Photo AI

The shopping complex will use a cabled network to connect all the shops - NSC Information Technology - Question 3 - 2017 - Paper 2

Question icon

Question 3

The-shopping-complex-will-use-a-cabled-network-to-connect-all-the-shops-NSC Information Technology-Question 3-2017-Paper 2.png

The shopping complex will use a cabled network to connect all the shops. 3.1 The cabled LAN in the shopping complex will have access to the Internet. 3.1.1 Give TW... show full transcript

Worked Solution & Example Answer:The shopping complex will use a cabled network to connect all the shops - NSC Information Technology - Question 3 - 2017 - Paper 2

Step 1

Give TWO reasons to motivate the use of UTP cables for the network in the shopping complex.

96%

114 rated

Answer

  1. Easy to Install: UTP cables are straightforward to install, which reduces setup time and costs.

  2. Cost-Effective: The overall cost of UTP cables is lower than that of fiber optic cables, making them a financially viable option for the shopping complex.

Step 2

Which hardware device (Device A) will be used so that the LAN will have Internet access?

99%

104 rated

Answer

The hardware device used will be a Router. This device connects the LAN to the Internet and manages network traffic.

Step 3

Suggest a suitable topology for the LAN.

96%

101 rated

Answer

A Star Topology is suitable for the LAN. In this configuration, all devices are connected to a central hub or switch, making it easy to manage and troubleshoot issues.

Step 4

State TWO advantages of using a client-server network rather than a peer-to-peer network.

98%

120 rated

Answer

  1. More Sophisticated Security: Client-server networks typically offer better security measures as they centralize data management and access controls.

  2. Better Performance: These networks are designed for efficient handling of multiple requests, leading to improved overall performance.

Step 5

Suggest ONE reason for keeping software up to date.

97%

117 rated

Answer

Keeping software up to date ensures that security vulnerabilities are fixed, preventing potential attacks from hackers and malicious software.

Step 6

State TWO responsibilities of the system administrator.

97%

121 rated

Answer

  1. Make Regular Backups: System administrators are responsible for creating backups to prevent data loss.

  2. Manage/Monitor Users' Rights: They oversee and manage user permissions, ensuring the right access levels are maintained.

Step 7

Explain what role password protection plays in the security of data.

96%

114 rated

Answer

Password protection acts as a barrier to prevent unauthorized access to sensitive data. By requiring users to enter a password, it safeguards the information from unauthorized alterations and leaks.

Step 8

Define the term malware.

99%

104 rated

Answer

Malware is defined as software specifically designed to disrupt, damage, or gain unauthorized access to a computer system without the user's consent.

Step 9

Explain how a firewall assists in providing security to computers on a network.

96%

101 rated

Answer

A firewall provides security by monitoring incoming and outgoing network traffic, acting as a barrier between trusted internal networks and untrusted external networks. It prevents unauthorized access and protects sensitive data.

Step 10

What is a cookie in computing terms?

98%

120 rated

Answer

A cookie is a text file that stores information on the user's device after visiting a website, allowing sites to remember user preferences and session data.

Step 11

Explain what a dynamic web page is.

97%

117 rated

Answer

A dynamic web page is generated each time a user accesses it, often using server-side scripting to produce customized content based on user interactions or preferences.

Step 12

How are CSSs (cascading style sheets) used in developing a web page?

97%

121 rated

Answer

CSS is utilized in web page development to define the look and formatting of a web document, allowing developers to separate content from design and enhance the visual appearance of websites.

Step 13

Why is it recommended that the company’s website have a digital certificate?

96%

114 rated

Answer

It is recommended to have a digital certificate to authenticate the identity of the organization, ensuring users are interacting with a legitimate entity.

Step 14

State TWO details that are found on the digital certificate.

99%

104 rated

Answer

  1. Owner's Public Key: This is used to encrypt communications.

  2. Date of Issue: This indicates when the certificate was issued.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;