Trending ▼   ResFinder  

GCE JAN 2011 : ( A2 13) Networking and Communications

16 pages, 28 questions, 0 questions with responses, 0 total responses,    0    0
gce
  
+Fave Message
 Home > gce >

Formatting page ...

Centre Number 71 Candidate Number ADVANCED General Certificate of Education January 2011 Applied Information and Communication Technology A6J71 Assessment Unit A2 13 assessing Unit 13: Networking and Communications [A6J71] FRIDAY 21 JANUARY, MORNING TIME 1 hour 30 minutes. INSTRUCTIONS TO CANDIDATES Write your Centre Number and Candidate Number in the spaces provided at the top of this page. Answer all twelve questions on the paper in the spaces provided. For Examiner s use only Marks Question available 1 INFORMATION FOR CANDIDATES 2 3 The total mark for this paper is 100. 4 Figures in brackets printed down the right-hand side of pages indicate the marks awarded to each question or part question. 5 Quality of written communication will be assessed in questions 6 4, 5 and 12. 7 8 9 ADVICE TO CANDIDATES 10 You are advised to take account of the marks for each part 11 question in allocating the available examination time. 12 6 4 6 8 12 8 8 6 8 10 12 12 Total 100 6421 Marks Remark 1 Examiner Only Marks Remark Fig. 1 The diagram shown above in Fig. 1 shows a small network of five computers connected to a network cable. (a) Name the type of network topology shown in Fig. 1. _______________________________________________________ [1] (b) Name the type of cable that would allow the five computers to pass data along the cable from one computer to another computer in Fig. 1. _______________________________________________________ [1] (c) Describe how data would be sent from one computer to another computer in Fig. 1. _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _______________________________________________________ [4] 6421 2 [Turn over 2 List and describe two properties of a network card that make it suitable for connecting computers in a network. Examiner Only Marks Remark Property 1: ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ Property 2: ____________________________________________________________ ____________________________________________________________ __________________________________________________________ [4] 3 List and describe three features of networking computers in a star topology. Feature 1: ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ Feature 2: ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ Feature 3: ____________________________________________________________ ____________________________________________________________ __________________________________________________________ [6] 6421 3 [Turn over 4 Hubs and switches are common connection points for devices in a network. Examiner Only Marks Remark Compare and contrast the main differences between hubs and switches in networks. ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ __________________________________________________________ [8] 6421 4 [Turn over BLANK PAGE (Questions continue overleaf) 6421 5 [Turn over 5 Using suitably labelled sketches in each case, describe the main differences between client server networks and peer-to-peer networks. Examiner Only Marks Remark CLIENT SERVER NETWORK DIAGRAM PEER-TO-PEER NETWORK DIAGRAM 6421 6 [Turn over Examiner Only ____________________________________________________________ Marks Remark ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ _________________________________________________________ [12] 6421 7 [Turn over 6 Employees in a building company regularly send documents and drawings to other employees in the company and to other building companies using e-mail attachments. They also receive e-mail attachments from outside the company. Examiner Only Marks Remark (a) List and describe two different problems that may arise within the company if adequate security measures are not in place. (b) Describe a solution for each problem identified. Problem 1: _________________________________________________________ _________________________________________________________ _________________________________________________________ Problem 2: _________________________________________________________ _________________________________________________________ _________________________________________________________ Solution 1: _________________________________________________________ _________________________________________________________ _________________________________________________________ Solution 2: _________________________________________________________ _________________________________________________________ _______________________________________________________ [8] 6421 8 [Turn over 7 Each of the following statements is either TRUE or FALSE. Place the word TRUE or FALSE correctly into the space opposite each statement. Examiner Only Marks Remark A proxy server may hold copies of previously requested web pages. A firewall is software used to provide greater network security. Routers can divide single networks into logically separate networks. A media access control address (MAC) is a unique identifier attached to network equipment. An IP address can be either static or roaming. A subnet mask is used to identify the name of a user who has logged onto the Internet. A worm is similar to a virus and needs a host, such as an e-mail attachment, to enable it to travel from place to place. An example of a valid URL is www.exam.org [8] 6421 9 [Turn over 8 Wireless networking technology is very popular with people who access the Internet at home. List and describe three advantages of using wireless networking at home. Examiner Only Marks Remark Advantage 1: ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ Advantage 2: ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ Advantage 3: ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ __________________________________________________________ [6] 6421 10 [Turn over 9 Computer networks have issues with regard to security. Examiner Only Marks Remark Discuss two main problems caused to networks by: (a) worms (b) denial of service attacks (DoS). (a) Problem 1 _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ Problem 2 _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ (b) Problem 1 _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ Problem 2 _________________________________________________________ _________________________________________________________ _________________________________________________________ _______________________________________________________ [8] 6421 11 [Turn over 10 In the following table there are statements that should appear in a company s acceptable use policy (AUP) and statements that should not appear, governing network and Internet use within the organisation. Each of the following statements is either TRUE or FALSE. Place the word TRUE or FALSE correctly into the space opposite each statement. Examiner Only Marks Remark A statement about restrictions on how to use the Internet for personal purposes. A request that unsuitable material should not be accessed. Information about the Computer Misuse Act. Information about security measures within the organisation. A reminder that all material accessed on the Internet is available for employees to download. A statement that the normal rules of copyright do not apply to Internet usage in the company. A statement telling users how to write down or store their passwords. A statement of the legal implications of improper Internet use. A statement of Internet policy that an employee must accept before being allowed to use the Internet. The roles of the senior managers in the organisation with regard to employees work hours and duties. [10] 6421 12 [Turn over 11 When working on a private LAN, a measure of security can be provided by Network Address Translation (NAT). Examiner Only Marks Remark (a) Describe what NAT is and how it provides LAN with some measure of security. _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ (b) Describe two main differences between static and dynamic IP addressing. _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ (c) List and describe two main features of a firewall. _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ _________________________________________________________ ______________________________________________________ [12] 6421 13 [Turn over 12 A student in a school in Northern Ireland wants to view the home webpage of another school in Northern Ireland. Describe the process of transferring the home webpage required to the student s computer. Examiner Only Marks Remark ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ _________________________________________________________ [12] THIS IS THE END OF THE QUESTION PAPER 6421 14 [Turn over 111556 [Turn over

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 

Additional Info : Gce Applied ICT January 2011 Assessment Unit A2 13 - Networking and Communications
Tags : General Certificate of Education, A Level and AS Level, uk, council for the curriculum examinations and assessment, gce exam papers, gce a level and as level exam papers , gce past questions and answer, gce past question papers, ccea gce past papers, gce ccea past papers  


© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

gce chat