0% found this document useful (0 votes)
3 views

Computer Networks

Uploaded by

mistiqblynk
Copyright
© © All Rights Reserved
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Computer Networks

Uploaded by

mistiqblynk
Copyright
© © All Rights Reserved
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 28

_______________________

Name:
_
Fundamentals of computer
networks _______________________
Class:
_

_______________________
Date:
_

Time: 97 minutes

Marks: 91 marks

Comments:

Page 1 of 28
Q1.
Most schools have a computer network.

Some schools allow teachers to access the school network from their home computers.

Give one reason why some schools allow this and one reason why some schools do not
allow this.

Reason for: _____________________________________________________________

_______________________________________________________________________

Reason against: __________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Q2.
State three advantages of using a computer network.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 3 marks)

Q3.
PANs and LANs are two different types of network.

(a) Describe one difference between a PAN and a LAN.

___________________________________________________________________

___________________________________________________________________
(1)

(b) Give one example of where a PAN could be used.

___________________________________________________________________

___________________________________________________________________
(1)
(Total 2 marks)

Q4.

Page 2 of 28
When two computers on a network communicate with each other they need to use the
same protocol.

Define the term network protocol.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Q5.
For questions (a) to (c) shade one lozenge to indicate the most suitable protocol to use in
the situation described.

(a) Used to retrieve email stored on a server.

A HTTP

B HTTPS

C FTP

D SMTP

E IMAP

(1)

(b) Used to make a payment securely when purchasing goods from a website.

A HTTP

B HTTPS

C FTP

D SMTP

E IMAP

(1)

(c) Used to send an email from a client machine to an email server.

A HTTP

B HTTPS

C FTP

Page 3 of 28
D SMTP

E IMAP

(1)
(Total 3 marks)

Q6.
TCP/IP is a protocol used in networking. There are 4 layers in the TCP/IP stack.

Complete the table by placing the four layers of the TCP/IP stack into order (1-4) where 1
is the top layer and 4 is the bottom layer.

Layer Order (1-4)

Transport

Link

Internet

Application
(Total 3 marks)

Q7.
A games café is evaluating the security for their network.

(a) State two reasons why using a biometric authentication measure is better than
password authentication for staff accounts.

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________
(2)

(b) Explain why it would not be appropriate for the café to use MAC address filtering on
their wireless network.

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

Page 4 of 28
___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________
(2)
(Total 4 marks)

Q8.
Explain two differences between a LAN and a WAN.

Difference 1: ____________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

Difference 2: ____________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 4 marks)

Q9.
HTTP and HTTPS are two application layer protocols.

Explain why HTTPS is often used rather than HTTP.

_______________________________________________________________________

_______________________________________________________________________
(Total 1 mark)

Q10.
The application layer and the network (internet) layer are two of the layers within the
TCP/IP stack.

What are the names of the other two TCP/IP stack layers?

1. _____________________________________________________________________

_______________________________________________________________________

Page 5 of 28
2. _____________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Q11.
What is the purpose of the network (internet) layer within the TCP/IP stack?

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Q12.
Explain how MAC address filtering works.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Q13.
List three different measures that can be used to maintain the security of a computer
system.

For each measure:

• Outline what the measure is.


• Explain what types of threat to cyber security it is effective against.
(Total 9 marks)

Q14.

Most schools have a computer network.

Some schools allow teachers to access the school network from their home computers.

Give one reason why some schools allow this and one reason why some schools do not
allow this.

Reason for: ____________________________________________________________

_______________________________________________________________________

Reason against:_________________________________________________________

Page 6 of 28
_______________________________________________________________________
(Total 2 marks)

Q15.

PANs and LANs are two different types of network.

Describe one difference between a PAN and a LAN.

_______________________________________________________________________

_______________________________________________________________________
(Total 1 mark)

Q16.

Give one example of where a PAN could be used.

_______________________________________________________________________

_______________________________________________________________________
(Total 1 mark)

Q17.

“Schools should use a wireless network instead of a wired network”.

Discuss this statement.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 6 marks)

Q18.

When two computers on a network communicate with each other they need to use the

Page 7 of 28
same protocol.

Define the term protocol.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Q19.

Shade one lozenge to indicate the most suitable protocol to use in the situation described.

(a) Used to retrieve email stored on a server.

A HTTP

B HTTPS

C FTP

D SMTP

E IMAP
(1)

(b) Used to make a payment securely when purchasing goods from a website.

A HTTP

B HTTPS

C FTP

D SMTP

E IMAP
(1)

(c) Used to send an email from a client machine to an email server.

A HTTP

B HTTPS

C FTP

D SMTP

E IMAP

Page 8 of 28
(1)
(Total 3 marks)

Q20.

TCP / IP is a protocol stack used in networking. There are four layers in the TCP / IP
stack.

Complete the table by placing the four layers of the TCP / IP stack into order (1 – 4),
where 1 is the top layer and 4 is the bottom layer).

Layer Order (1-4)


Transport

Link

Internet

Application
(Total 3 marks)

Q21.

Define the term network.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Q22.

Describe three advantages of using a computer network rather than standalone


machines.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 3 marks)

Page 9 of 28
Q23.

One disadvantage of using a computer network is that there are increased security risks.
Describe three other disadvantages of using a computer network.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 3 marks)

Q24.

Barnes Pest Control is a small business with four employees. Each of their employees
has a standalone desktop computer. They have decided to use a network instead of
standalone machines.

Two security measures that Barnes Pest Control could use are authentication and
encryption. Explain each of these security measures and how Barnes Pest Control could
use them.

Authentication:___________________________________________________________

_______________________________________________________________________

Encryption:______________________________________________________________

_______________________________________________________________________
(Total 4 marks)

Q25.

Draw a diagram showing a four-computer network using a bus topology.

Page 10 of 28
(Total 3 marks)

Q26.

Barnes Pest Control is a small business with four employees. Each of their employees
has a standalone desktop computer. They have decided to use a network instead of
standalone machines.

Barnes Pest Control decides to use a star network topology. State two reasons why this
topology may not be the most suitable choice.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Q27.

The application layer and the internet layer are two of the layers in the four-layer TCP / IP
model. Describe the roles of each of the four layers in the TCP / IP model. In your answer
you should also state the names of the other two layers of the TCP / IP model.

_______________________________________________________________________

_______________________________________________________________________

Page 11 of 28
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 6 marks)

Q28.

The diagram below shows a client–server network. The clients are connected to a switch.

(a) What network topology is shown in the diagram above?

___________________________________________________________________

___________________________________________________________________
(1)

(b) State two advantages of this particular topology.

1. _________________________________________________________________

___________________________________________________________________

2. _________________________________________________________________

___________________________________________________________________
(2)
(Total 3 marks)

Page 12 of 28
Q29.
Discuss the advantages and disadvantages of connecting a computer to a network.

In this question you will be marked on your ability to use good English, to organise
information clearly and to use specialist vocabulary where appropriate.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 6 marks)

Q30.

What is a computer network?

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Page 13 of 28
Mark schemes

Q1.
All marks AO1 (understanding)

Reasons for allowing:


Teachers can access resources on the school network to allow
them to plan lessons at home;
Teachers can teach lessons from home (using videoconferencing)
if they are not able to get into work (eg travel difficulties);
Teachers can access electronic copies of student work so that they
do not have to carry marking home;

Reasons for not allowing:


Data protection issues – schools may not want potentially sensitive
student information to be accessed outside of school;
To try to help teachers have a work-life balance;
Increased security risks as teachers may not have fully-protected
computers at home (eg if a teacher does not have anti-virus
software on their home computer this may cause problems when
they connect their computer to the school network);

Max 1 mark: if only described reasons for allowing access

Max 1 mark: if only described reasons for not allowing access


[2]

Q2.
All marks AO1 (understanding)

Share hardware; A. by example


Share data/files;
Easier to work collaboratively;
Use of communication tools
Central management for machines A. by example: centralised
software deployment, centralised back-ups;
Files not stored on local machine so can be accessed from
multiple machines;
Can monitor computer users;
Increase available storage;

Max 3 marks
[3]

Q3.
(a) 1 mark for AO1 (understanding)
PANs are centred around one person, LANs cover a limited
geographical area / LANs cover a larger area;
PANs have one user, LANs (normally) have more than one
user;
PAN uses Bluetooth, LAN uses alternative protocols /
connection methods (A. by example);

Page 14 of 28
Note: answer must cover both PAN and LAN to be awarded
a mark

Max 1
1

(b) 1 mark for AO1 (understanding)

Wearable computing devices;


Connecting headphones to a music player; Connecting
pedometer to a mobile phone;

A. any suitable example

Max 1
1
[2]

Q4.
All marks AO1 (recall)

a set of rules;
that allow two devices to communicate;
[2]

Q5.
(a) Mark is for AO1 (recall)

E IMAP;

R. If more than one lozenge shaded


1

(b) Mark is for AO1 (recall)

B HTTPS;

R. If more than one lozenge shaded


1

(c) Mark is for AO1 (recall)

D SMTP;

R. If more than one lozenge shaded


1
[3]

Q6.
All marks AO1 (recall)

Layer Order (1 – 4)

Transport 2

Page 15 of 28
Link 4

Network 3

Application 1

Mark as follows:
1 mark: any row correct;
2 marks: any two rows correct;
3 marks: all four rows correct;
[3]

Q7.
(a) All marks AO2 (apply)

Staff could forget their password // staff can’t forget biometric


measure;
Shouldering risk when staff entering their password // no risk
of shouldering when using biometric data;
Lower risk of hacking;

Max 2
2

(b) All marks AO2 (apply)

Network is made available to members of the public;


Won’t know the MAC addresses for (most) of the devices
connecting to the network;
2
[4]

Q8.
4 marks for AO1 (understanding)

1 mark for each explanation point.

Example answers

• A WAN is a Wide Area Network that links more than one remote geographical
site / location to another;
• A LAN is a Local Area Network that links together devices that are within one
site \ location;
• The speed of data transmission across a LAN is likely to be higher than across
a WAN;
• WANs are typically public networks (and so data encryption is likely to be
used);
• LANs (may not need data encryption) as they are typically private;
• LANs typically carry less traffic than WANs;
• This is because the number of users on a LAN can be controlled by the
administrator whereas public WANs could have an unlimited number of users;
• LAN Connections are generally more reliable as they are under the control
and maintenance of the network administrators;
• On a WAN it is possible that heavy traffic, peak usage times, viruses, weather
or physical damage could affect the connection reliability;

Page 16 of 28
• WANs are typically under shared ownership;
• LANs are typically owned by a single person or organisation;
• LANs use different protocol suites (accept protocols) to WANs;

R. Simple expansion of acronyms.


R. Any reference to cost comparisons.
R. Reference to cable types.
R. WAN is a collection of LANs / LANs joined together (if only a simple statement).
[4]

Q9.
Mark is for AO1 (understand)

Max 1 mark for any of the following:

• HTTPS is secure / encrypted;


• Data transmitted using HTTP could be easily read if intercepted;
• Data transmitted using HTTPS can only be seen / read / understood by the
(intended) recipient;
[1]

Q10.
2 marks for AO1 (recall)

1 mark for each correct answer. Accept any of:

• Transport (layer);
• Data Link (layer);
• Link (layer);
• Network Interface / access (layer)

R. Any name that is not correct.


I. the order that the answers are written in.
[2]

Q11.
2 marks for AO1 (understanding)

Max 2 marks:

• packages / unpackages data (for / after transmission);


• adds address(es) (for transmission);
• routes the packets (across the network);
• provides error checking;

R. It provides access to the Internet


[2]

Q12.
2 marks for AO1 (understanding)

1 mark for each of the following points to a maximum of 2 marks.

Page 17 of 28
• Each device connected to the network has a (unique) reference ID / physical /
physical address (called the MAC Address);
• There is a list of allowed / denied addresses;
• The network device / router looks at the address of the device trying to
connect (and blocks / allows appropriately);
[2]

Q13.
9 marks for AO1 (knowledge and understanding)

Award up to three marks for each measure. Of these:

• Award up to two marks for an outline (one per point)


• Award one mark for an example of a threat that it would be effective against.

The table below lists common examples but is not exhaustive; alternative valid responses
should also be credited.

Virus Checker Outline:


Scans files to look for malicious code
Needs to be updated regularly with latest virus
definitions
Can quarantine / delete malware/suspicious files
Effective against:
Malware (accept examples)

Firewall Outline:
Analyses/scans network traffic
Can block traffic from suspicious hosts/
computers/addresses/ports
Effective against:
Hackers
Transmission of malware

Login system / Outline:


Authentication / User has to enter username and password
Password / Can be authenticated by other methods such as
Biometric biometric (accept examples)
Login details matched to a database of users
Effective against:
Hackers
Unauthorised access

MAC address Outline:


filtering Each hardware device has unique hardware address
A database of allowed hardware/MAC addresses is
kept/whitelist
To connect to a network a device must have an
address on the database/whitelist
Effective against:
Unauthorised devices

Encryption Outline:
Data is stored/transmitted as ciphertext (A. in coded
form)
Only people who know the encryption method/key can

Page 18 of 28
decrypt/read the data
Effective against:
Data theft

Prevention of Outline:
use external Ports on a computer are disabled
storage Storage devices connected to them cannot be
devices / USB accessed // flash drives cannot be used
ports Effective against:
Putting malware onto a computer
Theft of data

Access rights Outline:


Users are associated with certain privileges
These might control files that can be accessed/run //
level of internet access // ability to create/delete files //
ability to change settings
Effective against:
Hackers
Theft of data
Authorised users doing unauthorised things

CAPTCHA Outline:
Users have to type in some distorted text // recognise
images for a set of images
Humans can do this but it is a difficult task for computer
programs / bots
Effective against:
Automated hacking programs
Bots

Automatic Outline:
software Operating system / software configured to download
updates updates from the internet
Hackers look for security vulnerabilities in software
Updates can patch security vulnerabilities
Effective against:
Hackers
Malware
[9]

Q14.

All marks AO1 (understanding)

Reasons for allowing:


Teachers can access resources on the school network to allow them to plan lessons
at home;
Teachers can teach lessons from home (using videoconferencing) if they are not
able to get into work (eg travel difficulties);
Teachers can access electronic copies of student work so that they do not have to
carry marking home;

Reasons for not allowing:


Data protection issues – schools may not want potentially sensitive student
information to be accessed outside of school;

Page 19 of 28
To try to help teachers have a work-life balance;
Increased security risks as teachers may not have fully-protected computers at
home (eg if a teacher does not have anti-virus software on their home computer this
may cause problems when they connect their computer to the school network);

Max 1 mark: if only described reasons for allowing access


Max 1 mark: if only described reasons for not allowing access
[2]

Q15.

1 mark for AO1 (understanding)


PANs are centered around one person, LANs cover a limited geographical area /
LANs cover a larger area;
PANs have one user, LANs (normally) have more than one user;
PAN uses Bluetooth, LAN uses alternative protocols / connection methods (A. by
example);

Note: answer must cover both PAN and LAN to be awarded a mark

Max 1
[1]

Q16.

1 mark for AO1 (understanding)

Wearable computing devices;


Connecting headphones to a music player;
Connecting pedometer to a mobile phone;

A. any suitable example

Max 1
[1]

Q17.

6 marks for AO2 (apply)

Level 3 (5–6 marks):


Discussion with five or more relevant points includes a detailed consideration (more
than two reasons) of why schools should use a wireless network (or why they should
use a wired network) and a detailed consideration (more than two reasons) of why
schools should use a wired network (or why they should use a wireless network).
The reasons given are clearly relevant to the context of networks in a school
environment. The discussion is logically coherent and the reasons given follow a
clear line of reasoning from the advantages and disadvantages of the two types of
network.

Level 2 (3–4 marks):


A logically coherent discussion includes consideration (one or two reasons) of why
schools should use a wireless network (or why they should use a wired network)

Page 20 of 28
and consideration (one or two reasons) of why schools should use a wired network
(or why they should use a wireless network). Most of the reasons given will be
clearly relevant to the context of networks in a school environment rather than being
more general discussion points about the two types of network.

Level 1 (1–2 marks):


A statement of one or two reasons why schools either should or should not use a
wireless network has been included. The reasons given may not be strongly linked
to a school environment.

Alternatively, a statement of one or two reasons why schools either should or should
not use a wired network has been included. The reasons given may not be strongly
linked to a school environment.

0 marks:
No creditworthy answer

Guidance – Indicative Response


Schools should use wired networks:
• as they need high bandwidth as they make use of a lot of multimedia;
• as they need high bandwidth / reliable systems as delays in lessons are not
acceptable;
• there is better security on wired networks making it easier for schools to control /
monitor how students are using the network;
• network performance may be poor if there are large numbers of student-owned
devices using the school network at any one time;

Schools should use wireless networks:


• as it allows students to make use of their own portable devices in their learning;
• as maintaining a safe learning environment is very important as children are more
vulnerable to safety issues (like trailing wires);
• it allows computing devices to be used outside of the lesson eg in PE lessons;
• as schools have limited budgets and it is cheaper to add extra wireless devices to a
school network;
• less cable and drilling needed which may save money;
• as there are now many devices which don’t have wired connection ports and
schools may want to be able to use these devices;
[6]

Q18.

All marks AO1 (recall)

1 mark: a set of rules;

1 mark: that allow two devices to communicate;


[2]

Q19.

(a) Mark is for AO1 (recall)

1 mark: E IMAP;

If more than one lozenge shaded then mark is not awarded

Page 21 of 28
1

(b) Mark is for AO1 (recall)

1 mark: B HTTPS;

If more than one lozenge shaded then mark is not awarded


1

(c) Mark is for AO1 (recall)

1 mark: D SMTP;

If more than one lozenge shaded then mark is not awarded


1
[3]

Q20.

All marks AO1 (recall)

Layer Order (1-4)


Transport 2

Link 4

Internet 3

Application 1

Mark as follows:
1 mark: any row correct;
1 mark: any two rows correct;
1 mark: all four rows correct;
[3]

Q21.

All marks for AO1 (recall)

Group of computers / devices;


connected together // that can communicate with each other;
[2]

Q22.

All marks for AO1 (understanding)

Share hardware;
Share data / files;
Improved communication tools;
Improved monitoring of users;
Centralised back-up;

Page 22 of 28
Max 3 marks
[3]

Q23.

All marks for AO1 (understanding)

Reliance on server;
Network can slow down (when traffic is heavy);
Cabling / additional hardware / installation costs;
May have additional costs due to need to employ a network manager;

Max 3 marks
[3]

Q24.

2 marks for AO1 (understanding) and 2 marks for AO2 (apply)

1 mark for AO1: Authentication is ensuring that a user is who they are claiming to
be;

1 mark for AO2:The business could give each employee their own username and
password // the business could use a biometric system, e.g. fingerprints, to check
which employee is logging in / to ensure that only employees can log in;

1 mark for AO1: Encryption is changing data so that it cannot be read (except by
authorised users / those with the decryption key);

1 mark for AO2: The business could use encryption to prevent unauthorised people
from reading sensitive data; A. example of sensitive data eg personnel records
[4]

Q25.

All marks for AO1 (understanding)

Mark as follows:
Diagram has a main cable; I. bidirectional arrow instead of line R. unidirectional
arrow

Each computer is connected to the main cable; I. bidirectional arrows instead of


lines R. unidirectional arrows

Network contains exactly four computers and each computer is not connected to
any other computers (except via the main cable);

Page 23 of 28
I. missing terminators at ends of main cable

Maximum 2 marks if any errors in diagram

Example answer

This diagram worth 2 marks as there is a main cable and there are four computers
not connected to any other computers (except via the main cable). However, it does
not get the mark for connecting the computers to the main cable as the computers
have not been given connections to the main cable.
[3]

Q26.

All marks for AO2 (apply)

The installation cost will be high;


There is a reliance on the central switch / hub (and if this fails the network is
unusable);

A. As there are only a small number of workstations there is little (A. no) difference
in network speed between the bus and star networks;

Max 2
[2]

Q27.

Two marks for AO1 (recall) and four marks for AO1 (understanding)

Level 3 (5–6 marks):


Clear descriptions of the roles of all or almost all of the layers of TCP / IP have been
included along with the names of the missing layers.

Level 2 (3–4 marks):


Accurate description of one or two of the roles of layers of TCP / IP has been
included along with the name of at least one of the missing layers.

Level 1 (1–2 marks):


Answer includes one of the following: an accurate description of the roles of the
application and/or Internet layers of TCP / IP, a statement of the names of the
missing layers of the TCP / IP model, a statement of the name of one of the missing
layers of the TCP / IP layer which may include a description of the role of this layer.

0 marks:
No creditworthy answer

Guidance – Response for AO1 (recall)


Transport (layer);
Link (layer); A. link A. network interface (layer)

Page 24 of 28
Guidance – Indicative Response for AO1 (understanding)
Application layer is where network applications operate;
Transport layer sets up the communication between the two hosts;
Transport layer splits the data into packets;
Internet layer adds (IP) addresses to the packets;
Internet layer routes the packets across the network;
Link layer is where network hardware operates (eg network interface card);
Link layer is where operating device drivers operate;

Note: there is significantly more detail that can be written about the roles of
the layers that is beyond the scope of the syllabus. Responses that contain
some of this detail would also obtain credit though the additional detail has
not been included on this mark scheme.

Maximum four marks for AO1 (understanding)


[6]

Q28.

(a) Star;

A. Switched Ethernet
1

(b) Any creditworthy point to a maximum of two. Examples include:

It allows each client to use full transmission over the network // no data
collisions;
Easy to connect new devices;
The failure of one client will not affect the others;
Packets are only sent to intended device;
Improved performance; (compared to non-switched networks)
2
[3]

Q29.

No creditworthy material
0 marks

Lower mark range


One or two (dis)advantages are stated.
//
One (dis)advantage is explained.

Quality of written communication: The candidate has used a form and style of writing
which has many deficiencies. Ideas are not often clearly expressed. Sentences and
paragraphs are often not well-connected or at times bullet points may have been used.
Specialist vocabulary has been used inappropriately or not at all. Much of the text is
legible and some of the meaning is clear. There are many errors of spelling, punctuation
and grammar but it should still be possible to understand much of the response.
1–2 marks

Mid mark range


Two or more (dis)advantages are explained.

Page 25 of 28
Quality of written communication: The candidate has mostly used a form and style of
writing appropriate to purpose and has expressed some complex ideas reasonably clearly
and fluently. The candidate has usually used well linked sentences and paragraphs.
Specialist vocabulary has been used on a number of occasions but not always
appropriately. Text is legible and most of the meaning is clear. There are occasional errors
of spelling, punctuation and grammar.
3–4 marks

High mark range


Two or more (dis)advantages are discussed (including at least one advantage and one
disadvantage).

Quality of written communication: The candidate has selected and used a form and style
of writing appropriate to purpose and has expressed complex ideas clearly and fluently.
Sentences and paragraphs follow on from one another clearly and coherently. Specialist
vocabulary has been used appropriately throughout. Text is legible and the meaning is
clear. There are few if any errors of spelling, punctuation and grammar.
5–6 marks

Quality of written communication skills


The candidate’s quality of written communication skills will be one of the factors
influencing the actual mark an examiner will give within a level of response. The quality of
written communication skills associated with each level is indicated above.

Examples of advantages of connecting to a network (give credit to any other


correct example):
• Enables users to work from multiple physical locations;
• Enables hardware resources to be shared between computers;
• Enables computers to communicate with one another;
• Creates more resilient systems (than when you are reliant on just one computer);
• Enables processing to be distributed;
• May enable access to web services;
• Easier monitoring of all users;
• Centralised back-up is possible;
• Easier to maintain multiple devices.

Examples of disadvantages of connecting to a network (give credit to any other


correct example):
• Additional hardware is required;
• Introduces potential security risks. [allow a maximum of two points for viruses,
hacking and so on];
• Additional support costs;
• Certain hardware failures (e.g. main server or switch // router) could impact other
devices;
• Performance potentially limited by network traffic.
[6]

Q30.

Two or more computers//a group of computers;


That have been connected together//That can communicate with/send messages to
one another;
[2]

Page 26 of 28
Examiner reports

Q8.
This question was about networks, network protocols, network models and network
security.

Although most students could give one or two differences between LANs and
WANs, most could not describe the differences. A common answer was that LANs
are smaller and WANs are larger. Without giving a geographical context, or
example, this could not be awarded marks. Better students compared speed of
transmission across the network or referred to typical ownership of LANs and
WANs. Another common incorrect answer was that WANs are wireless (maybe
mistaking them for WLANs), whereas LANs are wired.

Q10.
This question was about networks, network protocols, network models and network
security.

More than ten percent of students did not attempt to answer this question about
TCP/IP stack layers.

Q11.
This question was about networks, network protocols, network models and network
security.

More than ten percent of students did not attempt to answer this question. Of those
who answered this question about the network layer, less than half could describe
its purpose. Many students answered that its purpose was to access the internet.

Q12.
This question was about networks, network protocols, network models and network
security.

A high percentage of students did not attempt to answer the this about MAC address
filtering. A large proportion of those who did answer knew that a MAC address is
unique but could not explain how it was used as a device filter.

Q28.

Two thirds of candidates could correctly identify the star network shown in question (a)
however only a quarter of candidates could state two advantages of this topology
(although two thirds could identify at least one advantage).

Q29.

Few candidates achieved full marks in this extended answer question (5%) but over
half received three or more marks. The question stem asked for a discussion on the
advantages and disadvantages and we refer to the mark scheme to see how
answers fall into the three mark ranges. Many candidates were obviously well-

Page 27 of 28
prepared on network topologies and gave lengthy answers on the comparative
merits of ring, bus and star topologies but this was not what the question was
asking. This points to a need for candidates to practice exam technique more
deeply.

Q30.

Most students correctly described a computer network although many students


unnecessarily made reference to servers or the client-server model in this question.

Page 28 of 28

You might also like