Você está na página 1de 16

HIGHER

SCHOOL
2017 CERTIFICATE
EXAMINATION

Information and Digital


Technology
Networking and hardware
General • Reading time – 5 minutes
Instructions • Working time – 2 hours
• Write using black pen
• NESA approved calculators may be used
• Write your Centre Number and Student Number at the top of
pages 9, 11 and 13

Total marks: Section I – 20 marks (pages 2–7)


80 • Attempt Questions 1–20
• Allow about 20 minutes for this section

Section II – 30 marks (pages 9–13)


• Attempt Questions 21–26
• Allow about 50 minutes for this section

Section III – 15 marks (page 15)


• Attempt Question 27
• Allow about 25 minutes for this section

Section IV – 15 marks (page 16)


• Attempt Question 28
• Allow about 25 minutes for this section

1470
Section I

20 marks
Attempt Questions 1–20
Allow about 20 minutes for this section

Use the multiple-choice answer sheet for Questions 1–20.

1 What does this symbol represent?

A. Battery
B. Bluetooth
C. Volume
D. Wi-Fi

2 Which of the following is the safest way to place an electrical extension lead across a
walkway?

A. Place a mat over the extension lead


B. Attach a warning sign to the extension lead
C. Stick the extension lead to the floor
D. Suspend the extension lead above head height

3 Which of the following is an example of an open source operating system?

A. iOS
B. Linux
C. MacOS
D. Windows

–2–
4 A network computer needs to be booted remotely.

Which of the following would enable this to occur?

A. Standby
B. Event viewer
C. Task manager
D. Wake-on-LAN

5 A desktop computer seems to be operating normally, but the lights on the network
interface card are not lit.

What is the most likely cause of this problem?

A. The internet is down.


B. The CMOS battery is faulty.
C. The network cable is unplugged.
D. The power supply of the computer is faulty.

6 Water was found on the floor in the office kitchen. A staff member has mopped up this
spill.

Which risk control measure has been used?

A. Administration
B. Elimination
C. Engineering
D. Isolation

7 Employees in an organisation are frequently being interrupted with a fake pop-up alert
message, even when not using a browser. The company’s computers are regularly
scanned with antivirus software.

Which of the following is most likely to overcome this problem?

A. Perform a disk cleanup


B. Defragment the hard disk
C. Run a real-time virus scan
D. Update the virus definitions

–3–
8 What is virtual memory?

A. RAM allocated to a graphics card


B. Memory that is only used to store text
C. High speed memory installed on the motherboard
D. An area of the hard disk that is used to simulate RAM

9 What is a benefit for an IT professional of achieving vendor certification?

A. It is attractive to a broader range of employers.


B. It will not be outdated when software versions change.
C. It demonstrates detailed knowledge of a particular vendor’s product.
D. It shows flexibility and diversity in handling products from different vendors.

10 A business generates new files each day and their data is backed up every night. The
system failed on Friday morning and all data was lost. The organisation was able to
recover all data using only the most recent Monday and Thursday night backups.

What combination of backup methods is being used?

A. Full and differential


B. Full and incremental
C. Partial and differential
D. Partial and incremental

–4–
11 Two components of a computer system are shown.

Due to copyright restrictions, Due to copyright restrictions,


this material cannot be displayed this material cannot be displayed
until permission has been obtained. until permission has been obtained.

Component X Component Y

Which row of the table correctly identifies the components?

Component X Component Y

A. CPU RAM

B. CPU Video card

C. Motherboard RAM

D. Motherboard Video card

12 What is the main function of a switch?

A. To store data on a network


B. To connect a network to the internet
C. To prevent hackers from accessing a network
D. To enable computers to be connected together

13 Which of the following is the strongest password?

A. Qwert6
B. jJ3pt4s0
C. holidays
D. 12345678

14 The modification of data to improve its security is called

A. authentication.
B. configuration.
C. encryption.
D. permission.

–5–
15 What is the purpose of asymmetrical digital subscriber line (ADSL)?

A. To secure workstations
B. To authenticate users on a network
C. To connect a network to the internet
D. To prevent unauthorised access to files

16 An image of a connector is shown.

What type of connector is this?

A. RJ45
B. ST
C. USB
D. VGA

17 Two buildings on a university campus need to be networked.

Building 1 Tree Building 2


300 m

Which cable would provide the most secure data connection between Building 1 and
Building 2?

A. Fibre
B. Coaxial
C. Shielded twisted pair (STP)
D. Unshielded twisted pair (UTP)

–6–
18 What is the process called when files on a hard disk are overwritten with patterns of 1s
and 0s?

A. Deleting
B. Formatting
C. Partitioning
D. Data wiping

19 A website can be accessed by a browser when the website’s IP address is entered, but not
when its URL is entered.

Which of the following settings would need to be changed to fix this problem?

A. Proxy
B. TCP/IP
C. Domain Name Service (DNS)
D. Dynamic Host Configuration Protocol (DHCP)

20 This screenshot was obtained after a command line utility was executed.

[180.179.212.202] with 32 bytes of data:


Reply from 180.179.212.202: bytes=32 time=481ms TTL=52
Reply from 180.179.212.202: bytes=32 time=482ms TTL=52
Reply from 180.179.212.202: bytes=32 time=486ms TTL=52
Reply from 180.179.212.202: bytes=32 time=487ms TTL=52

statistics for 180.179.212.202:


packets: sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 481ms, Maximum = 487ms, Average = 484ms

Which row of the table correctly identifies, from the screenshot, the command line utility
used and the speed of the internet connection?

Command line utility Internet connection


A. Ping Fast
B. Ping Slow
C. IP Config Fast
D. IP Config Slow

–7–
BLANK PAGE

–8–
© 2017 NSW Education Standards Authority
HIGHER SCHOOL CERTIFICATE
2017 EXAMINATION

Centre Number
Information and Digital Technology
Networking and hardware
Section II Student Number
30 marks
Attempt Questions 21–26
Allow about 50 minutes for this section

Answer the questions in the spaces provided. These spaces provide guidance for the expected
length of response.

Question 21 (8 marks)

(a) What is the purpose of a file extension? Provide an example. 2


...............................................................................................................................
...............................................................................................................................

...............................................................................................................................

(b) Outline TWO accessibility features of an operating system. 2


...............................................................................................................................
...............................................................................................................................
...............................................................................................................................
...............................................................................................................................
...............................................................................................................................

(c) Explain, using examples, the effect that the convergence of technologies has had 4
on the ICT industry.
...............................................................................................................................
...............................................................................................................................
...............................................................................................................................
...............................................................................................................................
...............................................................................................................................
...............................................................................................................................
...............................................................................................................................
...............................................................................................................................

1471 –9–
Question 22 (2 marks)

Describe the role of SafeWork NSW (formerly WorkCover NSW). 2


.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

Question 23 (5 marks)

(a) Explain how a business may be affected by malicious software. 2


...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

(b) A user reports that they cannot log on to the network. 3

What troubleshooting steps should be taken to resolve this issue?

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

– 10 –
© 2017 NSW Education Standards Authority
HIGHER SCHOOL CERTIFICATE
2017 EXAMINATION

Centre Number
Information and Digital Technology
Networking and hardware
Section II (continued) Student Number

Question 24 (8 marks)

(a) Outline TWO factors that should be considered when installing a wireless router 2
on a SOHO network.
...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

(b) Under what circumstances would satellite be the most effective option for a 2
SOHO to access the internet?
...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

(c) Explain how a business can improve the long-term reliability of its networked 4
desktop computers.
...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

...............................................................................................................................

1472 – 11 –
BLANK PAGE

– 12 –
© 2017 NSW Education Standards Authority
HIGHER SCHOOL CERTIFICATE
2017 EXAMINATION

Centre Number
Information and Digital Technology
Networking and hardware
Section II (continued) Student Number

Question 25 (3 marks)

Explain how port assignment is used when configuring a firewall. 3


.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

Question 26 (4 marks)

Contrast Bluetooth and Wi-Fi technologies. 4


.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

.........................................................................................................................................

1473 – 13 –
BLANK PAGE

– 14 –
© 2017 NSW Education Standards Authority
HIGHER SCHOOL CERTIFICATE
2017 EXAMINATION

Information and Digital Technology


Networking and hardware

Section III

15 marks
Attempt Question 27
Allow about 25 minutes for this section

Answer the question in a writing booklet. Extra writing booklets are available.

Question 27 (15 marks)

A company is experiencing ongoing problems with printing and file management on


its network.

(a) Explain the benefits of entering into a vendor contract as a solution to the 3
problems.

(b) At the moment, files on the network are accessible by all users. However, access 4
to some files should be restricted to managers only.

Explain how this can be achieved efficiently.

(c) Below is an extract of the help desk log for one small networked laser printer in 8
this company.

Based on the information, and excluding vendor contracts, suggest and justify
ways to reduce problems with this printer in the future.

Date Page Problem Notes from service staff


count
1/1/17 2300 Poor quality print. New toner cartridge ordered. Due for
delivery 4/1/17.
7/1/17 7300 Streaks on printed Toner cartridge empty. New cartridge
page. Faint text. ordered due in two days.
16/1/17 12800 Printing blank Toner cartridge ordered. 3-day delay
pages. before new cartridge is available.
20/1/17 13200 Black dots over the Cleaned spilled toner from rollers.
page. Replacement printer drum ordered.
Delivery expected 24/1/17.

Please turn over

1474 – 15 –
Section IV

15 marks
Attempt Question 28
Allow about 25 minutes for this section

Answer the question in a SEPARATE writing booklet. Extra writing booklets are available.

Your answer will be assessed on how well you:


● demonstrate knowledge and understanding relevant to the question
● communicate ideas and information using relevant workplace examples and industry
terminology
● present a logical and cohesive response

Question 28 (15 marks)

A large manufacturer of ICT components employs people from diverse cultural backgrounds as
well as people with disabilities. The company operates 24 hours a day, 6 days a week, requiring
staff to undertake shift work.

A recent evacuation drill highlighted a number of serious concerns at this workplace. It was
noted that a large number of staff members were unaware of their responsibilities. People,
including managers and visitors, were unaccounted for. People with disabilities had difficulty
evacuating.

Recommend and justify ways in which this organisation can raise awareness among its entire
staff on the importance of consultation and participation in work health and safety processes.

End of paper

– 16 –
© 2017 NSW Education Standards Authority

Você também pode gostar