Professional Documents
Culture Documents
STUDENTS NAME:
SCHOOL NAME:
shahzadah.ashraf 03332076121
@gmail.com
A Levels With
Sir Bande'Shah
Page 1 of 79
Cambridge International AS & A Level Computer Science 9618 syllabus for 2021, 2022 and 2023. Subject content
2 Communication
Page 2 of 79
Page 3 of 79
Chapter 1.2 (Communication)
The computer could be a stand-alone system or some organizations chose to have more than one
computer connected using a local area network (LAN). It was called a local area network because it
typically connected PCs that were in one room or in one building or on one site.
Wide area network (WAN): a network connecting computers on different sites, possibly thousands
of kilometres apart
Local area network (LAN): a network connecting computers in a single room, in a single building or
on a single site
• A file server could be attached to the LAN that allowed users to store larger files and
also allowed files to be shared between users.
• The ‘paper-less office’ became a possibility, where files were to be stored in digital
form on a file server rather than as paper copies in a filing cabinet.
Page 4 of 79
Thick and Thin Client
• possibly carries out some processing before running the application on the server
and also after receiving output from the application
• Alternatively, possibly downloads the application from the server and runs the
application itself.
Thin-client: a client that only provides input and receives output from the application
Network topologies
The shape of a network, and relationship between the nodes in that network is known as the network
topology. The network topology determines what kind of functions the network can perform, and
what the quality of communication will be between nodes.
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology. Bus topology uses one
main cable to which all nodes are directly connected. The main cable acts as a backbone for the
network. One of the computers in the network typically acts as the computer server.
Page 5 of 79
Advantages of Bus Topology
1. It is cost effective.
4. It is easy to understand.
2. If network traffic is heavy or nodes are more the performance of the network decreases.
Star Topology
In star topology, each computer is connected to a central hub using a point-to-point connection. The
central hub can be a computer server that manages the network, or it can be a much simpler device
that only makes the connections between computers over the network possible.
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
Page 6 of 79
Disadvantages of Star Topology
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
Mesh Topology
An example of a fully-connected mesh topology is shown in Figure. In this configuration, each end-
system has a point-to-point connection to each of the other end- systems. Transmission is duplex;
messages might be unicast, multicast or broadcast.
Hybrid Network
In a situation where several LANs are connected, they can have different topologies or supporting
technologies. This collection of LANs then becomes a hybrid network. A special connecting device is
needed to ensure that the hybrid network is fully functional. It is often an advantage to be able to
connect a new topology LAN to existing LANs where it is not sensible or not possible to use the existing
topology for the new LAN. An example is when a wired LAN is already installed but a new wireless LAN
is to be connected to it.
Page 7 of 79
Cloud computing
Cloud computing is the provision of computing services usually via the Internet.
Private Cloud
An organization may choose to establish its own private cloud. In this case there are three possible
approaches:
• The organization takes full responsibility for creating and managing the cloud installed on-site and
connected to a private network
• The organization outsources to a third-party the creation and management of an on-site installation
connected to a private network
• The organization outsources the creation and management of an Internet accessible system by a
third-party.
Public Cloud
The alternative is a public cloud. This is created, managed and owned by a third-party cloud service
provider.
The services provided by a cloud are familiar ones provided by file servers and application servers.
They are accessible via a browser and therefore accessible from any suitable device in any location. A
public cloud can be accessed by an individual user or by an organization. One major difference is the
scale of the systems. The provision is established using large mainframe computers or server farms.
The services provided can be characterized as being one of:
• infrastructure provision
• platform provision
• software provision
Many of the advantages to a cloud user arise from the fact that the cloud does not have the limitations
that the systems already available have. For the infrastructure provision, the advantages include the
better performance when running software and the increased storage capacity. For the platform
provision, the cloud can offer facilities for software development and testing. For the software
provision, the cloud will be able to run applications that require high performance systems.
Alternatively, it could be that the costs to a company of buying and installing a software package
themselves would be far too high. The other advantage is the familiar one with regard to outsourcing.
The cloud user no longer needs technical expertise.
The disadvantages to a cloud user relate to the use of a public cloud. The cloud service provider has
complete access to all of the data stored on the cloud. The cloud user cannot be sure that their data
is not being shared with third-parties. This is a concern with regard to data privacy. The security of the
data stored is an issue; the cloud service provider is being relied on to ensure data cannot be lost.
Page 8 of 79
Subnet
A subnet, or subnetwork, is a network inside a network. Subnets make networks more efficient.
Through subnetting, network traffic can travel a shorter distance without passing through unnecessary
routers to reach its destination.
Imagine Alice puts a letter in the mail that is addressed to Bob, who lives in the town right next to
hers. For the letter to reach Bob as quickly as possible, it should be delivered right from Alice's post
office to the post office in Bob's town, and then to Bob. If the letter is first sent to a post office
hundreds of miles away, Alice's letter could take a lot longer to reach Bob.
Like the postal service, networks are more efficient when messages travel as directly as possible. When
a network receives data packets from another network, it will sort and route those packets by subnet
so that the packets do not take an inefficient route to their destination.
IP address
In order to understand subnets, we must quickly define IP addresses. Every device that connects to
the Internet is assigned a unique IP (Internet Protocol) address, enabling data sent over the Internet
to reach the right device out of the billions of devices connected to the Internet. While computers
read IP addresses as binary code (a series of 1s and 0s), IP addresses are usually written as a series of
alphanumeric characters.
Every IP address has two parts. The first part indicates which network the address belongs to. The
second part specifies the device within that network. However, the length of the "first part" changes
depending on the network's class.
Networks are categorized into different classes, labeled A through E. Class A networks can connect
millions of devices. Class B networks and Class C networks are progressively smaller in size. (Class D
and Class E networks are not commonly used.)
Page 9 of 79
Let's break down how these classes affect IP address construction:
Class A network: Everything before the first period indicates the network, and everything after it
specifies the device within that network. Using 203.0.113.112 as an example, the network is indicated
by "203" and the device by "0.113.112."
Class B network: Everything before the second period indicates the network. Again using
203.0.113.112 as an example, "203.0" indicates the network and "113.112" indicates the device within
that network.
Class C network: For Class C networks, everything before the third period indicates the network. Using
the same example, "203.0.113" indicates the Class C network, and "112" indicates the device.
As the previous example illustrates, the way IP addresses are constructed makes it relatively simple
for Internet routers to find the right network to route data into. However, in a Class A network (for
instance), there could be millions of connected devices, and it could take some time for the data to
find the right device. This is why subnetting comes in handy: subnetting narrows down the IP address
to usage within a range of devices.
Because an IP address is limited to indicating the network and the device address, IP addresses cannot
be used to indicate which subnet an IP packet should go to. Routers within a network use something
called a subnet mask to sort data into subnetworks.
A subnet mask is like an IP address, but for only internal usage within a network. Routers use subnet
masks to route data packets to the right place. Subnet masks are not indicated within data packets
traversing the Internet — those packets only indicate the destination IP address, which a router will
match with a subnet.
Suppose an IP packet is addressed to the IP address 192.0.2.15. This IP address is a Class C network,
so the network is identified by "192.0.2" (or to be technically precise, 192.0.2.0/24). Network routers
forward the packet to a host on the network indicated by "192.0.2."
Once the packet arrives at that network, a router within the network consults its routing table. It does
some binary mathematics using its subnet mask of 255.255.255.0, sees the device address "15" (the
rest of the IP address indicates the network), and calculates which subnet the packet should go to. It
forwards the packet to the router or switch responsible for delivering packets within that subnet, and
the packet arrives at IP address 192.0.2.15 (learn more about routers and switches).
NIC
Stands for "Network Interface Card" and is pronounced "nick." A NIC is a component that provides
networking capabilities for a computer. It may enable a wired connection (such as Ethernet) or a
wireless connection (such as Wi-Fi) to a local area network.
WNIC
Instead of an Ethernet port, wireless NICs are designed for Wi-Fi connections and often have an
antenna to provide better wireless reception for the computer. Older wireless cards have PCI
connections while most modern wireless NICs connect to a PCI Express slot.
Page 10 of 79
Bridge
A network bridge is a device that divides a network into segments. Each segment represent a separate
collision domain, so the number of collisions on the network is reduced. Each collision domain has its
own separate bandwidth, so a bridge also improves the network performance.
Page 11 of 79
The Internet
The Internet - a global system of interconnected computer networks that use the
standard Internet Protocol suite (TCP/IP)
World Wide Web - a system of interlinked hypertext documents accessed via the
Internet.
The first thing to notice is that the World Wide Web is not the internet, but a subset of
what the internet offers. The internet hosts all forms of data, including games, video,
telecommunications etc. while the WWW only transmits hypertext documents. The
WWW is accessed through a web browser linking files together using hyperlinks
Intranet
Intranet - a private network within an organization which may offer printer sharing, file
sharing, communication, private websites etc. Which uses internet technologies such as
TCP/IP and web browsers.
Networking Devices
Hub
Network Hub is a networking device which is used to connect multiple network hosts. The
data is transferred in terms of packets on a computer network. So when a host sends a
data packet to a network hub, the hub copies (broadcast) the data packet to all of its
ports connected to. Like this, all the ports know about the data and the port for whom
the packet is intended, claims the packet.
However, because of its working mechanism, a hub is not so secure and safe. Moreover,
copying the data packets on all the interfaces or ports makes it slower and more
congested which led to the use of network switch.
Page 12 of 79
Switch
Switch is also used to connect multiple network hosts but it’s more intelligent than a hub.
While hub just does the work of data forwarding, a switch does ‘filter and forwarding’
which is a more intelligent way of dealing with the data packets.
So, when a packet is received at one of the interfaces of the switch, it filters the packet
and sends only to the interface of the intended receiver.
Modem
Modem is a kind of Network Device which let you get an internet connection through a
wire (Telephone Copper wires) to your house. This wire is used to carry our internet data
outside to the internet world.
However, our computer generates binary data or digital data in forms of 1s and 0s and on
the other hand, a wire carries an analog signal and that’s where a modem comes in.
A modem stands for (Modulator + Demodulator). That means it modulates and
demodulates the signal between the digital data of a computer and the analog signal of a
telephone line.
Network Router
A router is a network device which is responsible for routing traffic from one to another
network. These two networks could be a private company network to a public network.
You can think of a router as a traffic police who directs different network traffic to
different directions.
Repeater
A repeater is an electronic device that amplifies the signal it receives. In other terms, you
can think of repeater as a device which receives a signal and retransmits it at a higher
level or higher power so that the signal can cover longer distances.
For example, inside a college campus, the hostels might be far away from the main
college where the ISP line comes in. If the college authority wants to pull a wire in
between the hostels and main campus, they will have to use repeaters if the distance is
much because different types of cables have limitations in terms of the distances they can
carry the data for.
Gateway
A gateway, as the name suggests, is a passage to connect two networks together that
may work upon different networking models. They basically work as the messenger
agents that take data from one system, interpret it, and transfer it to another system.
Gateways are also called protocol converters and can operate at any network layer.
Gateways are generally more complex than switch or router.
Page 13 of 79
Client Server Model
Client computers were then attached to these centralized computers (servers) and if you
wanted to calculate something, you would have to wait for the central computer to
respond.
As computing power got cheaper client nodes became more powerful and the central
computer less important. However, with the growth of the internet, there has been a
shift back to a client server model. Powerful central computers store information such as
emails, documents, music and videos or offer services such as file hosting, printing, game
hosting and internet access; client computers fetch information and use services from
these central servers. In the next few years you are likely to see more and more software
moving away from running on your desktop to running on remote servers and you
accessing it as a client, this is called software as a service.
Cloud Computing
The current client-server model is starting to change, with companies being less likely to
offer services with a centralized server. Increasingly internet firms are reaching a global
clientèle, it makes little sense to have a server or servers based in one location as if your
servers are in America and some of your users in Armenia, and these users will
experience slow access to your services. Another problem is if a power cut affects your
server or the connection to that one server or set of servers goes down then the service
you are offering the internet will also stop.
With cloud computing the services may be distributed all over the globe, meaning that
wherever you are, you'll have a server reasonably close to you offering access to the data
and services you need. Page 14 of 79
Server
A computer program running to serve the requests of other programs, the "clients"
Servers are software programs that in most cases run off normal computing hardware.
Server software includes:
Printing
File sharing
Game hosting
Websites
Other web services
Client
An application or system that accesses a service made available by a server
Clients are software programs and processes that connect to servers, sending requests
and receiving responses. Client examples include:
Web browser page requests
Chat systems on mobile phones
Online games
DNS
It's like your computer's GPS for the Internet. Its basic job is to turn a user-friendly
domain name like "google.com" into an Internet Protocol (IP) address like 64.233.167.104
that computers use to identify each other on the network.
Computers and other network devices on the Internet use an IP address to route your
request to the site you're trying to reach. This is similar to dialing a phone number to
connect to the person you're trying to call. Thanks to DNS, though, you don't have to
keep your own address book of IP addresses. Instead, you just connect through a domain
name server, also called a DNS server or name server, which manages a massive database
that maps domain names to IP addresses.
In relation to the Internet, the PSTN actually furnishes much of the Internet's long-distance
infrastructure.
Because Internet service providers (ISPs) pay the long-distance providers for access to
their infrastructure and share the circuits among many users through Packet-switching,
Internet users avoid having to pay usage tolls to anyone other than their ISPs.
Page 15 of 79
What are the benefits and drawbacks of using copper cable, fiber-
optic cabling, radio waves, microwaves, satellites?
One of the key elements that determine bandwidth is the physical nature of the cable
being used. A signal becomes weaker and dies down eventually the longer it travels along
a cable. Therefore, the length of cable determines the bandwidth of the link. For
instance, the bandwidth of a broadband DSL connection to the home is determined by
the length of copper cable between the house and the nearest telephone exchange.
Copper Wires
Twisted pair cabling is a type of wiring in which two conductors (wires) are twisted
together for the purposes of cancelling out electromagnetic interference from external
sources or other twisted pairs. It was invented by Alexander Graham Bell. Twisted pair is
used to gain enough bandwidth higher than coax cable.
Unshielded twisted pair (UTP) cables are found in many local area networks and
telephone systems. A typical subset of these colors (white/blue, blue/white,
white/orange, orange/white) shows up in most UTP cables as shown above.
UTP cable is the most common cable used in computer networking and is often used in
LAN because of its relatively lower costs compared to optical fiber and coaxial cable. UTP is
also finding increasing use in video applications, primarily in security cameras.
Shielded twisted pair (STP) cables are often copper shielded in an attempt to prevent
electromagnetic interference and so allow bandwidth to be higher for any given length.
This shielding can be applied to individual pairs, to the collection of pairs or both.
Fiber optics is a technology that uses glass (or plastic) threads (fibers) to transmit data. A
fiber optic cable consists of a bundle of glass threads, each of which is capable of
transmitting messages modulated onto light waves.
Fiber optics has several advantages over traditional metal communications lines:
1. Fiber optic cables have a much greater bandwidth than metal cables. This means
that they can carry more data.
2. Fiber optic cables are less susceptible than metal cables to interference.
3. Fiber optic cables are much thinner and lighter than metal wires.
4. Data can be transmitted digitally (the natural form for computer data) rather than
analogically.
The main disadvantage of fiber optics is that the cables are expensive to install. In
addition, they are more fragile than wire and are difficult to splice.
Wireless Networks
Wireless network refers to any type of computer network that is not connected by cables
of any kind. It is a method by which homes, telecommunications networks and enterprise
(business) installations avoid the costly process of introducing cables into a building, or as
a connection between various equipment locations. Wireless telecommunications
networks are generally implemented and administered using a transmission system called
radio waves.
Page 17 of 79
Radio Waves
Radio waves are an electromagnetic radiation with differing wavelengths. These waves are
similar to an ocean wave. Radio waves are used for many processes. For example, they are
used to broadcast TV, in communication between satellites and it enables computers to
share information without wires.
Radio waves have a large wavelength so they experience less interference and can travel
over large distances. However, since they do not have a high frequency, they cannot
transmit as much data.
However, they can carry more signals than wires; they are often used for linking buildings
on a college campus or corporate site and increasingly for longer distances as telephone
companies update their networks.
Micro Wave
Microwave radio also carries computer network signals, generally as part of long-distance
telephone systems. Low-power microwaves becoming common for wireless networks
within a building.
Page 18 of 79
Microwaves are widely used for point-to-point communications because their small
wavelength allows conveniently-sized antennas to direct them in narrow beams, which
can be pointed directly at the receiving antenna. This allows nearby microwave equipment
to use the same frequencies without interfering with each other, as lower frequency radio
waves do. Another advantage is that the high frequency of microwaves gives the
microwave band a very large information-carrying capacity; the microwave band has a
bandwidth 30 times that of all the rest of the radio spectrum below it. The attenuation of
microwave is less than twisted pair or coaxial cable. A disadvantage is that microwaves are
limited to line of sight propagation; they cannot pass around hills or mountains as lower
frequency radio waves can. It is also affected by anything blocking the line of sight, such as
rainfall.
Satellites
A satellite is any object that revolves around a planet in a circular or elliptical path. The
moon is Earth's natural satellite at 240,000 miles distant. Other satellites that fulfill this
definition are man-made and have been launched into orbit to carry out specific functions.
These satellites are typically between 100 and 24,000 miles away. Satellites have many
purposes including data communications, scientific applications and weather analysis.
Satellite transmission requires an unobstructed line of sight. The line of site will be
between the orbiting satellite and a station on Earth. Satellite signals must travel in
straight lines but do not have the limitations of ground based wireless transmission, such
as the curvature of the Earth.
Microwave signals from a satellite can be transmitted to any place on Earth which means
that high quality communications can be made available to remote areas of the world
without requiring the massive investment in ground-based equipment.
Page 19 of 79
What Is A Bit Stream?
Millions of bits, travel over thousands of computer networks every day. The system works
much like the modern post office, which has to constantly send and receive letters from all
over the world. Like those letters, computer bits arrive in a continuous, ordered stream
known as the bit stream. The bits identify where they are coming from (often a computer)
and where they are traveling to (often another computer).
All the information sent to and from a computer turns into a series of 1's and 0's that
represent data. When the computer sends a message, the bits travel in a specific order
through a wire to their destination. Typically, the bit stream starts with information about
where it's going and how to process the information once it arrives. An email, for example,
contains information on the sender, the recipient, and the message itself. When the user
sends it, it's broken down into bits of data which travel over the bit stream to the
recipient's computer.
Video on demand (VOD) is a system that may allow users to select and watch/listen to
video or audio content when they choose to, rather than having to watch at a specific
broadcast time (Live streaming). Some TV VOD systems such as Netflix or Hulu allow users
to watch their favorite shows whenever they please.
Real time or Live streaming, as the name suggests, is streaming a video that is happening
at that exact moment. Examples may be a football match, a concert, or a lecture
happening at your university.
What Is Bitrate?
Bitrate is a term used to describe the amount of data that is being passed within a given
amount of time. Depending on the context, common measurements of bitrate include
Kbps and Mbps, respectively meaning kilobits per second and megabits per second. No
matter the units being used, a higher number is generally good, indicating high speed or
high quality.
When it comes to Internet speeds, a higher bitrate is always desirable –it simply sends you
the content that you want faster. With higher bitrates, you can do more with your Internet
connection stream high definition movies, play online games with minimal lag, and
—
download large files in just a few seconds. You can figure out what bitrates you’re getting
by visiting a website such as speedtest.net
When talking about streaming audio or video, bitrates refer to the amount of data stored
for each second of media that is played. For example, a 320 kbps MP3 audio file has a
higher quality than the same file at just 128 kbps. The same applies to videos a higher
–
bitrate will have a higher quality when comparing the same video with the same
resolution. Bitrates should be expected to go up whenever the resolution goes up, as more
data is being processed. Therefore, high bitrates for audio and video may provide excellent
quality, but it can also place a major strain on your hardware which can result in stutters
or frequent pauses in the media being streamed if your bitrate is not high enough or if
there is too much traffic on your line.
Page 20 of 79
1.2.2 IP addressing
IP Address - numerical label assigned to each device (e.g., computer, printer) participating
in a computer network that uses the Internet Protocol
Every device attached to a network has a number assigned to it. This unique number is
called the IP Address, and you might be familiar with the format of:
192.168.7.1
Currently the most common form of IP Address is IPv4 which uses 32 bits to store an
address. This means that there are theoretically different IP Addresses that can exist.
However, due to the allocation of IP ranges to different organizations and tasks, the
number is lower.
IPv6
As you might have noticed, there is a limit to the number of IPv4 addresses we can have,
this limit is well below the current population of the world. If we were in the future to
have every inhabitant of the planet connected to the internet, there wouldn't be enough
IP Addresses for them to use! This problem is very current and IPv6 is being introduced to
try and resolve it.
Page 21 of 79
Public IP Addresses
A public IP address is assigned to every computer that connects to the Internet, where
each IP is unique. In this case, there cannot exist two computers with the same public IP
address all over the Internet. This addressing scheme makes it possible for the computers
to “find each other” online and exchange information. Users have no control over the IP
address (public) that is assigned to the computer. The public IP address is assigned to the
computer by the Internet Service Provider as soon as the computer is connected to the
Internet gateway.
A public IP address can be either static or dynamic. A static public IP address does not
change and is used primarily for hosting web pages or services on the Internet. On the
other hand, a dynamic public IP address is chosen from a pool of available addresses and
changes each time one connects to the
Internet.
Most Internet users will only have a dynamic IP assigned to their computer which goes off
when the computer is disconnected from the Internet. Thus when it is re-connected it gets
a new IP.
You can check your public IP address by visiting www.whatismyip.com
Private IP Addresses
An IP address is considered private if the IP number falls within one of the IP address
ranges reserved for private networks such as a Local Area Network (LAN). The Internet
Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP
address space for private networks (local networks):
Private IP addresses are used for numbering the computers in a private network including
home, school and business LANs in airports and hotels which makes it possible for the
computers in the network to communicate with each other.
Say for example, if a network X consists of 10 computers, each of them can be given an IP
starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the
private network is free to assign an IP address of his own choice (provided the IP number
falls in the private IP address range as mentioned above).
Devices with private IP addresses cannot connect directly to the Internet. Likewise,
computers outside the local network cannot connect directly to a device with a private IP.
It is possible to interconnect two private networks with the help of a router.
If the private network is connected to the Internet (through an Internet connection via
ISP), then each computer will have a private IP as well as a public IP. Private IP is used for
communication within the network whereas the public IP is used for communication over
the Internet. Most Internet users with a DSL connection will have both a private as well as
a public IP.
Page 22 of 79
You can know your private IP by typing ipconfig command in the command prompt. The
number that you see against “IPV4 Address:” is your private IP which in most cases will
be192.168.1.1 or 192.168.1.2.
Unlike the public IP, private IP addresses are always static in nature.
URLs allow us to specify the domain name and exact location of a resource on the
internet. For example, the following links to a picture on wikicommons:
http://commons.wikimedia.org/wiki/File:George_Clausen_WWI_poster.jpg
The protocol
The hostname
The file location
Domain Name
Domain Name System server (DNS server) - translates domain names into IP addresses
To see a domain name in action you can use the ping command, where pinging Google,
uses the DNS server to find the IP address you want to send a ping packet to:
# ping www.google.com
$ dig www.google.com
-- Snip --
ANSWER SECTION:
www.google.com. 246 IN A 173.194.34.144
www.google.com. 246 IN A 173.194.34.148
www.google.com. 246 IN A 173.194.34.145
Internet Registrars - Allow organizations and individuals to buy their own domain names.
Internet registrars are responsible for allocating internet domains to anyone who wants
one. If someone wanted to own their own website with a domain name, they would have
to go to an internet registrar in order to buy the website name. These services typically
require payment in order to maintain control over the name of the website. If you do not
renew your website, then the internet registrars may sell it to other buyers.
Internet Registries - hold domain names which are registered. They allow owners to link
domain names to IP addresses. Well known domains usually have their own registry, such
as .co, .com, .sch
Internet Service Providers - companies which offer customers access to the internet
Page 24 of 79
CSMA/CD
Short for carrier sense multiple access/collision detection, CSMA/CD is a media access
control (MAC) method used most notably in early Ethernet technology for local area
networking. When Ethernet was designed in the 1970s, it was a shared medium. At any
moment, only one frame from one station was transmitting in one direction (half
duplex).
With CSMA/CD, if the network is busy when a station wants to transmit (carrier sense),
the station waits a random number of microseconds before trying again. However, if
two stations coincidentally transmit their frames at exactly the same time, their signals
will collide. Both stations detect the collision and back off a random duration before
retrying.
Today, collisions have been mostly eliminated, because shared Ethernet gave way to
full-duplex, point-to-point channels between sender and receiver. However, CSMA/CD
provides compatibility for older shared Ethernet hubs that may still be in place. Ethernet
is a data link protocol, and CSMA/CD is a MAC layer protocol.
Page 25 of 79
Page 26 of 79
5 (a) Telephone calls can be made by using:
• conventional telephones (using the Public Service Telephone Network (PSTN) system)
over a wired network
• a computer, equipped with speakers and microphone, connected to the Internet
Put a tick () in the correct column to match each description to the appropriate communication
method.
Conventional telephone
Description Internet-based system
using PSTN
connection only in use
whilst sound is being
transmitted
dedicated channel used
between two points for the
duration of the call
connection maintained
throughout the telephone
call
encoding schemes and
compression technology
used
lines remain active even
during a power outage
[5]
(b) Distinguish between the Internet and the World Wide Web (WWW).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
9608/12/M/J/15 Page 27 of 79
(c) Name the hardware device that is being described:
(i) A device that transfers data from one network to another in an intelligent way. It has the
task of forwarding data packets to their destination by the most efficient route.
.......................................................................................................................................[1]
(ii) A device used between two dissimilar LANs. The device is required to convert data
packets from one protocol to another.
.......................................................................................................................................[1]
(iii) A device or software that provides a specific function for computers using a network. The
most common examples handle printing, file storage and the delivery of web pages.
.......................................................................................................................................[1]
9608/12/M/J/15 Page 28 of 79
7 Access to World Wide Web content uses IP addressing.
...............................................................................................................................................[1]
Indicate for each IP address whether it is valid or invalid and give a reason.
Denary / Valid or
Address Reason
Hexadecimal Invalid
3.2A.6AA.BBBB Hexadecimal
2.0.255.1 Denary
6.0.257.6 Denary
A.78.F4.J8 Hexadecimal
[4]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
9608/12/M/J/16 Page 29 of 79
6 (a) Explain the difference between the World Wide Web (WWW) and the Internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Three methods of connecting devices include fibre-optic cables, copper cables and radio
waves. The table below gives descriptions relating to these connection methods.
Tick (✓) one box on each row to show the method that best fits each description.
(c) Bit streaming is used for both real-time and on-demand services.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(d) A device needs an IP address to connect to the Internet. IPv4 is the more common type of
IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
9608/13/M/J/16 Page 30 of 79
(e) A computer user keys in the Uniform Resource Locator (URL) of a web page into a web
browser.
Describe how the browser uses the Domain Name Service (DNS) to display the web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
9608/13/M/J/16 Page 31 of 79
6 Downloading a file from a website is an example of a client-server application.
(a) Describe what is meant by the term client-server for this application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) The following sequence of steps (1 to 5) describes what happens when someone uses their
personal computer (PC) to request a web page. The web page consists of HTML tags and
text content only. Four of the statements from A, B, C, D, E and F are used to complete the
sequence.
A Browser software interprets the script, renders the page and displays.
B Browser software renders the page and displays.
C Browser software compiles the script, renders the page and displays.
D The web server retrieves the page.
E The Domain Name Service (DNS) uses the domain name from the
browser to look up the IP address of the web server.
F The web server sends the web page content to the browser.
Write one of the letters A to F in the appropriate row to complete the sequence.
1. The user keys in the Uniform Resource Locator (URL) into the browser software.
2. ....................................
3. ....................................
4. ....................................
5. ....................................
[4]
9608/12/M/J/17 Page 32 of 79
2
Circle either Valid or Invalid to indicate whether each address is valid or invalid. Explain your
decision.
Explanation ...............................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
[3]
(b) A website can be accessed using either the Uniform Resource Locator (URL) or the IP
address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Complete the following statements by filling in the names of the missing methods of bit
streaming.
................................................. bit streaming is used when watching an event that has taken
place in the past. Existing media are encoded to bit streaming format and uploaded to a
server. It can be paused and rewound.
[2]
© UCLES 2019 9608/11/M/J/19 Page 33 of 79
3
(d) A recording of a concert is stored as a file. The file is compressed using lossy compression
before it is streamed to users.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
C100:2235::1000:25AA:AA50
Explain why this IPv6 address would be an invalid IPv4 address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) A company has computers in two separate buildings that communicate using the Internet
over a Public Switched Telephone Network (PSTN).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The company wants to install a dedicated line between the two buildings.
Identify one benefit and one drawback of installing a dedicated line between the two
buildings.
Benefit ...............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2019 9608/12/M/J/19 Page 35 of 79
3
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]
(a) Describe the tasks performed by the operating system to manage the main memory in the
games console.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) The computer games are written in a high-level language. Bart does not need a compiler or
an interpreter to run the games he buys for his console.
Explain why the games run without the need for a compiler or an interpreter.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
(c) When Bart is at work, he connects his work laptop to his employer’s Local Area Network
(LAN). The LAN has both a router and a gateway.
Give two similarities and one difference between a router and a gateway.
Similarity 1 ................................................................................................................................
...................................................................................................................................................
Similarity 2 ................................................................................................................................
...................................................................................................................................................
Difference .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
7 A company allows customers to stream music from its servers over the Internet.
The company’s internet connection is currently provided through copper cables.
(a) Identify two pieces of hardware, other than the cables, that enable the servers to connect to
the Internet. Describe the purpose of each device.
Device 1 ....................................................................................................................................
Purpose ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Device 2 ....................................................................................................................................
Purpose ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(b) The company wants to upgrade their internet connection to fibre‑optic cables.
Give one benefit and one drawback to the company of upgrading to fibre‑optic cables.
Benefit ......................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Drawback ..................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
1 Ana owns a small company with four employees. The office has a network containing several
computers that run on a client-server model. There is one server that connects to the Internet
using a router.
(a) Networks transmit data using various types of connection shown in the following table.
..................................................................................................
..................................................................................................
Fibre-optic
..................................................................................................
..................................................................................................
..................................................................................................
..................................................................................................
Radio waves
..................................................................................................
..................................................................................................
(b) Explain how the client-server model enables the employees to access the same files from
different computers.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Give two reasons why the computers do not have public IP addresses.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(a) He wants to make sure the source code is secure on his laptop.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(b) Wei wants to compress the source code to transport it to another computer.
Justification ...............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(i) Give two benefits of using bit streaming for this purpose.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(ii) State two potential problems of using bit streaming for this purpose.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(c) Explain the terms on-demand bit streaming and real-time bit streaming.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
9608/13/O/N/15 Page 42 of 79
3 (a) The table shows four statements about IP addresses.
http://cie.org.uk/computerscience.html
http ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
cie.org.uk ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
computerscience.html .......................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
%20 ...................................................................................................................................
...........................................................................................................................................
? ........................................................................................................................................
...........................................................................................................................................
[2]
9608/13/O/N/15 Page 43 of 79
6 A company operates a chemical plant, which has a number of processes. Local computers monitor
these processes and collect data.
Engineers at the telco had to decide which type of cable to use. They considered the use of either
copper cable or fibre optic cable.
State two benefits of each type of cable. Each benefit must be clearly different.
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
1 .......................................................................................................................................................
..........................................................................................................................................................
2 .......................................................................................................................................................
..........................................................................................................................................................
[4]
9608/13/O/N/15 Page 44 of 79
7 (a) (i) Describe what is meant by a client-server model of networked computers.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(b) The diagram shows a computer network with connection to the Internet.
file server
mail server
...............................................................................................................................................[1]
9608/13/O/N/15 Page 45 of 79
(c) A web page offers a link for users to request another web page. The requested web page
contains HTML code and JavaScript code.
Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand
column.
Sequence
Statement
number
The user clicks on the hyperlink and the web page is requested
from the web server
[5]
9608/13/O/N/15 Page 46 of 79
6 A user watches a video available on a website. The website uses on-demand bit streaming.
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
9608/13/O/N/16 Page 47 of 79
10
(c) The bank is upgrading its local area network (LAN) copper cables to fibre-optic cables.
(i) State two benefits to the bank of upgrading to fibre-optic cable from copper cable.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
(c) The self-checkout machines connect to a server that stores all the data for the supermarket.
This is a client-server network.
(i) Describe, using an example for the supermarket, the client-server network model.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) The supermarket is concerned about the security and integrity of the data on the server.
Identify two methods that can be used to minimise the security risk to the data, and one
method to protect the integrity of the data.
Security 1 ..........................................................................................................................
...........................................................................................................................................
Security 2 ..........................................................................................................................
...........................................................................................................................................
Integrity .............................................................................................................................
...........................................................................................................................................
[3]
(a) The laptop has a private IP address. The router has both public and private IP addresses.
Explain the reasons why Joshua’s laptop has a private IP address only, but the router has
both a private and a public IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Joshua visits a website by entering its Uniform Resource Locator (URL).
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...................................................................................................................................................
............................................................................................................................................. [1]
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.
Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.
Characteristic IP address
IPv6
[2]
Explain the reasons for the web server using a static instead of a dynamic IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Give the reasons why the laptop does not have a public IP address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
Give three differences between the format of an IPv4 address and an IPv6 address.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
(b) A Public Switched Telephone Network (PSTN) is one example of a communication system
that can be used to support the Internet.
Identify and describe two other communication systems that can be used to support the
Internet.
System 1 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
System 2 ...................................................................................................................................
Description ................................................................................................................................
...................................................................................................................................................
[4]
5 (a)
Conventional telephone
Description Internet-based system
using PSTN
connection maintained
throughout the telephone
call
[5]
(b) maximum of two marks for Internet references and maximum of two marks for world wide
web references
Internet
Page 55 of 79
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9618 12
(b) [4]
Denary / Valid or
Address Reason
Hexadecimal Invalid
One mark for each combination of valid or invalid and the reason.
Page 56 of 79
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9618 13
Twisted-pair is an
example
Uses light waves
WiFi
Fastest
transmission media
• Real time – the event is captured live with a video camera connected to a computer
• On-demand – Existing media are encoded to bit streaming format and uploaded to a
server
(d) Two marks for description, one mark for correct example. [3]
Page 57 of 79
9608/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED
6(b) 1. The user keys in the Uniform Resource Locator (URL) into 4
the browser Software.
2. E // The Domain Name Service (DNS) uses the domain 1
name from the browser to look up the IP address of the web
server.
3. D // The web server retrieves the page 1
4. F // Sends the web page content to the browser 1
5. B // Browser software renders the page and displays 1
6(c)(ii) 6 – 21 1
6(c)(iii) 13 1
6(c)(iv) Checks that the RunnerID entered starts with the characters CAM or VAR only 1
• Format check 1
RunnerID is three letter characters followed by two digit characters
//Position is digit characters only 1
• Length check 1
RunnerID has exactly five characters 1
• Range check 1
The value for Position is between1 and (say) 50 1
• Presence check 1
The text box for RunnerID or Position is not empty 1
• Existence check 1
To ensure that RunnerID has been registered 1
• Uniqueness check 1
To ensure no two runners have the same number 1
Page 58 of 79
9608/13 Cambridge International AS/A Level – Mark Scheme
PUBLISHED May/June 2017
7(c)(ii) 6 – 19 1
7(c)(iii) 11 1
7(c)(iv) Checks that the product code has not be left blank // presence check on product 1
code
• Range check 1
Check the number entered is (say) between 1 and 100 1
• Format check 1
Checks the product code is a particular format // Checks the number has digit
characters only // by example 1
• Length check 1
The number of items has exactly five characters 1
• Existence check 1
To ensure the product code has been assigned 1
Page 59 of 79
9608/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED
3A.21.2H.1 Invalid
H is not a valid hexadecimal digit
299.53.2.2 Invalid
299 is not in the correct range
192.2.1.0 Valid
Consists of four numbers in the range 0–255 separated by
full stops
Real-time
On-demand
• Data is lost
• The decompressed file is not the same as the original
e.g. 192.168.0.1
The number of IP addresses needed will exceed the number available using
IPv4.
Benefit
• (Probably) faster connection / communication / transmission of data
• (Usually) more consistent transmission speed
• Improved security
Drawback
• Expensive to set-up / maintain
• Disruption to the dedicated line would leave no alternative
1(c) 1 mark per bullet point to max 4, max 3 for router, max 3 for gateway 4
Only award the repeated bullet points (1 to 5 in each section) once
Router:
• Connects two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for
• Receives packets and forwards towards the destination
• using the IP address of the destination
• Assigns private IP addresses
• Operates between similar networks // networks using the same protocol
• Can be used to segment a network
Gateway:
• Connect two (or more) networks
• Can connect a network to a WAN // acts as the single access point
for
• Receives packets and send packets towards the destination
• using the IP address of the destination
• Assigns private IP addresses
• Connects two dissimilar networks // networks that use different
protocols
1(d) 1 mark per bullet point to max 3 for any valid answer 3
For example:
• File server
• Print server
• Proxy server
• Web server
• Application server
• Easier de-bugging
• because errors can be corrected in real time
• The effect of any change made to the code can be seen immediately
• Parts of the program can be tested, without all the program code being
available
Assembler
• CREATE (line 1)
• INTEGER (line 6)
• PRIMARY KEY (line 7)
• Software will have been built using a compiler // the software is pre-
compiled
• Software is an executable file // the game is already in machine code //
the game is already set-up to run on the console
• Source code is not provided so does not need compiling/interpreting
• A Router connects two networks using the same protocol, a Gateway can
connect two networks using different protocols
7(a) 1 mark for device, 1 mark for matching purpose. Max 2 devices. 4
• Router
• To connect (devices) / the servers to the Internet // to transmit data
between the servers and the Internet // to forward data towards its
destination
• Gateway
• To connect a server that uses a different protocol to the Internet // to join
two different types of network
• Modem
• To connect (the servers) to the Internet over a telephone line
7(b) 1 mark per bullet point, max 1 for benefit, max 1 for drawback 2
Benefit:
• (Consistently) faster data transmission
• More stable connection
Drawback:
• High initial cost as new hardware will be needed
• Expertise required to complete connections
• Improved security because the IP address is not visible outside the network
• An internet presence is not required for each employee computer
• Only the router needs a public IP address, as only the router needs to be
externally visible
• Reduces number of (public) IP addresses needed
The printer uses a laser (beam) and a rotating mirror to draw the contents of the
page on the photosensitive drum as an electrostatic charge. The toner is attracted
to this charge.
on-demand
– digital video tape, analogue video tape, or digital files are converted to bit streaming –
format for broadcasting on the net; this is known as encoding these encoded streaming
video files are then uploaded to a dedicated server
– a link for the encoded video is placed on a web site
– a user clicks on the link to download the encoded streaming video; the streamed video is
– then broadcast to the user as and when they require it
– can be paused / can go back and re-watch / fast-forward, etc.
real-time
Page 69 of 79
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9618 13
3 (a)
(b) (i) http – enables browser to know what protocol is being used to access information in the
domain
(ii) %20 – because <space> not allowed in a URL, %20 is the coding for a space (32 in
denary)
Page 70 of 79
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9618 13
(c)
Statement Sequence
number
The user clicks on the hyperlink and the web page is requested
1
from the web server
[5]
Page 71 of 79
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9618 13
6 Any four from:
Page 72 of 79
9608/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019
4(d)(ii) 1 mark for 1 or 2 correct Primary Keys, 2 marks for 3 correct Primary Keys 2
CUSTOMER: CustomerID
ACCOUNT_TYPE: AccountID
CUSTOMER_ACCOUNT: ID
Table: CUSTOMER_ACCOUNT
Foreign Key: CustomerID / AccountID
Definition Term
1(c)(i) 1 mark per bullet point to max 3 plus 1 mark for suitable example 4
1(c)(ii) 1 mark for each security method to max 2, 1 mark for integrity 3
Security
• encryption
• access rights
• username and password // biometrics // user accounts
• backup // disk mirroring
• firewall
• Physical methods (e.g. CCTV, locked rooms etc.)
Integrity
• checksum
• parity
• validation on input
2(a) 1 mark per bullet point to max 4 for each management task, max 6 in total 6
Process Management
• Manages the scheduling of processes
• « allows multi-tasking / multi-processing
• « ensures fair access
• « handles priorities
• Manages which resources the processes require
• Enables processes to share information
• Prevents interference between processes // resolution of conflicts
Memory Management
• Allocates memory to processes
• Ensures fair usage of memory
• Organises memory / by example
• Makes use of virtual memory
• Keep processes separate
• To release memory when a process stops
• The browser parses the Uniform Resource Locator (URL) to obtain the
Domain Name
For example:
• The manager is supporting her professional development
• The manager is working in the best interest of his/her colleague (Malika)
• This will ensure she is introduced to all aspects of the job
• The manager is offering appropriate support
For example:
• She is acting in her own best interest
• … by taking responsibility for her own professional development
• She is acting in the best interests of her colleagues
• … by ensuring she is up-to-date and does not need further training
For example:
• Discuss the problems with her
• Discuss the concerns with her colleagues
• Assign her a mentor who can reassure her
• Team building exercises
7(a) 1 mark for correct lines from IPv4, 1 mark for correct lines from IPv6 2
Characteristic IP address
Can use hexadecimal
notation
IPv6
Uses double colons (::)
Benefit:
• Programs may be interpreted on different platforms
Drawback:
• Intermediate code / program still needs to be interpreted on the user’s
computer, which may run slowly
• Extra CPU resources may be required
• The router has the public IP address for the home network
• All data comes through the router
• The laptop is not accessible / visible to the outside world
• … to ensure security // to protect the laptop from external threats
• Satellite
• Send data to satellites in orbit