Professional Documents
Culture Documents
SECTION A
1
SECTION B
26. Privacy law
- Install utility software such as firewall, antivirus etc
- Create password for data used
- Erase history of website after browsed
27.
Figure A Figure B
The code of the software cannot be The code of the software can be modified
modified
Software cannot be downloaded from the Software can be downloaded from the internet
internet
License is needed to use the software No license needed to use the software
Need to purchase from vendor No need to purchase from vendor. Its freely used
28.
Network A (Intranet) Network B (Extranet)
Only use internet technology Use internet and intranet technologies
Everyone within company can access the Only authorized user can access extranet
information
29. a) User can share the information over a network by anybody and this allows the ease of sharing data.
User can easily retrieve the information of the friends in database and also can modify any changes
of information in data base.
b) The misuse of information by people who has bad intention to any friends in database.
As the data can be retrieved by other user theres a chance where the information could be wrongly
modified by unethical user without authorization.
2
SECTION C
- All the workstations will be connected to the hub and the server.
- If one of the workstations fails, the network will still running as long as the hub is working
- New workstation can be added to the hub and the server and this can ensure the ease of extending the
network in future.
b) i) Wireless Access Point allows the laptop to transfer data wirelessly to other wireless devices.
ii) Modem - a device that enables a computer to transmit data over telephone or cable lines.
iii) Router - a computer networking device that forwards data packets across a network toward their
destinations, through a process known as routing
b) i) Bank XYZ can use a firewall to prevent unauthorized access to its network system.
ii) Bank XYZ can use lock, smartcard or password to access the system.
iii) The bank can also detect and guards all exits and record any hardware transported.
iv) The bank can also do a backup files by keeping the duplicated files in external storage such as in the
external hard disk or thumb drive (choose only 2 points)
33. a) Update button used for changing data on the library system
b) Book ID Each book in the library must have unique number to differentiate the books.