0% found this document useful (0 votes)
21 views5 pages

ICT Test 6

The document is a test for IGCSE Information and Communication Technology covering various topics such as networking, encryption, IP addressing, and network operating systems. It includes true/false questions, multiple-choice questions, and open-ended questions requiring explanations and discussions. The test assesses knowledge on client-server networks, MAC addresses, and the benefits of LANs.

Uploaded by

Kyaw Myint Naing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views5 pages

ICT Test 6

The document is a test for IGCSE Information and Communication Technology covering various topics such as networking, encryption, IP addressing, and network operating systems. It includes true/false questions, multiple-choice questions, and open-ended questions requiring explanations and discussions. The test assesses knowledge on client-server networks, MAC addresses, and the benefits of LANs.

Uploaded by

Kyaw Myint Naing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Nay Chi Education Center

IGCSE Information and Communication


Technology
Name
TEST 6
Time Allowed: 1 hour
Answer all questions.

1. (a) The following statement are TRUE or FALSE. [6]

(i) A networked computer that automatically assigns an IP address to other computers when
they join the network. DHCP Server TRUE

FALSE
(ii) This type of cables can now carry data at 40 Gbit/s over many kilometres without
affecting signal quality. Cat 6 Ethernet Cable
TRUE

FALSE
(iii) The servers provide clients with access to applications that can be run directly from the
server. File Server TRUE

FALSE
(iv) The encryption uses the same key at both ends of the process, meaning that the same key
is used to encrypt and decrypt the data. Public key encryption TRUE

FALSE
(v) A security protocol is designed to provide better encryption than WEP. It generates a new
key for each device on the wireless network. New keys are also provided for each packet of
data that is sent. Wi-Fi Protected Access (WPA) TRUE

FALSE
(vi) The use of a user's location to block access to services online; for example, a television
channel might only allow users in their own country to watch their shows online. geolocation
rights management
TRUE

FALSE

1.(b) Computers in a network can be connected using one of two different models. Express
these TWO models and explain One. [4]

…………………………………………………………………………………………………

…………………………………………………………………………………………………

…………………………………………………………………………………………………
…………………………………………………………………………………………………..

2. Choose and tick the correct answer for the following. [7]

(i) A is used to amplify the signal in a network so that its range can be extended. Boosters can
be used for both wired and wireless connections.
bridge A booster hub port
(ii) A network device stores the addresses of all devices that are connected to it so that it can
forward network traffic to its destination using the quickest route.
A Switch A Router A Gateway A ISP
(iii) To secure the wireless transfer of data, data encryption method is used which is every
device on the wireless network uses the same key for every transfer.
A WPA A WEP A symmetric key encryption A public key encryption
(iv) Public key encryption uses two mathematically related keys called a key pair. One key is
used to encrypt the data and a different key is used to decrypt it.
A WPA A WEP A symmetric key encryption A public key encryption
(v) This encryption method shifts each letter to the left by a set number of places. The
number of places by which the letters have been shifted is known as the key.
A WPA A WEP A Caesar cipher A Creaser Chipper
(vi) A set of standards that control how computer documents that are written in HTML
connect to each other.
A HTTP A TCP/IP A FTP A DHCP
(vii) A networked computer that automatically assigns an IP address to other computers when
they join the network.
A Client A DHCP Server A WEB Server A IPV6
2.(b) Discuss why the number of connected devices is growing at a faster rate than the
number of internet users. [3]
……………………………………………………………………………………………..

……………………………………………………………………………………………..

……………………………………………………………………………………………..

……………………………………………………………………………………………..
3.(a) Match the following terms with related statements explanatory notes. (Write only
alphabet) [6]
(a) eavesdropper (b) web browser (c) file permissions. (d) packet

(e) malware (f) accidental deletion

A type of software application used to request and display information stored on


b
web servers.

A unit of data packaged to travel across a network d


An unauthorised person or piece of software that intercepts data from a private
communication
a
They can be set for individual files, folders or drives, and they ensure that users
are either allowed to read only or allowed to read and write to the file, folder or
c
drive.

A software that is created with the intention to do harm


e
Users can sometimes delete files or even the entire contents of a drive by mistake.
f
3. (b) A network operating system allows a computer to communicate on a network.
It provides additional functionality to a stand-alone operating system. State Two additional
functions for that. [4]
……………………………………………………………………………………………..

……………………………………………………………………………………………..

……………………………………………………………………………………………..

……………………………………………………………………………………………..

……………………………………………………………………………………………..

……………………………………………………………………………………………..

……………………………………………………………………………………………..

4.(a) IP addresses are made up groups of numbers. There are two main versions of IP in use.
Explain these versions with example. [4]
………………………………………………………………………………………………

……………………………………………………………………………………………….

……………………………………………………………………………………………….

……………………………………………………………………………………………….

……………………………………………………………………………………………….

(b) Media access control (MAC) addresses are universally unique identifiers given to the
network interface card (NIC). Explain the structure of MAC address. [3]
………………………………………………………………………………………………

……………………………………………………………………………………………….

……………………………………………………………………………………………….

………………………………………………………………………………………………..
(c) Connecting computers using a LAN provides a range of benefits. State THREE benefits
of them.
[3]
………………………………………………………………………………………………

……………………………………………………………………………………………….

……………………………………………………………………………………………….

5. There are several benefits of using client-server networks that are not available when using
a peer-to-peer network. Express these benefits and explain FOUR of these benefits with your
own words. [10]
Marking Scheme

1(b) peer-to-peer, client-server.


Computers in a peerto-peer network share their resources with other computers in the
network, but they do not access servers.
Some networks use servers (see page 86). A network that uses servers and clients is called a
client-server network.

3(b) passing usernames and passwords to a server for checking when a user logs in (2)
• separating user accounts and ensuring that users cannot access each other's files (2)
• providing access to network storage and shared resources such as networked printers.(2) not
more than (4)
4(a) • 1Pv4 uses four groups of up to three numbers separated by full stops (for example,
192.168.1.1 ).
• 1Pv6 uses eight groups of four hexadecimal numbers separated by colons (for
example, 2001 :Odb8:0000:0042:0000:8a2e:0370:7334).
(b) A MAC address is usually made up of six pairs of hexadecimal characters. The first three
pairs identify the manufacturer and the remaining pairs are assigned by the manufacturer to
uniquely identify the device. Figure 5.6 is an example of a MAC address.
(c) -access to shared peripherals • access to shared storage and data • flexible access (that is,
being able to access peripherals, storage and data from any connected device) • media
streaming (including movies, music and gaming) • communication (that is, being able to send
messages and files to others on the network) • shared access to the internet.
(5) Control of user access rights: Users, or groups of users, can be given access to some
resources (such as storage or printers) and restricted from accessing others.
• Centralised administration: Resources and user accounts can be managed by an individual,
or individual group of servers and administrators. This ensures that support can be provided
by people who have an overview of the network and avoids inexperienced users creating
problems for themselves or others.
• Centralised backup: User data is protected from loss because backups can be automated for
all users. This makes it more likely that backups will happen than if individual users were
sked to complete backups themselves.
• Shared software: Application servers (see page 86) can provide access to shared software.
Some servers can provide access to operating systems.
• Shared storage and file access: The amount of storage available to users can be managed
centrally. Sharing storage means that users can make files available to others. File
permissions can be set for individual files, folders or drives, allowing users to either read only
or read and write to different files.

• Roaming profiles: This is the ability to log into any computer in an office and see your
settings and files. This allows users to access data, applications, mail and printers from any
client, enabling them to work from anywhere where there is a client.

You might also like