IB Comp Sci topic 3 (old questions)

studied byStudied by 1 person
5.0(1)
get a hint
hint

Outline two precautions that a mobile device user can take to prevent their data from being compromised if they lose their mobile device.

1 / 44

Tags and Description

all topic 3 questions + answers from before 2014

45 Terms

1

Outline two precautions that a mobile device user can take to prevent their data from being compromised if they lose their mobile device.

Assign a password to the device; So it cannot be accessed by an unauthorized user and do not store sensitive data on the smartphone; So that it is not there to be found if the device is lost

New cards
2

Compare the use of Ethernet with Bluetooth for data communication in smartphones.

Bluetooth is much slower than Ethernet; Ethernet requires a physical connection, Bluetooth does not; Ethernet is more secure than Bluetooth; An Ethernet network requires additional hardware (routers, hubs, etc). Bluetooth does not;

New cards
3

Discuss the advantages of letting a mobile device transmit the user’s location.

Emergency services can locate a distress call; Friends can see where you are and meet you; Advertisements could be tailored for things that are near you.

New cards
4

Discuss the disadvantages of letting a mobile device transmit the user’s location.

Illegal surveillance is possible; Advertisers could profile your physical habits as well as your online; Loss of location information (eg in a tunnel) could create erroneous data in systems.

New cards
5

Outline one way in which this use can harm the health of mobile phone users.

By being too engaging; Causing the user to not pay attention to the real world

By taking up too much of the users’ time; Causing them to exercise or socialize less

New cards
6

Explain two consequences of the change of protocols for 4G phones.

Seamless integration with internet service; Allows more effective communication.

The IP routing/handling hardware and software design is standard; So designs can be re-used thereby reducing unit.

New cards
7

Discuss the positive effects that the widespread ownership of smartphones is having on students

Contact teachers with queries

Research topics

Replace expensive textbooks

Make study schedules

Store PowerPoint presentations

New cards
8

Discuss the negative effects that the widespread ownership of smartphones is having on students

Become a distraction in class

Reliance on smartphones as knowledge source Plagiarism issues

Cheating in exams

New cards
9

State two differences between Wi-Fi and WiMAX

WiMax has much greater range than Wi-Fi, WiMax has a greater bandwidth than Wi-Fi, WiMax is more secure than Wi-Fi

New cards
10

State two differences between Wi-Fi and Bluetooth

Bluetooth has much less range than Wi-Fi, Bluetooth has much less power than Wi-Fi, Bluetooth cannot work through building walls, Wi-Fi can.

New cards
11

Describe the purpose and structure of a data packet

A standard message format used within a network, contains header and data, header identifies sender and recipient.

New cards
12

Compare the transfer of data in a 4G cellular network to that of a wired Internet connection.

4G bandwidth is shared with others users, wired access is dedicated; wired access only available in one place,4G accessible everywhere; wired access more reliable than 4G.

New cards
13

Define the terms client and server in terms of a computer network

Client: process of desk top computer or terminal that make requests from a server in a network.

Server: computer system (hardware and software) that controls and co-ordinates clients requests to use or access a major function on a network.

New cards
14

State two functions included in a network data community protocol

Control the error checking, control the structure of the bit packets, control the error correction

New cards
15

Explain one advanatge of a star network topology over a bus network topology.

reduces congestion as a network link is not shared, reduces full network failure because if hub to device cable breaks the entire network can continue to function, additional lines can be added without causing disruption to other network devices.

New cards
16

Outline one key task a packet network protocol must be able to achieve.

packets can be shipped via any combination of nodes, hence the protocol must be able to enable the packets to be assembled into the correct order at the receiving end.

New cards
17

State two network topologies.

Star, Bus, Ring

New cards
18

Outline the need for a protocol in data transmission across a network.

To establish standard method, for transferring data between devices.

New cards
19

In relation to computer networks, define the meaning of the term wide area network

WAN; communications network that connects geographically dispersed hosts. These are often used by multi-national companies.

New cards
20

Outline three characteristics of a communications network.

Network is a collection of data communication hardware, Connected in a way to allow users to share resources, Communications media.

New cards
21

Describe how a check sum could ensure data integrity in the transmission of data.

Checksum is computed from data, Groups of bits, are added before transmission and the sum appended to the group, When the data is received the actual sum is compared with the check sum.

New cards
22

A hospital has a large networked computer system. Data in the computer system in confidential. Identify two ways in which the security of the network within the hospital can be ensured.

Each user should have a personal password, Passwords should be regularly changed, Each computer should have access rights depending on its location.

New cards
23

Describe how data could be recovered in case of corruption.

All data files should be backed up, Backing up needs to be performed daily/weekly, In case of corruption the most recent backup of the master file is loaded.

New cards
24

Outline the network administrator can reduce the risk that sensitive patient data is seen by someone other than a doctor.

Each user should have appropriate access rights, Passwords should be encrypted, File systems should be encrypted, Administrator should record who has logged on from which computer and for how long.

New cards
25

Explain two ways of reducing the time required to transmit data in a computer network.

Data could be compressed before sending, which means less data to send; High speed lines, fibre optics, or dedicated lines could be used, which allows faster transmission than traditional lines.

New cards
26

Outline the role of a gateway in a Wide Area Network

A gateway provides the link between systems by providing the appropriate conversions and adding the appropriate data.

New cards
27

Packet switching over the Internet makes use of standard protocols during its operation. Define the term standard protocol.

Rules/procedures governing the transmission of data that allow data to be correctly received.

New cards
28

Outline the main difference between data security and data integrity.

Deals with preventing the data being intercepted by a third party

New cards
29

Outline how packet switching helps to provide better security for the data being sent.

Data is not sent as on unit, but is divided into separate packets that are formatted, addressed and routed, making the complete message difficult to intercept.

New cards
30

Outline how packet switching is less likely to be affected by network failure.

Individual packets can be sent by different routes, so if one route is down, others can be used.

New cards
31

Identify three pieces of information that a data packet must contain.

Senders IP address, Receivers IP address, Paket number, Total # of packets, Data, Parity bit.

New cards
32

A company has set up a nationwide telephone call centre for enquiries. Depending on the phone number of the caller, a mainframe redirects incoming calls to one of the four servers, each of them located at a regional centre, working with their computers. The network developed is hybrid. Suggest a physical transmission medium for communication.

Optical cable, general telecom lines.

New cards
33

A company has set up a nationwide telephone call centre for enquiries. Depending on the phone number of the caller, a mainframe redirects incoming calls to one of the four servers, each of them located at a regional centre, working with their computers. The network developed is hybrid. Suggest a physical transmission for communication between the server and operators computer.

Twisted pair coaxial cable (also acceptable: Ethernet cable)

New cards
34

A company has set up a nationwide telephone call centre for enquiries. Depending on the phone number of the caller, a mainframe redirects incoming calls to one of the four servers, each of them located at a regional centre, working with their computers. The network developed is hybrid. Explain why switches would be used rather than hubs in this hybrid network.

Because a switch inspects the data packet received, it forwards the packet to the appropriate server only, Hence the performances of the network are better than with a hub that would broadcast.

New cards
35

State two resources that could be shared on a LAN.

Database/data files, Software, Backing storage devices, Output devices/printer

New cards
36

State two possible communication links that could be used to connect the LAN to a WAN.

Fibre optic cable, Digital line/ISDN line, Satellite link

New cards
37

Outline one advantage and disadvantage to protest groups of communication by social networks.

Pervasiveness, Immediacy, Accessibility, Anonymity, Visibility, Multimedia nature of social networks, Information stored on the server.

New cards
38

A LAN in a healthcare centre allows two receptionist and four doctors to share three PC’s and a printer which are connected to server. The LAN has a star topology, and uses cables. Define the terms server and client.

Server: A computer and its software that provides services available through the network.

Client: A computer/terminal and its software used to access the services in a network by sending requests to the server.

New cards
39

The doctors can access only the medical records of the patients; the receptionists cannot access the medical records of the patients and deal only with registering new patients and booking appointments. Describe how the access of the doctors and the receptionists can be restricted to the appropriate parts of the file system.

Assign different access rights to the files/parts of the file system to different groups of users.

New cards
40

5. A school network is connected to the Internet. Outline one threat to the security of the school’s data that may arise from the use of the Internet.

Hackers will attempt to gain access rights or viruses could damage important data/hardware.

New cards
41

Outline two implications of a school administrator being able to monitor students’ use of the Internet.

Lack of privacy-Students could be prevented from visiting unsuitable sites.

New cards
42

A fashion designer works from home to create a new clothing range for a company. Outline 2 advantages of using a graphic tablet to create a design.

The design can be precisely drawn/inputted by pen then held in a graphics file/stored within memory, Using the pen changes can be easily made and memory contents easily updated.

New cards
43

A fashion designer works from home to create a new clothing range for a company. Describe a communication system that would allow a fast transmission of data files from the designer to the company.

Designer’s computer connected to the Internet with a secure link to the company’s server.

New cards
44

A fashion designer works from home to create a new clothing range for a company. Outline the benefits of data compression in storing and sending the designer’s work to the company.

When large graphic files are compressed they occupy less memory space on the designer’s and company’s computers, transmission is quicker and cheaper.

New cards
45

A fashion designer works from home to create a new clothing range for a company. Explain the need for encryption when sending the designer’s work to the company.

The data files should be encrypted/secured because they may be intercepted/read, then misused by other designers/companies.

New cards

Explore top notes

note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 30 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 22 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 72 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 154 people
Updated ... ago
4.3 Stars(3)
note Note
studied byStudied by 20 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17194 people
Updated ... ago
4.6 Stars(106)

Explore top flashcards

flashcards Flashcard57 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard33 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard41 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard64 terms
studied byStudied by 71 people
Updated ... ago
4.0 Stars(10)
flashcards Flashcard39 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard168 terms
studied byStudied by 106 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard45 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard122 terms
studied byStudied by 71 people
Updated ... ago
5.0 Stars(1)