Practice A2 Networks with authentic IB Computer Science (First Exam 2027) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like programming concepts, algorithms, and data structures. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
A data centre implements various error detection and correction mechanisms for high-reliability storage systems.
Describe the capabilities and limitations of different error handling methods:
| Method | Detection Capabilities | Correction Abilities | Overhead Costs | Typical Applications |
|---|---|---|---|---|
| Parity Bits | Detects single-bit errors (simple parity); may detect odd number of errors | Cannot correct errors | Very low (1 bit per data unit) | Simple error detection in memory, serial communication |
| Checksums | Detects most errors, especially burst errors depending on algorithm | Cannot correct errors | Low to moderate (varies with checksum size) | Network protocols (TCP/IP), data integrity in files |
| CRC | Detects single-bit errors and burst errors up to polynomial length | Cannot correct errors | Moderate (e.g., 16 or 32 bits typical) | Data link layer protocols (Ethernet, USB), storage devices |
| Hamming Codes | Detects and corrects single-bit errors; detects double-bit errors | Corrects single-bit errors | Moderate (depends on block size, ~logâ‚‚(n) bits) | ECC RAM, low-error-rate communication systems |
| Reed-Solomon | Detects and corrects multiple symbol errors including burst errors | Corrects multiple errors | High (depends on block size and error correction strength) | CDs/DVDs, QR codes, satellite, deep-space comms, storage |
Explain why Reed-Solomon codes are specifically chosen for satellite communications and optical storage media.
A financial trading firm implements ultra-low latency networking for high-frequency trading operations.
Evaluate different latency optimization techniques including kernel bypass, RDMA, hardware timestamping, dedicated fiber, and FPGA processing. Discuss their latency reduction potential, implementation costs, complexity, and typical performance gains.
Explain the business impact of microsecond latency differences in high-frequency trading.
An autonomous vehicle manufacturer develops vehicle-to-everything (V2X) communication systems for traffic safety. Analyse different wireless communication technologies for V2X applications:
| Load Balancing Method | Decision Criteria | Response Time | Scalability | Complexity | Best Use Case |
|---|---|---|---|---|---|
| Round Robin | Predictable | Low | Medium | Low | Simple, evenly distributed traffic |
| Least Connections | Active connections | Medium | High | Medium | When server loads vary |
| Weighted Round Robin | Different server capacities | Low | High | Medium | Servers with varying power |
| Geographic | Geographic location | Low | High | High | User proximity-based routing |
Analyse different wireless communication technologies for V2X applications:
| Technology | Range | Latency | Bandwidth | Reliability | Infrastructure Required | Safety Application |
|---|---|---|---|---|---|---|
| DSRC (802.11p) | Not specified | <100 ms | High | Not specified | Not specified | Not specified |
(b) Evaluate the trade-offs between direct vehicle-to-vehicle communication and infrastructure-based communication for emergency braking scenarios.
A university campus network serves 25,000 students and 2,000 staff members across multiple buildings.
Design a network addressing scheme using the table below to accommodate the campus requirements:
| Building/Department | Users | Subnet | Subnet Mask | Available Addresses | Growth Capacity |
|---|---|---|---|---|---|
| Student Dormitories | 15,000 | 192.168.0.0/12 | Not specified | Not specified | Not specified |
| Academic Buildings | 8,000 | Not specified | 255.255.192.0 | Not specified | Good |
| Administration | 2,000 | 192.168.32.0/20 | Not specified | Not specified | Not specified |
| Guest Network | 2,000 | Not specified | 255.255.248.0 | Not specified | Limited |
Justify why VLANs would be beneficial for segmenting different user groups on this campus network.
A financial services company requires high-availability network connectivity for real-time trading operations.
Evaluate three different network redundancy methods (dual ISP links, link aggregation, and hot standby routers) in terms of their failover time, cost, and suitability for trading applications.
Explain why Quality of Service (QoS) is essential for trading applications and describe how priority queuing and traffic shaping mechanisms would be implemented.
A financial trading firm implements ultra-low latency networking for high-frequency trading operations.
Evaluate different latency optimization techniques including kernel bypass, RDMA, hardware timestamping, dedicated fiber, and FPGA processing. Discuss their latency reduction potential, implementation costs, complexity, and typical performance gains.
Explain the business impact of microsecond latency differences in high-frequency trading.
A government agency implements advanced persistent threat (APT) detection capabilities across its classified network infrastructure.
Develop a comprehensive APT detection strategy covering network traffic analysis, endpoint behaviour monitoring, email security, DNS monitoring, and user behaviour analytics. Discuss the technologies, detection methods, time requirements, and coverage areas for each layer.
Analyse the specific challenges of detecting APTs that employ "living off the land" techniques using legitimate system tools.
A virtual reality gaming company designs a network architecture to support multiplayer VR experiences with minimal latency.
Analyse the network performance requirements for VR gaming including bandwidth, latency, jitter, and packet loss tolerances. Discuss how these requirements differ from traditional online gaming.
Evaluate edge computing strategies for VR gaming, including content pre-positioning, local rendering, and predictive content delivery.
A financial institution detects and responds to sophisticated cyber attacks using advanced network security tools.
Compare the capabilities of different security tools: IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), and Network Analytics. Discuss their detection methods, response capabilities, scope, and automation levels.
Evaluate the role of Security Orchestration, Automation and Response (SOAR) in modern cybersecurity operations.
A smart city project implements IoT sensors throughout the urban area for traffic monitoring and environmental sensing.
Explain how the data volume requirements differ between traffic cameras, air quality sensors, and emergency alert systems in an IoT smart city deployment.
Compare LoRaWAN and 5G technologies for IoT applications, discussing their suitability for different sensor types in terms of power consumption, range, and latency.
Describe how edge computing architecture reduces network congestion in smart city IoT deployments.
Practice A2 Networks with authentic IB Computer Science (First Exam 2027) exam questions for both SL and HL students. This question bank mirrors Paper 1, 2, 3 structure, covering key topics like programming concepts, algorithms, and data structures. Get instant solutions, detailed explanations, and build exam confidence with questions in the style of IB examiners.
A data centre implements various error detection and correction mechanisms for high-reliability storage systems.
Describe the capabilities and limitations of different error handling methods:
| Method | Detection Capabilities | Correction Abilities | Overhead Costs | Typical Applications |
|---|---|---|---|---|
| Parity Bits | Detects single-bit errors (simple parity); may detect odd number of errors | Cannot correct errors | Very low (1 bit per data unit) | Simple error detection in memory, serial communication |
| Checksums | Detects most errors, especially burst errors depending on algorithm | Cannot correct errors | Low to moderate (varies with checksum size) | Network protocols (TCP/IP), data integrity in files |
| CRC | Detects single-bit errors and burst errors up to polynomial length | Cannot correct errors | Moderate (e.g., 16 or 32 bits typical) | Data link layer protocols (Ethernet, USB), storage devices |
| Hamming Codes | Detects and corrects single-bit errors; detects double-bit errors | Corrects single-bit errors | Moderate (depends on block size, ~logâ‚‚(n) bits) | ECC RAM, low-error-rate communication systems |
| Reed-Solomon | Detects and corrects multiple symbol errors including burst errors | Corrects multiple errors | High (depends on block size and error correction strength) | CDs/DVDs, QR codes, satellite, deep-space comms, storage |
Explain why Reed-Solomon codes are specifically chosen for satellite communications and optical storage media.
A financial trading firm implements ultra-low latency networking for high-frequency trading operations.
Evaluate different latency optimization techniques including kernel bypass, RDMA, hardware timestamping, dedicated fiber, and FPGA processing. Discuss their latency reduction potential, implementation costs, complexity, and typical performance gains.
Explain the business impact of microsecond latency differences in high-frequency trading.
An autonomous vehicle manufacturer develops vehicle-to-everything (V2X) communication systems for traffic safety. Analyse different wireless communication technologies for V2X applications:
| Load Balancing Method | Decision Criteria | Response Time | Scalability | Complexity | Best Use Case |
|---|---|---|---|---|---|
| Round Robin | Predictable | Low | Medium | Low | Simple, evenly distributed traffic |
| Least Connections | Active connections | Medium | High | Medium | When server loads vary |
| Weighted Round Robin | Different server capacities | Low | High | Medium | Servers with varying power |
| Geographic | Geographic location | Low | High | High | User proximity-based routing |
Analyse different wireless communication technologies for V2X applications:
| Technology | Range | Latency | Bandwidth | Reliability | Infrastructure Required | Safety Application |
|---|---|---|---|---|---|---|
| DSRC (802.11p) | Not specified | <100 ms | High | Not specified | Not specified | Not specified |
(b) Evaluate the trade-offs between direct vehicle-to-vehicle communication and infrastructure-based communication for emergency braking scenarios.
A university campus network serves 25,000 students and 2,000 staff members across multiple buildings.
Design a network addressing scheme using the table below to accommodate the campus requirements:
| Building/Department | Users | Subnet | Subnet Mask | Available Addresses | Growth Capacity |
|---|---|---|---|---|---|
| Student Dormitories | 15,000 | 192.168.0.0/12 | Not specified | Not specified | Not specified |
| Academic Buildings | 8,000 | Not specified | 255.255.192.0 | Not specified | Good |
| Administration | 2,000 | 192.168.32.0/20 | Not specified | Not specified | Not specified |
| Guest Network | 2,000 | Not specified | 255.255.248.0 | Not specified | Limited |
Justify why VLANs would be beneficial for segmenting different user groups on this campus network.
A financial services company requires high-availability network connectivity for real-time trading operations.
Evaluate three different network redundancy methods (dual ISP links, link aggregation, and hot standby routers) in terms of their failover time, cost, and suitability for trading applications.
Explain why Quality of Service (QoS) is essential for trading applications and describe how priority queuing and traffic shaping mechanisms would be implemented.
A financial trading firm implements ultra-low latency networking for high-frequency trading operations.
Evaluate different latency optimization techniques including kernel bypass, RDMA, hardware timestamping, dedicated fiber, and FPGA processing. Discuss their latency reduction potential, implementation costs, complexity, and typical performance gains.
Explain the business impact of microsecond latency differences in high-frequency trading.
A government agency implements advanced persistent threat (APT) detection capabilities across its classified network infrastructure.
Develop a comprehensive APT detection strategy covering network traffic analysis, endpoint behaviour monitoring, email security, DNS monitoring, and user behaviour analytics. Discuss the technologies, detection methods, time requirements, and coverage areas for each layer.
Analyse the specific challenges of detecting APTs that employ "living off the land" techniques using legitimate system tools.
A virtual reality gaming company designs a network architecture to support multiplayer VR experiences with minimal latency.
Analyse the network performance requirements for VR gaming including bandwidth, latency, jitter, and packet loss tolerances. Discuss how these requirements differ from traditional online gaming.
Evaluate edge computing strategies for VR gaming, including content pre-positioning, local rendering, and predictive content delivery.
A financial institution detects and responds to sophisticated cyber attacks using advanced network security tools.
Compare the capabilities of different security tools: IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), and Network Analytics. Discuss their detection methods, response capabilities, scope, and automation levels.
Evaluate the role of Security Orchestration, Automation and Response (SOAR) in modern cybersecurity operations.
A smart city project implements IoT sensors throughout the urban area for traffic monitoring and environmental sensing.
Explain how the data volume requirements differ between traffic cameras, air quality sensors, and emergency alert systems in an IoT smart city deployment.
Compare LoRaWAN and 5G technologies for IoT applications, discussing their suitability for different sensor types in terms of power consumption, range, and latency.
Describe how edge computing architecture reduces network congestion in smart city IoT deployments.