LogoLogo
    Logo
    • TutoringSchools
    1. Home
    2. IB
    3. Computer Science (CS)
    4. Questions

    Question
    SLPaper 1
    1.

    Define the term data encryption.

    [1]
    Verified
    Solution

    Definition

    Data encryption refers to latex{latex}latexcalculations/algorithms$$ that transform plain text into a non-readable form for unauthorized parties. The authorized recipient uses a key and the algorithm to decrypt the data and transform it back to the original plain text version. 1 mark

    2.

    Outline why protocols are necessary.

    [2]
    Verified
    Solution

    Award 2max2 max2max
    Protocols define the rules that govern network communication (for example, packet format, type and size, what happens when an error occurs, and which part of the network is supposed to handle the error and how);

    Computer networks consists of various types of equipment (such as routers, switches, hubs and network interface cards) and the equipment comes from different vendors, but they must all work together or the network does not operate correctly;

    Protocols work in layers (the highest being what the user sees, and the lowest being the wire that the information is transferred along) and these layers communicate with each other according to the rules (allowing communication to occur accurately and efficiently);

    3.

    Evaluate the use of trusted media access control (MAC) addresses as one method of network security.

    [4]
    Verified
    Solution

    Method #1

    Each (wireless network) adapter has a unique label called a MAC address; 1 mark

    Routers uses these addresses to identify/authenticate computers (routers include an option to whitelist or blacklist certain devices based on MAC addresses, so access could be restricted to any device which is not in the whitelist); 1 mark

    One disadvantage is that the whitelist should be amended any time a new device is purchased / when access to guests should be granted; 1 mark

    Also this method is useless against hackers who use programs which intercept data passing through network and report the MAC address of any device communicating on the network; 1 mark

    4.

    Describe the purpose of the following hardware component of a network: Network interface card (NIC)

    [2]
    Verified
    Solution

    Method #1

    A network interface card (NIC) is used to 1 mark:

    • Connect each computer to the network
    • Allow the computer to communicate with the network router and receive information packets

    Additionally, NICs 1 mark:

    • Determine the infrastructure of a local area network (LAN)
    • Allow all computers to connect to the network

    Sign up for free to view this answer

    5.

    Outline two advantages of a school using a computer network.

    [4]
    Verified
    Solution

    Award 4max4 max4max
    File sharing/resource sharing;
    instead of using a disk or USB key to carry files from one computer to another files can be shared directly using a network/all computers in the network can share resources such as printers, scanners;

    Communication;
    students/teachers can communicate with people around the world via the network;

    Interactive teamwork;
    software (like Microsoft Office) enables many users to contribute to a document concurrently;

    Flexible access;
    network allows students to access files from different computers (throughout the network) (one can begin work on a project on one computer and finish up on another);

    Software cost;
    software products are available for networks at a substantial savings in comparison to buying individually licensed software;

    Software management;
    load software on the server saves time compared to installing and tracking files on independent computers/upgrades are also easier because changes only have to be done once on the file server instead of on individual computers;

    Improved network security;
    if the school has its own network, it can monitor network traffic / can create a security culture (everyone who has a username and password is responsible for keeping data secure);

    Mark as 222 and 222.

    Sign up for free to view this answer

    6.

    Describe the purpose of the following hardware component of a network: Router

    [2]
    Verified
    Solution

    Describe the purpose of the following hardware component of a network: Router

    • A network router is a hardware device that is connected to multiple channels for different networks through an interface that is situated on each network. 1 mark

    • Router acts as a processing unit for information packets; it duplicates information packets for use during transmission from one network to another. 1 mark

    • The router uses a protocol or set of rules to determine which information packets are to be routed to certain interfaces within the network. 1 mark

    3

    Sign up for free to view this answer

    Still stuck?

    Get step-by-step solutions with Jojo AI

    FreeJojo AI

    Want more practice questions for Computer Science (CS)?

    Related topics


    Join 350k+ students using RevisionDojo today

    Footer

    General

    • About us
    • Mission
    • Tutoring
    • Blog
    • State of learning surveyNew

    • Trustpilot
    • Contact us
    • Join us We're hiring!

    Features

    • Jojo AI
    • Questionbank
    • Study notes
    • Flashcards
    • Test builder
    • Exam mode
    • Coursework
    • IB grade calculator

    Legal

    • Terms and conditions
    • Privacy policy
    • Cookie policy
    • Trust Center

    IB

    • Biology (New syllabus)
    • Business Management
    • Chemistry (New syllabus)
    • Chinese A Lang & Lit
    • Chinese B
    • Computer Science (CS)
    • Design Technology (DT)
    • Digital Society (DS)
    • Economics
    • English B
    • View more...
    Logo

    © 2022 - 2025 RevisionDojo (MyDojo Inc)

    RevisionDojo was developed independently of the IBO and as such is not endorsed by it in any way.

    SAT® is a trademark registered and owned by the College Board®, which is not affiliated with and does not endorse this product or site.

    RedditInstagramTikTokDiscord
    GDPR compliant