CH 14
CH 14
Discuss the
advantages and disadvantages of peer-to-peer networking by companies.[8]
2. Routers are components that send internet protocol (IP) packets through computer networks.
Describe how each of the following are used in the routing of the IP packets.
(a) static routing tables [5]
(b) dynamic routing tables [5]
3. (a) Describe what is meant by identity theft[2]
(b) Describe the impact of identity theft on individuals.[6]
4. Describe the use of fourth (4th) generation optical data storage systems to store and retrieve data.
[6]
5. LANs and WANs use protocols to send, receive and route data across networks. Describe, in detail,
each of the following protocols.
(a) Dynamic Host Configuration Protocol (DHCP)[2]
(b) BitTorrent[2]
(c) BitTorrent[2]
(d) Transmission Control Protocol (TCP)[2]
6. Companies are concerned that their employee files may be viewed and used by unauthorised
people. A company uses access rights (permissions) to protect files stored on its network. Explain
how different access rights can be used to control access to files.[6]
7. IT crime (cybercrime) is crime committed using computers and networks. Explain how encryption
can be used to combat IT crime.[6]
8. A company has a local area network (LAN) that can be accessed by its staff using their desktop and
laptop computers as well as their smartphones.
(a) Describe the role of wireless access points (WAPs) in the network. [2]
(b) Describe how wireless access points (WAPs) can be configured to improve network security.[6]
9. Ultra-high definition television is available from video streaming services over the internet.
(a) Describe the features of ultra-high definition television systems that improve the viewing
experience.[3]
(b) Analyse how the different types of transmission media used by internet service providers affect
the availability of ultra-high definition television to their customers.[8]
10. A company is concerned that their personnel files may be viewed and used by unauthorised people.
The company uses access rights (permissions) to protect their files when they are stored on their
network and encryption when the files are sent to other companies by email.
(a) Explain how the use of different access rights (permissions) applied to files can be used to control
access to files. [6]
(b) Describe the advantages of the different encryption methods for protecting files when sending
them over public telecommunications systems. [6]
11. Telecommunication companies are using fibre optic cables to supply internet services direct to
people’s homes because fibre optic cables are cheaper than copper cables.
(a) Explain the reasons, other than cost, why companies prefer to use fibre optic cabling.[4]
(b) Describe three disadvantages of using fibre optic cables [3]
12. Describe the security issues that may arise when computers are networked.[6]
13. Describe how peer-to-peer file sharing can be carried out using the BitTorrent protocol.[6]
14. Evaluate, by weighing up the advantages and disadvantages, the use of wireless communications in
the home.[8]
15. Fig. 1.1 shows three interconnected networks (numbered 1 to 3) that use internet protocol (IP) and
packet switching when transmitting files.
Network 1 has a server that is used for video streaming.
Network 2 has servers that provide a company with a website used for selling DVDs online.
Network 3 is a network in a home.
There are routers on the internet that can be used to connect the networks.
A user on the home network is watching a video that is being streamed from the server on network
1. At the same time a shopper on the home network is using a web browser to access the company
website on network 2 to buy some DVDs online.
(a) Describe how the video stream is transferred from the server on network 1 to the user on
network 3.[6]
(b) The viewing experience can sometimes be spoiled by the online shopping affecting the video
streaming.
Describe how router E on the home network can be configured to ensure that this does not
happen.[2]
(c) Explain why HTTPS is used for communication between the shopper’s web browser and the
company website.[6]
16. A software company uses the waterfall method to create its products.
During the creation and testing of the products, some developers are allowed to telework.
(i) Describe what is meant by teleworking.[2]
(ii) Describe two possible effects of teleworking on the developers.[2]
17. Airports provide public WiFi access to the internet for their customers. Discuss the advantages and
disadvantages of using public WiFi to access the internet.[8]
18. Describe how a device fitted to an aircraft can use a Global Positioning System (GPS) to determine its
location.[6]
19. An Information Technology (IT) Manager is considering storing company data in the cloud.
(a) Explain what is meant by storing data in the cloud.[2]
(b) Explain why the IT Manager could be worried about storing data in the cloud.[6]
20. Satellite communication systems can be used to provide internet access to users in areas of the
world where other methods of providing internet access are not possible. Describe how satellite
communication systems provide internet access to users.[8]
21. The introduction of 5G cellular communication systems will provide increased bandwidth for users.
(a) 5G cellular communication systems will enable video delivery to users to be more reliable.
Describe two other improvements that 5G will be able to provide.[2]
(b) Describe two drawbacks of the introduction of 5G cellular communication systems.[2]
22. Hubs and switches are networking devices. Compare and contrast how these devices carry out their
roles in a network.[6]
23. The directors of a company are trying to protect the company’s data. Explain the measures that
could be taken by the company to help protect the network from a data breach.[8]
24. John wants to know how a Global Positioning System (GPS) works. He currently thinks that a GPS
satellite calculates the position of a car and sends a signal telling the car what its position is.
John discovers that this is incorrect.
Explain how a GPS actually works.[5]
25. Describe the limitations of using wireless access points (WAPs) to connect portable computers to a
cabled network[6]
26. Evaluate, by weighing up the advantages and disadvantages, the use of encryption to protect
confidential data.[6]
27. Switches are devices used in computer networks. Describe the role and operation of a network
switch.[8]
28. Bluetooth and infrared can both be used to send data between devices. Contrast, by describing the
differences between, the use of Bluetooth and the use of infrared for transmitting data between
devices.[6]
29. (a) Describe bit streaming.[1]
(c) Describe the differences between real-time bit streaming and on demand bit streaming.[2]
30. An Information Technology (IT) Manager is considering storing company data in the cloud.
(a) Explain what is meant by storing data in the cloud[2]
(b) Explain why the IT Manager could be worried about storing data in the cloud.[6]
31. Satellite communication systems can be used to provide internet access to users in areas of the
world where other methods of providing internet access are not possible. Describe how satellite
communication systems provide internet access to users.
32. Microwave transmission is used to send data between devices at different locations.
(a) Explain how microwaves are used to transmit data between devices.[3]
(b) Describe four ways that microwave transmission is used in communication systems.[4]
33.