JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
IB SL - 3. Networks QB
A computer network is a set of devices connected together for the purpose of easing communication between computers and sharing resources.
Sign in to Google
to save your progress.
Learn more
* Indicates required question
Select disadvantages of a WLAN.
*
2 points
A WLAN is not as flexible as a LAN and it is difficult to extend due to extra equipment required.
Connectivity in a WLAN may be inconsistent due to physical barriers.
A WLAN is less secure than a LAN because wireless activity is easier to intercept.
There are no disadvantages to WLAN. They are terrific!
Required
Define the term extranet.
*
1 point
A global WAN connected through an ISP in exchange for a monthly fee.
A system for connecting multiple computers in a LAN.
A private network that uses internet technologies so that authorised users can share data within an organisation.
A type of VPN.
Define the term protocol.
*
1 point
Rules that must be followed for correct and stable data transmission over a network
A type of error detection algorithm; an error can either be corrected or the data is resent.
Identification of senders and receivers using addresses that adhere to a standard format.
Maintain the integrity of the data by ensuring that the data received is the same as data sent.
Why are protocols important?
*
2 points
Data Integrity.
Flow Control.
Deadlock Prevention.
All of the above.
Required
Tunnelling protocols allow for data to be hidden whilst travelling across the internet. For which kind of network is this most useful?
*
1 point
LAN
WLAN
VPN
WAN
Identify suitable ways in which the network administrator can reduce the risk of unauthorised access to confidential data.
*
2 points
Implement a firewall.
Apply media access control.
Not putting confidential data accessible via the internet.
Only allow access to resources via VPN.
Required
Identify a type of network that would allow secure access from an employee's home to their company's LAN.
*
1 point
Your answer
Microwave, radio signals, satellites and WiFi are examples of...
*
1 point
Metal Conductors
Fibre Optics
Wireless Transmission Media
None of the above
Identify the transmission media that carries beams of light as signals.
*
1 point
Your answer
Copper cable, UTP cable and coaxial cable are examples of...
*
1 point
Metal Conductors
Fibre Optics
Wireless Transmission Media
None of the above
What is a data packet?
*
1 point
Message that needs to be transferred between two devices over a network.
Large complex object that contains all the routing information so that data can be transferred.
A very small portion of a message that also includes the necessary info so that the data can arrive at the destination.
Refers to a method of communication whereby messages are grouped into data packets.
Select factors that affect speed of data transmission.
*
1 point
Bandwidth
User's PC performance
Malicious software
All of the above.
Required
What is the purpose of a NIC?
*
1 point
Every computer that is on a network must have a NIC because it provides the necessary circuitry tied to the data link so that info can be sent and received..
A device that allows you to connect to the internet.
A device that connects to the router so that an existing signal can be extended.
Network connection point for multiple devices.
What is the purpose of a router in a LAN?
*
3 points
A device that serves as a connection point for all other devices on the network.
Controls the flow of data in the network.
Provides a services to other computers on the network.
A device that links multiple computer networks.
Inspect data packet addresses.
Required
Experiencing low internet speeds is a common pain point for users. Select a suitable reason why this could be so.
*
1 point
Desirable climate conditions.
Many servers are down.
Too much traffic during peak times.
The enablement of WPA 2 encryption.
The user is not using a VPN.
What is an OSI reference model?
*
1 point
It is a device that is connected to a network.
A security measure for the transmission of data.
A network topology.
An abstract set of layer protocols that describe network communication.
Which of the below is not part of the OSI reference model?
*
1 point
Physical
Application
Data Link
Internet
Presentation
Session
Transport
Network
From the below select all roles that a computer can perform in a network.
*
1 point
File Server
Router
Client
Firewall
All of the above
Required
Identify two reasons why fibre optic cable would be preferred over wireless connectivity.
*
2 points
Physical cabling will always offer better security within a network.
Networks can be extended easily and cheaply with fibre optic cables.
Fibre optic supports a much higher bandwidth.
Many devices only support wired connectivity.
Required
From the below, tick the component that is not essential when building a wireless network.
*
1 point
Modem
Mail Server
Wireless Network Card
Wireless Router
Encryption and authenticated requests are both valid security measures to limit data access over a wireless network.
*
1 point
True
False
Select the two technologies that would be used exclusively in a Virtual Private Network.
*
2 points
Application Server
Gateway
VPN Client
VPN Server
Required
Select characteristics of a Peer to Peer (P2P) network.
*
2 points
Devices on the network have similar capabilities, there is no central server.
Devices on the network have clear roles e.g. multiple clients access a file server.
Supports telecoms and file sharing with ease.
A private network that piggy backs on internet technologies.
Required
Tick characteristics of a Personal Area Network (PAN).
*
2 points
Interconnection of devices surrounding a single user.
Intended to be shared amongst multiple users.
Wired connectivity through a USB or wireless through Bluetooth.
Application sharing via remote access.
Required
Consider a company that has its Head Office in London and the RnD department in Berlin. How can the employees across both countries communicate over a VPN connection?
*
4 points
Employees can adopt Microsoft Teams and communicate via videoconferencing and chatting.
Employees should be able to share resources securely and easily as though they are in a private network. This enables Berlin to provide high quality tech support for London even though they are miles away.
Employees can send emails to each other.
They can call each other using Voice over Internet Protocol (VoIP) phones. A VoIP solution can be set up with a VPN so that calls can be made securely through a 'tunnelled' network. A VoIP VPN solution will feel like all the employees are in one location.
All of the above.
Required
Which of these statements can be used to describe how data is transmitted by packet switching?
*
4 points
For packet switching data is grouped into packets prior to transmission.
Packets of data travel through a network individually. It is possible for packets to use different routes to reach the desired destination.
The destination for a packet can be specified with Datagram Packet Switching whereby every packet contains the receiver address.
The destination for a packet can be specified with Virtual Circuit Packet Switching meaning whereby a packet follows a predetermined route.
All of the above.
In a network the role of the client is...
*
1 point
to make requests to a service that is being hosted on another computer in the network and interpret responses.
to host a service and appropriately respond to requests coming from other computers on the network.
to pay for the replacement or enhancement of a computer system.
to be a central point of connection for multiple devices.
In a network the role of the server is...
*
1 point
to make requests to a service that is being hosted on another computer in the network and interpret responses.
to host a service and appropriately respond to requests coming from other computers on the network.
to pay for the replacement or enhancement of a computer system.
to be a central point of connection for multiple devices.
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. -
Terms of Service
-
Privacy Policy
Does this form look suspicious?
Report
Forms