You are on page 1of 3

 

                                                                                                                          

Name: Std.: Date:

Subject: ICT Classroom Organisation: Individual

Topic: Networks and effects of using them


 
Q.I. Data is often transmitted using packets. Indicate by using a tick, which of the

following information forms part of the packets.


Item of information Present

Size of the packet (in MB)

Header to identify the data packet

Senders IP address

Identity of each node covering the whole

route

Identity number of each packet

Item of information Present


Size of the packet (in MB)
Header to identify the data packet 
Senders IP address 
Identity of each node covering the
whole route
Identity number of each packet 

Q.II. Shane owns a large shop with a number of computers. He would like each

computer to access the internet to enable new orders to be processed and answer

customer queries.

a. Identify three items of hardware Shane may need to buy to set up a computer

Cambridge21‐22                                                                                                                                          Page 1 of 3 
 
 
 

network.
 NIC (Network Interface Card
 Modem/Router
 Hub/Switch
 Network cables
 External phone line
c. It is necessary to back up the shop data, such as customer accounts. Describe a

strategy Shane could adopt to back up his data.


 Copy data onto a removable storage medium
 Save at regular intervals
 Store medium away from the main computer in the shop
 Make incremental backups
 Make use of cloud storage

Q.III. Which terms are being described below:

a. Guidelines to protect individuals, which include ‘data must be accurate’ and ‘data

must be adequate, relevant and not excessive.


Ans. Data protection act
b. Software that can carry out ‘heuristic checking’ and make use of ‘quarantines’ to

identify and deal with potential computer malware.


Ans. Antivirus software
c. Additional security items found on ID cards and credit/debit cards that make forgery

more difficult; these appear to move or change colour when the card is rotated.
Ans. Holographic image
d. Verification that data comes from a secure and trusted source; works with encryption

to strengthen internet security.


Ans. Authentication

Cambridge19‐20                                                                                                                                          Page 2 of 3 
 
 
 

Q.IV. Name three items of hardware and software needed to carry out video

conferencing.
Hardware
 Webcams
 Large monitors/TVs microphones
 Speakers
Software
 CODEC software
 echo cancellation software
 hardware drivers

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> 

Cambridge19‐20                                                                                                                                          Page 3 of 3 
 

You might also like