Worse you all went over the correct answers in class and you also had access
to ALL past exam questions, answers and revision material on my site, so even if
you didnt get it the first time you couldve improved by doing some revision.
Those who didnt do so well also fell in to the same old traps:
These three things should now be considered so basic that no one is making
these mistakes. There is no magic formula for passing a test and no one is just
better than you, it all comes down to how much work youve done and are
prepared to do. If you are able to sit yourself down, practise questions from my
site and test yourself then you stand a chance of doing seriously well.
Finally, you have GOT to stop talking about hackers in your answers! It seems
that as soon as one of you is unsure of an answer you revert to itll get
hacked!!! This is NEVER going to be an exam answer so please, stop using it
unless I explicitly tell you that its ok.
Your performance:
Marks: /54
Percentage: 0%
Grade: Your personal targets:
1. To complete the assessment/ do it!
2. To understand the definition of WLAN & LAN
3. Challenge/Extension
Copy out and answer questions 2, 7, 8, 9, 11, 12, 13 and 14 from the test, with
their full and correct answers.
2.) A large company has a LAN. The manager of the company wants to replace it
with a WLAN. Explain the differences between a LAN and a WLAN, giving an
advantage and a disadvantage of a WLAN. [4]
A LAN is a small group of computers connected in a small radius. However, a
WLAN is of course wireless and therefore does not use cables but a LAN does. An
advantage of LAN is it is fast but you could trip over the wires. A WLAN has
limited access and is more expensive.
7.) Give two advantages and two disadvantages of having computers networked.
[4]
You can share hardware and also data.
You can communicate with other computers.
More vulnerable to viruses.
8) To protect the customers data the company owner will make sure the system
uses encryption. Describe Encryption [3]
Encryption is the process of scrambling and coding data so it is hard for hackers
to access the encrypted data, you can protect documents with keys, you can
encrypt data with a password.
9) Describe the role of a proxy server when a LAN is connected to the Internet [3]
It will receive requests and will monitor the internet, it will filter them and pass
them to the Firewall.
12) Mobile phones are used for accessing the Internet. Give two advantages and
two disadvantages of using a mobile phone rather than a PC to access the
Internet. [4]
Mobiles are portable
13) Explain the purpose of the Data Protection Act and one of the principles. [2]
The purpose is to control how information is handled, one of the principles are
that personal data should be accurate when necessary and would be up to date.