0% found this document useful (0 votes)
22 views29 pages

Topic 3

Uploaded by

Madiha Musharraf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views29 pages

Topic 3

Uploaded by

Madiha Musharraf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Paper 1 Paper 2 Paper 3 All levels

Question 1 SL

A company has expanded its office space into nearby


rooms and has decided to set up a local area network
(LAN) to support its operations.
The LAN will connect the room where the server is
installed to new computers in the additional office
space. The network engineer produced the following
Gantt chart for this task.
Define the term concurrent processing. [1]
Identify two tasks that will be carried out [1]
concurrently.
Identify two tasks that will be carried out [1]
sequentially.
After 5 years the company decided to replace [4]
the LAN with a wireless local area network
(WLAN).
Outline two advantages, to this company, of
installing a WLAN.
A WLAN will introduce additional security [4]
issues for the company.
Discuss any two of these issues and the ways
in which the company might resolve them.
The company is considering expanding their [4]
network to allow employees to connect from
anywhere in the world. The expanded network
would need to provide security and allow the
employees full functionality of the internal
network.
Explain how setting up a virtual private
network (VPN) would provide a suitable
solution.
Question 2 SL

An international company is in the process of moving


its Head Office from Europe to Asia.
Identify two possible compatibility issues as a [2]
part of data migration.
Outline how a virtual private network (VPN) [2]
will allow employees who are in Europe to
communicate with the Head Office in Asia.
Outline one social issue associated with this [2]
process.
Question 3 HL

An oil and gas company has a networked computer


system for use of their employees in the Head Office.
The company also uses the internet to enable
communication with employees working on
exploration and production in many remote
geographical areas.
The sub-sea oil and gas exploration and production
unit of the company relies on thousands of kilometres
of pipeline which are monitored by a computer control
system which can detect leaks.
The process of detecting leaks is carried out by
sensors which are continuously monitoring changes
in the flow and pressure of the liquids in the pipes.
This data is processed on a computer in the office.
If any of sensor values are outside of the acceptable
parameters stored on a disk in the office, the
following error routines are performed:
an alarm is sounded on the computer at the
office
an email message is sent to managers in the
Head Office.
Identify one hardware security measure that [1]
will ensure that confidential data from the
Head Office cannot be accessed.
Identify one software security measure that [1]
will ensure that confidential data from the
Head Office cannot be accessed.
Identify one network security measure. [1]
Explain the environmental benefit of using a [3]
computer control system to monitor the
pipeline.
Explain the relationship between sensors, [4]
output transducers and processor in this
situation.
Construct a system flowchart to represent the [5]
process described above.
Question 4 SL

Outline what is meant by the term computer [2]


network.
Question 5 SL

Identify two reasons why fibre optic cable [2]


would be preferred over wireless connectivity.
Good job identifying two reasons why fibre
optic cable would be preferred over wireless
connectivity. However, your answer could be
improved by providing more specific details.
For example, you could mention that fibre
optics allow faster transmission speeds
compared to wireless connectivity, and that
fibre optic cables are more secure and harder
to break into. Remember to be more precise in
your explanations. Keep up the good work!
Question 6 SL

A wireless local area network (WLAN) is used to


extend access to a school’s wired local area network.
The advantages of this WLAN are user-mobility and
economical access points.
The concept of packet data transmission is used
within this network.
Figure 1 shows the simplified structure of a data
packet.
Figure 1: The structure of a data packet

Identify one hardware component of the [1]


WLAN, other than computers.
Outline two disadvantages of this WLAN. [4]
Identify three ways in which the network [3]
administrator can reduce the risk of
unauthorized access to confidential data.
Define the term protocol. [1]
With reference to Figure 1, explain how data is [6]
transferred by packet switching.
Question 7 SL

A school has a local area network (LAN) connecting


its computers and peripheral devices. The LAN also
provides access to the internet.
Users have been troubled by slow speeds when
accessing the internet.
Describe the role of a router in this network. [3]
Outline two reasons why there might be a [4]
reduction in data transmission speed at
certain times.
Outline two measures that the school could [4]
take to safeguard its data from unlawful
access via the internet.
The inventory of office supplies used in the [4]
school is stored on the computer as a single
file.
Each of the office supplies in the inventory
(such as paper, ink, toner, printers, pens,
staplers, pencils and scissors) has a unique ID
number, name, maximum quantity, minimum
quantity and remaining quantity.
Outline the steps in an algorithm that would
output a list of supplies with the quantity to be
ordered.
Question 8 SL

Explain how data is transmitted by packet [3]


switching.
Question 9 SL

Identify two characteristics of a data packet. [2]


Question 10 SL

Outline the reason for compression when [2]


transmitting data.
Your answer provides a valid reason for
compression when transmitting data. You
correctly state that compressing data reduces
the file size, which in turn leads to cost savings
in cloud storage. However, you could have also
mentioned that compression reduces transfer
times and saves on bandwidth when
transmitting data over a network. Overall, your
answer is clear and concise. Well done!
Question 11 HL

Outline what is meant by the term computer [2]


network.
Describe one problem resulting from low [2]
bandwidth in a computer network.
Question 12 SL

Explain why protocols are used in network [3]


communications.
Question 13 SL

Outline two advantages of a school using a [4]


computer network.
Describe the purpose of the following [2]
hardware component of a network: Router
Describe the purpose of the following [2]
hardware component of a network: Network
interface card (NIC)
Outline why protocols are necessary. [2]
Define the term data encryption. [1]
Evaluate the use of trusted media access [4]
control (MAC) addresses as one method of
network security.
Question 14 SL

Describe how data is transmitted by packet [4]


switching.
Question 15 SL

Define the term data packet. [1]


Your answer is mostly correct. You correctly
mentioned that data is broken down into small
units called data packets and that they are
transmitted over the network. However, you
did not mention that a data packet travels as a
unit with all its parts kept together.
Additionally, you provided extra information
about the three parts of a data packet (header,
payload, and trailer) which was not required in
the question. Overall, your answer
demonstrates a good understanding of the
concept.
Question 16 SL

A school currently has a cabled network but wants to


add wireless networking across the whole campus.
There are concerns that unauthorized people could
access the data on the wireless network.
The school has decided to implement a virtual private
network (VPN) to provide access to its network.
Describe two hardware components the [4]
school will need to implement the wireless
network.
Identify two advantages to the students of the [2]
new wireless network.
Outline two methods the school could employ [4]
to prevent network data from being accessed
over their wireless system.
Identify two technologies the school would [2]
require to provide a VPN.
Explain one benefit to the staff of using a VPN [3]
to remotely access the school network.
Question 17 SL

Identify two differences between a wide area [2]


network (WAN) and a local area network
(LAN).
Question 18 SL

Outline one reason why protocols are used in [2]


communications between computers.
Question 19 SL

Identify two characteristics of a personal area [2]


network (PAN).
Question 20 SL

A company that provides training for teachers plans


to set up a training room in its offices with a network
of 15 computers. Each computer has 1 TB of storage
and 16 GB of random access memory (RAM).
In order to minimize costs, the company decided only
to install general application software on the training
computers.
The company has decided to allow the teachers to
use their own devices in its training room by adding
wireless networking.
Identify two characteristics of RAM. [2]
State the purpose of persistent storage on the [1]
computers.
Identify two types of general application [2]
software that would be installed on the
training computers.
Outline one advantage to the company of [2]
implementing this change.
Outline one disadvantage to the company of [2]
implementing this change.
Describe one method of security that may be [2]
used on this wireless network.
Explain why the speed of data transmission on [4]
the wireless network in the training room may
vary.
Question 21 SL

Outline one reason for the use of standards in [2]


the construction of networks.

You might also like