Photo AI

Network technologies are applied in many areas of everyday life - NSC Information Technology - Question 3 - 2017 - Paper 2

Question icon

Question 3

Network-technologies-are-applied-in-many-areas-of-everyday-life-NSC Information Technology-Question 3-2017-Paper 2.png

Network technologies are applied in many areas of everyday life. 3.1 Computers used for administrative tasks are normally connected in a network. An Ethernet LAN co... show full transcript

Worked Solution & Example Answer:Network technologies are applied in many areas of everyday life - NSC Information Technology - Question 3 - 2017 - Paper 2

Step 1

3.1.1 Name ONE type of cable that is commonly used in an Ethernet network.

96%

114 rated

Answer

One common type of cable used in an Ethernet network is a UTP (Unshielded Twisted Pair) cable, specifically CAT 5 or CAT 6.

Step 2

3.1.2 Which topology allows every computer to be connected with its own cable to a switch?

99%

104 rated

Answer

The topology that allows each computer to be connected with its own cable to a switch is the Star topology.

Step 3

3.1.3 Which network protocol would be used to: (a) Access the Internet

96%

101 rated

Answer

(a) The network protocol used to access the Internet is typically TCP/IP (Transmission Control Protocol/Internet Protocol).

Step 4

3.1.3 Which network protocol would be used to: (b) Browse web pages?

98%

120 rated

Answer

(b) To browse web pages, the HTTP (Hypertext Transfer Protocol) or HTTPS (HTTP Secure) protocols would be used.

Step 5

3.2 What is the benefit of using a virtual private network (VPN)?

97%

117 rated

Answer

The benefit of using a VPN is that it creates a secure connection over a public network, enhancing privacy and security while allowing users to access resources remotely.

Step 6

3.3.1 What is this type of data capturing called?

97%

121 rated

Answer

This type of data capturing is called 'invisible data capturing.'

Step 7

3.3.2 Give ONE example of a real-life situation in which this type of data capturing takes place AND name the type of information that can be captured.

96%

114 rated

Answer

An example of a real-life situation is when users make online purchases using credit cards. The type of information that can be captured includes personal purchase history and credit card details.

Step 8

3.3.3 The captured data is often used for user profiling purposes. What is user profiling mostly used for?

99%

104 rated

Answer

User profiling is mostly used for targeted marketing purposes, allowing businesses to tailor advertising and promotions to individual user preferences.

Step 9

3.4 Name THREE types of code a website can implement to provide interactivity.

96%

101 rated

Answer

Three types of code that a website can implement to provide interactivity are:

  • JavaScript
  • AJAX
  • PHP

Step 10

3.5.1 What is a cookie?

98%

120 rated

Answer

A cookie is a small text file stored on the user's local computer that is used to save user settings and preferences for a website.

Step 11

3.5.2 What is the effect of deleting cookies for the user?

97%

117 rated

Answer

The effect of deleting cookies for the user includes losing saved preferences, causing the user to be prompted to set default settings again when visiting a website.

Step 12

3.6 State TWO disadvantages of using VoIP.

97%

121 rated

Answer

Two disadvantages of using VoIP are:

  • Both parties need a stable internet connection.
  • Call quality may vary based on internet speed, potentially leading to poor call experiences.

Step 13

3.7 What is the purpose of a GPS?

96%

114 rated

Answer

The purpose of a GPS (Global Positioning System) is to provide location data for devices, enabling navigation and tracking of positions.

Step 14

3.8.1 Explain what DRM software is.

99%

104 rated

Answer

DRM (Digital Rights Management) software refers to any software that uses encryption to manage access rights to digital content, preventing unauthorized copying and distribution.

Step 15

3.8.2 Give ANY ONE area of application of DRM software.

96%

101 rated

Answer

One area of application of DRM software is in the distribution of digital music, where it prevents unauthorized sharing and copying of tracks.

Join the NSC students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;