DP Computer Science Questionbank
Topic 3: Networks
Path: |
Description
[N/A]Directly related questions
-
21M.1.SL.TZ0.6:
Identify two reasons why fibre optic cable would be preferred over wireless connectivity.
-
21M.1.SL.TZ0.12a:
Describe two hardware components the school will need to implement the wireless network.
-
21M.1.SL.TZ0.12b:
Identify two advantages to the students of the new wireless network.
-
21M.1.SL.TZ0.9:
Define the term data packet.
-
21M.1.SL.TZ0.12c:
Outline two methods the school could employ to prevent network data from being accessed over their wireless system.
-
21M.1.SL.TZ0.12d:
Identify two technologies the school would require to provide a VPN.
-
21M.1.SL.TZ0.12e:
Explain one benefit to the staff of using a VPN to remotely access the school network.
-
17N.1.SL.TZ0.12a:
Identify one hardware component of the WLAN, other than computers.
-
17N.1.SL.TZ0.12e:
With reference to Figure 1, explain how data is transferred by packet switching.
-
17N.1.SL.TZ0.12b:
Outline two disadvantages of this WLAN.
-
17N.1.SL.TZ0.12c:
Identify three ways in which the network administrator can reduce the risk of unauthorized access to confidential data.
- 17N.1.SL.TZ0.12d: Define the term protocol.
-
18N.1.SL.TZ0.1:
Outline what is meant by the term computer network.
-
18N.1.SL.TZ0.5b:
Outline how a virtual private network (VPN) will allow employees who are in Europe to communicate with the Head Office in Asia.
-
18N.1.SL.TZ0.6:
Describe how data is transmitted by packet switching.
-
18N.1.HL.TZ0.1a:
Outline what is meant by the term computer network.
-
18N.1.HL.TZ0.10a.i:
Identify one hardware security measure that will ensure that confidential data from the Head Office cannot be accessed.
-
18N.1.HL.TZ0.1b:
Describe one problem resulting from low bandwidth in a computer network.
-
18N.1.HL.TZ0.10a.ii:
Identify one software security measure that will ensure that confidential data from the Head Office cannot be accessed.
-
18N.1.HL.TZ0.10b:
Identify one network security measure.
-
19N.1.SL.TZ0.9d:
Define the term data encryption.
-
19N.1.SL.TZ0.9c:
Outline why protocols are necessary.
-
19N.1.SL.TZ0.9e:
Evaluate the use of trusted media access control (MAC) addresses as one method of network security.
-
19N.1.SL.TZ0.9a:
Outline two advantages of a school using a computer network.
-
19N.1.SL.TZ0.9b.i:
Describe the purpose of the following hardware component of a network: Router
-
19N.1.SL.TZ0.9b.ii:
Describe the purpose of the following hardware component of a network: Network interface card (NIC)
-
20N.1.SL.TZ0.7c:
Outline two measures that the school could take to safeguard its data from unlawful access via the internet.
-
20N.1.SL.TZ0.7b:
Outline two reasons why there might be a reduction in data transmission speed at certain times.
-
18M.1.SL.TZ0.6:
Identify two characteristics of a data packet.
-
18M.1.SL.TZ0.7:
Explain why protocols are used in network communications.
-
18M.1.SL.TZ0.11f:
The company is considering expanding their network to allow employees to connect from anywhere in the world. The expanded network would need to provide security and allow the employees full functionality of the internal network.
Explain how setting up a virtual private network (VPN) would provide a suitable solution.
-
18M.1.SL.TZ0.11e:
A WLAN will introduce additional security issues for the company.
Discuss any two of these issues and the ways in which the company might resolve them.
-
19M.1.SL.TZ0.12:
Identify two characteristics of a personal area network (PAN).
-
19M.1.SL.TZ0.11:
Outline one reason why protocols are used in communications between computers.
-
19M.1.SL.TZ0.13:
Explain how data is transmitted by packet switching.
-
19M.1.SL.TZ0.15d.ii:
Outline one disadvantage to the company of implementing this change.
-
19M.1.SL.TZ0.15d.i:
Outline one advantage to the company of implementing this change.
-
19M.1.SL.TZ0.15e:
Describe one method of security that may be used on this wireless network.
-
19M.1.SL.TZ0.15f:
Explain why the speed of data transmission on the wireless network in the training room may vary.
-
22M.1.SL.TZ0.3:
Identify two differences between a wide area network (WAN) and a local area network (LAN).
-
22M.1.SL.TZ0.4:
Outline the reason for compression when transmitting data.
-
22M.1.SL.TZ0.10:
Outline one reason for the use of standards in the construction of networks.
Sub sections and their related questions
3.1 Networks
-
18M.1.SL.TZ0.6:
Identify two characteristics of a data packet.
-
18M.1.SL.TZ0.7:
Explain why protocols are used in network communications.
-
18M.1.SL.TZ0.11e:
A WLAN will introduce additional security issues for the company.
Discuss any two of these issues and the ways in which the company might resolve them.
-
18M.1.SL.TZ0.11f:
The company is considering expanding their network to allow employees to connect from anywhere in the world. The expanded network would need to provide security and allow the employees full functionality of the internal network.
Explain how setting up a virtual private network (VPN) would provide a suitable solution.
-
19M.1.SL.TZ0.11:
Outline one reason why protocols are used in communications between computers.
-
19M.1.SL.TZ0.12:
Identify two characteristics of a personal area network (PAN).
-
19M.1.SL.TZ0.13:
Explain how data is transmitted by packet switching.
-
19M.1.SL.TZ0.15d.i:
Outline one advantage to the company of implementing this change.
-
19M.1.SL.TZ0.15d.ii:
Outline one disadvantage to the company of implementing this change.
-
19M.1.SL.TZ0.15e:
Describe one method of security that may be used on this wireless network.
-
19M.1.SL.TZ0.15f:
Explain why the speed of data transmission on the wireless network in the training room may vary.
-
21M.1.SL.TZ0.6:
Identify two reasons why fibre optic cable would be preferred over wireless connectivity.
-
21M.1.SL.TZ0.9:
Define the term data packet.
-
21M.1.SL.TZ0.12a:
Describe two hardware components the school will need to implement the wireless network.
-
21M.1.SL.TZ0.12b:
Identify two advantages to the students of the new wireless network.
-
21M.1.SL.TZ0.12c:
Outline two methods the school could employ to prevent network data from being accessed over their wireless system.
-
21M.1.SL.TZ0.12d:
Identify two technologies the school would require to provide a VPN.
-
21M.1.SL.TZ0.12e:
Explain one benefit to the staff of using a VPN to remotely access the school network.
-
17N.1.SL.TZ0.12a:
Identify one hardware component of the WLAN, other than computers.
-
17N.1.SL.TZ0.12b:
Outline two disadvantages of this WLAN.
-
17N.1.SL.TZ0.12c:
Identify three ways in which the network administrator can reduce the risk of unauthorized access to confidential data.
- 17N.1.SL.TZ0.12d: Define the term protocol.
-
17N.1.SL.TZ0.12e:
With reference to Figure 1, explain how data is transferred by packet switching.
-
18N.1.SL.TZ0.1:
Outline what is meant by the term computer network.
-
18N.1.SL.TZ0.5b:
Outline how a virtual private network (VPN) will allow employees who are in Europe to communicate with the Head Office in Asia.
-
18N.1.SL.TZ0.6:
Describe how data is transmitted by packet switching.
-
18N.1.HL.TZ0.1b:
Describe one problem resulting from low bandwidth in a computer network.
-
18N.1.HL.TZ0.1a:
Outline what is meant by the term computer network.
-
18N.1.HL.TZ0.10a.i:
Identify one hardware security measure that will ensure that confidential data from the Head Office cannot be accessed.
-
18N.1.HL.TZ0.10a.ii:
Identify one software security measure that will ensure that confidential data from the Head Office cannot be accessed.
-
18N.1.HL.TZ0.10b:
Identify one network security measure.
-
19N.1.SL.TZ0.9a:
Outline two advantages of a school using a computer network.
-
19N.1.SL.TZ0.9b.i:
Describe the purpose of the following hardware component of a network: Router
-
19N.1.SL.TZ0.9b.ii:
Describe the purpose of the following hardware component of a network: Network interface card (NIC)
-
19N.1.SL.TZ0.9c:
Outline why protocols are necessary.
-
19N.1.SL.TZ0.9d:
Define the term data encryption.
-
19N.1.SL.TZ0.9e:
Evaluate the use of trusted media access control (MAC) addresses as one method of network security.
-
20N.1.SL.TZ0.7b:
Outline two reasons why there might be a reduction in data transmission speed at certain times.
-
20N.1.SL.TZ0.7c:
Outline two measures that the school could take to safeguard its data from unlawful access via the internet.
-
22M.1.SL.TZ0.3:
Identify two differences between a wide area network (WAN) and a local area network (LAN).
-
22M.1.SL.TZ0.4:
Outline the reason for compression when transmitting data.
-
22M.1.SL.TZ0.10:
Outline one reason for the use of standards in the construction of networks.