100% found this document useful (1 vote)
1K views

Igcse Theory Question-Finished

1. A firewall monitors incoming and outgoing data on a computer connected to the internet, allowing or blocking data to secure the system and prevent unauthorized access and undesirable content. 2. Schools concerned with students accessing inappropriate sites could use a firewall to prevent undesirable content or a proxy server to filter and monitor web traffic. 3. Network devices include hubs that broadcast packets to all computers, switches that inspect packets and send them to the correct IP address, and routers that send packets through the internet using IP addresses and choosing the best route.

Uploaded by

api-266862390
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

Igcse Theory Question-Finished

1. A firewall monitors incoming and outgoing data on a computer connected to the internet, allowing or blocking data to secure the system and prevent unauthorized access and undesirable content. 2. Schools concerned with students accessing inappropriate sites could use a firewall to prevent undesirable content or a proxy server to filter and monitor web traffic. 3. Network devices include hubs that broadcast packets to all computers, switches that inspect packets and send them to the correct IP address, and routers that send packets through the internet using IP addresses and choosing the best route.

Uploaded by

api-266862390
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

IGCSE Theory question

1. N.2 Explain how a firewall could be used to secure the data in a


computer connected to the internet- 3 marks.
A firewall could be used to secure data in a computer connected to
the internet by
Monitoring the data being sent or received by your computer to
either allow it through or block it.
They prevent hackers damaging data on the system by preventing
unauthorised use.
They prevent undesirable content being by users on the internet.
2. N.3- schools are concerned with the possibility students are using
the internet connections to access inappropriate sites. Name 2
security methods the school could use to prevent this from
happening. 4 marks
Method 1: the school could use a firewall
Description: it can prevent undesirable content being used by users
on the internet via internet connections
Method 2: proxy server
Description: they can be used to filter and monitor web traffic
3. N.5- name 3 network devices and for each one describe what it does.
6 marks
Name: Hub
Description: Its in the centre of a network and broadcasts the
packets to every computer connected
Name: Switch
Description: it sends packets by doing a packet inspection and
sending it to the correct IP address
Name: Router
Description: A router sends a packet to computers connected to the
internet using an ip address and choosing the best route.

4. 4 marks: Which of the following statements applies to LANs and


which applies to WLANs:
Use wireless technology to transmit data- WLAN
Faster transmissions of data- LAN
Greater security- LAN
Is cheaper as there is less cabling- WLAN
5. Aftab owns a company which has a small network of computers. Give
2 advantages of having computers networked.
You can share internet connection between computers
You can share printers
6. Aftab connects to the internet. Name the device he would need to do
this:
router

NC.1. VOIP is an e.g. of an internet telephony service. Describe 4


advantages of using VOIP over sending messages via email. 4 marks

You can get immediate feedback so you can have a proper


conversation and it flows.
You can here or tell another persons emotions and reactions.
You know the person is getting the message straight away
You know you have the right person on the end of the line.

NC.2- Describe 4 advantages to businesses of using email to send


messages to other businesses rather than using fax machines. 4 marks

You dont have to remember a fax number all you need is a name
for a contact on email.
You can edit the document at the other end because it hasnt been
printed a fax cant be edited.
You can send high quality documents instead of low quality on fax.
You can only fax one person at one time unlike email
You can send/receive an email faster than you can receive/send a
fax.
You can send multimedia files on email.
You can save paper because on email it doesnt print off
automatically where as it does on fax.

You might also like