0% found this document useful (0 votes)
52 views84 pages

2 As Communication

Inqilab Patel is an experienced computer science teacher who has taught at several schools in Pakistan. He is continuing his education by pursuing an MPhil in computer studies. Patel maintains a website and contributes material to support teachers and students in excelling at Cambridge computer science qualifications. He has received training in innovative teaching methods and aims to transfer his knowledge and skills to students.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views84 pages

2 As Communication

Inqilab Patel is an experienced computer science teacher who has taught at several schools in Pakistan. He is continuing his education by pursuing an MPhil in computer studies. Patel maintains a website and contributes material to support teachers and students in excelling at Cambridge computer science qualifications. He has received training in innovative teaching methods and aims to transfer his knowledge and skills to students.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 84

COMPUTER SCIENCE WITH INQILAB PATEL

About the developer of this workbook


Inqilab Patel is an O & A Level Computer Teacher. Currently he is teaching A & O Level Computer Science
at The City School PAF Chapters, Hira Foundation School and Intellect. He has taught in many other
schools including Yaqeen Model School, Karachi Cadet School, KN Academy, Hexis A Level, Verge and
Nakhlah Boys Campus Society. Cambridge has selected him as a Member of Cambridge Editorial
Review Board. He is also associated with Aga Khan University Examination Board in the capacity of
Chief Examiner, Item Writer, E-Marker, Karachi Board of Secondary Education the capacity of
Deputy Head Examiner and Sindh Board of Technical Education.

His entire career path revolves around computer science; either he was a student or a teacher.
He got a chance to polish his skills of teaching and studying more about computers at various
levels which has given him great confidence in presenting himself for any senior level position of
transferring his knowledge to the youth.

He has not stopped; he is continuing with his education at the higher levels. It is his second
semester of MPhil computer studies from a well-known university of Pakistan; The Institute of
Business & Technology.

Inqilab Patel knows a lot of methods of teaching computers and has developed tutorial notes,
worksheets and assignments for my students. He also maintains a website
(www.inqilabpatel.com) which is specifically designed for the support of those who want to excel
in GCSE computer science. He also regularly contributes material to CIE teacher support website,
for which he receives appreciation from different people across the world.

He has also received various training in innovative and special methods of teaching this subject.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
2 Communication
2.1 Networks including the internet
Candidates should be able to: Notes and guidance
Show understanding of the purpose and benefits
of networking devices
Show understanding of the characteristics of a
LAN (local area network) and a WAN (wide area
network)
Explain the client-server and peer-to-peer Roles of the different computers within the
models of networked computers network and subnetwork models
Benefits and drawbacks of each model
Justify the use of a model for a given situation
Show understanding of thin-client and thick-
client and the differences between them
Show understanding of the bus, star, mesh and Understand how packets are transmitted
hybrid topologies between two hosts for a given topology
Justify the use of a topology for a given situation
Show understanding of cloud computing Including the use of public and private clouds.
Benefits and drawbacks of cloud computing
Show understanding of the differences between Describe the characteristics of copper cable,
and implications of the use of wireless and wired fibre optic cable, radio waves (including WiFi),
networks microwaves, satellites
Describe the hardware that is used to support a Including switch, server, Network Interface Card
LAN (NIC), Wireless Network Interface Card (WNIC),
Wireless Access Points (WAP), cables, bridge,
repeater
Describe the role and function of a router in a
network
Show understanding of Ethernet and how Including Carrier Sense Multiple Access /
collisions are detected and avoided Collision Detection (CSMA / CD)
Show understanding of bit streaming Methods of bit streaming, i.e. real-time and on-
demand
Importance of bit rates / broadband speed on bit
streaming
Show understanding of the differences between
the World Wide Web (WWW) and the internet
Describe the hardware that is used to support Including modems, PSTN (Public Switched
the internet Telephone Network), dedicated lines, cell phone
network

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Explain the purpose and benefits of networking devices.
Computer Network
A computer network is a set of computers connected together for the purpose of sharing resources.
The most common resource shared today is connection to the Internet. Other shared resources can
include a printer or a file server. The Internet itself can be considered a computer network.
A computer network is a set of
connected computers. Computers on a
network are called nodes. The connection
between computers can be done via
cabling, most commonly the Ethernet
cable, or wirelessly through radio waves.
Connected computers can share
resources, like access to the Internet,
printers, file servers, and others. A
network is a multipurpose connection, which allows a single computer to do more.

Characteristics of LAN and WAN

The two main types of networks are local area


networks (LANs) and wide area networks
(WANs).Generally, a network over short
distances is called a local area network (LAN)
while those over great distances are wide area
networks (WAN). Whether a network is a WAN
or a LAN, it allows the computers to:

● communicate with one another


● share information centrally
● share copies of software
● give access to data and program files to multiple users.

Local area networks (LANs)


A local area network (LAN) is formed when devices are based geographically close to each other, for
example, in the same building or across one site. A network in your home, workplace, or school could
be a LAN. Note that the word 'local' doesn't refer to a geographical area, such as neighbourhood, city,
or region.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
In a LAN there is the added benefit of being able to share hardware. For example, the classroom with
20 computers may only have one or two printers. Also, those printers may be of different types and
used for different tasks. This means that the type of printer used is dependent on the job that the user
wants it to do rather than on the type of printer that happens to be connected to the computer from
which the printout is sent.

The benefits of connecting PCs in a LAN included the following:

The expense of installing application software on each individual PC could be saved by


installing the software on an application server attached to the LAN instead.

A file server could be attached to the LAN that allowed users to store larger files and also
allowed files to be shared between users.

Instead of supplying individual printers to be connected to a user’s PC, one or more printers
could Managers in organisations could use electronic mail to communicate with staff rather
than sending round memos on paper.

The ‘paper-less office’ became a possibility, where files were to be stored in digital form
on a file server rather than as paper copies in a filing cabinet.

Today, a typical LAN is characterised by the following:

• It will be used by an organisation or a company within a site or branch.

• It will be owned by the organisation or company.

• It will be one of many individual LANS at one site.

• The transmission medium will be twisted pair cable or WiFi.

• The LAN will contain a device that allows connection to other networks.

• There will be end-systems connected which will be user systems or servers

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Wide area networks (WANs)

When devices are connected across a wider geographical area, they form a wide area network
(WAN). Often lots of LANs are connected together to create a WAN. There are many examples of
WANs, such as a bank connecting all of its cash machines together across the country, or regional
police stations connecting together to share information.

The largest example of a WAN is the internet, which allows LANs in homes, businesses, universities,
or anywhere else to connect to each other by utilising an internet service provider (ISP). For example,
if you connect your mobile phone to your WiFi router when you are at home, you are connecting to
your home LAN. If you then use your phone to access a website or a social media app, you have
connected to the internet, which is a WAN.
The benefits of having the computers connected by a WAN were:
• a ‘job’ could be run on a remote computer that had the required application software
• a data archive that was stored on a remote computer could be accessed
• a message could be transmitted electronically to a user on a remote computer.
Today, a typical WAN is characterised by the following.
• It will be used by an organisation or a company to connect sites or branches.
• It will not be owned by the organisation or company.
• It will be leased from a public switched telephone network company (PSTN).
• A dedicated communication link will be provided by the PSTN.
• The transmission medium will be fibre-optic cable.
• Transmission within the WAN will be from switch to switch.
• A switch will connect the WAN to each site.
• There will not be any end-systems connected directly to the WAN.
Following are different types of networks.

WAN: 100 km to over 1000 km


MAN (Metropolitan Area Network): 1 to 100 km
LAN: 10 m to 1000 m
PAN (Personal Area Network sometime known as home system): 1 m to 10 m

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Cloud Computing
Cloud computing means storing and accessing data and programs over the internet instead of user’s
computer's hard drive.
Cloud Services are often divided into three categories based on who has access to the services or
infrastructure: Private, Public and Hybrid. We use cloud services almost everyday and in various
forms. For example, we listen to streamed music or watch movies via the Internet, we store our
documents and photos on OneDrive and other cloud storage systems, we manage our mail via
Outlook, and even use our smartphones to book taxis. All these services are provided to us via cloud-
based services.
Cloud Storage Services offer unlimited data, anywhere, and can be accessed from your smartphone,
laptop, desktop, or any other device that has the relevant application and is connected to the Internet.
Cloud Storage Services usually employ advanced information compression functions and in some
cases encryption, thus ensuring greater security and mobility of data.

Categories of Cloud Computing Services


Cloud computing can be divided into three main services

These services constitute what is known as the Cloud Computing Stack with SaaS at the top, PaaS in
the middle, and IaaS on the bottom.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Types of cloud computing
Not all clouds are the same and not one type of cloud computing is right
for everyone. Several different models, types, and services have evolved
to help offer the right solution for your needs.
First, you need to determine the type of cloud deployment, or cloud
computing architecture, that your cloud services will be implemented on.
There are three different ways to deploy cloud services: on a public
cloud, private cloud, or hybrid cloud.
Private cloud
Private cloud is cloud infrastructure owned, operated and accessed by an organisation, whether
managed internally or by a third party, and hosted either internally or externally.
A private cloud refers to cloud computing resources used exclusively by a single business or
organization. A private cloud can be physically located on the company’s on-site datacentre. Some
companies also pay third-party service providers to host their private cloud. A private cloud is one in
which the services and infrastructure are maintained on a private network.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Public cloud
Public cloud is owned by a cloud service provider for general access. Cloud services are considered
"public" when they are delivered over the public Internet, and they may be offered as a paid
subscription, or free of charge.
Public clouds are owned and operated by a third-party cloud service providers, which deliver their
computing resources, like servers and storage, over the Internet.
Hybrid cloud
Hybrid cloud is a composition of a public cloud and a private environment, such as a private cloud or
on-premises resources, that remain distinct entities but are bound together, offering the benefits of
multiple deployment models. Hybrid cloud can also mean the ability to connect collocation, managed
and/or dedicated services with cloud resources.
Advantages of Cloud Computing
Advantages of cloud computing are given below:
1) Back-up and restore data
Once the data is stored in the cloud, it is easier to get back-up and restore that data using the cloud.
2) Improved collaboration
Cloud applications improve collaboration by allowing groups of people to quickly and easily share
information in the cloud via shared storage.
3) Excellent accessibility
Cloud allows quickly and easily access store information anywhere, anytime in the whole world, using
an internet connection. An internet cloud infrastructure increases organization productivity and
efficiency by ensuring that data is always accessible.
4) Low maintenance cost
Cloud computing reduces both hardware and software maintenance costs for organizations.
5) Mobility
Cloud computing allows us to easily access all cloud data via mobile.
6) Services in the pay-per-use model
Cloud computing offers Application Programming Interfaces (APIs) to the users for access services
on the cloud and pays the charges as per the usage of service.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


7) Unlimited storage capacity
Cloud offers a huge amount of storing capacity for storing important data such as documents,
images, audio, video, etc. in one place.
8) Data security
Data security is one of the biggest advantages of cloud computing. Cloud offers many advanced
features related to security and ensures that data is securely stored and handled.
Disadvantages of Cloud Computing
A list of the disadvantage of cloud computing is given below -
1) Internet Connectivity
Good internet connectivity is the basic requirement for cloud computing. Data from the cloud cannot
be accessed from cloud without good internet connectivity.
2) Vendor lock-in
Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may face problems
when transferring their services from one vendor to another. As different vendors provide different
platforms, that can cause difficulty moving from one cloud to another.
3) Limited Control
As we know, cloud infrastructure is completely owned, managed, and monitored by the service
provider, so the cloud users have less control over the function and execution of services within a
cloud infrastructure.
4) Security
Although cloud service providers implement the best security standards to store important
information. But, before adopting cloud technology, user should be aware that all data and
organization's sensitive information is sent to a third party, i.e., a cloud computing service provider.
While sending the data on the cloud, there may be a chance that organization's information is hacked
by Hackers.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Explain the benefits and drawbacks of a client-server and peer-to-peer network.
Peer-to-peer network
A network where there is not central computer, workstations known as peers or nodes are equally
participants in data sharing. They are equally privileged and equipped in the application. Each peer
(workstation or node) can act as a client and request a file from another peer or it can act as a server
when another peer requests the download of a file.
A peer-to-peer network operates with each peer (networked computer) storing some of the files.
Characteristics of Peer to Peer Computing
The different characteristics of peer to peer networks are as follows −
There is no central computer
Computers in this network are known as
Peer or Node
It is suitable for small networks like a
groups of a dozen or less computers.
All peers can act as both client (request
a file or resource) and as servers
(provide file or resources)
Peers store their data using individually
Advantages of Peer to Peer Computing
Some advantages of peer to peer computing are as follows −
Each computer in the peer to peer network manages itself. So, the network is quite easy to set
up and maintain.
It is easy to scale the peer to peer network and add more nodes. This only increases the data
sharing capacity of the system.
None of the nodes in the peer to peer network are dependent on the others for their
functioning.
Disadvantages of Peer to Peer Computing
Some disadvantages of peer to peer computing are as follows −
It is difficult to backup the data as it is stored in different computer systems and there is no
central server.
It is difficult to provide overall security in the peer to peer network as each system is
independent and contains its own data.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Client-Server Model
Client Server Architecture is a computing model in which the server hosts, delivers and manages
most of the resources and services to be consumed by the client. This type of architecture has one or
more client computers connected to a central server over a network or internet connection. This
system shares computing resources. Client/server architecture is also known as a networking
computing model or client/server network because all the requests and services are delivered over a
network.
In modern days the client is a web browser connected to the Internet. The server is a web server
hosted on the Internet.
Advantages of Client-Server Model
– files and resources are centralised
– creation of security / manage security
– user needs user name and password to access network
– centralised back-up
– intranet capability
– Internet monitoring
– clients can be less powerful machines, therefore less expensive to buy
– saving resources on server reduces the burden on the client
The server provides an application and the client uses the application. There are two options for how
the client functions a thin-client and a thick-client
Thin Clients Thick Clients
a client that only provides input and a client that carries out at least some of the
Definition
receives output from the application processing itself
chooses an application to run on the chooses an application provided by the
server server
Sends input data to the server when possibly carries out some processing
requested by the application. before running the application on the server
How they
and also after receiving output from the
work
application
Receives output from the application Alternatively, possibly downloads the
application from the server and runs the
application itself.
•less expensive to expand (low •more robust (device can carry out
powered and cheap devices can be processing even when not connected to
Pros used) server)
•clients have more control (they can store
their own programs and data/files)

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
•all devices are linked to a server (data
updates and new software installation
done centrally)
•server can offer protection against
hacking and malware

• high reliance on the server; if the • less secure (relies on clients to keep their
server goes down or there is a break own data secure)
in the communication link then the • each client needs to update data and
Cons devices cannot work software individually
• despite cheaper hardware, the start- • data integrity issues, since many clients
up costs are generally higher than for access the same data which can lead to
thick clients inconsistencies
Software •always relies on a connection to a •can run some of the features of the
remote server or computer for it to software even when not connected to a
work server
•requires very few local resources •relies heavily on local resources
(such as SSD, RAM memory or •more tolerant of a slow network
computer processing time) connection
•relies on a good, stable and fast • can store data on local resources such
network connection for it to work as HDD or SSD
•data is stored on a remote server or
computer

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Comparison of peer-to-peer network and client-server architecture
Peer-to-Peer Model Client-Server model
There is no central computer, all computers In this network some computers are servers
are equally participant in file and resource and others are clients
sharing Some computers are servers and others host,
deliver and manages most of the resources
There is one or more central computers work
as server
Peer or node is a computer in this model Servers are computers provides resources
A client is a computer that provides a user with
access to a network
Suitable for small networks suitable for large networks
Easy to setup and add or remove peers Difficult to setup and add or remove servers or
clients
Data is saved individually Data is saved centrally
No control on downloading and using files File downloading and access can be controlled
Less secure Can be better protected
Parts of files can be downloaded from
different peers

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Network Topologies
Describe the characteristics, benefits and drawbacks, of different network topologies.

Network Topology
Topology defines the structure of the network of how all the components are interconnected to each
other.
Bus Topology:
The bus topology is the simplest network arrangement. It has one cable that connects every device
on the network, which is called the backbone. At each end of the main cable there is a small device
called a terminator which absorbs the signals when they reach the end, to prevent interference.
Each device must be connected to the main cable to join the network.
Advantages Disadvantages
A relatively low number of cables are needed so A collision of signals occur if more than one
it is cheap to install device transmit data at the same time
Simple to add additional devices The possibility of collisions increases on
networks with high traffic
If the backbone cable breaks the whole network
will fail

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Star Topology

In a star topology, each device is connected to a central device, either a switch or a hub, which gives
it a star formation.

The main difference between a hub and a switch is that a hub will send every signal to every device
on the network, while a switch will only send each signal to the intended recipient device.

Star topology advantages Star topology disadvantages


If one cable is damaged only the affected If the hub or switch fails the whole
node will be disconnected from the network network will fail
Additional devices can be easily added to More cables are required than for a
the network by connecting them to the hub bus network which increases the cost
or the switch of this network
It is more secure than a bus network as
signals can be directed to their intended
recipient

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Mesh Topology
In a mesh topology, every node is connected to every other node. Consequently, a greater amount of
cabling is required, but this arrangement can increase the speed and reliability of the network. Unlike
the star topology, there is no central point. Due to the reliability of mesh networks, they are often used
by emergency services that depend on efficient and reliable communication.
Mesh topology advantages Mesh topology disadvantages
Effective for networks with high data traffic Large networks require a substantial
and where response times are critical amount of cabling which is expensive
because of the direct connections from It is not always possible to find routes
node to node within a building for all the cabling
Alternative transmission routes via other Maintenance costs are high due to the
nodes make the network more reliable, due amount of cabling
to a reduction in collisions of data, and the
avoidance of faulty cables
Direct connections result in quicker
transmission speeds

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Wired and wireless
In a network computer can be connected with each using wires or wirelessly.
Wired Network Wireless Network
A wired network uses cables to connect devices, A wireless network allows devices to stay
such as laptop or desktop computers, to the connected to the network but roam untethered to
Internet or another network. any wires.
A wired network has some disadvantages when Access points amplify Wi-Fi signals, so a device
compared to a wireless network. The biggest can be far from a router but still be connected to
disadvantage is that your device is tethered to a the network. When you connect to a Wi-Fi
hub/switch. The most common wired networks hotspot at a cafe, a hotel, an airport lounge, or
use cables connected at one end to an Ethernet another public place, you're connecting to that
port on the network hub/switch and at the other business's wireless network.
end to a computer or other device.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Network Hardware
Including switch, server, Network Interface Card (NIC), Wireless Network Interface Card (WNIC), Wireless
Access Points (WAP), cables, bridge, repeater
Describe the role and function of a router in a network

Network interface controller (NIC)


A network interface controller (NIC) is required for a computer to connect to a network. It is a circuit
board that enables the computer to transmit and receive data in the network using an Ethernet port,
WiFi aerial/s, or both. Each NIC is assigned a unique address called a MAC address.
Wireless Network interface controller (WNIC)
A wireless network interface controller (WNIC) is a network interface controller which connects to
a wireless network, such as Wi-Fi or Bluetooth, rather than a wired network, such as a Token
Ring or Ethernet. A WNIC, just like other NICs, uses an antenna to communicate via radio waves.
Wireless access point (WAP)
A wireless access point (WAP), or more generally just access point (AP), is a networking
hardware device that allows other Wi-Fi devices to connect to a wired local area network (LAN). As a
standalone device, the Access Point may have a wired connection to a router, but, in a wireless
router, it can also be an integral component of the router itself.
Hub
A Hub is a networking device that allows you to connect multiple PCs to a single network. It is used to
connect segments of a LAN. A hub stores various ports, so when a packet arrives at one port, it is
copied to various other ports. Hub works as a common connection point for devices in a network.
Switch
A network switch is a computer networking device that connects various devices together on a single
computer network. It may also be used to route information in the form of electronic data sent over
networks. Since the process of linking network segments is also called bridging, switches are usually
referred to as bridging devices.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Hub Switch
Hub is a broadcast type transmission. Switch is a Unicast, multicast and broadcast
type transmission.
Hub is not intelligent device Switch is an intelligent device
A hub is to send out a message from one port to A switch is able to handle the data and knows
other ports. For example, if there are three the specific addresses to send the message. It
computers of A, B, C, the message sent by a can decide which computer is the message
hub for computer A will also come to the other intended for and send the message directly to
computers. But only computer A will respond the right computer.
and the response will also go out to every other
port on the hub. Therefore, all the computers
can receive the message and computers
themselves need to decide whether to accept
the message.

Routers
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. Data sent through the internet, such as a web
page or email, is in the form of data packets. A packet is typically forwarded from one router to
another router through the networks that constitute an internetwork (e.g. the Internet) until it reaches
its destination node.
A router is connected to two or more data lines from different IP networks. When a data packet
comes in on one of the lines, the router reads the network address information in the packet header
to determine the ultimate destination. Then, using information in its routing table or routing policy, it
directs the packet to the next network on its journey.
The role of the router is to forward data to the correct recipient.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Bridge
A network bridge is a computer networking device that creates a single, aggregate network from
multiple communication networks or network segments. This function is called network bridging.
Bridging is distinct from routing. Routing allows multiple networks to communicate independently and
yet remain separate, whereas bridging connects two separate networks as if they were a single
network

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Gateway
A gateway, as the name suggests, is a passage to connect two networks together that may work
upon different networking models. They basically work as the messenger agents that take data from
one system, interpret it, and transfer it to another system. Gateways are also called protocol
converters and can operate at any network layer. Gateways are generally more complex than switch
or router.
Transmission media
There are two main cable technologies used for the transmission of data on a network: copper and
fiber-optic cables.

Copper cables
Copper cables are the most common type used in
Ethernet networks. Copper cables use electrical signals
to transmit information. There are three types of copper
cables:

Coaxial: the same type as the cable used to connect TVs to aerials. It has one single copper
core wire.
Unshielded twisted pair (UTP): up to eight copper wires are twisted around each other in
pairs and then all pairs are twisted around each other. The arrangement reduces electrical
interference. UTPs are the most common type of cables used in Ethernet networks.
Shielded twisted pair (STP): the same structure as the unshielded twisted pair cable.
However, a layer of shielding is added to further prevent interference.

Advantages of Copper Cabling


copper cabling is less expensive to install
copper cable is easier to install because it is more flexible
it is easier to make terminations using copper cabling
the expertise in use of copper cabling is more extensive
has been around for years … so very little is “unknown” about installations using this
type of cabling

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Fibre-optic cables
Fibre-optic cables contain clusters of thin glass or plastic fibres. It works by transmitting light through
the cable which is reflected by the cable's internal wall until it reaches the recipient.

Fibre-optic cables can preserve a good signal strength for up to 100km and are not affected by
electrical interference therefore, they exceed the performance of copper wires, although they also can
be very expensive.

Advantages of Fibre-optic
fibre optic cables have greater bandwidth
fibre optic cables need less signal boosting // can transmit over longer distances
fibre optic cables have greater security (more difficult to “tap” into)
fibre optic cables are immune to electromagnetic and other effects
fibre optic cabling is lighter in weight (easier to install)
fibre optic cables consume less power
Wi-Fi
Wi-Fi is the wireless technology used to connect computers, tablets, smartphones and other
devices to the internet.
Wi-Fi is the radio signal sent from a wireless router (WAP-Wireless Access Point) to a nearby device,
which translates the signal into data you can see and use. The device transmits a radio signal back to
the router, which connects to the internet by wire or cable.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


What Are Collisions?
A network collision occurs when more than one device attempts to send a packet on a network
segment at the same time.
Ethernet uses CSMA/CD (Carrier Sense Multiple Access/Collision Detect) as its collision
detection method. Here is a simplified example of Ethernet operation:

1. Station A wishes to send a frame. First, it checks if the medium is available (Carrier Sense). If it
isn't, it waits until the current sender on the medium has finished.
2. Suppose Station A believes the medium is available and attempts to send a frame. Because the
medium is shared (Multiple Access), other senders might also attempt to send at the same time.
At this point, Station B tries to send a frame at the same time as Station A.
3. Shortly after, Station A and Station B realize that there is another device attempting to send a
frame (Collision Detect). Each station waits for a random amount of time before sending again.
The time after the collision is divided into time slots; Station A and Station B, each pick a random
slot for attempting a retransmission.
4. Should Station A and Station B attempt to retransmit in the same slot, they extend the number of
slots. Each station then picks a new slot, thereby decreasing the probability of retransmitting in the
same slot.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Bit Streaming
Show understanding of bit streaming
Methods of bit streaming, i.e. real-time and on-demand
Importance of bit rates / broadband speed on bit streaming

Bit streaming is a sequence of bits (digital signals) over a communication over a communication path
(internet). It is used to transfer of data at high speed.
Bit streaming requires fast broadband connection and some form of buffering.
Bits arrive in the same order as sent.
Bit Streaming is a contiguous sequence of bits, representing a stream of data, transmitted
continuously over a communication path serially.
Because of the file sizes involved, streamed media is always compressed to a sequence of bits - a
‘bit stream’. Generic compression techniques can convert the byte stream to a bit stream with fewer
bits overall. For the decoding process at the receiver end to work properly, the data must be
transferred as a bit stream.
Benefits of bit streaming:
video or audio files can be played without waiting for a whole file to be downloaded
data is erased after being played automatically so no need to store large files on user’s computer
allows on demand playback
allows live broadcast
no specialist software is required for playback in browser
Problems in bit streaming
– video stops / hangs if very slow Internet / broadband speed low
– video stops / hangs if inadequate buffering capacity
– loss of Internet means can’t access films / files
– may require specific software to run the files / films
– viruses can be downloaded from the websites
Bandwidth
Bandwidth is the term used to describe the volume of data that can be sent or received. It isn't the
speed of data, but the amount of data, the volume of data.
There are two different types of Bit Streaming and these are Real-Time Bit Streaming and On-
Demand Bit Streaming.

Real-Time Bit Streaming

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Real-Time Bit Streaming is a live streaming of currently an ongoing event. This involves taking videos
from live sources, such as webcams, camcorders, etc. and broadcasting it live over the internet to
audience.
Real time streaming cannot be paused or re-winded, as any data that is not immediately used (e.g.
video data outputted to the screen) is discarded.
Features:
Low latency (delay) is prioritised over quality – packets that don’t arrive in time are discarded.
If the data cannot be reliably streamed at the current bit-rate (quality) then a lower bit-rate and quality
will be used.
Used for:
Live sports television broadcasts
Online Gaming
Some financial data
Some weather data
Live streaming services (e.g. Twitch)
Controlling UAVs and other autonomous devices.
On-Demand Bit Streaming
On-Demand Bit Streaming is watching an already existing or recorded video. Viewers can watch the
video over and over again.
On demand bit streaming is used to transmit data that has been pre-recorded. The player buffers
(waits and saves up packets) until the data can be streamed in the bit-rate selected before starting
playback
Features:
Data integrity is prioritised over latency.
If there is insufficient bandwidth to handle the bit stream then buffering will occur and the output will
pause or drop frames until the bandwidth increases or a lower bit rate stream is selected.
Used for:
Movie playback
Music streaming (not live radio)
Video streaming sites such as media websites (YouTube)

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
World Wide Web and The Internet
Explain the difference between the internet and the WWW.

Internet
The Internet is a global network of networks.
It is the network of connected computers,
Internet makes use of Internet Protocol (IP) and Transmission Control Protocols (TCP).

World Wide Web


Web, also referred formally as World Wide Web (www) is collection of information which is accessed
via the Internet.
The World Wide Web, are collection of the pages and documents user sees when at a device and
they're online.
WWW makes use of http(s)
WWW pages are written in html
WWW documents are stored in a webserver,
Webserver are located using URL
Browsers are used to access web pages

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Internet Hardware
Describe the hardware that is used to support the internet
Including modems, PSTN (Public Switched Telephone Network), dedicated lines, cell phone network
Following hardware are required to connect with internet
Modem
Router
PSTN
Dedicated Lines
Cell phone network
Other requirements are
ISP
Web browser
Modem
A modem is a hardware device that changes the digital signal produced by the computer into one that
can be transmitted over the public telephone line, i.e. an analogue signal. A second modem is
required at the receiving device in order to convert the analogue signal back into a digital signal,
which can be then processed by the computer.
Routers
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. Data sent through the internet, such as a web
page or email, is in the form of data packets. A packet is typically forwarded from one router to
another router through the networks that constitute an internetwork (e.g. the Internet) until it reaches
its destination node.
A router is connected to two or more data lines from different IP networks. When a data packet
comes in on one of the lines, the router reads the network address information in the packet header
to determine the ultimate destination. Then, using information in its routing table or routing policy, it
directs the packet to the next network on its journey.
The role of the router is to forward data to the correct recipient.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Public Switch Telephone Network (PSTN)
The telephone network system, public switched telephone network (PSTN), is used to connect
computers/devices and LANs between towns and cities. Satellite technology is used to connect to
other countries.
PSTN (Circuit switching) uses a dedicated channel/circuit which lasts throughout the connection: the
communication line is effectively ‘tied up’.
Now telephone lines have changed from copper cables to fibre optic cables, which permits greater
bandwidth and faster data transfer rates (and less risk of data corruption from interference). Fibre
optic telephone networks are usually identified as ‘fast broadband’. High speed broadband has
allowed WLANs to be developed by using WAPs.
High speed communication links allow telephone and video calls to be made using a computer and
the internet. Telephone calls require either an internet-enabled telephone connected to a computer
(using a USB port) or external/internal microphone and speakers.
Video calls also require a webcam. When using the internet to make a phone call, the user’s voice is
converted to digital packages using Voice over Internet Protocol (VoIP). Data is split into packages
(packet switching) and sent over the network via the fastest route.

Cellular networks and satellites


Other devices, such as mobile phones, use the cellular network. Here, the mobile phone providers act
as the ISPs and the phones contain communication software which allows them to access the
telephone network and also permits them to make an internet connection.
Satellites are an important part of all network communications that cover vast distances. Due to the
curvature of the Earth, the height of the satellite’s orbit determines how much coverage it can give.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


IP Addressing
Explain the use of IP addresses in the transmission of data over the internet
Explain how a Uniform Resource Locator (URL) is used to locate a resource on the World Wide Web (WWW)
and the role of the Domain Name Service (DNS)

An IP address (internet protocol address) is a numerical representation that uniquely identifies a


specific interface on the network. Each computer or device connected to the Internet has an Internet
Protocol (IP) address.
IPv4
IPv4 is the most common IP address. It consists of 32 bits to represent more than 4 billion computers.
32 bits of IP v4 are divided into 4 sections of 8 bits each. Each section is represented in denary
numbers ranging from 0 – 255. e.g. 172. 16. 254. 1
Range 0 – 255 (256 Possibilities in each)
Total addresses = 256 x 256 x 256 x 256 = 4.3 Billion.
4.2 Billion Addresses is not enough for the modern world
as the world has 7 Billion plus inhabitants and many
people have more than one internet connected device.
Classes of IP Address
Internet Protocol hierarchy contains several classes of IP
Addresses to be used efficiently in various situations as per the requirement of hosts per network.
Broadly, the IPv4 Addressing system is divided into five classes of IP Addresses. All the five classes
are identified by the first octet of IP Address.
Internet Corporation for Assigned Names and Numbers is responsible for assigning IP addresses.
The first octet referred here is the left most of all. The octets numbered as follows depicting dotted
decimal notation of IP Address −

The number of networks and the number of hosts per class can be derived by this formula −

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
When calculating hosts' IP addresses, 2 IP addresses are decreased because they cannot be
assigned to hosts, i.e. the first IP of a network is network number and the last IP is reserved
for Broadcast IP.
Class A Address
The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127, i.e.

Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is
reserved for loopback IP addresses.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing
can have 126 networks (2 7-2) and 16777214 hosts (224-2).
Class A IP address format is thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Class B Address
An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e.

Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is
255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (2 16-2) Host addresses.
Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is −

Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is
255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Class D Address
Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of −

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved for Multicasting.
In multicasting data is not destined for a particular host, that is why there is no need to extract host
address from the IP address, and Class D does not have any subnet mask.
Class E Address
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this class
ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped with any subnet
mask.
Class IPv4 1st Octet Denary NetIDs Host IDs
A 1st octet starts with 0 0000 0000 – 0111 1111 0-127 8 24
B 1st octet starts with 10 1000 0000 – 1011 1111 128-191 16 16
C 1st octet starts with 110 1100 0000 – 1101 1111 192-223 24 8
D 1st octet starts with 1110 1110 0000 – 1110 1111 224-239 Multi cast
E 1st octet starts with 1111 1111 0000 – 1111 1111 240-255 E

Classless inter-domain routing (CIDR)


The first approach developed for improving the addressing scheme is called ‘classless inter-domain
routing’ (CIDR). This retains the concept of a netID and a hostID but removes the rigid structure and
allows the split between the netID and the hostID to be varied to buit individual need. The simple
method used to achieve this is to add an 8-bit suff ix to the address that specifies the number of bits
for the netID. If, for instance, we define the suff ix as 21, that means that 21 bits are used for the
netID and there are 11 bits remaining (of a 32-bit address) to specify hostIDs allowing 211 (i.e. 2048)
hosts.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Sub-Net
By using sub-netting, one single IP address can be used to have smaller sub-networks which
provides better network management capabilities.
Sub-net Masking
A subnetwork or subnet is a logical subdivision of an IP network.[1]:1,16 The practice of dividing a
network into two or more networks is called sub-netting.
Computers that belong to a subnet are
addressed with an identical most-significant
bit-group in their IP addresses. This results
in the logical division of an IP address into
two fields: the network number or routing
prefix and the rest field or host identifier.
The rest field is an identifier for a specific host or network interface.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Public IP Addresses
Each LAN connected to the internet has a single public IP Address. This is the address seen by other
computers and networks on the Internet and is the address attached to packets sent across the
Internet.
Private IP Addresses
Computers within a LAN have their own private IP Address that is different to their Public IP Address.
This private IP Address is either:
o Issued by the Server / Router using Dynamic Host Configuration Protocol (DHCP)
o Set manually by the computer user themselves.
Range of private IP addresses

Differences between public & private IP Address:


Private IP Address Public IP Address
Private address can only be reached Public address can be reached across the
internally/through the LAN/Intranet // private Internet.
address cannot be reached across the Internet
NAT (Network Address Translation) is No need of NAT box
necessary for a private IP address to access the
Internet directly.
A private address is more secure than a public A public address is less secure
address
Private addresses are assigned by the router or Public addresses are provided by ISP
network administrator.
Private addresses (are unique within their Public addresses are unique (to the Internet)
network, but) can be duplicated within other
(discrete) networks.
10.0.0.1 to 10.255.255.254 and 172.16.0.1 to IP addresses from the private address space are
172.31.255.254 and 192.168.0.1.to never assigned as public
192.168.255.254 form the private address space

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
There are 2 main types of Public IP Addresses: Static and Dynamic
Static IP Addresses
These are mainly used by:
o Businesses with LANs that need to be accessed externally from the internet
o Website Hosts
o Gamers who want the fastest, most reliable internet service
Static IP addresses stay the same, which mean that data is always sent in the most efficient manner.
However a static IP address opens your network up to attackers.
Dynamic IP addresses
Most home internet users are issued with a dynamic IP address when their router connects to the
internet and the IP address is renewed every month or so. Each time it is renewed a new IP Address
is drawn from the pool.
This sharing of IP addresses allows the internet to continue to function even when there are more
devices in the world than there are available IP addresses (4 billion different ip addresses are
available in total for IPV4 addresses). It is also potentially harder to hack as a network’s IP address is
constantly changing.
The limited number of addresses available on the internet using IPV4 led to the development of IPV6,
though this technology is still in the process of being rolled out…

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


IP Version 6
IPv6 is 128 Bit Address,
340,282,366,920,938,463,463,374,607,431,768,211,456 Addresses.
Probably enough for the foreseeable future.
Advantages
o Future proof – plenty of unique addresses for each device.
o Security built in to the profile
o Allows for QOS packet prioritising.
Disadvantages
o A bit more overhead in packet size
o Many legacy devices and systems still don’t fully support IPv6 so we still need IPv4 backup.
Compressing IPv6 Addresses
IP Version 6 addresses are incredibly long, which makes them difficult humans to read/write, even
when represented using hexadecimal. Fortunately IP Version 6 Addresses can be Shortened
(Compressed). Take a look at the video to see how this can be done.
Today there are combinations of 1Pv4 approaches in use and these allow the Internet to continue to
function. Respected sources argue that this cannot continue beyond the current decade. There must
soon be a migration to IP version 6 (1Pv6), which uses a 128-bitaddressing scheme allowing 2128
different addresses, a huge number! In practice, this will allow more complex structuring of
addresses. Documenting these addresses is not going to be fun. The addresses are written in a colon
hexadecimal notation. The code is broken into16-bit parts with each of these represented by four
hexadecimal characters. Fortunately, some abbreviations are allowed.
1Pv6 address Comment
68E6:7C48:FFFE:FFFF:3D20:1180:695A:FF01 A full address
72E6:0000:0000:CFFE:3D20:1180:295A:FF01
:0000:0000: has been replaced by::
72E6::CFFE:3D20:1180:295A:FF01
6C48:0023:FFFE:FFFF:3D20:1180:095A:FF01
Leading zeros omitted
6C48:23:FFFE:FFFF:3D20:1180:95A:FF01
192.31.20.46
An 1Pv4 address used in1Pv6
::192.31.20.46

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
NAT
Network Address Translation (NAT) is designed for IP address conservation. It enables private IP
networks that use unregistered IP addresses to connect to the Internet. NAT usually connecting two
networks together, and translates the private (not globally unique) addresses in the internal network
into legal addresses, before packets are forwarded to another network.
As part of this capability, NAT can be configured to advertise only one address for the entire network
to the outside world. This provides additional security by effectively hiding the entire internal network
behind that address. NAT offers the dual functions of security and address conservation and is
typically implemented in remote-access environments.

Range of Private IPs

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Uniform Resource Locator (URL):
URL stands for Uniform Resource Locator. It is the address of a web page. Each page has its own unique web
address (URL).
This is how a computer locates the web page that user is trying to find.
An example of a URL is: http://inqilabpatel.com/computer2210.html.
In this example
http enables browser to know what protocol is being used to access information in the domain
ruknuddin.com is called the domain name.
"computer2210.html" refers to the specific page.

URL encoding:
Web addresses can be written using hexadecimal rather than denary. Hexadecimal codes are preceded by a
% sign. For example, the word www.ruknuddin.com is written as:
r u k n u d d i n
in hex %72 %75 %6B %6E %75 %64 %64 %69 %6E

w w w . r u k n u d d i n . c o m
%77 %77 %77 %2E %72 %75 %6B %6E %75 %64 %64 %69 %6E %2E %63 %6F %6D

Some characters are not allowed in URL. URL encoding converts characters into a format that can be
transmitted over the Internet
For example
%20 is used in URL in place of <space> not allowed in a URL, %20 is the coding for a space (32 in denar
y)
? separates the URL from all parameters or variables
e.g. for query to search Inqilabpatel in Google
https://www.google.com.pk/search?q=inqilab%20patel
here q is variable for query ? separates it from URL https://www.google.com.pk/search

while %20 is used for the space between inqilab and patel

URL ?to separate %20 code for space


Variable from URL

HYPERTEXT MARK-UP LANGUAGE (HTML) is used when writing and developing web pages. HTML isn t a
programming language but is simply a mark-up language. A mark-up language is used in the processing,
definition and presentation of text (for example, specifying the colour of the text).
HTML uses <tags> which are used to bracket a piece of code;

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
Example Question 2.4:

Consider the URL:


http://cie.org.uk/computerscience.html
(i) Give the meaning of the following parts of the URL.

http
................................................................................................................................................................................
...............................................................................................................................
cie.org.uk ...........................................................................................................................................
................................................................................................................................................................................
........................................................................................................................................
computerscience.html ........................................................................................................................
................................................................................................................................................................................
................................................................................................................................... [3]
(ii) Sometimes the URL contains the characters %20 and ?.
Describe the function of these characters.
%20 ...................................................................................................................................................
............................................................................................................................................................
? .........................................................................................................................................................
....................................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Domain Name Server (DNS):
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of
domain names and translate them to Internet Protocol (IP) addresses.
1. User types URL of a website in web browser address bar.
2. The web browser sends the request of URL to DNS of internet service provider (ISP).
3. DNS searches the IP address of the URL.
4. URL is translated into machine friendly IP address by DNS.
5. The translated IP address is sent to browser.
6. Browser sends http get command to the server of the IP address where website is hosted.
7. The web server sends HTML data to the client web browser.
8. Web page is displayed on client s browser.

1. User types inqilabpatel.com


2. Browser requests DNS to lookup IP address

3. DNS looks up IP address to browser

4. Browser makes HTTP Request to Web Server

5. Web Server HTTP response in the form of html data

Example Question2.5:
(a) A web page offers a link for users to request another web page. The requested web page contains HTML
code. Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand column.

Statement Sequence No
The requested web page is displayed on the client computer
The user clicks on the hyperlink and the web page is requested from the web server
The requested web page content is transmitted to the client computer
The client computer processes the html code using the web browser software
The web server locates the requested web page

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
2 Yvette runs a company that books walking holidays for groups of people. She has a website that
customers use to book the holidays.
(a) The website has a URL and an IPv6 address.
Describe, using an example, the format of an IPv6 address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(b) An IP address can be static or dynamic. Describe static and dynamic IP addresses.
Static .........................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Dynamic ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [4]
(c) Yvette’s company has a LAN (Local Area Network) that has hybrid topology.
(i) Describe the characteristics of a LAN.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


(ii) The LAN has a range of different topologies. One subnetwork connects four computers and one
server set up as a star topology. Describe how packets are transmitted between two of the computers
in this subnetwork.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]
(d) The LAN has both wired and wireless connections.
(i) Ethernet cables connect the computers to the server.
Identify three other hardware components that might be used to set up the LAN.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...................................................................................................................................... [3]
(ii) Describe how Carrier Sense Multiple Access/Collision Detection (CSMA/CD) manages collisions
during data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
5 Seth uses a computer for work.
(c) Seth accesses both software and data using cloud computing.
(i) Give two benefits of storing data using cloud computing.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


(ii) Give two drawbacks of Seth using cloud computing.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]

(d) Draw one line from each term to its most appropriate description. [4]
Term Description
It is only visible to devices within the Local
Area Network (LAN)

It increments by 1 each time the device


Public IP address
connects to the internet

A new one is reallocated each time a


Private IP address
device connects to the internet

Dynamic IP address It can only be allocated to a router

Static IP address It is visible to any device on the internet

It does not change each time a device


connects to the internet

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


4 Melinda and her friends set up a peer-to-peer network between their computers to share data.
(a) Describe the key features of a peer-to-peer network.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(b) Describe two drawbacks to Melinda and her friends of using a peer-to-peer network.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [4]
(c) Melinda connects her laptop to the internet through her router.
(i) Tick one box in each row to identify whether the task is performed by the router or not. [2]
Performed Not performed
Task
by router by router
Receives packets from devices
Finds the IP address of a Uniform Resource Locator (URL)
Directs each packet to all devices attached to it
Stores the IP and/or MAC address of all devices attached to it

(ii) Melinda mainly uses the internet to watch films and play computer games.
Tick one box to identify whether Melinda should connect to the router using a wired or wireless
network and justify your choice.
Wired
Wireless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
...........................................................................................................................................
..................................................................................................................................... [3]
(d) Melinda sends emails from her webmail account (email account accessed through a website).
Explain whether Melinda is using the internet, or the World Wide Web (WWW), or both.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/
COMPUTER SCIENCE WITH INQILAB PATEL
3 Andy likes to play computer games.
(b) Andy plays some of the computer games over the internet. He has several devices that connect
wirelessly to the router in his house.
(i) Identify the topology of Andy’s home network. Justify your choice.
Topology ............................................................................................................................
Justification .......................................................................................................................
........................................................................................................................................... [2]
(ii) The router has a wireless access point (WAP) to allow the devices to connect wirelessly.
Identify three functions of the router in Andy’s network.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
........................................................................................................................................... [3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


8 A school is setting up a network within one of its buildings.
(a) State whether the network will be a LAN (local area network) or a WAN (wide area network).
Justify your choice.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) One classroom in the building has 30 computers. The computers need to be connected to the
network. Each computer has a network interface card (NIC).
Identify two possible devices that can be used to physically connect the 30 computers to the rest of
the network.
1 ................................................................................................................................................
2 ................................................................................................................................................ [2]
(c) The school has several laptops. Each laptop has a Wireless Network Interface Card (WNIC).
Describe the functions of a Wireless Network Interface Card.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


3b 9618 S22 P12
9 (a) The following incomplete table contains four network devices and their descriptions.
Complete the table by writing the missing devices and missing descriptions. [4]
Device Description

Receives and sends data between two networks operating on the same protocol
..........................

Wireless Network
.................................................................................................................
Interface Card
.................................................................................................................
(WNIC)
.................................................................................................................

Restores the digital signal so it can be transmitted over greater distances


..........................

Wireless Access .................................................................................................................


Point (WAP) .................................................................................................................
.................................................................................................................
(b) Describe three differences between fibre-optic cables and copper cables.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
................................................................................................................................................... [3]
(c) Ethernet uses Carrier Sense Multiple Access/Collision Detection (CSMA/CD).
Describe CSMA/CD.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


3c 9618 S22 P13
8 A company uses cloud computing.
(a) Define cloud computing.
...................................................................................................................................................
............................................................................................................................................. [1]
(b) State what is meant by a public cloud and a private cloud.
Public cloud ..............................................................................................................................
...................................................................................................................................................
Private cloud .............................................................................................................................
................................................................................................................................................... [2]
(c) Give two benefits and one drawback of using cloud computing.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
................................................................................................................................................... [3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
5 (a) Telephone calls can be made by using:
• conventional telephones (using the Public Service Telephone Network (PSTN) system)over a
wired network
• a computer, equipped with speakers and microphone, connected to the Internet
Put a tick ( ) in the correct column to match each description to the appropriate communication
method. [5]
Conventional Internet-
Description
telephone using PSTN based system
connection only in use whilst sound is being
transmitted
dedicated channel used between two points for the
duration of the call
connection maintained throughout the telephone call
encoding schemes and compression technology
used
lines remain active even during a power outage
(b) Distinguish between the Internet and the World Wide Web (WWW).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


(c) Name the hardware device that is being described:
(i) A device that transfers data from one network to another in an intelligent way. It has the task of
forwarding data packets to their destination by the most efficient route.
.......................................................................................................................................[1]
(ii) A device used between two dissimilar LANs. The device is required to convert data packets from
one protocol to another.
.......................................................................................................................................[1]
(iii) A device or software that provides a specific function for computers using a network. The most
common examples handle printing, file storage and the delivery of web pages.
.......................................................................................................................................[1]

1 (a) Explain the term bit streaming.


...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) A person watches a film streamed from a website on a tablet computer.
(i) Give two benefits of using bit streaming for this purpose.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................[2]
(ii) State two potential problems of using bit streaming for this purpose.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................[2]
(c) Explain the terms on-demand bit streaming and real-time bit streaming.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]

3 (a) The table shows four statements about IP addresses.

Tick ( ) to show which of the statements are true. [2]

Statement True ( )

The IP address consists of any number of digits separated by single dots (.)
Each number in an IP address can range from 0 to 255
IP addresses are used to ensure that messages and data reach their correct
destinations
Public IP addresses are considered to be more secure than private IP addresses
(b) Consider the URL:
http://cie.org.uk/computerscience.html
(i) Give the meaning of the following parts of the URL.
http ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
cie.org.uk ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
computerscience.html .......................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(ii) Sometimes the URL contains the characters %20 and ?.
Describe the function of these characters.
%20 ...................................................................................................................................
...........................................................................................................................................
? ........................................................................................................................................
........................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


6 A company operates a chemical plant, which has a number of processes. Local computers monitor
these processes and collect data.
The computers transfer these data to a central computer 50 km away. A telecommunications
company (telco) provides cables.
Engineers at the telco had to decide which type of cable to use. They considered the use of either
copper cable or fibre optic cable.
State two benefits of each type of cable. Each benefit must be clearly different.
Benefits of copper cable
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
Benefits of fibre optic cable
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
.......................................................................................................................................................... [4]

7 (a) (i) Describe what is meant by a client-server model of networked computers.


...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Give two benefits of using the client-server model.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
(b) The diagram shows a computer network with connection to the Internet.

Name the hardware device labelled X.


...............................................................................................................................................[1]
(c) A web page offers a link for users to request another web page. The requested web page contains
HTML code and JavaScript code. Put each statement in the correct sequence by writing the numbers
1 to 5 in the right-hand column. [5]
Sequence
Statement
number
The requested web page is displayed on the client computer
The user clicks on the hyperlink and the web page is requested from the web server
The requested web page content is transmitted to the client computer
The client computer processes the JavaScript code using the web browser software
The web server locates the requested web page

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


9 (a) An IP address has the following value:
11.64.255.90
(i) Write the above IP address in hexadecimal.
.......................................................................................................................................[4]
(ii) Explain the format of an IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) Study the following sentence:
“When a user enters a URL into their web browser, the DNS service locates the required resource.”
Explain how a URL and DNS are used to locate a resource.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
10 Before it is used, a hard disk is formatted using disk formatter software.
(a) Explain why formatting is needed.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
(b) Eventually, the performance of the hard disk deteriorates.
Name three other utility programs that might be required. State why each is needed.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................[6]

7 Access to World Wide Web content uses IP addressing.


(a) State what IP stands for.
...............................................................................................................................................[1]
(b) The following table shows four possible IP addresses.
Indicate for each IP address whether it is valid or invalid and give a reason. [4]
Denary / Valid or
Address Reason
Hexadecimal Invalid
3.2A.6AA.BBBB Hexadecimal
2.0.255.1 Denary
6.0.257.6 Denary
A.78.F4.J8 Hexadecimal

(c) Describe two differences between public and private IP addresses.


1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


6 (a) Explain the difference between the World Wide Web (WWW) and the Internet.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
............................................................................................................................................................[2]

(b) Three methods of connecting devices include fibre-optic cables, copper cables and radio waves.
The table below gives descriptions relating to these connection methods.
Tick ( ) one box on each row to show the method that best fits each description. [5]
Description Fibre-optic cable Copper cable Radio waves
Wireless medium
Twisted-pair is an example
Uses light waves
WiFi
Fastest transmission medium

(c) Bit streaming is used for both real-time and on-demand services.
Describe one difference between real-time and on-demand bit streaming.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
............................................................................................................................................................[2]
(d) A device needs an IP address to connect to the Internet. IPv4 is the more common type of IP
address.
Describe, using an example, the format of an IPv4 address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
(e) A computer user keys in the Uniform Resource Locator (URL) of a web page into a web browser.
Describe how the browser uses the Domain Name Service (DNS) to display the web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]

7 (b) A user requests a web page by keying the Uniform Resource Locator (URL) into the address
bar of their web browser. The requested page contains a client-side script.
Describe the sequence of steps leading to the display of the web page on the computer screen.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
............................................................................................................................................................[4]

6 Downloading a file from a website is an example of a client-server application.


(a) Describe what is meant by the term client-server for this application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


(b) The following sequence of steps (1 to 5) describes what happens when someone uses their
personal computer (PC) to request a web page. The web page consists of HTML tags and text
content only. Four of the statements from A, B, C, D, E and F are used to complete the sequence.
A Browser software interprets the script, renders the page and displays.
B Browser software renders the page and displays.
C Browser software compiles the script, renders the page and displays.
D The web server retrieves the page.
The Domain Name Service (DNS) uses the domain name from the browser to
E
look up the IP address of the web server.
F The web server sends the web page content to the browser.
Write one of the letters A to F in the appropriate row to complete the sequence.
1. The user keys in the Uniform Resource Locator (URL) into the browser software.
2. ....................................
3. ....................................
4. ....................................
5. .................................... [4]

1 Four communication media and five features are shown.


Draw one or more lines from each communication media to the appropriate feature(s). [6]

Communication media Feature


Can be twisted pair or co-axial
Fibre-optic cable
Transmits light pulses
Radio waves
Large range of wavelengths
Copper cable
Least likely to have interference
Satellite
Wireless transmission

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
5 A college has a client-server network.
(a) The college has a file server and other servers.
State the purpose of two other servers in the college network.
Server 1 ....................................................................................................................................
Server 2 ....................................................................................................................................[2]
(b) The students use the network to access the Internet.
One student stated, ‘The Internet and the World Wide Web are the same thing’.

Tick ( ) one box to indicate whether this statement is true or false.

True False

Justify your choice.


...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[5]

6 (d) (i) State whether this JavaScript code will be run client-side or server-side.
.......................................................................................................................................[1]
(ii) Explain the difference between client-side scripting and server-side scripting.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


2 Computer A needs to access a web page.
(a) State how Computer A could access the web page without using a Domain Name Service(DNS).
...................................................................................................................................................
...............................................................................................................................................[1]
(b) (i) The following table shows four IPv6 addresses. [4]
State if each address is valid or invalid.
IP address Valid or invalid
21E5:69AA:FFFF:1:E100:B691:1285:F56E
::255.255.255.255
59FB::1005:CC57:6571
56FE::2159:5BBC::6594
(ii) The following table shows four statements about either public or private IP addresses.
Tick ( ) one box in each row to indicate whether each statement refers to a public or a private IP
address. [4]

Statement Public Private


192.168.2.1 is an example of this type of address
Assigned by the Internet Service Provider (ISP)
IP address cannot be duplicated in different networks
Network Address Translation (NAT) is necessary
to access the Internet directly

(c) One type of transmission media is copper cable.


Give two additional types of transmission media.
1 ................................................................................................................................................
2 ............................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
2 Gopal types the Uniform Resource Locator (URL) of a website into a web browser.
(a) The following sequence (1 to 5) describes the steps that take place. There are three missing
statements.
1 Gopal types into the web browser.
2 ......................................
3 DNS looks up the URL in table
4 ......................................
5 ......................................
Three statements A, B and C are used to complete the sequence.
A DNS finds corresponding IP address
B Web browser sends URL to Domain Name Service (DNS)
C DNS returns IP address to web browser
Write one of the letters A to C in the appropriate rows (2, 4 and 5) to complete the sequence. [2]
(b) Describe the purpose of an IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
(c) A telecommunications operator has installed fibre-optic cables in Gopal’s neighbourhood.
(i) Give three benefits of fibre-optic cable over copper cable.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
........................................................................................................................................... [3]
(ii) Give two drawbacks of fibre-optic cable over copper cable.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


1 Devices connected to the Internet have IP (Internet Protocol) addresses.
(a) Three IPv4 addresses are given.
Circle either Valid or Invalid to indicate whether each address is valid or invalid. Explain your
decision.
Address 1: 13A.21.2H.1 Valid / Invalid
Explanation ............................................................................................................................................
................................................................................................................................................................
Address 2: 299.53.2.2 Valid / Invalid
Explanation ............................................................................................................................................
................................................................................................................................................................
Address 3: 192.2.1.0 Valid / Invalid
Explanation ............................................................................................................................................
...........................................................................................................................................................[3]

(b) A website can be accessed using either the Uniform Resource Locator (URL) or the IP
address. Describe how a URL is converted into its matching IP address.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................... [3]
(c) People use the Internet to stream media.
Complete the following statements by filling in the names of the missing methods of bit streaming.
................................................. bit streaming is used when watching a live stream of events that are
currently taking place. The event is captured live with a video camera connected to a computer, and it
cannot be paused or rewound.
................................................. bit streaming is used when watching an event that has taken place in
the past. Existing media are encoded to bit streaming format and uploaded to a server. It can be
paused and rewound. [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
1 Computers on the Internet have IP addresses.
(a) IP addresses can be in either IPv4 or IPv6 format.
(i) Give an example of a valid IPv4 address.
.................................................................................................................................................................
......................................................................................................................................................... [1]
(ii) State why there is a need for IPv6 addressing.
.................................................................................................................................................................
......................................................................................................................................................... [1]
(iii) A computer’s IPv6 address is:
C100:2235::1000:25AA: AA50
Explain why this IPv6 address would be an invalid IPv4 address.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
....................................................................................................................................................... [2]

(b) A company has computers in two separate buildings that communicate using the Internet over a
Public Switched Telephone Network (PSTN).
(i) Describe the transmission of data using a PSTN.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
........................................................................................................................................................ [2]
(ii) The company wants to install a dedicated line between the two buildings.
Identify one benefit and one drawback of installing a dedicated line between the two buildings.
Benefit ....................................................................................................................................................
................................................................................................................................................................
Drawback ...............................................................................................................................................
.......................................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


(c) A network can use routers and gateways.
Explain the role of routers and gateways in a network.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
................................................................................................................................................... [4]
(d) The company has an email server.
Identify three other types of server.
1 .............................................................................................................................................................
2 .............................................................................................................................................................
3 ....................................................................................................................................................... [3]

4 Customers of a bank can access their account information by logging in on the bank’s website.
(a) The bank has a client-server model of networked computers.
(i) Describe, using the bank as an example, the key features of a client-server model.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) Give two other examples of applications that can use the client-server model.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
(b) The bank’s customers log in to the website using a web application.
Explain why the web application uses server-side scripting.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]

(c) The bank is upgrading its local area network (LAN) copper cables to fibre-optic cables.
(i) State two benefits to the bank of upgrading to fibre-optic cable from copper cable.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]
(ii) State two drawbacks of upgrading to fibre-optic cables.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]

2 c (iii) The peripheral devices are plugged into USB ports of the computer.
Describe two benefits of connecting the peripheral devices using a USB port.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


7 A company allows customers to stream music from its servers over the Internet.
The company’s internet connection is currently provided through copper cables.
(a) Identify two pieces of hardware, other than the cables, that enable the servers to connect to the Internet.
Describe the purpose of each device.
Device 1 ....................................................................................................................................
Purpose ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 2 ....................................................................................................................................
Purpose ....................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [4]
(b) The company wants to upgrade their internet connection to fibre-optic cables.
Give one benefit and one drawback to the company of upgrading to fibre-optic cables.
Benefit ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
................................................................................................................................................... [2]
(c) A customer enters a song title into a web page to listen to the song. The design of the web page is shown:

The web page will make use of both client-side and server-side scripting.
(i) Explain how client-side scripting will be used in this web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
(d) The company needs to keep the data on its servers secure from online threats.
(i) Describe how a firewall will help to protect the data on the servers from online threats.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) Give one additional security measure that the company can use to protect the data on the servers from
online threats.
..................................................................................................................................... [1]

1 Ana owns a small company with four employees. The office has a network containing several computers that run on a
client-server model. There is one server that connects to the Internet using a router.
(a) Networks transmit data using various types of connection shown in the following table. Complete the table. [4]
Type of connection Description

..................................................................................................
Fibre-optic ..................................................................................................
..................................................................................................
..................................................................................................

A communication device in Earth’s orbit that receives and


...............................................
transmits data
...............................................

..................................................................................................
Radio waves ..................................................................................................
..................................................................................................
..................................................................................................

Carries data as electrical signals and can consist of a twisted


...............................................
pair
...............................................

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


(b) Explain how the client-server model enables the employees to access the same files from different computers.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) Each computer in the network has a private IP address.
Give two reasons why the computers do not have public IP addresses.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
................................................................................................................................................... [2]
2 Billy has a laser printer.
(c) Billy’s computer has several ports.
(i) State the purpose of a port.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) Identify one type of port.
...........................................................................................................................................
..................................................................................................................................... [1]

2 (e) The surgery has five computers that can all access the database. A copy of the database is stored centrally.
(i) Complete the description of this type of network model by filling in the missing terms.
The ......................................... model has one ......................................... that stores all
the data for the surgery. The other computers are ......................................... . When a
user requests data, a request is sent to the ......................................... . [4]
(ii) The surgery wants to keep all data secure. The surgery network is not connected to the Internet.
Identify two authentication techniques the surgery could use to restrict access to the data.
1 ........................................................................................................................................
2 ........................................................................................................................................ [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
5 Oscar is watching a concert on his laptop computer.
(a) The concert is streamed to his computer at the same time as it is taking place.
(i) Identify whether Oscar is using real-time or on-demand bit streaming. Justify your choice.
Streaming method .............................................................................................................
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(ii) The video of the concert repeatedly stops and restarts while Oscar is watching it on his laptop computer. His
friend is watching the same video of the concert at the same time, in a different location, but he does not
experience the same problem as Oscar.
Give three possible reasons why Oscar’s video constantly stops and starts again.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
........................................................................................................................................... [3]
7 Anne is downloading a sound file from a web server. She had the choice of a sampling rate of 44.1kHz or
98kHz before she downloaded the sound file.
Explain the differences between the two sound files stored on the server.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [4]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


8 Joshua’s laptop is connected to the router on his home network.
(a) The laptop has a private IP address. The router has both public and private IP addresses.
Explain the reasons why Joshua’s laptop has a private IP address only, but the router has both a private and a
public IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]

(b) Joshua visits a website by entering its Uniform Resource Locator (URL).
Describe how the URL is converted into a matching IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) Give one example of a valid IPv4 address.
...................................................................................................................................................
............................................................................................................................................. [1]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
7 A web server has a public IPv4 address.
(a) Draw lines to link each characteristic to its appropriate IP address. [2]

Characteristic IP address

Can use hexadecimal notation

Each group of digits is a


IPv4
number between 0 and 65535

Consists of four groups of digits

Uses double colons (::) IPv6

The total length of the address


is 32 bits

(b) IP addresses can be static or dynamic.


Explain the reasons for the web server using a static instead of a dynamic IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


4 A laptop on a home network connects to the Internet through a router.
(a) The laptop has an IP address.
(i) Give the reasons why the laptop has an IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The laptop’s IP address is private.
Give the reasons why the laptop does not have a public IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(iii) The router has an IPv4 address.
Give three differences between the format of an IPv4 address and an IPv6 address.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
........................................................................................................................................... [3]
(b) A Public Switched Telephone Network (PSTN) is one example of a communication system that
can be used to support the Internet.
Identify and describe two other communication systems that can be used to support the Internet.
System 1 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
System 2 ...................................................................................................................................
Description ................................................................................................................................
................................................................................................................................................... [4]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
1 A Local Area Network (LAN) consists of four computers and one server. The LAN uses a bus
topology.
(a) Complete the diagram below to show how the computers and the File server could be connected.
[2]

(b) Computer C sends a data packet to Computer A.


Three statements are given below.

Tick ( ) to show whether each statement is true or false. [3]

Statement True False


Computer C uses the IP address of Computer A to indicate that the packet is for
Computer A.
Computer B can read the packet sent from Computer C to Computer A.
The File server routes the packet to Computer A.
(c) Computer A starts transmitting a packet to Computer C. At exactly the same time, the Fileserver
starts transmitting a packet to Computer D. This causes a problem.
(i) State the name given to this problem.
...........................................................................................................................................
.......................................................................................................................................[1]
(ii) Give three steps taken by both Computer A and the File server to allow them to transmit their
packets successfully.
Step 1 ................................................................................................................................
...........................................................................................................................................

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Step 2 ................................................................................................................................
...........................................................................................................................................
Step 3 ................................................................................................................................
.......................................................................................................................................[3]
(d) Adding a switch to the LAN changes its topology. Explain how the use of a switch removes the
problem identified in part (c)(i).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]

Q 22) June 17 P 31 Q 1
5 (a) A web browser is used to request and display a page stored on an internet web server.
Explain how each of the following items is used in this event.
(i) Packet: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Router: ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) TCP/IP: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
1 A Local Area Network (LAN) consists of three computers, one server and a switch. The LAN uses a
star topology.
(a) Complete the following diagram to show how the computers, the server and the switch could be
connected. [1]

(b) There are four statements in the following table. For each statement, place a tick ( ) in the

appropriate column to indicate whether it is true or false. [4]


Statement True False
The server can send packets to Computer B and Computer C at the same time.
The network software on each computer needs to include collision detection and
avoidance.
Computer B can read a packet sent from the server to Computer C.
Computer A can send a packet to Computer B and at the same time the server
can be sending a packet to Computer C.
(c) The LAN shown in part (a) will be connected to the Internet.
(i) A router will be attached to one of the devices on the LAN.
State the device used. Give a reason for your choice.
Device .....................................................................................................................................................
Reason ....................................................................................................................................................
.................................................................................................................................................................
............................................................................................................................................................ [2]
(ii) Explain why a router is required.
.................................................................................................................................................................
.................................................................................................................................................................
........................................................................................................................................................... [2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


(iii) After the router has been connected, Computer A sends several packets to an internet web
server. Explain how the packets are transmitted from the router to the web server.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
........................................................................................................................................................... [3]

Q 24) 9608 Winter 17 P32


1 A Local Area Network (LAN) consists of three computers, one server and a router connected to the
Internet. The LAN uses a bus topology.
(a) Complete the following diagram to show how the computers, the server and the router could be
connected. [2]

(b) There are four statements in the following table. For each statement, place a tick (3) in the
appropriate column to indicate whether it is true or false. [4]

Statement True False


The server can send packets to Computer B and the router at the same time.
Computer C uses the IP address of a web server to send a request for a web page
on the web server.
Computer B can read a packet sent from Computer A to Computer C.
The server can read all incoming packets from the Internet.

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
(c) The user on Computer A and the user on Computer B are both using the Internet at the same
time. On a few occasions, Computer A and Computer B start transmitting packets to the router at
exactly the same time. This causes a problem called a collision.
(i) Explain what is meant by a collision in this context.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) As a result of the collision, both Computer A and Computer B stop transmitting.
Computer A must carry out a number of steps to ensure the successful transmission of its packet.
Give two of the steps.
Step 1 ................................................................................................................................
Step 2 ................................................................................................................................ [2]
(d) The LAN topology is redesigned.
(i) Describe the changes that could be made to the LAN topology to overcome the problem identified
in part (c).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Explain how the redesign has overcome the problem.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


Q 25) 9608 Summer 18 P32
3 Star and bus are two types of topology that can be used in a Local Area Network (LAN).

(a) (i) State one benefit and one drawback of the star topology.
Benefit .....................................................................................................................................................
.................................................................................................................................................................
Drawback ................................................................................................................................................
...........................................................................................................................................................[2]
(ii) State one benefit and one drawback of the bus topology.
Benefit .....................................................................................................................................................
.................................................................................................................................................................
Drawback ................................................................................................................................................
...........................................................................................................................................................[2]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/


COMPUTER SCIENCE WITH INQILAB PATEL
(b) The sequence of steps 1 to 7 describes what happens when the LAN transmits data from
Computer X to Computer Y using circuit switching. Four statements (4 to 7) are missing from the
sequence.
A Computer X sends the data.
B The sender signals node to deallocate resources.
C Computer Y sends a receipt signal.
D If available, Computer X sets up path between nodes.
Write one letter (A to D) in the appropriate space to complete the sequence.
1 Computer X sends a connection request to Computer Y.
2 Computer Y sends ready or busy signal.
3 If busy, Computer X waits and then resends the connection request to Computer Y.
4 ……………
5 ……………
6 ……………
7 …………… [3]
(c) (i) Protocols are essential for successful transmission of data over a network. The TCP/IPprotocol
suite operates on many layers.
State the appropriate layer for each protocol in the following table. [3]

Protocol Layer
TCP
IP
SMTP

(ii) Peer-to-peer (P2P) file sharing uses the BitTorrent protocol.


Explain how the BitTorrent protocol allows files to be shared.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
...........................................................................................................................................................[3]

+92 300 2724734 /inqilabpatel https://www.inqilabpatel.com/

You might also like