Past Paper Questions Flashcards

1
Q

Explain how a Network Card is used in a network [2]

A

Network card - It connects a computer to a LAN [1] so that it can communicate with the file server [1]
It provides a port [1] for connecting a network cable/Ethernet cable [1]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain how a Wireless Access Point is used in a network [2]

A

WAP - To connect a computer to a network/router [1] using Wi-Fi/Bluetooth [1]
in a hotspot [1] using radio transmitters/antennae [1]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain how a MAC address is used in a network [2]

A

MAC Address - To identify a computer’s network interface card (NIC) [1] uniquely [1] on a LAN [1]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distinguish between a local area network (LAN) and a metropolitan area network (MAN).
[4]

A

A LAN is spread over a small geographical area/a single building/office [1] using cables/Wi-Fi/wireless/fibre optic technology [1] It provides services for a single organisation [1]
A MAN covers a highly-populated area/a large town/city [1] using fibre-optic/ wireless technology [1] It provides services for a community of users [1]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the main features of a peer-to-peer network. [4]

A

There is no dedicated/central server
All computers have equal status
Each computer is a supplier of resources
and a consumer of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Evaluate the star topology and the bus topology with respect to data security [6]

A

Star Network - A central or dedicated/host/fileserver/hub. Each node is directly connected to the hub by its own cable. The fileserver controls all network communication. The fileserver controls the transfer of data packets.

Data security - The star network is more secure. Data packets are sent to/from the fileserver from/to the node directly via a dedicated connection. The fileserver controls all security. Only the intended recipient receives the data packet.

Bus Network - A main cable/backbone to which all nodes are connected. Terminators are positioned at both ends. A node sends a data packet to another node by placing it on the backbone.

Data security - The bus network is less secure. There is no central control of security. All nodes have access to the backbone/all nodes could access the data packet. Data packets travel in both directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The OSI network model consists of seven layers, one of which is the Application layer.
Name four other layers in the OSI model.

A
Presentation  
Session  
Transport  
Network  
Data  
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the term data mining

A

The automatic analysis/sorting [1] of large data sets/big data [1] in a data warehouse [1]
Pattern recognition/algorithms used [1] to identify patterns/correlations [1] and to predict trends/relationships [1]
Data is combined from multiple source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain how a server is used in a network [2]

A

Manages network resources … such as storage
… files
… hardware devices/peripherals/printers
… communications/email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain how a switched hub is used in a network [2]

A

Switched hub - Acts as a connection point for a number of network computers/nodes
Checks the destination/IP address of data packets
… and forwards them to the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain how a repeater is used in a network [2]

A

Repeater - Regenerates data transmission signals … that have been attenuated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain why communication protocols are necessary

A

To enable different devices to communicate using the same rules/ standards
Devices may differ in transmission speeds/character sets/error detecting methods/security levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe The Application layer on the OSI network model

A
Presents information/data to the end user   Deals with functions such as data transfer   
... messaging   
... distributed databases   
... operating system functions   
... the end-user interface   
Interacts with the presentation layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe The Data Link layer on the OSI network model

A

Deals with functions such as error detection
… error correction
… creating data blocks
… synchronising data blocks
It converts each outgoing packet into a series of bits/a series of incoming bits into data packet
Interacts with the Network/Physical layers (3 × [1])

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fibre optic and metal cables are used for data transmission over a network. Evaluate these two types of cable with respect to data security.

A

Fibre Optic - Fibre optic consists of many strands of glass fibres inside an insulated casing
Data is transported using pulses of light

Metal - Copper wires are used to transmit electrical signals. The wires are encased by an insulating layer.

Data security -

  • Fibre optic cable is not prone to interception
  • Metal cable can be tapped into using listening devices wrapped round it which does not interfere with the signal -Fibre optic cable is less susceptible to interception than metal cable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the main features of data mining

A

Data mining involves analysing/sorting
… large data sets/big data
… to identify patterns/relationships
… to predict future trends

17
Q

An organisation decides to use cloud computing for all its data storage. Evaluate this decision with regard to data security.

A

Cloud computing -
An organisation’s data is managed by a third party. The data is stored on a global network of servers/data farms on the Internet.

Advantages of using cloud computing for data storage - The organisation requires fewer resources. The third party provides the hardware and software resources required to store and retrieve the data.

Data security issues -
-The third party is responsible for data security. The organisation is reliant on the third party for data security. –With cloud computing, most data access involves data transmission over the Internet which increases the risk of unauthorised access.