Trending ▼   ResFinder  

GCE MAY 2008 : ( A2 13) Networking and Communications

12 pages, 45 questions, 0 questions with responses, 0 total responses,    0    0
gce
  
+Fave Message
 Home > gce >

Formatting page ...

Centre Number 71 Candidate Number ADVANCED General Certificate of Education 2008 Applied Information and Communication Technology A6J71 Assessment Unit A2 13 assessing Unit 13: Networking and Communications [A6J71] TUESDAY 20 MAY, AFTERNOON For Examiner s use only TIME 1 hour 30 minutes. Marks Question available Write your Centre Number and Candidate Number in the spaces provided at the top of this page. Answer all eighteen questions on the paper in the spaces provided. Quality of written communication will be assessed in all questions. INFORMATION FOR CANDIDATES The total mark for this paper is 100. Figures in brackets printed down the right-hand side of pages indicate the marks awarded to each question or part question. ADVICE TO CANDIDATES You are advised to take account of the marks for each part question in allocating the available examination time. A6J71S8 3830 8 4 4 6 4 6 8 4 4 4 8 4 8 6 4 8 4 6 Total INSTRUCTIONS TO CANDIDATES 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 100 Marks Remark 1 The use of computer networks provides advantages and disadvantages for users. List and describe three advantages and one disadvantage of using computer networks. Examiner Only Marks Remark Advantage 1: _________________________________________________ _____________________________________________________________ Advantage 2: _________________________________________________ _____________________________________________________________ Advantage 3: _________________________________________________ _____________________________________________________________ Disadvantage: _________________________________________________ __________________________________________________________ [8] 2 A network card has four features described in the table below. Mark with a ( ) each correct feature. It can be inserted into an internal bus connector. It needs to be installed in a network printer. It controls the flow of data through the cable. It can be used as a file server. It is needed in a peer to peer network. It receives electrical signals and converts them into data. A6J71S8 3830 2 [4] [Turn over 3 In the box below tick ( ) four items that should be present to enable a small local area network to function. Examiner Only Marks Remark Cat 5e cable Spreadsheet software Bridge Two computers USB port Switch Network cards 4 [4] Consider the following paragraph which describes the working of an external port in a computer. Insert the correct words into the paragraph from the list below. (Each word can be used only once.) The PC s ____________________ port is generally used to support ____________________ communications from the PC to the ____________________. In this type of communication system there is the transmitter and the ____________________. The transmitting device places its data on the ____________________ lines and informs the receiving device that data is available. Modern PCs are often fitted with ____________________ ports instead of these ports. printer data unidirectional receiver parallel USB [6] A6J71S8 3830 3 [Turn over 5 In the box below tick ( ) only four terms that may be used in the description of serial data transmission. Examiner Only Marks Remark Parity checking Token passing Full Duplex Baton passing Half Duplex POTS Start bit 6 [4] In the box below tick ( ) only six features of a repeater. It extends the network diameter. All computers can see all data. Data is received and retransmitted. It is needed to connect to the Internet. There is no limit to the number that may be used in a network. They use broadband signalling. It acts as a firewall. They connect multiple Ethernet segments. It overcomes attenuation. It re-clocks or retimes the original signal. A6J71S8 3830 [6] 4 [Turn over 7 Give two advantages and two disadvantages of the RING network topology. Examiner Only Marks Remark Advantage 1: _________________________________________________ _____________________________________________________________ Advantage 2: _________________________________________________ _____________________________________________________________ Disadvantage 1: ______________________________________________ _____________________________________________________________ Disadvantage 2: ______________________________________________ __________________________________________________________ [8] 8 List and describe four features that would be associated with the Ethernet protocol. Feature 1. 2. 3. 4. [4] A6J71S8 3830 5 [Turn over 9 Dynamic Host Control Protocol (DHCP) can be described in only four of the following phrases. Put a tick ( ) beside each appropriate phrase. Examiner Only Marks Remark It is used to allocate access rights. It controls the print server in a network. It is a protocol for assigning or supplying IP addresses. It simplifies network administration. All PCs added to the network are allocated IP addresses by this protocol. It is a protocol used to control server back up procedures. It is used to check e-mail addresses. The MAC Address of all computers is registered on the DHCP server. [4] 10 A small company has a LAN in place. A new trainee is employed. What must the network manager do to instruct her on the use of the network? Place the following statements in the correct order using the numbers 2, 3, 4, 5. Demonstrate back up procedures. 6 Set employee access rights and permissions. Set up employee log on code and password. Demonstrate log on/log off procedures. Demonstrate file, save and print. Explain the company Acceptable User Policy (AUP). A6J71S8 3830 6 1 [4] [Turn over 11 A company is considering changing its Internet connection to either ISDN or Broadband. Identify four features of ISDN and four features of Broadband in the tables below. Examiner Only Marks Remark ISDN features 1. 2. 3. 4. Broadband features 1. 2. 3. 4. [8] 12 Tick ( ) four features in the table below that are associated with a firewall. It can check IP addresses. It can prevent access to websites containing inappropriate content. It holds all the addresses of computers on the world wide web. It can help a hacker break into a secure server. It sets up users access rights and permissions. It is a security feature (software) that prevents an internal network being entered by unauthorised user(s). It can look up network card serial numbers. It can monitor data entering and leaving the network. A6J71S8 3830 7 [4] [Turn over 13 Wireless networking technology has reduced the need for cabling in the workplace. Describe two advantages and two disadvantages of wireless networking. Examiner Only Marks Remark Advantage 1: _________________________________________________ _____________________________________________________________ _____________________________________________________________ Advantage 2: _________________________________________________ _____________________________________________________________ _____________________________________________________________ Disadvantage 1: ______________________________________________ _____________________________________________________________ _____________________________________________________________ Disadvantage 2: ______________________________________________ _____________________________________________________________ __________________________________________________________ [8] 14 e-mail is a very important business tool in use today. Identify three advantages and three disadvantages of using e-mail. e-mail advantages 1. 2. 3. e-mail disadvantages 1. 2. 3. A6J71S8 3830 [6] 8 [Turn over 15 Tick ( ) four features below that you would expect to find associated with a proxy server. Examiner Only Marks Remark It is a computer that holds all the software that users may need on the network. It is a computer that eases the load on Web and FTP servers. It is a computer that tries to prevent hacking . It is a computer that sits between your computer and the Web server whose pages you are accessing. It requests updated or new web requests that are not already held in store. It is a computer that holds a cache of the most popular recently accessed web pages. It is a very powerful computer. It allocates permissions to users on the network. A6J71S8 3830 9 [4] [Turn over 16 The following paragraph is about client server networks. Examiner Only Marks Remark Insert the correct words into the following sentences from the list of words that follow below. (Each word can be used only once.) client processing servers processors redundancy individual workstation application A client is an _____________ user s computer or a user _____________ that does a certain amount of _____________ on its own. It also sends and receives requests to and from one or more _____________ for other processing and/or data. A server consists of one or more computers that receive and process requests from one or more _____________ machines. A server is typically designed with some _____________ in power, computing and file storage. However, a machine with dual _____________ is not necessarily a server. Applications stored on the server can be accessed by an individual _____________. A6J71S8 3830 [8] 10 [Turn over 17 In a networked environment a network backup policy is extremely important. Describe what is meant by the terms incremental backup and selective backup, giving one advantage of each. Examiner Only Marks Remark Incremental backup: ___________________________________________ _____________________________________________________________ Advantage: __________________________________________________ _____________________________________________________________ Selective backup: _____________________________________________ _____________________________________________________________ Advantage: __________________________________________________ __________________________________________________________ [4] 18 Describe three advantages and three disadvantages of video conferencing . Advantages of video conferencing 1. 2. 3. Disadvantages of video conferencing 1. 2. 3. [6] THIS IS THE END OF THE QUESTION PAPER A6J71S8 3830 11 [Turn over S 9/07 530-047-1 9

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 

Additional Info : Gce Applied ICT May 2008 Assessment Unit A2 13 - Networking and Communications
Tags : General Certificate of Education, A Level and AS Level, uk, council for the curriculum examinations and assessment, gce exam papers, gce a level and as level exam papers , gce past questions and answer, gce past question papers, ccea gce past papers, gce ccea past papers  


© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

gce chat