ISF DP Computer Science

Networks #


Review Tools #

Topic 3 Revision from Computer Science Cafe.

Topic 3 Key Terminology from Computer Science Cafe.

Topic 3 Video from CS Classroom.


Key Terminology #


Example Problems #


Types of Networks #

Describe the purpose of the following hardware component of a network: Router. [2]


Describe the purpose of the following hardware component of a network: Network interface card (NIC). [2]


Identify one additional hardware component in a wireless LAN. [1]


Identify two characteristics of a personal area network (PAN). [2]


Outline two advantages of a school using a computer network. [4]


Speed #


Explain why the speed of data transmission across a mobile network can vary. [3]


Explain why the speed of data transmission on the wireless network in the training room may vary. [4]


Identify two factors that may affect the speed of data transmission. [2]


Wireless Networks #


Distinguish between a wired network and a wireless network in terms of reliability of transmission. [4]


Outline why a wireless network may be less secure than a wired network. [2]


Identify two characteristics of wireless transmission. [2]


Protocols #


Outline why protocols are necessary. [2]


Outline one reason why protocols are used in communications between computers. [2]


Outline three reasons why protocols are necessary on a computer network. [6]


OSI Model #


Identify two of the layers of the Open Systems Interconnection (OSI) seven-layer model. [2]


Security #


State one precaution a user can take to secure their data in case their laptop is stolen. [1]


Describe one method of security that may be used on this wireless network. [2]


Evaluate the use of trusted media access control (MAC) addresses as one method of network security. [4]


Describe the role of a firewall. [2]


Outline what is meant by a media access control (MAC) address. [2]


The staff at a doctor’s practice consist of a receptionist and a doctor. The patients’ medical records and payments, the doctor’s appointment calendar, and other important data are stored in a database on the central computer.

Outline one security measure that can be taken to prevent unauthorized access to the patients’ data stored on the central computer. [2]


VPN #


Outline two reasons for the use of a virtual private network (VPN) in this situation. [4]


State two technologies that are required to provide a virtual private network (VPN). [2]


Outline two features of a VPN that make it secure. [4]


Packets #


Describe the structure of a data packet. [2]


State three pieces of information that a data packet must contain. [3]


Explain how data is transmitted by packet switching. [3]


Explain how data is transmitted by packet switching. [4]


Explain how data is transmitted using packet switching. [5]