ISF DP Computer Science

Networks #


Review Tools #

Topic 3 Revision from Computer Science Cafe.

Topic 3 Key Terminology from Computer Science Cafe.

Topic 3 Video from CS Classroom.


Key Terminology #


Example Problems #


Hardware #

Outline what is meant by a media access control (MAC) address. [2]


Describe the purpose of the following hardware component of a network: Router. [2]


Describe the purpose of the following hardware component of a network: Network interface card (NIC). [2]


Identify one additional hardware component in a wireless LAN. [1]


Types of Networks #

Identify two characteristics of a personal area network (PAN). [2]


Identify two differences between a wide area network (WAN) and a local area network (LAN). [2]


Outline two advantages of a school using a computer network. [4]


Speed #


Explain why the speed of data transmission across a mobile network can vary. [3]


Explain why the speed of data transmission on the wireless network in the training room may vary. [4]


Identify two factors that may affect the speed of data transmission. [2]


Protocols #


Outline why protocols are necessary. [2]


Outline one reason why protocols are used in communications between computers. [2]


Outline three reasons why protocols are necessary on a computer network. [6]


Outline one reason for the use of standards in the construction of networks.


OSI Model #


Identify two of the layers of the Open Systems Interconnection (OSI) seven-layer model. [2]


Security #


State one precaution a user can take to secure their data in case their laptop is stolen. [1]


Describe one method of security that may be used on this wireless network. [2]


Evaluate the use of trusted media access control (MAC) addresses as one method of network security. [4]


Describe the role of a firewall. [2]


The staff at a doctor’s practice consist of a receptionist and a doctor. The patients’ medical records and payments, the doctor’s appointment calendar, and other important data are stored in a database on the central computer.

Outline one security measure that can be taken to prevent unauthorized access to the patients’ data stored on the central computer. [2]


VPN #


When the doctor visits a patient in their home, she needs to be able to access the patient’s medical records stored on the central computer in the practice.
Outline two reasons for the use of a virtual private network (VPN) in this situation. [4]


State two technologies that are required to provide a virtual private network (VPN). [2]


Outline two features of a VPN that make it secure. [4]


Explain one benefit to the staff of using a VPN to remotely access the school network.


Packets #


Describe the structure of a data packet. [2]


State three pieces of information that a data packet must contain. [3]


Packet Switching #

Explain how data is transmitted by packet switching. [3]


Explain how data is transmitted by packet switching. [4]


Explain how data is transmitted using packet switching. [5]


Compression #

Outline the reason for compression when transmitting data. [2]


Explain why data compression would be used when data is transmitted. [3]


Encryption #

Define the term data encryption. [1]


Outline how encryption is used to protect data. [2]


Describe how encryption is used to protect data during transmission.


Transmission Medium #

Identify two characteristics of fibre optic cables as a transmission medium.


Identify two characteristics of wireless transmission.


Identify two reasons why fibre optic cable would be preferred over wireless connectivity.


Wireless Networks #


Distinguish between a wired network and a wireless network in terms of reliability of transmission. [4]


Outline why a wireless network may be less secure than a wired network. [2]


Identify two characteristics of wireless transmission. [2]