0% found this document useful (0 votes)
3 views3 pages

Grade 10 Work

The document outlines an assessment for Grade 10 Computer Studies, focusing on local area networks, network components, basic network security, and social implications. It includes a list of 50 questions that students must research and answer, each worth 2 marks, with a due date of May 29, 2024. The questions cover various topics such as network functions, security measures, and potential risks associated with networking.

Uploaded by

Felix Mphephetse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

Grade 10 Work

The document outlines an assessment for Grade 10 Computer Studies, focusing on local area networks, network components, basic network security, and social implications. It includes a list of 50 questions that students must research and answer, each worth 2 marks, with a due date of May 29, 2024. The questions cover various topics such as network functions, security measures, and potential risks associated with networking.

Uploaded by

Felix Mphephetse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Grade 10

Assessment Computer Studies

Instructions Due date Wednesday 29 May 2024

1. Write this on your exercise books


2. Do research on the questions provided
3. Each Question contains 2 Marks

local area networks, network components, basic network security, and social implications:

1. What is the primary purpose of a local area network (LAN)?

2. Name two common types of LAN topologies.

3. What does the term “subnet mask” refer to in networking?

4. What is the function of a router in a network?

5. Define the term “switch” in the context of networking.

6. What is the role of a network interface card (NIC)?

7. Name two common types of network cables used in LANs.

8. What is DHCP and what role does it play in network configuration?

9. Explain the difference between a hub and a switch.

10. What is the purpose of a firewall in network security?

11. Define the term “packet filtering.”

12. What is encryption and how does it enhance network security?

13. Name two common encryption algorithms used in network security.

14. What is the purpose of intrusion detection systems (IDS) in network security?

15. Explain the concept of access control in network security.

16. What is a denial-of-service (DoS) attack, and how does it impact a network?

17. Define the term “phishing” in the context of network security.


18. What is the role of antivirus software in network security?

19. Explain the difference between symmetric and asymmetric encryption.

20. Define the term “social engineering” in the context of network security.

21. What are the potential risks of using public Wi-Fi networks?

22. Describe the importance of regular software updates in network security.

23. What is a VPN and how does it enhance network security?

24. Explain the concept of network segmentation.

25. What is the difference between a virus and a worm in terms of network security?

26. Define the term “botnet” and explain its impact on network security.

27. How does encryption contribute to the privacy of data transmitted over a network?

28. What is a MAC address and how is it used in networking?

29. Explain the concept of network latency and its impact on network performance.

30. What is DNS and what role does it play in network communication?

31. Describe the process of ARP (Address Resolution Protocol) in networking.

32. What is a proxy server and how is it used in network communication?

33. Explain the concept of bandwidth in the context of networking.

34. Define the term “port forwarding” and explain its use in networking.

35. What are the benefits of using VLANs (Virtual Local Area Networks) in network design?

36. Describe the purpose of NAT (Network Address Translation) in networking.

37. What is a MAC flooding attack and how does it work?

38. Define the term “router spoofing” in the context of network security.

39. How does network congestion affect the performance of a network?

40. Explain the role of a DNS cache in network performance.

41. Describe the purpose of Quality of Service (QoS) in networking.

42. What is the difference between TCP and UDP in terms of network protocols?

43. Define the term “traceroute” and explain its use in network troubleshooting.
44. How does a distributed denial-of-service (DDoS) attack differ from a DoS attack?

45. Describe the concept of port scanning in network security.

46. What is the purpose of a DMZ (Demilitarized Zone) in network security architecture?

47. Explain the importance of strong password policies in network security.

48. Define the term “data integrity” in the context of network security.

49. Describe the process of network sniffing and its implications for network security.

50. What are the ethical considerations of network security breaches?

You might also like