3.1 Having a large computer network presents potential challenges - NSC Information Technology - Question 3 - 2021 - Paper 2
Question 3
3.1 Having a large computer network presents potential challenges.
3.1.1 Describe what a computer network is.
3.1.2 What type of network could be used by an intern... show full transcript
Worked Solution & Example Answer:3.1 Having a large computer network presents potential challenges - NSC Information Technology - Question 3 - 2021 - Paper 2
Step 1
3.1.1 Describe what a computer network is.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A computer network is defined as a collection of interconnected devices that are able to communicate and share resources, such as software and data, over a communication medium. This network enables devices to transfer information efficiently.
Step 2
3.1.2 What type of network could be used by an international company such as this?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An international company could utilize a Wide Area Network (WAN) to connect its branches across different geographical locations or the Internet for broader connectivity.
Step 3
3.1.3 State TWO disadvantages of using a computer network.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Complex security management is required to protect sensitive data and prevent unauthorized access.
A network failure can disrupt communication and operations, leading to potential losses.
Step 4
3.2.1 Define the term topology.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Topology refers to the arrangement or layout of devices within a network, which influences performance and reliability.
Step 5
3.2.2 Explain what a star topology entails.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A star topology consists of devices connected independently to a central hub or switch. Each device communicates through the hub, which facilitates data transmission among devices. This layout enhances reliability since a failure in one device does not affect others.
Step 6
3.3.1 Give TWO reasons why a company would benefit from VoIP technology.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
VoIP technology typically offers lower communication costs compared to traditional phone systems.
It allows for features such as video conferencing and file sharing while simultaneously enabling voice calls.
Step 7
3.3.2 Besides the device you are using, state ONE other requirement needed to make a phone call using VoIP software.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An internet connection is required to facilitate communication over VoIP software.
Step 8
3.4.1 (a) What is the purpose of a web browser?
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The purpose of a web browser is to enable users to access and display web pages on the internet.
Step 9
3.4.1 (b) Why can a web browser not be used on its own when searching for information?
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A web browser needs a search engine to locate content on the internet. Without it, users would require specific URLs to find web pages.
Step 10
3.4.2 (a) What is a cookie in this context?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A cookie is a small text file that stores preferences and settings of a website visited by the user.
Step 11
3.4.2 (b) Explain how a cookie will enhance the browsing experience of users.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Cookies enhance the browsing experience by remembering user preferences, allowing for personalized settings, and automatically filling information, thus improving usability and efficiency during subsequent visits.
Step 12
3.4.3 Explain what a click farm is.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Click farms are operations that use bots or individuals to generate numerous clicks and interactions on websites to artificially inflate the status or popularity of a product or webpage.
Step 13
3.5.1 Differentiate between the terms range and bandwidth.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Range refers to the maximum distance over which data can be transmitted effectively, while bandwidth describes the amount of data that can be sent over a network in a specified period.
Step 14
3.5.2 Differentiate between shaping and throttling in this context.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Shaping occurs when an online activity is prioritized over other activities during peak traffic times, while throttling limits bandwidth to all activities when the network is congested.
Step 15
3.6.1 Explain the purpose of a digital certificate when SSL encryption is used.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A digital certificate verifies the authenticity of a person or organization, ensuring that their website can be trusted for secure data communication.
Step 16
3.6.2 How would you identify a website that is encrypted with a secure connection?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A secure website can be identified by the presence of 'https://' in the URL and a padlock symbol in the address bar.
Step 17
3.7.1 Define the term computer worm.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A computer worm is a type of malware that replicates itself to spread to other computers without the need for human action.
Step 18
3.7.2 State ONE activity performed by your electronic device that indicates that the device could be infected with a computer worm.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
An unusual decrease in hard drive space despite the absence of new files could indicate a computer worm infection.
Step 19
3.7.3 Briefly explain how a firewall can protect a network from being infected.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A firewall monitors incoming and outgoing network traffic and can block unauthorized access based on predefined security rules, thus protecting the network from malware.
Step 20
3.7.4 Give the term used to describe a person that is hired by a company to hack into the company's network to test their level of security.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The term used is 'penetration tester' or 'ethical hacker'.