Photo AI

The travel agents must be able to conduct business from their office building or by using their mobile office - NSC Information Technology - Question 6 - 2017 - Paper 2

Question icon

Question 6

The-travel-agents-must-be-able-to-conduct-business-from-their-office-building-or-by-using-their-mobile-office-NSC Information Technology-Question 6-2017-Paper 2.png

The travel agents must be able to conduct business from their office building or by using their mobile office. Internet access is required as most of the business is... show full transcript

Worked Solution & Example Answer:The travel agents must be able to conduct business from their office building or by using their mobile office - NSC Information Technology - Question 6 - 2017 - Paper 2

Step 1

6.1.1 Except for making calls and accessing the network, state ONE way in which a smartphone can be useful as a business tool.

96%

114 rated

Answer

One way a smartphone can be useful as a business tool is by allowing access to email, which enables travel agents to communicate with clients and other stakeholders promptly, irrespective of their location.

Step 2

6.1.2 Discuss TWO disadvantages of doing business using a smartphone.

99%

104 rated

Answer

  1. Limited Screen Size: The small screen can make it difficult to input data and view documents, leading to inefficiencies.

  2. Battery Life: Smartphones often need to be charged regularly. Limited battery life can interrupt business activities when power sources are unavailable.

Step 3

6.1.3 Which online service is used to ensure that travel agents will have access to the latest versions of their documents on all of their devices at all times?

96%

101 rated

Answer

An online syncing service such as Google Drive or Dropbox can be used, allowing travel agents to access the latest versions of their documents across all devices.

Step 4

6.2 State TWO methods that the agency can use to control access to the building electronically.

98%

120 rated

Answer

  1. Biometric Scanners: These can scan fingerprints or facial recognition for secure access.

  2. Keypads with Passwords: Staff must enter a code to access the building.

Step 5

6.3.1 Write out the abbreviation AUP in full.

97%

117 rated

Answer

AUP stands for Acceptable Use Policy.

Step 6

6.3.2 Except for the example given, name TWO other aspects that should be included in the travel agency's AUP.

97%

121 rated

Answer

  1. Policy on Personal Use of Company Devices: Restrictions on using company devices for personal tasks.

  2. Prohibited Activities: Specific actions that are forbidden, such as accessing inappropriate content.

Step 7

6.3.3 Motivate TWO reasons why the prohibition of social networking sites at work is justified.

96%

114 rated

Answer

  1. Productivity Issues: Accessing social networking sites can distract employees, leading to decreased productivity during work hours.

  2. Security Risks: These sites may expose the company's network to security vulnerabilities, increasing the risk of data breaches.

Step 8

6.4.1 What is an intranet?

99%

104 rated

Answer

An intranet is a local private network that is accessible only to authorized users within an organization. It can function similarly to the internet by hosting webpages and applications for internal use.

Step 9

6.4.2 Suggest a way in which the travel agents could gain access to the travel agency's intranet securely when working on their tablet computers from home.

96%

101 rated

Answer

Travel agents could log on to a VPN (Virtual Private Network) to access the intranet securely from remote locations.

Step 10

6.5.1 What is the function of an NIC?

98%

120 rated

Answer

The NIC (Network Interface Card) allows a computer to connect to a network. It controls the flow of data to and from the computer.

Step 11

6.5.2 What is the purpose of a MAC address?

97%

117 rated

Answer

The purpose of a MAC address is to uniquely identify a device on a network. It ensures that data is sent to the correct endpoint.

Step 12

6.6.1 It has been argued that the image scanner function is a waste of money. Suggest another way in which travel documents can be captured as images to be saved on the computer system.

97%

121 rated

Answer

Another way to capture travel documents as images is by using a digital camera or a smartphone camera to take photographs of the documents and then upload them to the computer.

Step 13

6.6.2 Besides sharing of the printer, give TWO other reasons for the networking of devices.

96%

114 rated

Answer

  1. Ease of Communication: Networking devices facilitate communication and collaboration between employees.

  2. Centralization of Data: It allows for shared access to resources and data management from a central location.

Step 14

6.6.3 Which technology will allow a user, not connected to a cabled network, to print on the printer?

99%

104 rated

Answer

Wireless technology such as Wi-Fi or Bluetooth will allow a user not connected to a cabled network to print on the printer.

Step 15

6.7.1 What software is needed to run cloud applications?

96%

101 rated

Answer

A web browser or specific applications that run on cloud infrastructure are required to access and run cloud applications.

Step 16

6.7.2 State TWO advantages of using SaaS as an integrated product.

98%

120 rated

Answer

  1. Accessibility: SaaS applications are accessible from any device with an internet connection, allowing for flexibility.

  2. Automatic Updates: SaaS products are regularly updated without user intervention, ensuring access to the latest features.

Step 17

6.7.3 Explain how cloud computing uses virtualization to provide powerful online services.

97%

117 rated

Answer

Cloud computing uses virtualization to create a simulated environment that can host multiple virtual servers on a single physical server. This allows for efficient resource allocation, scalability, and reduced hardware costs.

Step 18

6.7.4 Briefly describe TWO disadvantages of cloud computing.

97%

121 rated

Answer

  1. Dependency on Internet: Reliable internet access is required, and outages can hinder access to services.

  2. Security Concerns: Storing sensitive data on the cloud raises concerns about data privacy and potential breaches.

Step 19

6.8.1 Online transactions are encrypted. Explain the term encryption.

96%

114 rated

Answer

Encryption is the process of converting data into a coded form, making it unreadable to unauthorized users. It ensures that sensitive information, such as payment details, remains secure during transmission.

Step 20

6.8.2 Briefly explain the public key encryption method.

99%

104 rated

Answer

Public key encryption involves using a pair of keys: a public key to encrypt data and a private key to decrypt it. Only the holder of the private key can access the original data, ensuring secure communication.

Step 21

6.8.3 State ONE disadvantage of using BitCoin to pay online.

96%

101 rated

Answer

One disadvantage of using BitCoin is that transactions cannot be canceled or reversed once initiated, which poses a risk if a mistake is made.

Step 22

6.9.1 What is BitTorrent?

98%

120 rated

Answer

BitTorrent is a peer-to-peer (P2P) file sharing protocol used to distribute large amounts of data across the internet efficiently by allowing users to download pieces of a file from multiple sources simultaneously.

Step 23

6.9.2 State TWO benefits of using BitTorrent.

97%

117 rated

Answer

  1. Efficient File Sharing: Users can download files faster by connecting to multiple sources, reducing server load.

  2. Cost-Effective: Since users contribute to file sharing, it minimizes bandwidth costs for the original uploader.

Step 24

6.10 Give TWO examples when downloading software will not be regarded as piracy.

97%

121 rated

Answer

  1. Open Source Software: Downloading software that is legally made available for free under an open-source license is not considered piracy.

  2. Freeware: Software that is distributed for free by the developer and does not include any usage restrictions.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;