Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
270 views
10 pages
ICT CH 4 Network and Effect of Using Them Qus
Uploaded by
aidan
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save ICT CH 4 Network and Effect of using them Qus For Later
Download
Save
Save ICT CH 4 Network and Effect of using them Qus For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
270 views
10 pages
ICT CH 4 Network and Effect of Using Them Qus
Uploaded by
aidan
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save ICT CH 4 Network and Effect of using them Qus For Later
Carousel Previous
Carousel Next
Download
Save
Save ICT CH 4 Network and Effect of using them Qus For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 10
Search
Fullscreen
IEQA Networks and the effects of using them 1. Ken owns a large business. He has purchased 30 computers and three printers to help run his business more efficiently. a Identify three items of hardware Ken will need to buy to allow the computers to be networked and allow access to the internet to process customer orders. 1 bb Ken's business is expanding. He buys another company in a different location and installs a second network of computers in the new company. i Describe what additional hardware Ken needs to buy to enable the two networks to be linked (both are using the same protocols). Give a reason for your choice of hardware. Describe two of the features of the additional hardware you named in part b i. 1 Cambridge I6CSE™ olermation and Communication TechBMTRSETMGPHEBEK 2nd dion Phetocopying prohibitedPRA 4 Networks and the effects of using them ¢ Ken has asked all his staff to use passwords to protect their computers from illegal access. His staff has chosen a number of passwords. Indicate in the table below whether you think the passwords chosen are weak or strong. =r weakizi | Seon” reed [Kent23 asa ‘stpiaaze en 2 a Describe the following terms, i UN ii WAN ili WLAN b Identify the items shown in the following diagram using the following terms: » bridge » router » switch » server » internet tecopying prohibited Cambridge BOSE INGFRSFBRACommuniccion Technology Theory Workbook 2nd Etonial ‘4 Networks and the effects of using them Each item can be used once, more than once or not at all. © Give one advantage and one disadvantage of using WLANs rather than LANs. Advantage: Disadvantage: 3a Data is often transmitted using packets. Indicate, by using a tick (7) which of the following information forms part of the packet. tem of information Present iv) Size ofthe packet fia MB) Date packet sent Sender's IP address Name of recipient Routing table Identity number of each packet Cambridge 16CSE™ nfrmation and Communication TechilOGPTASOEPWEERBRGK 2d Eton‘4 Networks and the effects of using them b Describe what happens when the packets of data arrive together at their destination, ‘€ Computer X is connected to a LAN in Sweden. Computer Y is connected to a LAN in Pakistan, Describe how computer X could send data packets to computer Y. 4 a Name three items of hardware and/or software needed to carry out video conferencing. 1 b Describe two potential disadvantages and two clear advantages of using video conferencing rather than face-to-face meeting Disadvantagi 1 ‘Photecopying pranibites Cambridge [GOSEDIAPRAURFACommunicsin Technology Theory Workbook 2nd Edin /EQAar 4 Networks and the effects of using them Advantages: 1 5 Describe the operation of: iweb conferencing (webinars): ji phone conferencing: ‘cambridge IGCSE™ Inermation and Communication Tec and Edion Photocopying prohibited[EQA 4 Networks and the effects of using them 6 A research company needs to control which personnel are allowed access to secure areas. The company has issued each member of staff with a magnetic stripe card. Describe how the magnetic stripe card can be used to limit access to the secure areas. 'b Describe additional features which can be added to the card to improve security even further. Photocopying prohibited Cambridge [G0SEMINGPRBUBHR Communication Technology Theory Workbook 2nd Eltonnies 4 Networks and the effects of using them 7 Asif logs into his bank's website using his debit card number (1234 5678 9012 3456). The logon page at this stage is as shown below. Physical and electronic tokens are used to authenticate the user. HODDER BANK GROUP Pease enter your fl name: ~ Asif knan Pease enter the ast 5 igh of your debit car (23456 Using your physical token device, pease center the este password shown fon the screen: WOODS IDL ‘a Describe what is meant by a physical token. b Explain how the physical token can be used to generate the one-time password (OTF) which Asif needs to complete the login to his bank. 7 on copying prohibited Cambridge 1GCSE™* Information ad Communication Te MBE ROETMGTREPER 24a Photocopying pre‘4Networks and the effects of using them ¢ Explain the difference between a disconnected physical token and a connected physical token. 'b Zero login is one form of authentication. i Explain what meant by zero login. {i Give two disadvantages of zero login. 1 Photocopying prohibited Caméridye [GCSE PHTNGHRA Communication Technology Theery Workbook 2nd Eton [ERApar 4 Networks and the effects of using them ¢ Some smartphones use biometrics as a security feature to unlock the device. Name two types of biometric check used by smartphones. 1 2 9 Eight statements are shown in the table below. Indicate whether each statement is true or false by putting a tick (7) in the correct box. | statement True (1 False (v) ‘A network interface card has a MAC address hard-wired atthe ‘manufacturing stage Hubs only send data packets toa specific device onthe local network ‘bridge is used to connect a local area network (LANI to any external network Routers use IP addresses to direct data packets tothe correct network Bluetooth uses spread-spectrum frequency hopping to allow device pairing Cloud computing does not require access to the internet to enable files to be downloaded or uploaded ‘Wide area networks [WANs] only work over a very limited distance geographically Zero login depends on biometrics and behavioural patterns 10a One type of LAN is a wireless LAN (WLAN). Compare LANs with WLANs. ‘Cambridge IGCSE™ Information and Communication TecNBBSHIPSEMGPRBBER 278 EditonfEQA 4Networks and the effects of using them b Explain the difference between a LAN and a WAN. ‘V1a_Explain the term cloud computing, b Give three advantages and three disadvantages of cloud computing. Advantage 1: Advantage 2: Advantage 3: Disadvantage 1: Disadvantage 2: Disadvantage 3: Photecepying prohiites Cambridge (G0SEMINPMBUGRRFYCammuncation Technology Theory Workbook 2d Eton
You might also like
Mathes Tutor 3B
PDF
100% (2)
Mathes Tutor 3B
581 pages
CIE IGCSE ICT Theory Notes 3rd Edition
PDF
100% (2)
CIE IGCSE ICT Theory Notes 3rd Edition
45 pages
ICT 1.1 Computing Basics: Unit 1: Introduction To Computer Literacy
PDF
100% (1)
ICT 1.1 Computing Basics: Unit 1: Introduction To Computer Literacy
26 pages
5.2.2 Algorithms Worksheet 2 Operators Student
PDF
0% (1)
5.2.2 Algorithms Worksheet 2 Operators Student
3 pages
(9-1) Igcse Ict Chapter - 9 - 10
PDF
100% (1)
(9-1) Igcse Ict Chapter - 9 - 10
4 pages
Chapter 8 - Safety and Security
PDF
100% (1)
Chapter 8 - Safety and Security
31 pages
1 2 2-Security-Aspects
PDF
100% (1)
1 2 2-Security-Aspects
9 pages
WB Chapter 2 Data Transmission
PDF
No ratings yet
WB Chapter 2 Data Transmission
15 pages
Chapter 7 SystemLifeCycle
PDF
100% (1)
Chapter 7 SystemLifeCycle
14 pages
Ch08 - Safety and Security
PDF
100% (1)
Ch08 - Safety and Security
6 pages
E Safety
PDF
No ratings yet
E Safety
2 pages
WB Chapter 1 Data Representation
PDF
No ratings yet
WB Chapter 1 Data Representation
21 pages
Ict Igcse chp9 Audience Worksheet
PDF
No ratings yet
Ict Igcse chp9 Audience Worksheet
3 pages
Types of Network Computers: Questions
PDF
No ratings yet
Types of Network Computers: Questions
3 pages
Igcse Ict Chapter 11 Practical Notes
PDF
No ratings yet
Igcse Ict Chapter 11 Practical Notes
10 pages
4.1 Networks
PDF
No ratings yet
4.1 Networks
15 pages
Unit 1: Understanding Ict: A.M. FRIDAY, 13 January 2012 1 Hours
PDF
No ratings yet
Unit 1: Understanding Ict: A.M. FRIDAY, 13 January 2012 1 Hours
20 pages
Answer To Questions - 08. Iterative Constructs in Java
PDF
100% (1)
Answer To Questions - 08. Iterative Constructs in Java
2 pages
Gcse Information and Communication Technology
PDF
No ratings yet
Gcse Information and Communication Technology
19 pages
5.1 The Internet and The World Wide Web (WWW)
PDF
No ratings yet
5.1 The Internet and The World Wide Web (WWW)
19 pages
The ICT Lounge: Encrypting Data
PDF
No ratings yet
The ICT Lounge: Encrypting Data
4 pages
Pseudocode Guide
PDF
100% (1)
Pseudocode Guide
23 pages
IGCSE - ComputerScience - Chapter1 (Data Representation)
PDF
100% (1)
IGCSE - ComputerScience - Chapter1 (Data Representation)
57 pages
1microsoft Word 2003 For IGCSE ICT
PDF
No ratings yet
1microsoft Word 2003 For IGCSE ICT
5 pages
Types and Components of Computer Systems: 2016 © Provided by Anthi Aristotelous
PDF
No ratings yet
Types and Components of Computer Systems: 2016 © Provided by Anthi Aristotelous
55 pages
Presentation On Various Types of Data IN Microsoft Excel
PDF
No ratings yet
Presentation On Various Types of Data IN Microsoft Excel
11 pages
4.2 Network Issues and Communication
PDF
No ratings yet
4.2 Network Issues and Communication
14 pages
IGCSE Chapter 5 - The Effects of Using ICT
PDF
No ratings yet
IGCSE Chapter 5 - The Effects of Using ICT
3 pages
Chapter 6 Security Privacy and Data Integrity
PDF
No ratings yet
Chapter 6 Security Privacy and Data Integrity
91 pages
MS Excel
PDF
No ratings yet
MS Excel
8 pages
ICT THEORY PPR 2
PDF
No ratings yet
ICT THEORY PPR 2
18 pages
Igcse Ict 3ed TR Ws 7 3
PDF
No ratings yet
Igcse Ict 3ed TR Ws 7 3
2 pages
0417 Teacher Guide (For Examination From 2023)
PDF
No ratings yet
0417 Teacher Guide (For Examination From 2023)
28 pages
As Level Computer Science: Worksheet
PDF
67% (3)
As Level Computer Science: Worksheet
1 page
As Computer Science 9618
PDF
100% (1)
As Computer Science 9618
74 pages
Computer Science (9608)
PDF
No ratings yet
Computer Science (9608)
38 pages
N5 Web Design Development Notes
PDF
No ratings yet
N5 Web Design Development Notes
12 pages
Lesson Plan For Final Year
PDF
No ratings yet
Lesson Plan For Final Year
12 pages
Practical File (Adarsh)
PDF
No ratings yet
Practical File (Adarsh)
53 pages
KS3 Presentation - 01 Introduction To Computers
PDF
No ratings yet
KS3 Presentation - 01 Introduction To Computers
28 pages
Unit 9 Secuity Privacy and Data Integrity
PDF
No ratings yet
Unit 9 Secuity Privacy and Data Integrity
7 pages
Computer Networks Unit 1
PDF
No ratings yet
Computer Networks Unit 1
30 pages
Computer Science 2022-Practical File
PDF
No ratings yet
Computer Science 2022-Practical File
32 pages
Blender Tutorial Worksheet - Move, Rotate, Scale, Colour
PDF
No ratings yet
Blender Tutorial Worksheet - Move, Rotate, Scale, Colour
4 pages
ICT-Test For CH 1-2-QP
PDF
No ratings yet
ICT-Test For CH 1-2-QP
11 pages
Networks Questions Answers
PDF
100% (1)
Networks Questions Answers
3 pages
IGCSE ICT - Unit 1 - Chapter 2 (Edexel Pearson)
PDF
No ratings yet
IGCSE ICT - Unit 1 - Chapter 2 (Edexel Pearson)
29 pages
Ict Revision 2024-2025
PDF
100% (1)
Ict Revision 2024-2025
27 pages
More Stable and Secure Connection
PDF
No ratings yet
More Stable and Secure Connection
3 pages
O Level Revision Notes V22
PDF
No ratings yet
O Level Revision Notes V22
409 pages
Past Paper Questions (Paper 2 Complete)
PDF
No ratings yet
Past Paper Questions (Paper 2 Complete)
112 pages
2023 Safety and Security IGCSE ICT 0417
PDF
No ratings yet
2023 Safety and Security IGCSE ICT 0417
10 pages
Mahmud RAHMAN - 1.2 Workbook (Part 1)
PDF
No ratings yet
Mahmud RAHMAN - 1.2 Workbook (Part 1)
19 pages
Extended Questions - 6 Markers ANSWERS
PDF
No ratings yet
Extended Questions - 6 Markers ANSWERS
7 pages
IGCSE ICT Mock On Revision Notes 3
PDF
No ratings yet
IGCSE ICT Mock On Revision Notes 3
9 pages
Igcse Ict 3ed TR Ws 10 3
PDF
No ratings yet
Igcse Ict 3ed TR Ws 10 3
1 page
Note Ict 2 PDF
PDF
0% (1)
Note Ict 2 PDF
5 pages
Lesson (5) Digital Text and Numbers
PDF
No ratings yet
Lesson (5) Digital Text and Numbers
8 pages
Mahmud RAHMAN - 1.1 Workbook
PDF
No ratings yet
Mahmud RAHMAN - 1.1 Workbook
8 pages
ICT - Chapter 6 - Revision Notes
PDF
No ratings yet
ICT - Chapter 6 - Revision Notes
4 pages
Humane or A Brain Drain
PDF
100% (4)
Humane or A Brain Drain
2 pages
Chapter 4
PDF
No ratings yet
Chapter 4
10 pages
CIE CS CH2 Data Transmission
PDF
No ratings yet
CIE CS CH2 Data Transmission
30 pages
Activity 13 C
PDF
No ratings yet
Activity 13 C
1 page
Excel Exercise Exam Style Ans
PDF
No ratings yet
Excel Exercise Exam Style Ans
7 pages
ICT Qus2 Oct Test (2) Update
PDF
No ratings yet
ICT Qus2 Oct Test (2) Update
7 pages
ICT 25 1 2024 Quiz
PDF
No ratings yet
ICT 25 1 2024 Quiz
8 pages
A Short Text
PDF
No ratings yet
A Short Text
1 page
Pre IG C& C2 Mid Term Exam Question Paper
PDF
No ratings yet
Pre IG C& C2 Mid Term Exam Question Paper
12 pages
Lecture Notes by TR Wine: 2 August 2022 (11:30AM - 1:00PM)
PDF
No ratings yet
Lecture Notes by TR Wine: 2 August 2022 (11:30AM - 1:00PM)
4 pages
Quick Test For ME PreiG C2
PDF
No ratings yet
Quick Test For ME PreiG C2
6 pages
Unit 4-Programming (It All Adds Up)
PDF
No ratings yet
Unit 4-Programming (It All Adds Up)
26 pages
Mid-Term Exam Maths Preig C2
PDF
No ratings yet
Mid-Term Exam Maths Preig C2
3 pages
Types of Figurative Language
PDF
No ratings yet
Types of Figurative Language
4 pages
Topic GP
PDF
No ratings yet
Topic GP
10 pages