Get premium membership and access questions with answers, video lessons as well as revision papers.
a) (i) Intranets
a) Intranets are in-house, tailor-made networks for use within the organization and provide
limited access (if any) to outside services and also limit the external traffic (if any) into the in
tran etc An intranet might have access to the Internet but there will be no access from the
Internet to the organization’s intranet
The main elements of an Intranet are:
• Intranet server hardware
• Intranet server software
• TCP/IP stack software on the clients and servers
• WWW browsers
• A firewall
(ii) Extranets
Extranets (external Intranets) allow two or more companies to share parts of their Intranets
related to joint projects. For example two companies may be working on a common project, an
Extranet would allow them to share files related with the project.
- Extranets allow other organizations, such as suppliers, limited access to the
organization’s network.
- The purpose of the extranet is to increase efficiency within the business and to reduce
costs
(iii) Global system for mobile( GSM) communication
Global system for mobile communication (GSM) is a wide area wireless communications system
that uses digital radio transmission to provide voice, data, and multimedia communication
services. A GSM system coordinates the communication between a mobile telephones (mobile
stations), base stations (cell sites), and switching systems.
(iv) Bluetooth
Bluetooth technology is a wireless protocol that connects electronic devices while they are close
to each another.
Bluetooth technology was designed primarily to support simple wireless networking of personal
consumer devices and peripherals, including cell phones and wireless headsets. Wireless signals
transmitted with Bluetooth cover short distances, typically up to 30 feet (10 meters).
(b) Role of interface message processor (IMP} in a computer network;
- To transfer the message from the host network to other branches within the network
- To defragment the message in the network to protect it from threats such as viruses
Kavungya answered the question on May 14, 2019 at 09:37
- There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication...(Solved)
There is a global trend towards the adoption of digital data communication systems as opposed
to analog data communication systems.
Required:
Examine four advantages of digital data communication systems over analog data
communication systems.
Date posted: May 14, 2019. Answers (1)
- a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices...(Solved)
a) Mr. Shadrack Kalamba a technician with Icon Systems Technology Ltd. is setting up a local
area network (LAN) for a client
Required:
i) Identify four network devices that he would use in setting up the LAN.
ii) State six advantages of a LAN.
b) Expound the following acronyms as used in computing:
i) TCP.
ii) FTP.
iii) HTTP.
iv) HTML.
v) WWW.
vi) IP.
Date posted: May 14, 2019. Answers (1)
- Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.(Solved)
Transmission of data over computer networks raises certain security concerns.
Identify two possible causes of data insecurity and two mitigations that could be taken to secure
data.
Date posted: May 14, 2019. Answers (1)
- a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single...(Solved)
a) Define the term “world wide web”
b) The surface simplicity of the website is in fact that many individual protocols can be
contained within a single website.
Required
i) Define the term “Protocol”
ii) Describe any four protocols used in the World Wide Web.
iii) Outline four ways of accessing web pages.
Date posted: May 14, 2019. Answers (1)
- Distinguish between synchronous and asynchronous data transmission modes.(Solved)
Distinguish between synchronous and asynchronous data transmission modes.
Date posted: May 14, 2019. Answers (1)
- i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface(Solved)
i) Briefly explain the graphical user interface (GUI)
ii) State two reasons why a GUI is considered easier to use than a command line interface
Date posted: May 14, 2019. Answers (1)
- Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse...(Solved)
Joyce Kubo is a Marketing Manager with Kay Ltd She intends to use her home computer to
connect to the company's network in order to analyse sales data but suspects that her home
computer might.be infected by computer viruses.
Required:
i) Illustrate any four unusual events that could alert Joyce Kubo of possible computer virus
infection.
ii) Suppose after completing her analysis, Joyce Kubo prepares her results in PDF file format
and posts them to the company's website.
Briefly explain two reasons why Joyce Kubo could prefer the PDF file format.
iii) Suppose Joyce Kubo intends to display her results using a presentation package.
Describe four precautions which Joyce Kubo should observe when putting text in
presentation.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.(Solved)
(i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
Date posted: May 14, 2019. Answers (1)
- a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,(Solved)
a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.(Solved)
(i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
Date posted: May 14, 2019. Answers (1)
- Briefly discuss four advantages of the virtual private network.(Solved)
Briefly discuss four advantages of the virtual private network.
Date posted: May 14, 2019. Answers (1)
- (i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.(Solved)
(i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
Date posted: May 14, 2019. Answers (1)
- Explain three modes of data communication and their practical use.(Solved)
Explain three modes of data communication and their practical use.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices(Solved)
(i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
Date posted: May 14, 2019. Answers (1)
- Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.(Solved)
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
Date posted: May 14, 2019. Answers (1)
- Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records...(Solved)
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.
Required:
Describe five types of general information systems controls.
Date posted: May 14, 2019. Answers (1)
- Differentiate between information systems (IS) and information technology (IT).(Solved)
Differentiate between information systems (IS) and information technology (IT).
Date posted: May 14, 2019. Answers (1)
- a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system...(Solved)
a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system that could arise as a result of
computer crime.
Date posted: May 14, 2019. Answers (1)
- Identify three vital services which information systems can provide to a business organization.(Solved)
Identify three vital services which information systems can provide to a business organization.
Date posted: May 14, 2019. Answers (1)
- a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.(Solved)
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
Date posted: May 14, 2019. Answers (1)