Get premium membership and access questions with answers, video lessons as well as revision papers.
a) (i) Devices for setting up a LAN
- Gateway: A gateway can be hardware or software and it acts as a bridge between two
networks. A gateway is an entrance point of a network, e.g. a router or computer server
which acts as a gateway device in a network. A gateway computer is usually attached
with the router and switch.
- Hub: This is where a number of computers or peripheral devices are linked to a central
unit. It is a networking device
- LAN Card: This is a network Interface card which is used to join the computers in a
network.
- Switch: Ali tire computers in a wired network are directly connected with the switch
through Ethernet cable. They transmit the data towards its destination based on the IP
address.
- Repeater; A repeater is a network device that is used to retransmit the weaker signals in a
network. A repeater receives the. signals on the'electromagnetic or optical transmission
mediums.
(ii) Advantages of LAN
- Users can access the same files
- Messages can be sent between users
- Expensive hardware can be shared e.g. Laser printer Network software is cheaper than
buying individual packages
- A single internet connection can be shared among many users
b)i) TCP: Transmission Control Protocol: These are standard protocol for the Internet and
they are the rules for communicating over the Internet.
ii) FTP-File Transfer Protocol. FTP allows you to copy files on the Internet he.
downloading or uploading
iii) HTTP-Hypertext Transfer Protocol. HTTP defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take in response to
various commands
iv) HTML- Hypertext Markup Language. HTML is a special command code used to
structure text and multimedia documents and to set up hypertext links between
documents, used extensively on the World Wide Web.
v) WWW-World Wide Web; A system of Internet servers that support specially formatted
documents, The documents are formatted in a markup language called HTML
(HyperText Markup Language) that supports links to other documents, as well as
graphics, audio, and video files.
vi) IP- Internet Protocol which are the rules for communicating over the Internet; it is the
primary protocol that establishes the Internet.
Kavungya answered the question on May 14, 2019 at 09:20
- Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.(Solved)
Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.
Date posted: May 14, 2019. Answers (1)
- a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single...(Solved)
a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single website.
Required
i) Define the term “Protocol”
ii) Describe any four protocols used in the World Wide Web.
iii) Outline four ways of accessing web pages.
Date posted: May 14, 2019. Answers (1)
- Distinguish between synchronous and asynchronous data transmission modes.(Solved)
Distinguish between synchronous and asynchronous data transmission modes.
Date posted: May 14, 2019. Answers (1)
- i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface(Solved)
i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface
Date posted: May 14, 2019. Answers (1)
- Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse...(Solved)
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse sales data but suspects that her home
computer might.be infected by computer viruses.
Required:
i) Illustrate any four unusual events that could alert Joyce Kubo of possible computer virus
infection.
ii) Suppose after completing her analysis, Joyce Kubo prepares her results in PDF file format
and posts them to the company's website.
Briefly explain two reasons why Joyce Kubo could prefer the PDF file format.
iii) Suppose Joyce Kubo intends to display her results using a presentation package.
Describe four precautions which Joyce Kubo should observe when putting text in
presentation.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.(Solved)
(i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
Date posted: May 14, 2019. Answers (1)
- a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,(Solved)
a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.(Solved)
(i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
Date posted: May 14, 2019. Answers (1)
- Briefly discuss four advantages of the virtual private network.(Solved)
Briefly discuss four advantages of the virtual private network.
Date posted: May 14, 2019. Answers (1)
- (i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.(Solved)
(i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
Date posted: May 14, 2019. Answers (1)
- Explain three modes of data communication and their practical use.(Solved)
Explain three modes of data communication and their practical use.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices(Solved)
(i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
Date posted: May 14, 2019. Answers (1)
- Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.(Solved)
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
Date posted: May 14, 2019. Answers (1)
- Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records...(Solved)
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.
Required:
Describe five types of general information systems controls.
Date posted: May 14, 2019. Answers (1)
- Differentiate between information systems (IS) and information technology (IT).(Solved)
Differentiate between information systems (IS) and information technology (IT).
Date posted: May 14, 2019. Answers (1)
- a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system...(Solved)
a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system that could arise as a result of
computer crime.
Date posted: May 14, 2019. Answers (1)
- Identify three vital services which information systems can provide to a business organization.(Solved)
Identify three vital services which information systems can provide to a business organization.
Date posted: May 14, 2019. Answers (1)
- a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.(Solved)
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
Date posted: May 14, 2019. Answers (1)
- Organizations individual use different types of information systems for different purposes.
Describe the characteristics of the following information systems:
i) Transaction processing systems (TPS).
ii) Sales and marketing...(Solved)
Organizations individual use different types of information systems for different purposes.
Describe the characteristics of the following information systems:
i) Transaction processing systems (TPS).
ii) Sales and marketing systems.
Date posted: May 14, 2019. Answers (1)
- a) i) Define the term "information systems
ii) State five types of information systems
b) As the information system manager of a company whose operations are highly...(Solved)
a) i) Define the term "information systems
ii) State five types of information systems
b) As the information system manager of a company whose operations are highly automated,
you have noticed that a large number of employees are suffering from occupational over-use
syndrome otherwise known as repetitive strain injury (RSI)
Identify four measures that you could adopt in order to minimize occupational over-use
syndrome
Date posted: May 14, 2019. Answers (1)