May 2022 Flashcards

1
Q

Which of the following devices supports encapsulation?

A Hub
B Modem
C Router
D Switch

A

C Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Select the correct order of measurement, smallest to largest.

A Gibi, Tebi, Pebi, Kibi,
B Kibi, Gibi, Tebi, Pebi
C Kibi, Mebi, Tebi, Gibi
D Kibi, Tebi, Gibi, Pebi

A

B Kibi, Gibi, Tebi, Pebi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the binary figure for the decimal figure 134?

A 10000110
B 10100101
C 10101000
D 11100110

A

A 10000110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not a benefit of server virtualisation?

A Enables business continuity
B Reduces initial capital outlay
C Reduces the amount of physical storage needed
D Simplifies data centre management

A

C Reduces the amount of physical storage needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Complete the following sentence.
_________ uses copper wires to carry analogue voice data.

A ASDL
B ISDN
C MAN
D PSTN

A

D PSTN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a formal written communication skill used to provide
information to a customer?

A Help file
B Letter
C Online discussion
D Social network

A

B Letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Astatine Advertising Agency (AAA) is a small advertising agency based in a single building
in Cardiff. The company is expanding quickly and is opening offices in Exeter and Leicester.
The three offices will be used by staff who create the advertising campaigns for AAA’s clients.
Documents used in the campaigns are printed by a separate company, Westwood Printing.

16 When the new offices are opened, the AAA IT Support team need to install new computer
systems in the offices for the staff.

(a) Identify and describe two output devices that the AAA IT Support team could install in the
new offices. - 4

A
  • Monitor /Touchscreen(1st) to view information (1)
  • Printer/ Fax (1st) to produce hardcopies of letters (1)
  • Speaker (1st) to listen to conference calls (1)
  • Headphones/ Headset (1st) to listen to training (1)
  • Projector(1st) to view presentations with (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purpose of a Fibre channel port - 2 marks

A
  • To connect computer servers (1) shared storage devices (1)
  • To allow high-capacity data transfer (1) through switches (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advantages of Bespoke Software

A

Advantages
* Designed for specific business needs

  • Only contains software aspects needed
  • No extra ‘bloatware’ included
  • No ongoing licencing fees as paid for when developed
  • More secure than other types as only designed for AAA so less
    chance source code being obtained
  • Can be scaled up/down easier than off- the- shelf software
  • Competitive advantage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disadvantages - Bespoke Software

A

Disadvantages
* Costly to develop in first place
* Have to wait for development to take place - not ready straight
away
* Dependant on single developer for support
* Any changes/upgrades need to be carried out by original
developer
* Requires more training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AAA have used spreadsheet software to track the cost of the purchase and installation of the
new computer systems.

Explain one disadvantage of using spreadsheet software to track the cost of the purchase and
installation of the new computer systems.

2 marks

A
  • The file size can require large data storage space (1) due to
    possible excess/duplicate data (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain two characteristics of a peer to peer network - 4 marks

A
  • Devices share access (1) to all the files (1) and devices (1)
  • Access rights are controlled by sharing permissions (1) on
    individual machines (1)
  • If one computer runs slowly (1) the whole network runs slowly
    (1)
  • If one computer fails (1) the other computers still operate (1)
  • Each computer must be backed up (1) individually (1)
  • It does not need a dedicated server (1) to share data/
    peripherals (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The three offices will be linked together using a WAN.

Identify and describe ONE characteristic of the ADSL and ISDN connectivity methods that
could be used to create a WAN. - 6 marks

A

ADSL:
- Contended (1st ) when more systems connected (1) network
slows down (1)

  • Single line (1st) uses both (1) data and voice transmission (1)

ISDN:
- Uncontended (1st ) network not shared (1) and so security is
improved (1)

  • Data and voice can be sent simultaneously (1st) by phone lines (1) allowing high data volumes (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the term default gateway - 3 marks

A

Access point/IP router (1) linking one computer on a network (1)
to a computer on another network (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One advantage of using wired mesh network topology in the offices. - 2 marks

A
  • Addition of new nodes/devices (1) does not disrupt the
    transmission of data (1)
  • If one node breaks (1) rest of system can continue as if nothing
    has happened (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Extra staff will be employed at the new offices. The staff will have access to client information.

(a)* Discuss the operational issues that should be considered to increase the security of the
client information. - 10 marks

A
  • Train employees regarding how to use the information
  • Implement policies about how the information should be
    used/stored/handled
  • Implement use of access rights to the information as to who can
    view/edit the information
  • Implement and regularly update risk assessments for the
    computer system
  • Install range of physical and logical security methods to protect
    the information