Unit 3 - Networks
Unit 3 - Networks
Questions
21M.1.SL.TZ0.6
Identify two reasons why fibre optic cable would be preferred over wireless
connectivity.
21M.1.SL.TZ0.9
21M.1.SL.TZ0.12
https://pestle.pages.dev/app/ Page 1 of 29
QuestionBank Test 02/06/2025, 23:00
A school currently has a cabled network but wants to add wireless networking across
the whole campus.
There are concerns that unauthorized people could access the data on the wireless
network.
The school has decided to implement a virtual private network (VPN) to provide
access to its network.
a.
Describe two hardware components the school will need to implement the
wireless network.
[4]
b. Identify two advantages to the students of the new wireless network. [2]
c.
Outline two methods the school could employ to prevent network data from
being accessed over their wireless system.
[4]
d. Identify two technologies the school would require to provide a VPN. [2]
e.
Explain one benefit to the staff of using a VPN to remotely access the school
network.
[3]
19M.1.SL.TZ0.11
Outline one reason why protocols are used in communications between computers.
19M.1.SL.TZ0.12
19M.1.SL.TZ0.13
https://pestle.pages.dev/app/ Page 2 of 29
QuestionBank Test 02/06/2025, 23:00
19M.1.SL.TZ0.15
A company that provides training for teachers plans to set up a training room in its
offices with a network of 15 computers. Each computer has 1 TB of storage and 16 GB
of random access memory (RAM).
In order to minimize costs, the company decided only to install general application
software on the training computers.
The company has decided to allow the teachers to use their own devices in its training
room by adding wireless networking.
c.
Identify two types of general application software that would be installed on the
training computers.
[2]
d.i. Outline one advantage to the company of implementing this change. [2]
[2]
e. Describe one method of security that may be used on this wireless network.
[2]
f.
Explain why the speed of data transmission on the wireless network in the
training room may vary.
[4]
20N.1.SL.TZ0.7
https://pestle.pages.dev/app/ Page 3 of 29
QuestionBank Test 02/06/2025, 23:00
A school has a local area network (LAN) connecting its computers and peripheral
devices. The LAN also provides access to the internet.
Users have been troubled by slow speeds when accessing the internet.
b.
Outline two reasons why there might be a reduction in data transmission speed
at certain times.
[4]
c.
Outline two measures that the school could take to safeguard its data from
unlawful access via the internet.
[4]
d.
The inventory of office supplies used in the school is stored on the computer as a
single file.
Each of the office supplies in the inventory (such as paper, ink, toner, printers,
pens, staplers, pencils and scissors) has a unique ID number, name, maximum
quantity, minimum quantity and remaining quantity.
Outline the steps in an algorithm that would output a list of supplies with the
quantity to be ordered.
[4]
18M.1.SL.TZ0.6
18M.1.SL.TZ0.7
18M.1.SL.TZ0.11
https://pestle.pages.dev/app/ Page 4 of 29
QuestionBank Test 02/06/2025, 23:00
A company has expanded its office space into nearby rooms and has decided to set up
a local area network (LAN) to support its operations.
The LAN will connect the room where the server is installed to new computers in the
additional office space. The network engineer produced the following Gantt chart for
this task.
d.
After 5 years the company decided to replace the LAN with a wireless local area
network (WLAN).
Discuss any two of these issues and the ways in which the company might
https://pestle.pages.dev/app/ Page 5 of 29
QuestionBank Test 02/06/2025, 23:00
resolve them.
[4]
f.
Explain how setting up a virtual private network (VPN) would provide a suitable
solution.
[4]
19N.1.SL.TZ0.9
https://pestle.pages.dev/app/ Page 6 of 29
QuestionBank Test 02/06/2025, 23:00
a.
[4]
b.i.
[2]
b.ii.
[2]
e.
Evaluate the use of trusted media access control (MAC) addresses as one method
of network security.
[4]
17N.1.SL.TZ0.12
https://pestle.pages.dev/app/ Page 7 of 29
QuestionBank Test 02/06/2025, 23:00
A wireless local area network (WLAN) is used to extend access to a school’s wired
local area network.
The advantages of this WLAN are user-mobility and economical access points.
a. Identify one hardware component of the WLAN, other than computers. [1]
c.
Identify three ways in which the network administrator can reduce the risk of
unauthorized access to confidential data.
[3]
e.
[6]
22M.1.SL.TZ0.3
Identify two differences between a wide area network (WAN) and a local area network
(LAN).
22M.1.SL.TZ0.4
https://pestle.pages.dev/app/ Page 8 of 29
QuestionBank Test 02/06/2025, 23:00
22M.1.SL.TZ0.10
Outline one reason for the use of standards in the construction of networks.
18N.1.SL.TZ0.1
18N.1.SL.TZ0.5
An international company is in the process of moving its Head Office from Europe to
Asia.
b.
Outline how a virtual private network (VPN) will allow employees who are in
Europe to communicate with the Head Office in Asia.
[2]
18N.1.SL.TZ0.6
18N.1.HL.TZ0.1
a.
[2]
[2]
https://pestle.pages.dev/app/ Page 9 of 29
QuestionBank Test 02/06/2025, 23:00
18N.1.HL.TZ0.10
An oil and gas company has a networked computer system for use of their employees
in the Head Office.
The company also uses the internet to enable communication with employees working
on exploration and production in many remote geographical areas.
The sub-sea oil and gas exploration and production unit of the company relies on
thousands of kilometres of pipeline which are monitored by a computer control system
which can detect leaks.
The process of detecting leaks is carried out by sensors which are continuously
monitoring changes in the flow and pressure of the liquids in the pipes.
If any of sensor values are outside of the acceptable parameters stored on a disk in the
office, the following error routines are performed:
a.i.
Identify one hardware security measure that will ensure that confidential data
from the Head Office cannot be accessed.
[1]
a.ii.
Identify one software security measure that will ensure that confidential data
from the Head Office cannot be accessed.
[1]
c.
[3]
d.
https://pestle.pages.dev/app/ Page 10 of 29
QuestionBank Test 02/06/2025, 23:00
d.
[4]
https://pestle.pages.dev/app/ Page 11 of 29
QuestionBank Test 02/06/2025, 23:00
Markschemes
21M.1.SL.TZ0.6
Award [2 max]
Fibre optics allow faster transmission speeds;
Fibre optic cables are more secure/harder to break into;
Fibre optic cable transmission is more reliable/less likely to suffer interference;
Fibre optics allow transmission over longer distance;
Fibre optics allow greater bandwidth;
21M.1.SL.TZ0.9
Award [1 max]
A unit of data made into a single unit (that travels along a given network path);
A data packet travels through a network as a unit i.e. with all parts kept together;
21M.1.SL.TZ0.12
a.
Award [4 max]
(Wireless) router;
A central hub for all the computers to connect to;
Enables wireless network packet forwarding and routing;
Wireless repeaters;
To expand the reach of the network;
Mark as 2 and 2.
b.
Award [2 max]
The ability to use their own devices at school;
The ability to access the school network from anywhere in the school;
No cables laid, so reduces the risk of tripping over cables;
https://pestle.pages.dev/app/ Page 12 of 29
QuestionBank Test 02/06/2025, 23:00
d. Award [2 max]
Client VPN software (to make a secure remote connection);
VPN-aware routers and firewalls (to permit VPN traffic to pass);
VPN appliance/server (to handle incoming VPN traffic);
Encryption protocol IPSec or SSL;
e. Award [3 max]
Enhanced security of data;
for example, using encryption;
This prevents unauthorised access;
19M.1.SL.TZ0.11
Award [2 max].
To provide a set of rules/procedures;
To enable two or more different electronic devices/computers/entities to understand
each other during data transfer / enable successful communication;
19M.1.SL.TZ0.12
Award [2 max].
Smallest type of network;
Consists of connected devices in close proximity to the individual using them;
Connected via Bluetooth/wireless;
Suitable example: smartphone to car connection;
https://pestle.pages.dev/app/ Page 13 of 29
QuestionBank Test 02/06/2025, 23:00
19M.1.SL.TZ0.13
Award [3 max].
A message/the data is broken into a number of parts;
Which are sent independently;
…over the optimum route for each packet;
The individual parts are reassembled at the destination;
Each packet contains the (IP) address of both the sender and recipient;
19M.1.SL.TZ0.15
a.
Award [2 max].
RAM is volatile / contents erased when power is switched off;
Access speed is fast / faster than hard drive;
Data / instructions can be read from and written to it / /RAM can be overwritten;
Size is limited;
c. Award [2 max].
Word processor;
Spreadsheet;
Database management system;
Email;
Web browser;
Allow any general purpose application that is appropriate for a ‘training room
computer’
Trainees / teachers likely to be more familiar with software on own machine (and
how new training software interacts with OS / user interface);
Making training sessions more efficient / allowing trainer to concentrate on the
training rather than using generic applications;
e.
Award [2 max]
Encryption;
Scrambles the contents of the network transmissions so that if they are intercepted
they can’t be understood (without the decryption key);
Firewall;
Checks traffic coming into the network and leaving the network, and can block
suspicious data;
f. Award [4 max].
Mark as [2] and [2].
20N.1.SL.TZ0.7
a.
Award [3 max].
controls the flow of data in the network;
https://pestle.pages.dev/app/ Page 15 of 29
QuestionBank Test 02/06/2025, 23:00
b. Award [4 max].
malicious software/spyware/malware / viruses;
attacking the system;
Note: There are many types of internet connection: wireless connections, wireless
hotspots, mobile internet, broadband connections, fixed wireless and satellite
connection, cable, DSL;
hardware malfunction;
internet speed can considerably slow down if modem-router configuration is not
correct / updated;
external factors;
during the peak hours of daytime the most visited websites encounter more
network traffic than what has been anticipated;
NOTE: Accept examples. For example, too many students try to connect to an e-
learning site at the same time.
Mark as 2 and 2
c. Award [4 max].
Preventing unauthorized access/No access without user names/passwords;
which should be regularly changed/made difficult to guess;
Mark as 2 and 2
d.
Award [4 max].
Award [1] for looping through the inventory file;
Award [1] for reading the supply data record (ID number, name, maximum quantity,
minimum quantity and remaining quantity);
Award [1] for checking if the quantity remaining is less than minimum quantity;
Award [1] If so, calculate the quantity to be ordered (number to buy) / as the
maximum quantity minus the quantity remaining;
Award [1] for outputting the name/ID number of the office supply and the number
to buy;
Example 1:
Example 2:
18M.1.SL.TZ0.6
Award 2 marks if two of the contents of a packet are given and expanded.
18M.1.SL.TZ0.7
https://pestle.pages.dev/app/ Page 17 of 29
QuestionBank Test 02/06/2025, 23:00
18M.1.SL.TZ0.11
a.
b.
Install connectors on wall of server room AND Install connector on wall of new office
space;
OR Test the cabling AND Connect the new computers with the cabling;
c. Any pair of tasks that are NOT a correct answer to part (b);
Allows BYOD:
Which could lead to greater productivity (as familiarity with device);
Reduces wiring;
Therefore improved safety for employees;
e. Mark as [2] and [2]. The data can be intercepted as it goes through “the air”;
Can be resolved by strong encryption/protocols;
WPA-2 / a description of WPA-2;
Use of trusted MAC addresses;
Regular changes of router password; [2 max]
https://pestle.pages.dev/app/ Page 18 of 29
QuestionBank Test 02/06/2025, 23:00
f.
19N.1.SL.TZ0.9
a.
Award [4 max]
File sharing/resource sharing;
instead of using a disk or USB key to carry files from one computer to another files
can be shared directly using a network/all computers in the network can share
resources such as printers, scanners;
Communication;
students/teachers can communicate with people around the world via the
network;
Interactive teamwork;
software (like Microsoft Office) enables many users to contribute to a document
concurrently;
Flexible access;
network allows students to access files from different computers (throughout the
network) (one can begin work on a project on one computer and finish up on
another);
Software cost;
https://pestle.pages.dev/app/ Page 19 of 29
QuestionBank Test 02/06/2025, 23:00
Software management;
load software on the server saves time compared to installing and tracking files on
independent computers/upgrades are also easier because changes only have to be
done once on the file server instead of on individual computers;
b.i.
Award [2 max]
A network router is a hardware device that is connected to multiple channels for
different networks;
through an interface that is situated on each network;
b.ii.
Award [2 max]
Network interface cards are used to connect each computer to the network;
so they can communicate with the network router to receive information packets;
c.
Award [2 max]
Protocols define the rules that govern network communication (for example, packet
format, type and size, what happens when an error occurs, and which part of the
network is supposed to handle the error and how);
switches, hubs and network interface cards) and the equipment comes from
different vendors, but they must all work together or the network does not operate
correctly;
Protocols work in layers (the highest being what the user sees, and the lowest
being the wire that the information is transferred along) and these layers
communicate with each other according to the rules (allowing communication to
occur accurately and efficiently);
d.
Award [1 max]
Data encryption refers to calculations/algorithms that transform plain text into a
form that is non-readable to unauthorized parties (authorized recipient of an
encrypted text uses a key and the algorithm to decrypt the data/ to transform it to
the original plain text version);
e. Award [4 max]
Each (wireless network) adapter has a unique label called a MAC address;
One disadvantage is that the whitelist should be amended any time a new device is
purchased / when access to guests should be granted;
Also this method is useless against hackers who use programs which intercept data
passing through network and report the MAC address of any device communicating
on the network;
17N.1.SL.TZ0.12
a.
Award up to [1 max].
Wireless router/modem;
Access points;
Switch;
Wireless repeater/extender/booster;
b.
Award [1] for identifying a disadvantage and [1] for an expansion, for two
disadvantages up to [4 max].
Note: Accept any reasonable points, provided they are appropriately elaborated.
c.
Award up to [3 max].
Give each user appropriate login details/passwords;
Different access rights for students, teachers, school administrators (file-level and
share-level security);
All passwords and files should be encrypted;
Use the latest WiFi protocol/WPA2;
Require MAC address authentication;
Password protect the documents;
Note: the focus of the question is on confidential data (firewalls not accepted)
Award up to [3 max] for added detail that references the contents of the given data
packet in the answer.
Data is organized in specially formatted units (data packets) which are routed from
source to destination using network switches and routers;
Network switches and routers determine how best to transfer the packet between
a number of intermediate devices (routers and switches) on the path to its
https://pestle.pages.dev/app/ Page 22 of 29
QuestionBank Test 02/06/2025, 23:00
destination (rather than flowing directly over a single wire on the path to its
destination);
22M.1.SL.TZ0.3
Award [2 max].
WAN covers a much larger area (national/international), LANs usually cover a smaller
area (such as a single site);
Nodes connected to WANs often make use of connections through public networks
(such as the telephone system), nodes connected to LANs are usually connected
through private infrastructure;
LANs are more secure than WANs (due to how WANs transmit the data /how far the
data would need to travel);
A higher bandwidth is available for transmission in a LAN than a WAN/ LANs can have
a higher data transfer rate than a WAN;
LAN is typically cheaper than WAN to implement/ maintain (as the equipment
required for LAN is less expensive);
WAN includes a large number of devices connected together, LAN includes less;
WANs are typically slower than LANs due to the distance data must travel;
WAN requires hardware to connect different networks, such as a router, LAN can be
simple and does not need to connect to other networks;
22M.1.SL.TZ0.4
https://pestle.pages.dev/app/ Page 23 of 29
QuestionBank Test 02/06/2025, 23:00
Award [2 max].
The reason for compression when transmitting data is to save on transfer times;
As it reduces the number of bits needed to represent data (when compared with the
original data);
Note to examiners: Award [1] for a reason (for example, to save data usage for sending
files over the internet, to save storage capacity, to speed up file transfer, to decrease
costs for network bandwidth, etc.), and award [1] for an expansion.
22M.1.SL.TZ0.10
Award [2 max]
Standards ensure compatibility between nodes on the network;
Through the use of common techniques/protocols/language;
18N.1.SL.TZ0.1
Award [1] for identifying the nature of a network and [1] for a development of the first
point up to [2 max].
A group of computers and other computing hardware devices that are linked together
through communication channels/cables/wirelessly;
To enable communication (sharing files, sharing information) between systems/among
a wide range of users;
18N.1.SL.TZ0.5
https://pestle.pages.dev/app/ Page 24 of 29
QuestionBank Test 02/06/2025, 23:00
a.
b.
Award [1] for identifying how VPN will allow employees to communicate and [1]for a
development up to [2 max].
c. Award [1] for identifying an issue and [1] for an expansion up to [2 max].
18N.1.SL.TZ0.6
https://pestle.pages.dev/app/ Page 25 of 29
QuestionBank Test 02/06/2025, 23:00
Award [4 max].
Packet switching entails data being separated into specially formatted units (packets);
Each packet contains data and information such as packet number, address that
identifies the sending computer and intended recipient, etc.;
Packets are routed from source to destination using (different) network switches and
routers;
Using these addresses, network switches and routers determine how best to transfer
the packet on the path to its destination;
Packets are reassembled at the destination (using packet numbers);
If any of packets is missing it should be retransmitted;
18N.1.HL.TZ0.1
a.
Award [1] for identifying the nature of a network and [1] for a development of the
first point up to [2 max].
A group of computers and other computing hardware devices that are linked
together through communication channels/cables/wirelessly;
To enable communication (sharing files, sharing information) between
systems/among a wide range of users;
b.
Award [1] for a definition of the term bandwidth and [1] for a description of an issue
caused by low bandwidth up to [2 max].
Bandwidth indicates the maximum amount of data that can be transferred from one
point to another in a unit of time;
18N.1.HL.TZ0.10
a.i.
Retina scans;
Locked doors;
Alarms;
https://pestle.pages.dev/app/ Page 26 of 29
QuestionBank Test 02/06/2025, 23:00
a.ii. Award [1] for each software security measure identified up to [1 max].
Use of passwords;
Different access rights;
Encryption;
Encryption;
UserID;
Trusted MAC addresses;
c. Award [3 max].
d. Award [4 max].
e. Award [5 max].
Example 1
https://pestle.pages.dev/app/ Page 27 of 29
QuestionBank Test 02/06/2025, 23:00
Example 2
https://pestle.pages.dev/app/ Page 28 of 29
QuestionBank Test 02/06/2025, 23:00
https://pestle.pages.dev/app/ Page 29 of 29