Trending ▼   ResFinder  

GCE JUN 2007 : ( A2 13) Networking and Communications

12 pages, 38 questions, 0 questions with responses, 0 total responses,    0    0
gce
  
+Fave Message
 Home > gce >

Instantly get Model Answers to questions on this ResPaper. Try now!
NEW ResPaper Exclusive!

Formatting page ...

Centre Number 71 Candidate Number ADVANCED General Certi cate of Education 2007 Applied Information and Communication Technology A6J71 Assessment Unit A2 13 assessing Unit 13: Networking and Communications [A6J71] TUESDAY 5 JUNE, MORNING TIME 1 hour 30 minutes. INSTRUCTIONS TO CANDIDATES Write your Centre Number and Candidate Number in the spaces provided at the top of this page. Answer all sixteen questions on the paper in the space provided. Quality of written communication will be assessed in all questions. For Examiner s use only Question Marks Marks available The total mark for this paper is 100. Figures in brackets printed down the right-hand side of pages indicate the marks awarded to each question or part question. ADVICE TO CANDIDATES You are advised to take account of the marks for each part question in allocating the available examination time. A6J71S7 2923 6 6 4 6 6 6 6 8 6 6 6 6 6 6 8 8 Total INFORMATION FOR CANDIDATES 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 100 Remark 1 In the box below tick (!) three features of a network card. Examiner Only Marks Is used to store binary Has a unique identi cation code assigned Can be connected to a mouse Allows connection to a network Is part of the central processing unit Is tted onto a slot on the motherboard of a computer [6] 2 When two devices are transferring data from one to another they engage in a process known as handshaking. Transmission of data can be either half duplex or full duplex . Explain, using properly labelled diagrams, what is meant by these two terms. Half duplex: Full duplex: Diagrams [6] A6J71S7 2923 2 Remark 3 Asynchronous data transmission takes place between a sender and receiver. Tick (!) two terms that best describe asynchronous data transmission. Examiner Only Marks Remark Timer Byte Start bit Binary digit Parity bit [4] 4 (a) Draw a suitably labelled sketch of a ring network topology. (b) Identify and describe two features of this ring topology. Feature 1: Feature 2: [6] A6J71S7 2923 3 [Turn over 5 Tick (!) three features below that would be associated with a network which uses a linear bus topology. Examiner Only Marks Terminators Beginners CSMA/CD Twisted wire pair cabling Coaxial cabling Token passing [6] 6 Tick (!) only those features that are false about the following networks. In a star network all nodes have equal status in the star. Within a bus network, each network interface card has an address allocated by the manufacturer. Bus topologies are suitable for Wide Area Networks. Peer to peer networks use tokens to pass data. In a ring topology all computers in the ring can transmit at once. Switches and hubs are found in star networks. A6J71S7 2923 [6] 4 Remark 7 Describe three features of the role being played by the bridge in the network shown below. Examiner Only Marks Remark Feature 1: Feature 2: Feature 3: [6] A6J71S7 2923 5 [Turn over 8 The security of a network can be threatened in a number of ways. Identify two threats to network security, giving a measure that network security personnel might take to counter each threat. Examiner Only Marks Threat 1: Counter measure to threat 1: Threat 2: Counter measure to threat 2: [8] A6J71S7 2923 6 Remark 9 Internet Protocol (IP) addressing can be described in three of the following sentences. Put a tick (!) beside each appropriate correct sentence. Examiner Only Marks Remark Static and supplied IP addressing is possible. An IP address consists of letters only. An ISP can assign an IP address. IP addressing is not used on a wireless network. An IP address may identify a computer on the Internet. An IP address is the same format as an e-mail address. [6] 10 A small company has a wireless LAN in place. The company took certain precautions to ensure that signal strength was satisfactory. Tick (!) three precautions below that helped ensure a good signal was achieved. Users have a download limit imposed. The wireless unit is placed centrally in the network area. All users to the network are allocated a user log on code. Microwave ovens at work should be serviced regularly. The antenna is placed high and clear of obstructions. Users are only allowed to use the network for short periods of time. A6J71S7 2923 7 [6] [Turn over 11 A small company is thinking of changing its ISDN connection over to a broadband connection. Identify two advantages of using broadband and one disadvantage of using an ISDN connection. Broadband advantage 1: Broadband advantage 2: ISDN disadvantage: [6] 12 Tick (!) three features in the table below that you would expect to nd associated with a proxy server. It is designed to speed up le requests to a Web Server. It holds all the application software a client computer might use. It sits between your computer and the Web Server whose pages you are accessing. It backs up the contents of the main server in the network. It holds an archive of the most popular recently accessed pages. It is a server used to handle e-mail requests. [6] A6J71S7 2923 8 Examiner Only Marks Remark 13 Identify and describe three features of a rewall. Examiner Only Marks Remark Firewall feature 1: Firewall feature 2: Firewall feature 3: [6] 14 Tick (!) three features that you would expect to nd associated with a domain name. You can allocate yourself a domain name to make things simple. A URL allows you to store your postcode on a computer. An example of a domain name is myschool.com Special companies allocate domain names for a small fee. An example of a URL is www.examof ce.com A URL is another way of choosing your e-mail address. [6] A6J71S7 2923 9 [Turn over 15 Wireless networking has reduced the need for cabling and has made it easier for employees to move easily within the company when working. However there are problems associated with this technology. Describe two main problems with this technology, giving an appropriate solution to each of the problems you have identi ed. Wireless problem 1: Solution to wireless problem 1: Wireless problem 2: Solution to wireless problem 2: [8] A6J71S7 2923 10 Examiner Only Marks Remark 16 Networked computers are often subject to attack or abuse by outsiders wanting to prevent people from using a network. Complete the following, listing two features in each case. (a) A Denial of Service (DoS) attack Feature 1: Feature 2: (b) A trojan horse Feature 1: Feature 2: (c) A worm Feature 1: Feature 2: (d) junk mail Feature 1: Feature 2: [8] THIS IS THE END OF THE QUESTION PAPER A6J71S7 2923 11 Examiner Only Marks Remark S 4/07 7-182-1 [Turn over

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 

Additional Info : Gce Applied ICT June 2007 Assessment Unit A2 13 - Networking and Communications
Tags : General Certificate of Education, A Level and AS Level, uk, council for the curriculum examinations and assessment, gce exam papers, gce a level and as level exam papers , gce past questions and answer, gce past question papers, ccea gce past papers, gce ccea past papers  

© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

gce chat