Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
33 views5 pages

Communication and Networks

The document provides a comprehensive overview of communication and network concepts, including definitions of acronyms like ISP, PAN, and WAN, as well as advantages and disadvantages of wired and wireless networks. It discusses data transmission methods, the role of network devices, and security measures such as filter software and anti-malware. Additionally, it highlights the importance of the Internet and the World Wide Web in facilitating communication and data transfer.

Uploaded by

Sharon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views5 pages

Communication and Networks

The document provides a comprehensive overview of communication and network concepts, including definitions of acronyms like ISP, PAN, and WAN, as well as advantages and disadvantages of wired and wireless networks. It discusses data transmission methods, the role of network devices, and security measures such as filter software and anti-malware. Additionally, it highlights the importance of the Internet and the World Wide Web in facilitating communication and data transfer.

Uploaded by

Sharon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Communication and networks

1. What does the acronym ISP stand for?


Ans: Internet service provider

2. What does the acronym PAN stand for?


Ans: Personal area network

3. Which one of these does WAN stand for?


Ans: Wide area network

4. Which one of these is the maximum range of devices connected using a personal area
network?
Ans: 10 metres

5. Which one of these is the type of network formed when a Bluetooth mouse is connected
to a laptop?
Ans: PAN

6. A local area network (LAN) is one type of network.


State two other types of network.
Ans: PAN, WAN

7. Computer networks can be connected using wired and wireless connectivity.


a) Explain one advantage of using a wired computer network.
Ans: faster connection/ reliability/ increased security/ lower cost because
- Less signal loss due to external wireless interference.
- Difficult to hack without a physical connection
- No need to buy wireless equipment

b) Users may experience when using a wireless network and potential solutions to
prevent them happening.
Potential issue  Hackers trying to gain access
Potential solution  Regularly change wireless password
Potential issue  Lack of signal
Potential solution  Move closer to router, remove interference sources

8. Which one of these is an advantage of using a wired rather than a wireless network?
Ans: Lower lantency

9. Give two drawbacks of using WiFi to connect computers in a network.


Ans: Lower bandwidth, slower (data transfer)
Increased latency
Affected more by interference e.g., electrical appliances
Limited range
Less secure
Negatively affected by rain/ humidity

10. Complete the sentence.


The term uniform resource locator describes the system on the Internet that allows
users to move between documents using hypertext links.
11. Which one of these is a uniform resource locator (URL)?
Ans: https://www.pearson.com

12. Complete the sentence.


The Internet is a network of connected computers.

13. The internet is used to transfer data.


a) State what is meant by the term ‘Internet’.
Ans: Inter-connected networks
A network of networks
A system of computers around the world
A wide area network (WAN)

b) Which of these processes prepares data for transmission across the Internet?
Ans: Data is split into packets

c) Which one of these is a description of a URL?


Ans: a web server address

d) Give two reasons why some people do not have access to the Internet.
Ans: Cost
Remoteness
Rural location
Lack of infrastructure
Politics
Culture/ Religion

14. Data is split into packets for transfer across a network.


a) State what is meant by the term network.
Ans: A system of connected/ linked computers/ devices. A collection of servers.

b) Which of these is included in a packet header?


Ans: Sequence number

15. Data can be transmitted in packets.


Give two pieces of control information provided in a packet header.
Ans: Sender’s/ source address
Receiver’s destination address
Sequence/ packet number
Checksum
Version of IP
Number of packets
Packet length
Protocol
Expiry time (time to live)

16. State one reason why a data packet contains the sender’s IP address.
Ans: So the receiver knows where to return the data
So firewalls can protect systems/ check for blocked addresses.
Requesting dropped packets (so that a request can be sent to the sender for the packet
to be resent if it gets lost/ corrupted).

17. Data is split into packets for transmission across a network.


Which one of these is included in a packet header?
Ans: Sequence number

18. State one reason for using filter software in a network.


Ans: Protect systems/ networks/ data
Prevent users seeing inappropriate content.

19. State the role of network filter software.


Ans: To allow, block URLs, websites
To protect a network
To prevent/ block malware

20. The World Wide Web is stored on computers that are connected to the Internet.
State what is meant by the term ‘World Wide Web’.
Ans:
Hyper-linked content
A collection of web pages (accessed via a browser)
A collection of documents formatted in HTML and accessed via HTTP

21. Which one of these is a description of the World Wide Web?


Ans: A collection of linked pages

22. State one reason for connecting classroom computers in a network.


Ans: Communication
Collaboration
Sharing devices, software, resources
File sharing
Remote access
Roaming profiles
Centralized storage
Access to the internet

23. Some televisions receive transmissions using broadcast technology.


Give one other way that a television can receive transmissions.
Ans: Satellite, Cable

24. Which one of these is measured in bits per second?


Ans: Network data speeds

25. Data is sent between computers.


a) Which one of these can be used to intercept data?
Ans: Eavesdropping

b) Which one of these is increased by using wired rather than wireless connectivity?
Ans: Bandwidth

c) Explain why Near-field Communication (NFC) is a better choice than Bluetooth for
making payments in a shop.
Ans: More secure because there is less chance of interception.
Or because it has shorter range.

26. Which of the following communication method is used in contactless payment?


Ans: Near-field communication (NFC)

27. Which of these should be used to pair a smartphone with a wireless speaker?
Ans: Bluetooth

28. Complete the sentence using the correct word from this list.
Global television stations broadcast using satellite technology.

29. Mobile phones can transmit data using Bluetooth.


a) State the type of device used to forward data packets on a WAN.
Ans: Router

30. Describe the role of a network switch.


Ans: To direct/ send/ packets/ data to connected devices.

31. Give one reason why a switch is used on a network.


Ans: To connect computers together.
To direct traffic between computers.
To provide extra socket.

32. A tablet computer needs to connect to the internet.


Tablet  Wireless access point  Switch  Router  Modem  Internet

33. Networks devices have specialist roles.


Draw one straight line from each role to the correct device.
Connects two networks (role)  Desktop, modem, router, switch, wireless access point
Changes a signal so it can be used by different technology (role) 
Directs signals to the correct receiving device within a network (role) 

34. State the type of anti-malware that prevents software from recording what a user types
on a keyboard.
Ans: Anti-spyware (anti-keylogger)

35. Complete the sentence using the correct words from this list.
Malicious USB devices can contain a virus, which is a type of malware that can intercept
data.

36. Computers use communication technology.


a) Give two ways that technology enables the communications of individuals to be
monitored.
Ans: Key logging
Spyware
Hacking
Social media posts/ eavesdropping

b) Give two ways to protect your online identity.


Ans: Do not post personal information online
Disable GPS tracking
Report suspicious behaviors
Be alert for phishing email

37. Which one of these enables the communications of an individual to be monitored?


Ans: GPS tracking

38. Which of the following is classifies as an input device?


Ans: Games console controller
Webcam
c
39. It shows a smart system that responds to voice commands.
a) Give two input devices that are built into the system.
Ans:

b) Give one output device that is built into system.


Ans:

40. CCTV can be used to monitor people’s movements.


State one other way of monitoring people’s movements.
Ans: Credit card transactions.
ID cards
Social media posts
GPS (location data)

41. Give one benefit of using a network data speed of 1Gbps than 1 Mbps.
Ans: Data can be transferred/ sent/ received more quickly, it is faster.

You might also like