3.1 Explain the function of a network switch - NSC Information Technology - Question 3 - 2019 - Paper 2
Question 3
3.1 Explain the function of a network switch.
3.2 State the common use/purpose of EACH of the following technologies:
3.2.1 Wi-Fi
3.2.2 Bluetooth
3.2.3 3G
3.3 A... show full transcript
Worked Solution & Example Answer:3.1 Explain the function of a network switch - NSC Information Technology - Question 3 - 2019 - Paper 2
Step 1
Explain the function of a network switch.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A network switch connects computers to one another and determines the destination of each network signal it receives. It forwards this signal to the correct destination, effectively directing data traffic and facilitating communication within a local area network (LAN).
Step 2
State the common use/purpose of Wi-Fi.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Wi-Fi is used to connect devices to a local area network (LAN) or personal area network (PAN) wirelessly, allowing access to the internet and communication between devices.
Step 3
State the common use/purpose of Bluetooth.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Bluetooth is a short-range wireless technology used for transferring data between devices such as laptops and mobile phones, enabling them to communicate over short distances.
Step 4
State the common use/purpose of 3G.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
3G is a mobile telecommunications technology that enables devices to access cellular or mobile data, allowing internet connectivity and services like email and web browsing when away from wired networks.
Step 5
Name TWO types of cables that are commonly used in an Ethernet network.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Common types of cables used in an Ethernet network include:
UTP (Unshielded Twisted Pair)
Coaxial cable
Step 6
Draw a diagram to illustrate the layout of a star topology network for the four computers.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
PC
|
PC
|
[Switch/Router]
|
PC
|
PC
In this diagram, all four computers connect to a central switch or router, forming a star topology where data signals pass through the switch to reach the target computer.
Step 7
State TWO disadvantages of using a peer-to-peer network.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Peer-to-peer networks can be less secure than client-server models, as any device can compromise the network.
They can be harder to manage, especially as the number of nodes increases, making administration more complex.
Step 8
Explain what is meant by the term encryption.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Encryption is the process of transforming data or text into a new unreadable format using a specified set of rules or keys. This ensures that only authorized parties can read the data.
Step 9
Give ONE reason why services, such as Skype, use encryption processes.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Services like Skype use encryption to ensure the privacy of users and to protect conversations from being intercepted by third parties.
Step 10
What is this category of encryption software called?
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
This category of encryption software is commonly referred to as Digital Rights Management (DRM).
Step 11
Briefly describe how the inference/decision engine functions.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The inference engine of an expert system takes input from the user, looks it up in the knowledge base, and deduces new facts or follows rules to generate a decision output. It effectively processes information to arrive at conclusions.
Step 12
What does the term fuzzy logic refer to?
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Fuzzy logic refers to a reasoning technique that deals with approximate rather than fixed and exact values. It utilizes degrees of truth rather than the usual true or false, allowing for more flexible reasoning about uncertain conditions.
Step 13
What is meant by the term distributed computing?
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Distributed computing refers to a model where resources of different computers are shared and used simultaneously to solve a single problem or complete a task. This approach enhances efficiency and performance by leveraging multiple computing resources.