+1 (208) 254-6996 essayswallet@gmail.com
  

Give a brief summary: Question 1: 1.The owners of a large bakery… Give a brief summary:Question 1:1.The owners of a large bakery have a Local Area Network (LAN) with a star topology. They order their supplies over the Internet. When data is transmitted from the bakery to the supplier, network protocols are used. (a) Define what is meant by a ‘network protocol’.  (b) TCP/IP is a set of protocols based on layers. (i) With regards to network protocols, define what is meant by a ‘layer’.  ……………………………………………………………………………………………………….. [1] (ii) Describe one advantage of using layers to construct network protocols  ……………………………………………………………………………………………………….. [2] (c) Give two reasons why the bakery may use a star network topology for their LAN. 1  Question 2:A hospital stores patients’ details on its computer network. The hospital is concerned about the security of its patients’ details. (a) Staff already use strong passwords to protect systems. Explain, with reference to system security, three other ways that the hospital could protect the network system (b) Identify three errors that the hospital staff could make that may endanger the security of the network. Outline a procedure that could be put in place to prevent each error.   Question 3:A restaurant has a computer-based ordering system which is running slowly. A technician has said that the hard disc drive is fragmented. The technician has suggested using utility software to defragment the drive. (a) Explain how the restaurant’s hard disc could have become fragmented.  (b) Explain how defragmentation software could overcome the issue of the slow computer system.  Question 4:A law company currently use a Local Area Network (LAN) linked to a Wide Area Network (WAN).They want to upgrade their system to utilise cloud storage.(a) Define what is meant by a Wide Area Network.(b) Explain two advantages to the law company of storing their data in the Cloud.   (c) Explain two disadvantages to the law company of storing their data in the Cloud.  (d) Fig. 2 lists some actions that may take place in the law company’s office. Tick (?) one box in each row to show which legislation applies to each action. Action Data Protection Act 2018 Computer Misuse Act 1990 Copyright Designs and Patents Act 1988 Using a picture for the law company’s new logo without the original creator’s permission.      A secretary accessing a lawyer’s personal email account without permission.      Making a copy of the latest Hollywood blockbuster movie and sharing it with a client.      Storing customer data insecurely.      A lawyer installing a key logger on the secretary’s computer.      Selling client’s personal legal data to a marketing company without their permission.   Question 5:* People often want to buy the most up-to-date smartphones, even though the smartphone they own still works. Discuss the impact of people wanting to upgrade to the latest smartphone. In your answer, you might consider the impact on: ? smartphone users ? cultural issues ? ethical issues ? environmental issues.  Question 6;OCR High School uses a computer system to store data about students’ conduct. The system records good conduct as a positive number and poor conduct as a negative number. A TRUE or FALSE value is also used to record whether or not a letter has been sent home about each incident. An example of the data held in this system is shown below in Fig. 1: StudentName Detail Points LetterSent Kirstie Homework forgotten -2 FALSE Byron Good effort in class 1 TRUE Grahame 100% in a test 2 FALSE Marian Bullying -3 TRUE Fig. 1 (a) State the most appropriate data type used to store each of the following items of data. • StudentName …above in Fig. 1 is stored in a database table called Conduct. (i) Write an SQL statement to select the StudentName field for all records that have negative Points. . . [3] (ii) State the wildcard that can be used in SQL to show all fields from a table. . . (c) A single record from this database table is read into a program that uses an array with the identifier studentdata. An example of this array is shown below: studentdata = [“Kirstie”, “Homework forgotten”, “-2”, “FALSE”] The array is zero based, so studentdata[0] holds the value “Kirstie”. Write an algorithm that will identify whether the data in the studentdata array shows that a letter has been sent home or not for the student. The algorithm should then output either “sent” (if a letter has been sent) or “not sent” (if a letter has not been sent). . Computer Science Engineering & Technology Java Programming COMPUTER CS223

Don't use plagiarized sources. Get Your Custom Essay on
Top answer: Give a brief summary: Question 1: 1.The owners of a large bakery…
Just from $10/Page
Order Essay

Order your essay today and save 10% with the discount code ESSAYHELP