WITH VERIFIED QUESTIONS AND ANSWERS||
GUARANTEED PASS|| ALREADY GRADED A+||
LATEST VERSION 2025
Explain the topology of a bus network - ANSWER-A bus network has all nodes
connected to a main cable called the bus
In a bus network if a node is turned off data can still travel through the network
In a bus network devises transmitting at the same time can result in data
collisions
Explain why network security is important - ANSWER-Network security is
important to protect the data of the organisation
Network security is important to protect private and personal information
Network security is important as stolen data could result in prosecution and a
large fine
Explain what authentication and validation are - ANSWER-Authentication is
the process of determining whether someone logging in is who they claim to be
Authentication is accomplished with the use of a login name and a password
Validation ensures that each password conforms to the password policy of the
organisation
A strong password will include at least 8 characters, symbols, numbers and be
changed regularly
,Explain what access control is - ANSWER-Access control determines the user's
rights to the files stored on a network
Access control can prevent users from seeing certain files or only being allowed
read access to some data
Access control can also determine who is able delete and create files and folders
Explain what physical security is - ANSWER-Physical security is the first line
of defence to preventing unauthorised people from accessing a network
Physical security can include locks, swipe cards, biometrics and CCTV cameras
Explain what firewalls are - ANSWER-Firewalls can be both hardware and
software based
Firewalls protect a network connected to a WAN by monitoring incoming and
outgoing data
Firewalls can be configured to allow data from approved addresses
Firewalls can prevent certain programs from accessing the internet or data being
sent to certain addresses
Explain the security issues associated with cloud storage - ANSWER-Data
privacy is a concern as because data is stored elsewhere, it might be impossible
to know who has access
...you will not know how many people have access to the remote server it is
stored on
Lack of control is a concern as you are not directly in control of the cloud
service
...you will not know if the system is being backed up or suffering from virus or
malware infestations
Explain what cyberattacks are - ANSWER-Cyberattacks are an attempt by
hackers to damage or destroy a computer network or system
Cyberattacks are used to access, copy, modify or delete data on the network
,Cyberattacks are used to alter a system to be unusable
Explain why both antivirus and anti-malware need to be regularly updated -
ANSWER-Explain why both antivirus and anti-malware need to be regularly
updated
Both Antivirus and Anti-Malware need to be constantly updated
...to ensure they have the most up to date list of possible viruses and malware
programs
Give examples of application software and what each one is used for -
ANSWER-One example of application software is a spreadsheet
...this could be used by a biologist to model the behaviour of colonies
Image Editing - Cropping images for insertion into a presentation
Live Chat - For getting technical support help from a vendor support site
Web Browser - For looking up the address of a colleague at a different
university
Presentation -- Showing results of his research to colleagues at a conference
Video Editing -- Creating a video to put on YouTube of his lectures for his
students
Give examples of application software and what each one is used for
Explain what computer modelling is - ANSWER-Computer modelling attempts
to abstract the rules and mechanisms that control real life systems
Computer modelling allows those systems to be simulated
...these can be under different conditions and used to answer 'what if' questions
Computer modelling examples include flight simulators, traffic flow and
financial modelling
Explain what the internet is - ANSWER-The Internet is a series of
interconnected networks of networks/machines /hardware
, ...these are geographically distributed networks/machines/hardware
...they use protocols for communication
Access to The Internet is provided by an Internet Service Provider (ISP)
Explain how the internet uses routers - ANSWER-Routers are used to send
packets through the Internet
Packet switching involves routers sending packets to their destination via the
fastest route
Packet switching involves packets being numbered and taking different routes
to the destination
Explain what the World Wide Web (WWW) is - ANSWER-The World Wide
Web (WWW) is the information stored on the hardware
...pages of information stored on servers (pages written in HTML)
...uses HTTP / HTTPS to send/receive pages between servers and clients
Explain the protocols used for the World Wide Web (WWW) - ANSWER-
Protocols for the WWW include HTTP and HTTPS
Explain how domain names are structured - ANSWER-Domain names are the
names of the website visited (e.g. pearson.co.uk, google.com, youtube.com)
Explain why HTTPS is used - ANSWER-When a client/your browser connects
to a website via HTTPS the data is encrypted before transmission
If the data is intercepted by a hacker it will not have any meaning
It can only be read/decrypted using the unique decryption key provided
Explain the environmental impacts of technology - ANSWER-Pollution (water,
air, noise) resulting from the manufacturing process
High energy and water volumes needed for the manufacturing process