Photo AI

A university has buildings in two sites that are 5 miles apart - OCR - GCSE Computer Science - Question 7 - 2021 - Paper 1

Question icon

Question 7

A-university-has-buildings-in-two-sites-that-are-5-miles-apart-OCR-GCSE Computer Science-Question 7-2021-Paper 1.png

A university has buildings in two sites that are 5 miles apart. (a) Describe the difference between a LAN and a WAN. (b) Site A has 4 classrooms. Site B has 2 clas... show full transcript

Worked Solution & Example Answer:A university has buildings in two sites that are 5 miles apart - OCR - GCSE Computer Science - Question 7 - 2021 - Paper 1

Step 1

Describe the difference between a LAN and a WAN.

96%

114 rated

Answer

A Local Area Network (LAN) is a network that covers a small geographical area, typically within a single building or a group of buildings. It allows devices to connect and communicate over short distances, often using Ethernet or Wi-Fi. A Wide Area Network (WAN), on the other hand, spans a larger geographical area, such as cities or countries, and connects multiple LANs. WANs often utilize leased telecommunication lines or satellite links to provide long-distance data transmission.

Step 2

Complete the network diagram for site A of the University.

99%

104 rated

Answer

The network diagram for Site A should illustrate a star topology. The diagram consists of a central switch to which each of the classrooms (Classroom 1, Classroom 2, Classroom 3, and Classroom 4) connects. Each classroom should be represented as a node connected to the central switch, demonstrating the star topology structure.

Step 3

Explain how each of the following can contribute to the performance of a network. Wifi frequency

96%

101 rated

Answer

The WiFi frequency can significantly impact network performance. A 2.4 GHz frequency can carry less data per second compared to a 5 GHz frequency. The 5 GHz frequency allows for higher data throughput but may have a shorter range due to its higher frequency. Therefore, selecting the appropriate frequency for a given environment is essential for optimizing performance.

Step 4

Explain how each of the following can contribute to the performance of a network. Interference

98%

120 rated

Answer

Interference can degrade the performance of a network. It can be caused by physical obstructions like walls or electronic devices that emit signals on similar frequencies. This interference can lead to packet loss, reduced connection speeds, and unstable connections, thus adversely affecting the overall network performance.

Step 5

Explain how each of the following can contribute to the performance of a network. Number of concurrent users

97%

117 rated

Answer

The number of concurrent users can impact network performance, as more users sharing the same bandwidth can lead to increased traffic congestion. If each user is trying to access large files or stream videos, this can create bottlenecks, leading to slower speeds and a less responsive network experience.

Step 6

Explain how each of the following can contribute to the performance of a network. Type of network traffic

97%

121 rated

Answer

Different types of network traffic can have varying impacts on performance. For example, real-time traffic such as video calls or online gaming requires low latency for optimal experiences, while bulk data transfers may tolerate some delay. High traffic from large file transfers can consume significant bandwidth, impacting other users.

Step 7

Identify one other factor that can contribute to the performance of a network.

96%

114 rated

Answer

One other factor that can contribute to the performance of a network is the quality of the networking hardware, such as routers and switches. Higher quality equipment can handle more data simultaneously and provide faster processing speeds, thereby enhancing overall network performance.

Step 8

Describe how packet switching can be used when sending data from one site to the other.

99%

104 rated

Answer

When sending data using packet switching, the data is divided into smaller packets before transmission. Each packet is sent independently over the network and may take different routes to reach its destination. Once they arrive at Site B, the packets are reassembled into the original data format. This method allows for efficient use of network resources and can facilitate the transmission of data even if some paths are congested.

Step 9

Describe the threat malware can pose to the university's network and give a prevention method that the university can use. Description

96%

101 rated

Answer

Malware can pose significant threats to a university's network by corrupting data, stealing sensitive information, or providing unauthorized access to attackers. This can disrupt operations and compromise the integrity of the network.

Step 10

Describe the threat malware can pose to the university's network and give a prevention method that the university can use. Prevention

98%

120 rated

Answer

To prevent malware attacks, the university can implement robust antivirus software, conduct regular system updates, and provide training to users about safe browsing habits and recognizing phishing attempts.

Step 11

Describe the threat a brute force attack can pose to the university's network and give a prevention method that the university can use. Description

97%

117 rated

Answer

A brute force attack can threaten the university's network by attempting countless combinations to guess passwords and gain unauthorized access. This attack can compromise user accounts and sensitive data.

Step 12

Describe the threat a brute force attack can pose to the university's network and give a prevention method that the university can use. Prevention

97%

121 rated

Answer

To mitigate the risk of brute force attacks, the university can enforce strong password policies, including complex passwords and regular changes. Implementing account lockout policies after a certain number of failed login attempts can also help prevent such attacks.

Step 13

Tick one box in each row to identify whether the protocol is related to email, transferring files or accessing websites.

96%

114 rated

Answer

The table should reflect:

  • POP: Email
  • FTP: Transferring files
  • SMTP: Email
  • HTTPS: Accessing websites

Join the GCSE students using SimpleStudy...

97% of Students

Report Improved Results

98% of Students

Recommend to friends

100,000+

Students Supported

1 Million+

Questions answered

;