1 Data processing and information (3)

Resources | Revision Questions | Information Technology IT

Login to see all questions

Click on a question to view the answer

1.

Question 1: Define the terms 'direct data source' and 'indirect data source' in the context of information technology. Provide an example of each.

2.

Describe the role of hashing in data security. Explain the properties of a good cryptographic hash function and provide examples of its use in security applications.

3.

Question 3

Compare and contrast the use of real-time processing in online booking systems and traffic control systems. Consider the specific requirements and challenges of each application.