Lesson
Yr 11 - AQA GCSE Computer Science-Computer networks revision
12 hours ago by
ian_scott_74995
Save
Edit
Instructor-led session
Live lessonStart a live lesson
Asynchronous learning
AssignAssign homework
19 slides PreviewShow answers
  • Slide 1
    Report an issue

    Yr 11 - AQA GCSE Computer Science-Computer networks revision

    Text
  • Slide 2
    Report an issue

    Computer networks

    Computers and other technological/electronic devices can be connected together in a number of different ways.


    Depending on the device and the range of communications, we can classify the networks as PAN, LAN or WAN.


    What respective areas/how large areas do each of these networks cover?

  • Question 3
    30 seconds
    Report an issue
    Q.

    One of the network systems which can be created is a PAN. What communications protocol/method does a PAN use?

    answer choices

    Bluetooth

    WiFi

    Radio

    Ethernet

  • Slide 4
    Report an issue

    Physical wired networks

    Wired networks can be connected via different wiring systems.


    Wired networks can be cabled using copper cables or fibre-optics.


    What are the respective advantages/disadvantages of these different cabling systems?

  • Question 5
    45 seconds
    Report an issue
    Q.

    When setting up cabled networks - they can be constructed as which TWO different network topologies?

    answer choices

    Ethernet

    Bus

    Star

    LAN

  • Slide 6
    Report an issue

    Communications protocols

    For devices on any communications networking system - the information flowing along the network will be using different communications protocols (depending on the data/information being communicated).


    Communications protocols... a system of rules that allow two systems to exchange information.


    Typical communications protocols include: TCP, UDP, HTTP, HTTPS, FTP, SMTP and IMAP

  • Question 7
    45 seconds
    Report an issue
    Q.

    Which TWO of the communications protocols are used in e-mail communications and exchanges?

    answer choices

    IMAP

    SMTP

    FTP

    HTTP

  • Slide 8
    Report an issue

    Network security

    There are multiple ways of keeping networks secure - preventing unauthorised users from making use of your network, or preventing unauthorised people from 'reading' the data being sent across your network.


    What is the term given to making information 'unreadable' by unauthorised users, even if they 'intercept' the data packets?

  • Question 9
    30 seconds
    Report an issue
    Q.

    For any device attached to a network, which communicates and sends/receives data across the network - it has TWO unique numbers associated with it.


    What is the name, or term given to the number on the TOP of this image - 9C-35-5B-5F4C-D7 - which uniquely identifies this hardware?

    answer choices

    domain name

    Ethernet address

    IP address

    MAC address

  • Slide 10
    Report an issue

    Networking with TCP/IP

    For all devices on a TCP/IP network - when the client sends the data to another system or device, the data must go through a number of levels.


    These levels are part of the 4-layer TCP/IP model.


    Application - software applications sit at this level

    Transport - sets up/creates the data packets

    Internet - addresses the packets

    Link/Network - manages the packets through the network cards

  • Question 11
    30 seconds
    Report an issue
    Q.

    Which layer of the 4-layer TCP/IP model would an e-mail program, or web browser be at/sit?

    answer choices

    application

    transport

    internet

    network/link

  • Slide 12
    Report an issue

    Data packets

    All network/Internet communications splits data into packets.


    Each data packet is made up of a number of different parts.

  • Question 13
    45 seconds
    Report an issue
    Q.

    As computers send data to another computer - the receiver's IP address is included on the packet. Why does a packet need to include the sender's IP address?

    answer choices

    To know where the packet came from

    To be able to ask for the packet to be sent again in case of packet corruption

    To ensure both computer systems are compatible

    To be able to scan for viruses

  • Slide 14
    Report an issue

    PANs, LANs, WANs and connections

    It is possible to connect devices in PANs, LANs and WANs in a number of different ways, using a range of different communication protocols, and using a range of different hardware.


    How does the hardware and communications protocol(s) differ in these three different types of network?

  • Question 15
    30 seconds
    Report an issue
    Q.

    Wired networks can use fibre-optic cables... or copper cables. Which one of these is less likely to suffer from interference (from electromagnetic interference), can be used to communicate over very long distances but costs more money?

    answer choices

    Copper cable

    Fibre-optic cable

  • Question 16
    Ungraded
    30 seconds
    Report an issue
    Q.

    Data sent from one device (over a network) to another device... is split up into packets ... sent using TCP or UDP protocols


    Some data is 'more important' than others - all the data packets (for some applications) must arrive uncorrupted!


    BUT sometimes we prefer 'speed' over accuracy... which one of these communications protocols might be best suited for online gaming?

    no correct answer
  • Slide 17
    Report an issue

    Networks and security

    For any computer system/device attached to a network - there is a potential risk/threat to that system or device.


    There are a number of ways of protecting those network-attached devices, including (but not limited to):

    - firewalls - will 'reject' any suspicious data packets, stop any blacklisted IP address attacks

    - MAC address filtering - accept only white-listed MAC addresses

    - authentication

    - encryption

  • Question 18
    45 seconds
    Report an issue
    Q.

    Which of the following could be considered as suitable authentication methods to ensure only permitted users can access computer networks using their devices?

    answer choices
  • Slide 19
    Report an issue

    The end!

    Text
Report an issue
Why show ads?
Report Ad
Lessonsnew
Enter Code