0% found this document useful (0 votes)
91 views2 pages

1.3.2 Lesson Retrieval Practice ANSWERS

Protocols are rules that enable devices on a network to communicate effectively by ensuring data packets are sent and received in a standard way (1). Data packets are small units of data created when files are split up for transmission over a network (2). Encryption scrambles data before transmission using an encryption key, converting plain text to cipher text only readable by the recipient using the same key (3).

Uploaded by

emona.mocku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views2 pages

1.3.2 Lesson Retrieval Practice ANSWERS

Protocols are rules that enable devices on a network to communicate effectively by ensuring data packets are sent and received in a standard way (1). Data packets are small units of data created when files are split up for transmission over a network (2). Encryption scrambles data before transmission using an encryption key, converting plain text to cipher text only readable by the recipient using the same key (3).

Uploaded by

emona.mocku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

ComputerScienceUK.

com CSUK:Teacher

CSUK Lesson Retrieval Practice – Answer Sheet


Internet and Protocols (OCR)
1. What are the two main data transfer mediums used to enable communication between computers
in a network? [2]

Wired (Ethernet) [1] and Wireless (Wi-Fi & Bluetooth) [1].

2. What are the two main types of cables used to transport data between computers using Ethernet?
[2]

Copper cables [1] and Fibre optic cables [1].

3. What are the standard radio frequency bands used by Wi-Fi to send and receive data? [2]

2.4 GHz Band [1] and 5 GHz Band [1]

4. Why are the bands used by Wi-Fi split into channels that cover smaller frequency ranges within
the band? [2]

To allow devices using the same band to use different channels and frequencies [1], thereby avoiding
interference with one another [1].

5. What are data packets? [2]

Data packets are small units of data [1], created when a file is split up, when sent over a network [1].

6. What are protocols and what are their purpose in computer networking? [2]

Computer Science UK Membership Site Licence: Do not share outside of your centre 1
ComputerScienceUK.com CSUK:Teacher

Protocols are rules [1] which enable devices attached to a network to communicate with one another
effectively, by ensuring that data packets are produced and sent in the same standard way [1].

7. What is a MAC address? [2]

A MAC address (Media Access Control) is a unique, hard-coded 12-digit hexadecimal number assigned
to every network device [1], used to send data over a network to the correct network card. It is known as a
PHYSICAL ADDRESS [1].

8. What is an IP address? [2]

An IP address (Internet Protocol address) is a unique, dynamic 32-bit number assigned to every computer
on a network [1], used to send data over a network to the correct node [1].

9. What is encryption and how does it work? [3]

Encryption is the process of scrambling data before it is sent over a network so that it is unreadable if
intercepted [1]. An encryption key is used to systematically alter each piece of data in a file, converting
plain text into cipher text [1]. The same key is required by the recipient to reverse the encryption and
convert cipher text back to plain text [1].

10. What is the main difference between Wi-Fi and Bluetooth? [3]

Wi-Fi supports the transfer of data amongst multiple devices at once [1], has a longer range [1], and is
more secure [1]. Bluetooth, on the other hand, can only support data transfer between a small number of
devices at any one time [1], has a shorter ra

Computer Science UK Membership Site Licence: Do not share outside of your centre 2

You might also like