3.1 Explain the function of a network switch - NSC Information Technology - Question 3 - 2019 - Paper 2
Question 3
3.1 Explain the function of a network switch.
3.2 State the common use/purpose of EACH of the following technologies:
3.2.1 Wi-Fi
3.2.2 Bluetooth
3.2.3 3G
3.... show full transcript
Worked Solution & Example Answer:3.1 Explain the function of a network switch - NSC Information Technology - Question 3 - 2019 - Paper 2
Step 1
Explain the function of a network switch.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A network switch connects multiple computers within a network and efficiently directs data between them. It receives data packets from one device, checks the destination address, and forwards the packets to the intended recipient device, thus reducing collisions and increasing overall network performance.
Step 2
State the common use/purpose of Wi-Fi.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Wi-Fi technology is commonly used to establish a wireless network that allows devices to connect to the internet and communicate with one another without the need for physical cables, facilitating mobility and convenience.
Step 3
State the common use/purpose of Bluetooth.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Bluetooth technology is designed for short-range wireless communication between devices. It is typically used for transferring files or connecting peripherals like headphones and speakers with mobile devices.
Step 4
State the common use/purpose of 3G.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
3G technology enables mobile devices to access the internet and transfer data using cellular networks. It is commonly used for web browsing, streaming media, and other online services when away from traditional wired connections.
Step 5
Name TWO types of cables that are commonly used in an Ethernet network.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Twisted Pair Cable (e.g., CAT5, CAT6)
Coaxial Cable.
Step 6
Draw a diagram to illustrate the layout of a star topology network for the four computers.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The diagram should illustrate a central device (switch/router) connected to four PCs. Each PC will be directly linked to the switch, resembling a star shape, with labels indicating the components:
PC
|
Switch/Router
| | |
PC PC PC
Step 7
State TWO disadvantages of using a peer-to-peer network.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
There is increased security vulnerability since each device must be properly secured individually.
Managing and maintaining the network can become complicated as the number of devices increases.
Step 8
Explain what is meant by the term encryption.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Encryption is a method of securing data by transforming it into an unreadable format. This is accomplished using specific algorithms and keys to ensure that only authorized users can access the original data.
Step 9
Give ONE reason why services, such as Skype, use encryption processes.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Services like Skype use encryption to ensure the privacy and security of communications, protecting users from potential eavesdropping by third parties.
Step 10
What is this category of encryption software called?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This category of encryption software is commonly referred to as Digital Rights Management (DRM).
Step 11
Briefly describe how the inference/decision engine functions.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The inference engine in an expert system evaluates and processes information from the knowledge base. It applies logical rules to the data inputs to draw conclusions or make decisions, effectively simulating human reasoning.
Step 12
What does the term fuzzy logic refer to?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fuzzy logic is a form of many-valued logic that deals with reasoning that is approximate rather than fixed and exact. It is used to handle the concept of partial truth, where truth values can range between completely true and completely false.
Step 13
What is meant by the term distributed computing?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Distributed computing refers to a system where multiple computers work together over a network to share resources and process tasks simultaneously. This allows for more efficient processing and resource allocation across different machines.