Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
28 views4 pages

Chapter 14

The document outlines various questions related to computer networking, data security, and communication technologies, focusing on topics such as unauthorized access, tunneling protocols, Wi-Fi connections, client-server models, and server types. It includes evaluations, descriptions, and discussions on the advantages and disadvantages of different technologies and methods used in networking and data protection. The questions are structured to assess understanding and application of these concepts in practical scenarios.

Uploaded by

vidhya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views4 pages

Chapter 14

The document outlines various questions related to computer networking, data security, and communication technologies, focusing on topics such as unauthorized access, tunneling protocols, Wi-Fi connections, client-server models, and server types. It includes evaluations, descriptions, and discussions on the advantages and disadvantages of different technologies and methods used in networking and data protection. The questions are structured to assess understanding and application of these concepts in practical scenarios.

Uploaded by

vidhya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Unauthorised access to computer files can result in the manipulation and modification of computer
data. Oct 2024/33 Q11
(a) Describe the difference between data manipulation and data modification.[2]
(b) Evaluate the use of software methods in helping to prevent unauthorised access to computer
data and files.[8]
2. Using tunneling protocols in networking can affect the security of the data. (a) Explain how
tunneling protocols can increase data security oct 2024/32 Q 6
(b) Explain how tunneling protocols can decrease data security.[2]
3. Computer devices can connect to a local area network (LAN). Wi-Fi connections can only be used
within range of a wireless access point (WAP). (a) Explain why Wi-Fi connections to a WAP have a
limited range.[3]
(b) Explain how the connection range of Wi-Fi can be increased.[3]
Devices use ethernet technology to send data on cabled LANs. (c) Explain why ethernet technology
is used on LANs to send data[4] May 2024/31 Q5
4. Web browsers are clients which request services, such as web pages, from a web server. This is an
example of the use of the client-server model of networking. Justify the use of client-server
networking in this scenario May 2024/31 Q8
5. Devices on a network can be connected by Wi-Fi. Describe how a Wi-Fi connection is used to
transfer data between devices.[6] may 2024/32 Q1
6. A company network has a file server and a print server. Employees store their files on the file server
and use the print server when they need hard copies of their work. (a) Discuss the benefits and
drawbacks of the use of a print server on company networks. May 2024/32 Q9
(b) The company also has an FTP server. Its web designers use FTP to upload and download files
between the FTP server and their workstations. Evaluate the use of FTP in this scenario.[6]
7. Near Field Communication (NFC) is a communication method. Describe how NFC can be used by
mobile devices.[6] Feb 2024/32 Q1
8. Many companies have access control strategies to protect their data. Explain how the use of an
access control strategy can minimise the risks to computer data[6] Feb 2024/32 Q7
9. Botnets are software applications that are connected together over the internet. Describe how
botnets attack computer systems.[6] Feb 2024/32 q9
10. Discuss the benefits and drawbacks of using virtual servers for hosting websites.[8] Feb 2024/32 Q11
11. Peer-to-peer networking can be used by companies to connect computing devices. Discuss the
advantages and disadvantages of peer-to-peer networking by companies[8] Oct 2024/31 Q 5
12. (a) Describe what is meant by identity theft.[2]
(b) Describe the impact of identity theft on individuals.[6] Oct 2023/31 Q8
13. Cellular networks are used to provide mobile communications for users. (a) Describe the structure
of a cellular network.[3]
(b) Explain how cellular networks allow large numbers of mobile (cell) phones to connect without
interference from other mobile (cell) phones.[4] Oct 2023/32 Q4
14. Users may connect their smartphones to a local area network (LAN). (a) Describe two reasons why a
wireless connection to a local area network (LAN) may not be as secure as a wired connection.[2]
(b) Explain how a secure Wi-fi connection is established and maintained between a smartphone and
a local area network (LAN).[6] Oct 2023/32 Q5
15. A small company is considering installing a mail server to manage email for its five employees.
Discuss the advantages and disadvantages to the company of using its own mail server[6]
Oct 2023/32 Q10
16. (a) Describe what is meant by a botnet.[3]
(b) Malicious botnets are used to attack systems and can be a threat to the security of stored data.
Explain how these botnets can be used to gain unauthorised access to data.[6] May 2023/31 Q4
17. Data that is transmitted on networks or stored on servers needs to be protected. Analyse the use of
software methods to protect data.[7] May 2023/31 Q9
18. The security of data can be threatened by unauthorised destruction or modification. (a) Explain
these terms. Give an example of each. (i) data destruction[2]
(ii) data modification[2]
(b) Describe ways that data can be protected from unauthorised destruction and modification.[4]
May 2023/31 q10
19. IP networks can be connected by switches and routers so that data can be exchanged between
devices. Compare the operations of switches and routers in networks. You must include similarities
and differences.[8] May 2023/32 Q2
20. When data is transmitted across networks it needs to be protected from interception and
eavesdropping. (a) Explain how each of these network security protocols operates. (i) Secure Shell
(SSH)[2] May 2023/32 Q3
(ii) Internet Protocol Security (IPsec)[2]
(b) Explain why the use of Telnet for remote login may put data at risk.[2]
21. Bluetooth and Wi-fi are wireless technologies used to exchange data between devices. (a) Contrast
Bluetooth with Wi-fi as methods of wireless communication.[4] May 2023/32 Q4
(b) Describe how a Bluetooth connection is established between two devices.[5]
22. The OSI and the TCP/IP reference models are used to describe communications in networks. (a)
Describe three similarities between these models.[3] May 2023/32 Q5
(b) Describe three differences between these models.[3]
23. Cellular networks use 3G, 4G and 5G systems for mobile communications so that users can access
internet services. (a) Explain how 4G cellular networks provide a better service than 3G networks for
smartphone users accessing internet services.[4] feb 2023/32 Q1
(b) Describe two features of 5G mobile communication systems that make them suitable for
connecting smart devices together into large networks[2]
24. Contrast the use of Wi-fi and cabled Ethernet connections for transmitting data between computing
devices on LANs.[6] feb 2023/32 Q2
25. Compare the use of static and dynamic routing when sending data packets through IP networks. You
must include similarities and differences.[6] feb 2023/32 Q3
26. Explain how each of the following is used in a network. (a) web server[2]
(b) mail server[2]
(c) print server[2] Oct 2022/31 Q1
27. Packet switching is one way of transmitting data between computers in networks. The User
Datagram Protocol (UDP) is a protocol used when creating data packets to send to other computers
on the network. (a) Explain how the contents of the header are used when sending a data packet
using UDP.[6] Oct 2022/31 Q2
(b) Describe the drawbacks of using UDP to send data over a network.[3]
28. Discuss the advantages and disadvantages of the use of microwave transmissions for
communications.[8] Oct 2022/31 Q6
29. Bit rate is a measure of how fast data can be sent from one device to another on a network. (a)
Describe how the bit rate of a video stream is measured on a network.[2]
(b) Identify two factors that can affect the bit rate in data communication.[2] ] Oct 2022/31 Q9

30. Data stored on a network can be subject to different types of threats. Explain how these threats can
be detected[6] Oct 2022/31 Q10
31. Data can be sent over computer networks and the internet using tunneling. (a) Give two reasons
why tunneling is used for sending data.[2] Oct 2022/32 Q1
(b) Describe how tunneling transfers data over the internet.[3]
32. Explain how an FTP server carries out its role in a computer network.[6] Oct 2022/32 Q3
33. Mobile devices can use Near Field Communication (NFC) and Bluetooth to exchange data. (a)
Describe three uses of NFC in mobile devices[3] Oct 2022/32 Q4
(b) Discuss the differences between NFC and Bluetooth when used for exchanging data between
mobile devices.[6]
34. A company designs and manages the construction of buildings. It has a client-server network for use
by its designers and project managers so that they have access to the software resources they
require. Justify the use of the client-server model of networking in the company[8] Oct 2022/32 Q6
35. Data can be at risk of being lost from computer systems. (a) Describe the ways that data can be lost
from computer systems.[5]
(b) Backups are used to minimise the risk of data loss. Backup strategies are created for technicians
to ensure that data can be recovered in the event of a disaster occurring. Describe three instructions
to the technicians that should be included in a backup strategy.[3] May 2022/31 Q1
36. Evaluate the use of a proxy server for web access in a school.[8] May 2022/31 Q2
37. The confirm() method is used in JavaScript to create and provide dialog boxes for users to interact
with web pages. (a) Describe the purpose of two elements of the dialog box that appears when
confirm() is used.[2]
(b) Explain why the use of confirm() may cause problems on web pages.[3]
(c) Explain how the result of the user interaction from confirm() is reported back to the JavaScript
code for use in the remaining code.[3] May 2022/32 Q4
38. Email uses a system based on the client-server model. Explain how emails are sent and received
using this system[4] May 2022/32 Q8
39. Analyse the use of the critical path method in project management.[8] May 2022/32 Q11
40. Contrast the characteristics of local area networks (LANs) and wide area networks (WANs).[6] Feb
2022/32 Q1
41. Evaluate the use of a Virtual Private Network (VPN) when using the internet[8] ] Feb 2022/32 Q4
42. Microwave transmission is used to send data between devices at different locations. (a) Explain how
microwaves are used to transmit data between devices.[4] Feb 2022/32 Q6
(b) Describe four ways that microwave transmission is used in communication systems.[4]
43. Evaluate the use of cloud computing by banks.[8] Specimen 2025 Q7
44. Discuss the advantages and disadvantages of using fibre optic cables instead of copper cables to
carry internet services to customers.[6] Specimen 2025 Q8

You might also like