 6 - 2021 - Paper 2
Step 1
What medium is used to transfer Wi-Fi data?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The medium used to transfer Wi-Fi data is typically microwaves or radio waves.
Step 2
Give TWO reasons why there may be a need for many access points in the network environment of the mall.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
To increase the range: having multiple access points can ensure better coverage across a large area, minimizing dead zones.
High traffic management: in scenarios with many users, additional access points can help distribute the network load, enhancing performance and reducing congestion.
Step 3
Which type of device will most likely be used to run this app?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The type of device most likely to run this app would be a mobile device, such as a smartphone or tablet.
Step 4
What does the term application of the Web refer to?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term 'application of the Web' refers to using web apps to access services directly through browsers, rather than relying on traditional software applications.
Step 5
What is defensive programming?
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Defensive programming is a programming practice designed to ensure that the software continues to function under unforeseen circumstances. It involves writing code that anticipates potential errors and handles them gracefully.
Step 6
Briefly describe TWO examples of defensive programming techniques.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Range checking: Ensuring that input data falls within a specified range to prevent errors or unexpected behavior.
Error handling: Implementing try/catch blocks to manage exceptions and maintain application stability.
Step 7
Name an encryption protocol commonly used to encrypt private data that is sent over the internet.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A commonly used encryption protocol is HTTPS (Hypertext Transfer Protocol Secure), which ensures secure communication over a computer network.
Step 8
Briefly explain how public key encryption works.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Public key encryption involves two keys: a public key, which is shared with anyone, and a private key, which is kept secrets by the user. Data encrypted with the public key can only be decrypted by the corresponding private key, ensuring secure communication.
Step 9
Define location-based computing.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Location-based computing refers to computer processing that takes into account the physical location of people and objects and uses this information during processing.
Step 10
Give an example of the use of location-based computing in a mall environment.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example is providing specific advertisements or notifications when a user enters a shop, enhancing their shopping experience.
Step 11
Explain the difference between a white hat hacker and a black hat hacker.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A white hat hacker tests security systems without causing damage. In contrast, a black hat hacker exploits or damages systems for malicious purposes.
Step 12
Explain the effect of a DDoS attack.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A DDoS (Distributed Denial-of-Service) attack overwhelms a server or network with traffic, rendering it unresponsive and unavailable for legitimate users.
Step 13
Name TWO negative effects that cybercrime can have on businesses.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Loss of revenue due to service interruptions.
Damage to reputation, leading to loss of customer trust.
Step 14
Define the term virtual office.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A virtual office is a fixed physical address that provides reception desk and meeting room services, enabling users to operate from remote locations while having professional business addresses.
Step 15
What is the term used to indicate that an employee uses technology to work from home?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term is 'telecommuting', which refers to working from a remote location utilizing technology.
Step 16
What other hardware device would you recommend to be used in a home environment during these meetings, and why?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
I would recommend using a noise-canceling microphone or headphones to prevent background noise from disrupting meetings and ensure clear communication.
Step 17
Name ONE video conferencing platform, other than Google Meet, that can be used for the meetings.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One alternative platform is Zoom, which is commonly used for video conferencing.
Step 18
Give ONE example of a cloud storage space/service that could be used for saving the records of the meetings.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An example of a cloud storage service is Google Drive, which allows for easy saving and sharing of meeting records.
Step 19
Explain the difference between virtual reality and augmented reality.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Virtual reality immerses the user in a completely virtual environment, blocking out the physical world, while augmented reality overlays digital information onto the real world, enhancing the user's perception with additional data.
Step 20
How can the app improve the shopping experience at the mall by being augmented reality?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The app can provide interactive shopping experiences by overlaying 3D models of products in real-time, allowing customers to visualize items in their environment before making a purchase.
Step 21
Name TWO applicable sensors available on a mobile device.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Camera: used to capture real-world images for augmented reality display.
GPS: provides location data to enhance the context of the augmented information.