You are on page 1of 4

Unit C Integrated Assessment (Revision Questions)

Multiple Choice Questions


1. A
2. C
3. A
4. C
5. D
6. B
7. A
8. B
9. D
10. C
11. D
12. B
13. A
14. B
15. D

Long Questions
1. (a) Network interface cards (1) and network cables such as UTP cables (1) are needed.
A network interface card is an expansion board for connecting a computer to a
network. (1) Network cables are used to connect computers and other network
devices in a local area network. (1)
(b) Network operating system is used to control and coordinate the activities of all
computers and other devices on a network. (1) Moreover, network operating system
provides network security such as access control and file permissions. (1)
(c) VOD means video on demand which is a service allowing the users to select and
watch videos over the network. A video player is needed to watch the videos. (2)
(d) (i) A router should be used. (1)
(ii) John should install a proxy server and set up web page filtering criteria to
prevent the students from accessing pornographic web pages. (1)
(e) John should install a firewall to protect the school network against external threats.
A firewall consists of hardware and software which control access to the
school network. (2)
2. (a) An IP address is used for identifying a computer on a network. (1)
(b) Network layer. (1) This layer handles the actual delivery of data packets. (1)
(c) 11010010 00000000 10011100 00100100; (1) this IP address belongs to class C.
(1)
(d) She can build a DNS server that can store the domain names representing the IP
addresses. (1)
(e) (i) Advantage: File downloading is not dependent on a single server. (1)
Disadvantage: The lifetime of a hard disk will be shortened due to frequent
read/write. (1)
(ii) Since shareware is free to try, the action of the student is legal, as long as he
stops to use the shareware after the trial period. (2)
(iii) It is because the IP address always changes when using a Wi-Fi hotspot to
access the Internet. While IP address represents the identity of a computer on
the Internet, it is not easy to identify when the IP address always
changes. (2)

3. (a) Because the users have to pay PNETS charge in addition to monthly charge when
using the dial-up Internet access. (1)
(b) Speed = = Mbps = 25 Mbps (2)

(c) Time required = File size  Speed = Mbps = 8 seconds (2)

(d) Advantage: The bandwidth will not be shared by others. (1)


Disadvantage: The upload speed is sacrificed. (1)
(e) Rainy days. (1) Satellite communication needs radio signals to establish and radio
signals are weakened on rainy days. (1)
(f) (i) ‧The ping program is a computer network tool used to test whether a
particular host can be reached across an IP network.
‧It is also used to self-test the network interface card of the computer.
(any one  1)
(ii) The packet size is 32 bytes. (1)
(iii) The users using the cable modem share a single cable to access the Internet.
The peak time of Internet activities is at night and so the transmission speed is
slow. (1)
(iv) The source will be asked to resend the lost packet. (1)
4. (a) (i) Yes, it is because both Peter Wong and Emily Lui are on the Cc list of the
e-mail. Cc means that the same letter is also sent to the people on the Cc list,
though they are not the primary recipients. Names on the Cc list are visible to
all the recipients. (1)
(ii) No, because Henry is on the Bcc list. Bcc means the same letter is also sent
to the people on the Bcc list, though they are not the primary recipients.
Names on the Bcc list are not visible to all the recipients. (1)
(b) (i) Advantage: We need not do any configuration before receiving / sending
e-mails when we are using server-side mail. (1)
Disadvantage: Digital signature and encryption cannot be added to the e-mails.
(1)
(ii) Server-side mails are operated under POP and SMTP, (1) while client-side
mails are operated under IMAP. (1)
(c) ‧Robert may use VPN to connect to the company’s network.
‧Robert can establish an FTP server to store the files inside for downloading.
‧Robert can place the files to be downloaded at the company homepage.
(any one  1)
(d) (i) Phishing is an attempt to criminally acquire sensitive information, such as
usernames, passwords and credit card details, by pretending to be an e-mail
from a trustworthy organization. (2)
(ii) Educate the employees not to open hyperlinks in e-mails sent from
unknown sources. (1)
Use a web browser with anti-phishing function. (1)
(e) Spam, also known as ‘junk mail’, means e-mails which are unsolicited and sent in
bulk, usually for promotional purposes. We can install junk mail filter in the e-mail
system to reduce the number of junk mail received. (1)
5. (a)

(Correct frames for A.html (1), B.html (2) and C.html (2))

(b) Advantage: We can keep one part (e.g. title, menu) of the page static while
changing the other parts of the page. (1)
Disadvantage: It is complicated to manage. (1)
(c) (i) Arthur may promote his web site by e-mails / forums / newsgroups / search
engines. (any two  1)
(ii) ‘https’ means that the web page employs SSL. Therefore, all data sent to the
web page are encrypted. (1)
(iii) No. It is because it contains two generic-code top-level domains, namely ‘gov’
and ‘com’. (1)
(d) Arthur may add the main content one more time on the same web page, enclosed by
the paired tags <noframe> and </noframe>. (1)

You might also like