0% found this document useful (0 votes)
9 views29 pages

Unit 3 - Networks

The document is a Question Bank Test dated 02/06/2025, containing various questions related to computer networks, data transmission, and network security. It includes inquiries about fiber optic cables, wireless networking, VPN implementation, data packets, and network protocols. Additionally, it provides mark schemes for evaluating responses to the questions posed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views29 pages

Unit 3 - Networks

The document is a Question Bank Test dated 02/06/2025, containing various questions related to computer networks, data transmission, and network security. It includes inquiries about fiber optic cables, wireless networking, VPN implementation, data packets, and network protocols. Additionally, it provides mark schemes for evaluating responses to the questions posed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

QuestionBank Test 02/06/2025, 23:00

Questions
21M.1.SL.TZ0.6

Identify two reasons why fibre optic cable would be preferred over wireless
connectivity.

21M.1.SL.TZ0.9

Define the term data packet.

21M.1.SL.TZ0.12

https://pestle.pages.dev/app/ Page 1 of 29
QuestionBank Test 02/06/2025, 23:00

A school currently has a cabled network but wants to add wireless networking across
the whole campus.

There are concerns that unauthorized people could access the data on the wireless
network.

The school has decided to implement a virtual private network (VPN) to provide
access to its network.

a.

Describe two hardware components the school will need to implement the
wireless network.

[4]

b. Identify two advantages to the students of the new wireless network. [2]

c.

Outline two methods the school could employ to prevent network data from
being accessed over their wireless system.

[4]

d. Identify two technologies the school would require to provide a VPN. [2]

e.

Explain one benefit to the staff of using a VPN to remotely access the school
network.

[3]

19M.1.SL.TZ0.11

Outline one reason why protocols are used in communications between computers.

19M.1.SL.TZ0.12

Identify two characteristics of a personal area network (PAN).

19M.1.SL.TZ0.13

https://pestle.pages.dev/app/ Page 2 of 29
QuestionBank Test 02/06/2025, 23:00

Explain how data is transmitted by packet switching.

19M.1.SL.TZ0.15

A company that provides training for teachers plans to set up a training room in its
offices with a network of 15 computers. Each computer has 1 TB of storage and 16 GB
of random access memory (RAM).

In order to minimize costs, the company decided only to install general application
software on the training computers.

The company has decided to allow the teachers to use their own devices in its training
room by adding wireless networking.

a. Identify two characteristics of RAM. [2]

b. State the purpose of persistent storage on the computers. [1]

c.

Identify two types of general application software that would be installed on the
training computers.

[2]

d.i. Outline one advantage to the company of implementing this change. [2]

d.ii. Outline one disadvantage to the company of implementing this change.

[2]

e. Describe one method of security that may be used on this wireless network.

[2]

f.

Explain why the speed of data transmission on the wireless network in the
training room may vary.

[4]

20N.1.SL.TZ0.7

https://pestle.pages.dev/app/ Page 3 of 29
QuestionBank Test 02/06/2025, 23:00

A school has a local area network (LAN) connecting its computers and peripheral
devices. The LAN also provides access to the internet.

Users have been troubled by slow speeds when accessing the internet.

a. Describe the role of a router in this network. [3]

b.

Outline two reasons why there might be a reduction in data transmission speed
at certain times.

[4]

c.

Outline two measures that the school could take to safeguard its data from
unlawful access via the internet.

[4]

d.

The inventory of office supplies used in the school is stored on the computer as a
single file.

Each of the office supplies in the inventory (such as paper, ink, toner, printers,
pens, staplers, pencils and scissors) has a unique ID number, name, maximum
quantity, minimum quantity and remaining quantity.

Outline the steps in an algorithm that would output a list of supplies with the
quantity to be ordered.

[4]

18M.1.SL.TZ0.6

Identify two characteristics of a data packet.

18M.1.SL.TZ0.7

Explain why protocols are used in network communications.

18M.1.SL.TZ0.11

https://pestle.pages.dev/app/ Page 4 of 29
QuestionBank Test 02/06/2025, 23:00

A company has expanded its office space into nearby rooms and has decided to set up
a local area network (LAN) to support its operations.

The LAN will connect the room where the server is installed to new computers in the
additional office space. The network engineer produced the following Gantt chart for
this task.

a. Define the term concurrent processing. [1]

b. Identify two tasks that will be carried out concurrently. [1]

c. Identify two tasks that will be carried out sequentially. [1]

d.

After 5 years the company decided to replace the LAN with a wireless local area
network (WLAN).

Outline two advantages, to this company, of installing a WLAN. [4]

e. A WLAN will introduce additional security issues for the company.

Discuss any two of these issues and the ways in which the company might

https://pestle.pages.dev/app/ Page 5 of 29
QuestionBank Test 02/06/2025, 23:00

resolve them.

[4]

f.

The company is considering expanding their network to allow employees to


connect from anywhere in the world. The expanded network would need to
provide security and allow the employees full functionality of the internal
network.

Explain how setting up a virtual private network (VPN) would provide a suitable
solution.

[4]

19N.1.SL.TZ0.9

https://pestle.pages.dev/app/ Page 6 of 29
QuestionBank Test 02/06/2025, 23:00

a.

Outline two advantages of a school using a computer network.

[4]

b.i.

Describe the purpose of the following hardware component of a network: Router

[2]

b.ii.

Describe the purpose of the following hardware component of a network:


Network interface card (NIC)

[2]

c. Outline why protocols are necessary. [2]

d. Define the term data encryption. [1]

e.

Evaluate the use of trusted media access control (MAC) addresses as one method
of network security.

[4]

17N.1.SL.TZ0.12

https://pestle.pages.dev/app/ Page 7 of 29
QuestionBank Test 02/06/2025, 23:00

A wireless local area network (WLAN) is used to extend access to a school’s wired
local area network.

The advantages of this WLAN are user-mobility and economical access points.

The concept of packet data transmission is used within this network.


Figure 1 shows the simplified structure of a data packet.

Figure 1: The structure of a data packet

a. Identify one hardware component of the WLAN, other than computers. [1]

b. Outline two disadvantages of this WLAN. [4]

c.

Identify three ways in which the network administrator can reduce the risk of
unauthorized access to confidential data.

[3]

d. Define the term protocol. [1]

e.

With reference to Figure 1, explain how data is transferred by packet switching.

[6]

22M.1.SL.TZ0.3

Identify two differences between a wide area network (WAN) and a local area network
(LAN).

22M.1.SL.TZ0.4

https://pestle.pages.dev/app/ Page 8 of 29
QuestionBank Test 02/06/2025, 23:00

Outline the reason for compression when transmitting data.

22M.1.SL.TZ0.10

Outline one reason for the use of standards in the construction of networks.

18N.1.SL.TZ0.1

Outline what is meant by the term computer network.

18N.1.SL.TZ0.5

An international company is in the process of moving its Head Office from Europe to
Asia.

a. Identify two possible compatibility issues as a part of data migration. [2]

b.

Outline how a virtual private network (VPN) will allow employees who are in
Europe to communicate with the Head Office in Asia.

[2]

c. Outline one social issue associated with this process. [2]

18N.1.SL.TZ0.6

Describe how data is transmitted by packet switching.

18N.1.HL.TZ0.1

a.

Outline what is meant by the term computer network.

[2]

b. Describe one problem resulting from low bandwidth in a computer network.

[2]

https://pestle.pages.dev/app/ Page 9 of 29
QuestionBank Test 02/06/2025, 23:00

18N.1.HL.TZ0.10

An oil and gas company has a networked computer system for use of their employees
in the Head Office.

The company also uses the internet to enable communication with employees working
on exploration and production in many remote geographical areas.

The sub-sea oil and gas exploration and production unit of the company relies on
thousands of kilometres of pipeline which are monitored by a computer control system
which can detect leaks.

The process of detecting leaks is carried out by sensors which are continuously
monitoring changes in the flow and pressure of the liquids in the pipes.

This data is processed on a computer in the office.

If any of sensor values are outside of the acceptable parameters stored on a disk in the
office, the following error routines are performed:

an alarm is sounded on the computer at the office


an email message is sent to managers in the Head Office.

a.i.

Identify one hardware security measure that will ensure that confidential data
from the Head Office cannot be accessed.

[1]

a.ii.

Identify one software security measure that will ensure that confidential data
from the Head Office cannot be accessed.

[1]

b. Identify one network security measure. [1]

c.

Explain the environmental benefit of using a computer control system to monitor


the pipeline.

[3]

d.
https://pestle.pages.dev/app/ Page 10 of 29
QuestionBank Test 02/06/2025, 23:00

d.

Explain the relationship between sensors, output transducers and processor in


this situation.

[4]

e. Construct a system flowchart to represent the process described above. [5]

https://pestle.pages.dev/app/ Page 11 of 29
QuestionBank Test 02/06/2025, 23:00

Markschemes
21M.1.SL.TZ0.6

Award [2 max]
Fibre optics allow faster transmission speeds;
Fibre optic cables are more secure/harder to break into;
Fibre optic cable transmission is more reliable/less likely to suffer interference;
Fibre optics allow transmission over longer distance;
Fibre optics allow greater bandwidth;

21M.1.SL.TZ0.9

Award [1 max]
A unit of data made into a single unit (that travels along a given network path);
A data packet travels through a network as a unit i.e. with all parts kept together;

21M.1.SL.TZ0.12

a.

Award [4 max]

(Wireless) router;
A central hub for all the computers to connect to;
Enables wireless network packet forwarding and routing;

Wireless Network Interface Card (NIC);


To allow the computer to ‘talk to’ the (wireless) router;

Wireless access points;


allow Wi-Fi devices to connect to a wired network;

Wireless repeaters;
To expand the reach of the network;

Mark as 2 and 2.

b.

Award [2 max]
The ability to use their own devices at school;
The ability to access the school network from anywhere in the school;
No cables laid, so reduces the risk of tripping over cables;

https://pestle.pages.dev/app/ Page 12 of 29
QuestionBank Test 02/06/2025, 23:00

Numbers of connections are not limited to cable ports, so greater numbers of


students can connect at any given time;

c. Award [4 max] Use of encryption;


So that data cannot be understood if it is intercepted;

Use of user authentication/usernames and passwords;


To prevent unauthorized access to the system;

Setting up a file of accepted MAC addresses;


To only allow access to the network by registered mobile devices;

Hide network ID; Mark as 2 and 2.


So that the wireless network is not publicly seen;

d. Award [2 max]
Client VPN software (to make a secure remote connection);
VPN-aware routers and firewalls (to permit VPN traffic to pass);
VPN appliance/server (to handle incoming VPN traffic);
Encryption protocol IPSec or SSL;

e. Award [3 max]
Enhanced security of data;
for example, using encryption;
This prevents unauthorised access;

Remote access to data and resources (from any location);


Normal access of materials on the network;
as though the user was using the network on site;

19M.1.SL.TZ0.11

Award [2 max].
To provide a set of rules/procedures;
To enable two or more different electronic devices/computers/entities to understand
each other during data transfer / enable successful communication;

19M.1.SL.TZ0.12

Award [2 max].
Smallest type of network;
Consists of connected devices in close proximity to the individual using them;
Connected via Bluetooth/wireless;
Suitable example: smartphone to car connection;

https://pestle.pages.dev/app/ Page 13 of 29
QuestionBank Test 02/06/2025, 23:00

19M.1.SL.TZ0.13

Award [3 max].
A message/the data is broken into a number of parts;
Which are sent independently;
…over the optimum route for each packet;
The individual parts are reassembled at the destination;
Each packet contains the (IP) address of both the sender and recipient;

19M.1.SL.TZ0.15

a.

Award [2 max].
RAM is volatile / contents erased when power is switched off;
Access speed is fast / faster than hard drive;
Data / instructions can be read from and written to it / /RAM can be overwritten;
Size is limited;

b. To store programs / files / data in a non-volatile device so it isn’t lost;


Stores more data as it has a larger capacity;

c. Award [2 max].
Word processor;
Spreadsheet;
Database management system;
Email;
Web browser;

Allow any general purpose application that is appropriate for a ‘training room
computer’

d.i. Award [2 max].


May save money;
Due to not having to supply all the training computers;

May be able to increase the size of the training group;


Which may generate more income;

Trainees / teachers likely to be more familiar with software on own machine (and
how new training software interacts with OS / user interface);
Making training sessions more efficient / allowing trainer to concentrate on the
training rather than using generic applications;

d.ii. Award [2 max]


https://pestle.pages.dev/app/ Page 14 of 29
QuestionBank Test 02/06/2025, 23:00

May cause security issues;


Due to multiple users having network access from their “unsecured” devices;

May interfere with running of training sessions;


As some machines may not be compatible;

e.

Award [2 max]
Encryption;
Scrambles the contents of the network transmissions so that if they are intercepted
they can’t be understood (without the decryption key);

User ID (and password);


Only allows authorized users to access the network;

Media Access Control (MAC) addresses;


Unique identification codes embedded in networkable equipment so that only
authorized equipment may access the network;

Firewall;
Checks traffic coming into the network and leaving the network, and can block
suspicious data;

f. Award [4 max].
Mark as [2] and [2].

The speed of data transmission (on a wireless network) slows down;


The further the receiver is from the transmitter;

Passing through obstructions such as solid walls;


Can slow down transmissions (on a wireless network);

The bandwidth available for transmission on a wireless network is finite;


So, transmission speeds can be affected if the number of users on the network
increases;

Note to examiners: Answers must relate to wireless networks and not be a


comparison between cabled and wireless networks.

20N.1.SL.TZ0.7

a.

Award [3 max].
controls the flow of data in the network;

https://pestle.pages.dev/app/ Page 15 of 29
QuestionBank Test 02/06/2025, 23:00

inspects address of data packets;


directs to the appropriate network path/ selects a path between networks (by
inspecting address of data packets);
securely transmits data packets (across that path toward the intended destination);

b. Award [4 max].
malicious software/spyware/malware / viruses;
attacking the system;

the type of connection;


valid outline for the slow down (depending on the type of connection);

Note: There are many types of internet connection: wireless connections, wireless
hotspots, mobile internet, broadband connections, fixed wireless and satellite
connection, cable, DSL;

hardware malfunction;
internet speed can considerably slow down if modem-router configuration is not
correct / updated;

external factors;
during the peak hours of daytime the most visited websites encounter more
network traffic than what has been anticipated;

NOTE: Accept examples. For example, too many students try to connect to an e-
learning site at the same time.

Mark as 2 and 2

c. Award [4 max].
Preventing unauthorized access/No access without user names/passwords;
which should be regularly changed/made difficult to guess;

Data should be encrypted;


Allowing only those with decrypting code access;

Teachers/students should be trained for safe practices;


to create a risk-conscious /security-aware culture within the school;

Installation of virus checkers/spyware software;


to prevent damage to data files or the system / to prevent data being extracted
from the files/system;

Mark as 2 and 2

Note: Accept appropriate measures such as physical security measures / access


control / data security / network and communication security / user awareness
and education, etc.
https://pestle.pages.dev/app/ Page 16 of 29
QuestionBank Test 02/06/2025, 23:00

d.

Award [4 max].
Award [1] for looping through the inventory file;
Award [1] for reading the supply data record (ID number, name, maximum quantity,
minimum quantity and remaining quantity);
Award [1] for checking if the quantity remaining is less than minimum quantity;
Award [1] If so, calculate the quantity to be ordered (number to buy) / as the
maximum quantity minus the quantity remaining;
Award [1] for outputting the name/ID number of the office supply and the number
to buy;

Example 1:

while not end of inventory file


read supply data record from file
if remaining quantity < minimum quantity
then
numbertobuy = maximum quantity – remaining quantity
output ("Reorder ", ID, name, numbertobuy)
end if
end loop

Example 2:

for each item in the inventory loop


with item do
if remaining quantity < minimum quantity then
output "Reorder ", ID, name, (maximum quantity – remaining quan
end if
end do
end loop

18M.1.SL.TZ0.6

It contains a set amount of data;


It contains a fixed structure (or identify elements of the structure other than data);
It contains data that is to be sent via a communications channel;
It contains specific details for transmission e.g. address of sender and receiver, error
codes etc.;

Award 2 marks if two of the contents of a packet are given and expanded.

18M.1.SL.TZ0.7

https://pestle.pages.dev/app/ Page 17 of 29
QuestionBank Test 02/06/2025, 23:00

Protocols are a set of rules;


(That are used) so that both sender and receiver are using/expecting the same
formats/methods;
To allow data to be transmitted successfully / without errors;

18M.1.SL.TZ0.11

a.

Processes/task are carried out simultaneously/at the same time;

b.

Install connectors on wall of server room AND Install connector on wall of new office
space;

OR Test the cabling AND Connect the new computers with the cabling;

c. Any pair of tasks that are NOT a correct answer to part (b);

d. Award [1] for stating an advantage, [1] for expansion/example in context.


Mark as [2] and [2]

Answers may include:


Use on the move;
More versatile staff encouraged to collaborate etc.;

Allows BYOD:
Which could lead to greater productivity (as familiarity with device);

No extra equipment is needed for expansion after initial set-up;


Which will save the company time and money;

Reduces wiring;
Therefore improved safety for employees;

e. Mark as [2] and [2]. The data can be intercepted as it goes through “the air”;
Can be resolved by strong encryption/protocols;
WPA-2 / a description of WPA-2;
Use of trusted MAC addresses;
Regular changes of router password; [2 max]

BYOD issues leading to insecure devices;


Clear company policy regarding use;
Use of sand-box;

https://pestle.pages.dev/app/ Page 18 of 29
QuestionBank Test 02/06/2025, 23:00

Only approved devices allowed;


MAC addresses – only adding clean and tested devices brought in by staff;
Installation of MDM services;
Authentication (user ID + password on all devices including BYOD);
Security features added by company; [2 max]

f.

A VPN/tunneling allows the employee’s device to appear to be part of / a node of


the internal company network;
Thus affording him/her full access to the network resources;

Data that passes through a VPN can be encrypted;


So any unauthorized access will not be able to understand the data;

Tunnelling allows the company’s own protocols to be used/IPsec/TSL ensure


security;
Even though the data is passing over an outside network;

Multiple exit nodes / hidden IP addresses/encrypted connections;


Make it hard to distinguish where the data was generated;

19N.1.SL.TZ0.9

a.

Award [4 max]
File sharing/resource sharing;
instead of using a disk or USB key to carry files from one computer to another files
can be shared directly using a network/all computers in the network can share
resources such as printers, scanners;

Communication;
students/teachers can communicate with people around the world via the
network;

Interactive teamwork;
software (like Microsoft Office) enables many users to contribute to a document
concurrently;

Flexible access;
network allows students to access files from different computers (throughout the
network) (one can begin work on a project on one computer and finish up on
another);

Software cost;

https://pestle.pages.dev/app/ Page 19 of 29
QuestionBank Test 02/06/2025, 23:00

software products are available for networks at a substantial savings in comparison


to buying individually licensed software;

Software management;
load software on the server saves time compared to installing and tracking files on
independent computers/upgrades are also easier because changes only have to be
done once on the file server instead of on individual computers;

Improved network security;


if the school has its own network, it can monitor network traffic / can create a
security culture (everyone who has a username and password is responsible for
keeping data secure);

Mark as [2] and [2].

b.i.

Award [2 max]
A network router is a hardware device that is connected to multiple channels for
different networks;
through an interface that is situated on each network;

Router acts as a processing unit for information packets;


it duplicates information packets for use during transmission from one network to
another;

The router uses a protocol or set of rules;


to determine which information packets are to be routed to certain interfaces
within the network;

b.ii.

Award [2 max]
Network interface cards are used to connect each computer to the network;
so they can communicate with the network router to receive information packets;

Interface cards determine the infrastructure of a local area network (LAN);


and allow all of the computers to connect to the network;

c.

Award [2 max]
Protocols define the rules that govern network communication (for example, packet
format, type and size, what happens when an error occurs, and which part of the
network is supposed to handle the error and how);

Computer networks consists of various types of equipment (such as routers,


switches, hubs and network interface cards) and the equipment comes from
https://pestle.pages.dev/app/ Page 20 of 29
QuestionBank Test 02/06/2025, 23:00

switches, hubs and network interface cards) and the equipment comes from
different vendors, but they must all work together or the network does not operate
correctly;

Protocols work in layers (the highest being what the user sees, and the lowest
being the wire that the information is transferred along) and these layers
communicate with each other according to the rules (allowing communication to
occur accurately and efficiently);

d.

Award [1 max]
Data encryption refers to calculations/algorithms that transform plain text into a
form that is non-readable to unauthorized parties (authorized recipient of an
encrypted text uses a key and the algorithm to decrypt the data/ to transform it to
the original plain text version);

e. Award [4 max]
Each (wireless network) adapter has a unique label called a MAC address;

Routers uses these addresses to identify/authenticate computers (routers include


an option to whitelist or blacklist certain devices based on MAC addresses, so
access could be restricted to any device which is not in the whitelist);

One disadvantage is that the whitelist should be amended any time a new device is
purchased / when access to guests should be granted;

Also this method is useless against hackers who use programs which intercept data
passing through network and report the MAC address of any device communicating
on the network;

17N.1.SL.TZ0.12

a.

Award up to [1 max].
Wireless router/modem;
Access points;
Switch;
Wireless repeater/extender/booster;

b.

Award [1] for identifying a disadvantage and [1] for an expansion, for two
disadvantages up to [4 max].

Data transfer will decrease (compared with a wired LAN);


https://pestle.pages.dev/app/ Page 21 of 29
QuestionBank Test 02/06/2025, 23:00

Data transfer will decrease (compared with a wired LAN);


Because the number of computers using the network increases;
(and because) WLAN has lower bandwidth than a wired LAN;

Less data security;


As devices from outside the school can access the network/intercept
transmissions;

More easily open to misuse;


As teacher/administrator cannot directly monitor a specific student/teacher/
machine;

Intermittent connectivity due to physical barriers (walls);


Results in low transfer/speed and may hinder operations.

Note: Accept any reasonable points, provided they are appropriately elaborated.

c.

Award up to [3 max].
Give each user appropriate login details/passwords;
Different access rights for students, teachers, school administrators (file-level and
share-level security);
All passwords and files should be encrypted;
Use the latest WiFi protocol/WPA2;
Require MAC address authentication;
Password protect the documents;

Note: the focus of the question is on confidential data (firewalls not accepted)

d. Set of rules for data transmission;

e. Award up to [6] as follows:

Award up to [3 max] for a general description of how data is transferred by packet


switching. ([1 max] if this general description is very simplistic and refers to just the
Header/Data/Trailer already shown in the question paper).

Award up to [3 max] for added detail that references the contents of the given data
packet in the answer.

Example of general description

Data is organized in specially formatted units (data packets) which are routed from
source to destination using network switches and routers;

Network switches and routers determine how best to transfer the packet between
a number of intermediate devices (routers and switches) on the path to its

https://pestle.pages.dev/app/ Page 22 of 29
QuestionBank Test 02/06/2025, 23:00

destination (rather than flowing directly over a single wire on the path to its
destination);

Data packets are reassembled at the destination; Example of referencing content

Addresses have to be in a standard format so that each switch/routing station


recognizes the address;
Address of sender identifies the sending computer, so that any packets not
received can be re-requested;
Address of receiver identifies intended recipient so it can be forwarded on
correctly;
The protocol used must be identified so that the correct rules are followed;
Size of packet / size of fields in packet – All packets/fields must have the same
size so that the data can be reassembled;
Sequence number so that packets can be reassembled in correct order;
Transmission codes to show whether the data packet is transmitted or re-
transmitted;
Control bits, to maintain the integrity of the data by ensuring that the data received
is the same as the data sent;
Error checking code – when an error is detected, an algorithm either corrects the
error or requests that the packet is resent;

22M.1.SL.TZ0.3

Award [2 max].
WAN covers a much larger area (national/international), LANs usually cover a smaller
area (such as a single site);
Nodes connected to WANs often make use of connections through public networks
(such as the telephone system), nodes connected to LANs are usually connected
through private infrastructure;
LANs are more secure than WANs (due to how WANs transmit the data /how far the
data would need to travel);
A higher bandwidth is available for transmission in a LAN than a WAN/ LANs can have
a higher data transfer rate than a WAN;
LAN is typically cheaper than WAN to implement/ maintain (as the equipment
required for LAN is less expensive);
WAN includes a large number of devices connected together, LAN includes less;
WANs are typically slower than LANs due to the distance data must travel;
WAN requires hardware to connect different networks, such as a router, LAN can be
simple and does not need to connect to other networks;

22M.1.SL.TZ0.4

https://pestle.pages.dev/app/ Page 23 of 29
QuestionBank Test 02/06/2025, 23:00

Award [2 max].
The reason for compression when transmitting data is to save on transfer times;
As it reduces the number of bits needed to represent data (when compared with the
original data);

Compressing data involves modifying/restructuring files, so that they take up less


space;
And this results in cost savings in cloud storage;

To take up less bandwidth;


Because data compression reduces the size of files to be transmitted over a network;

Note to examiners: Award [1] for a reason (for example, to save data usage for sending
files over the internet, to save storage capacity, to speed up file transfer, to decrease
costs for network bandwidth, etc.), and award [1] for an expansion.

22M.1.SL.TZ0.10

Award [2 max]
Standards ensure compatibility between nodes on the network;
Through the use of common techniques/protocols/language;

18N.1.SL.TZ0.1

Award [1] for identifying the nature of a network and [1] for a development of the first
point up to [2 max].

A group of computers and other computing hardware devices that are linked together
through communication channels/cables/wirelessly;
To enable communication (sharing files, sharing information) between systems/among
a wide range of users;

18N.1.SL.TZ0.5

https://pestle.pages.dev/app/ Page 24 of 29
QuestionBank Test 02/06/2025, 23:00

a.

Award [1] for each possible compatibility issue identified up to [2 max].

Language differences/different character set;


Different conventions of representing various data/currencies, dates, etc.;
Incompatible software/incompatible hardware;

b.

Award [1] for identifying how VPN will allow employees to communicate and [1]for a
development up to [2 max].

VPN allows secure communication with the Head Office in Asia;


A VPN is the company’s private network that uses a public network (in this situation
the Internet) to connect remote sites/employees together;
Privacy is protected using VPN tunneling;
VPN uses encrypted connections routed through the Internet from the company's
private network (Europe)to the remote site in Asia (or employee);
Hiding IP addresses to prevent unwanted exposure and data leaks;
Data security is ensured by encryption – anyone intercepting the encrypted data
cannot read it;

c. Award [1] for identifying an issue and [1] for an expansion up to [2 max].

Employees who will not be willing to move to Asia;


Lost jobs / finding new job / income decreased;

Employees who will move to Asia;


Personal or family issues during the period of moving or in a new environment /
finances and cost of living / services such as schools, hospitals, transport /
language problems;

18N.1.SL.TZ0.6

https://pestle.pages.dev/app/ Page 25 of 29
QuestionBank Test 02/06/2025, 23:00

Award [4 max].

Packet switching entails data being separated into specially formatted units (packets);
Each packet contains data and information such as packet number, address that
identifies the sending computer and intended recipient, etc.;
Packets are routed from source to destination using (different) network switches and
routers;
Using these addresses, network switches and routers determine how best to transfer
the packet on the path to its destination;
Packets are reassembled at the destination (using packet numbers);
If any of packets is missing it should be retransmitted;

18N.1.HL.TZ0.1

a.

Award [1] for identifying the nature of a network and [1] for a development of the
first point up to [2 max].

A group of computers and other computing hardware devices that are linked
together through communication channels/cables/wirelessly;
To enable communication (sharing files, sharing information) between
systems/among a wide range of users;

b.

Award [1] for a definition of the term bandwidth and [1] for a description of an issue
caused by low bandwidth up to [2 max].

Bandwidth indicates the maximum amount of data that can be transferred from one
point to another in a unit of time;

Low bandwidth means slow network performance / extended duration when


transferring large amounts of data / loss of users’ time (money) / the whole area (of
the users) is not covered;

18N.1.HL.TZ0.10

a.i.

Award [1] for each hardware security measure identified up to [1 max].

Retina scans;
Locked doors;
Alarms;
https://pestle.pages.dev/app/ Page 26 of 29
QuestionBank Test 02/06/2025, 23:00

Protection of equipment within the building;

a.ii. Award [1] for each software security measure identified up to [1 max].

Use of passwords;
Different access rights;
Encryption;

b. Award [1] for each network security measure identified up to [1 max].

Encryption;
UserID;
Trusted MAC addresses;

c. Award [3 max].

In case of leaks (depending on severity of problem) which could cause pollution


(any environmental problem);
Computer control system can react quickly/turn on and off appropriate devices
immediately/many times in a short interval of time/(increased efficiency);
Computer control systems are very reliable (will not be tired / will not lose
concentration);
(can continue to operate reliably 24 hours a day, 7 days a week) (increased level of
safety);
Control systems are reasonably cheap to run comparing to the cost involved in
situations which can harm environment (and human health) (reduction of costs);

d. Award [4 max].

Input from flow/pressure sensors is analog;


AD convertors are used to convert this analog data into digital form;
Processor performs / logical and arithmetical / operations;
The result of processing is in digital form so it should be converted (by AD
convertors) into analog form;
This signal is sent to output transducers (a device that converts energy from one
form to another) (for example, alarm sounds in the office);

e. Award [5 max].

Award [1] for sensor input.


Award [1] for manual input and validation/configuration.
Award [1] for a disk (which is holding data).
Award [1] for a monitoring process / checking whether input values exceed the
allowed range or not.
Award [1] for error routines performed.

Example 1
https://pestle.pages.dev/app/ Page 27 of 29
QuestionBank Test 02/06/2025, 23:00

Example 2

https://pestle.pages.dev/app/ Page 28 of 29
QuestionBank Test 02/06/2025, 23:00

https://pestle.pages.dev/app/ Page 29 of 29

You might also like