Chapter 4
Chapter 4
4 using them
1 Ken owns a large business. He has purchased 30 computers and three printers to help run his
business more efficiently.
a Identify three items of hardware Ken will need to buy to allow the computers to be
networked and allow access to the internet to process customer orders.
1
.......................................................................................................................................................................
.......................................................................................................................................................................
2
.......................................................................................................................................................................
.......................................................................................................................................................................
3
.......................................................................................................................................................................
.......................................................................................................................................................................
b Ken’s business is expanding. He buys another company in a different location and installs
a second network of computers in the new company.
i Describe what additional hardware Ken needs to buy to enable the two networks to be
linked (both are using the same protocols). Give a reason for your choice of hardware.
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
ii Describe two of the features of the additional hardware you named in part b i.
1
.................................................................................................................................................................
.................................................................................................................................................................
2
.................................................................................................................................................................
.................................................................................................................................................................
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition Photocopying prohibited
27
c Ken has asked all his staff to use passwords to protect their computers from illegal
access. His staff has chosen a number of passwords. Indicate in the table below
whether you think the passwords chosen are weak or strong.
i LAN
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
ii WAN
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
iii WLAN
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Identify the items shown in the following diagram using the following terms:
» bridge » router
» switch » server
» internet
28 Photocopying prohibited Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
Each item can be used once, more than once or not at all.
5
2
1 1 4
LAN
1
.......................................................................................................................................................................
2
.......................................................................................................................................................................
3
.......................................................................................................................................................................
4
.......................................................................................................................................................................
5
.......................................................................................................................................................................
c Give one advantage and one disadvantage of using WLANs rather than LANs.
Advantage: .......................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
Disadvantage: ..................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
3 a Data is often transmitted using packets. Indicate, by using a tick (✓) which of the
following information forms part of the packet.
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition Photocopying prohibited
29
b Describe what happens when the packets of data arrive together at their destination.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
4 a Name three items of hardware and/or software needed to carry out video conferencing.
1 .......................................................................................................................................................................
.......................................................................................................................................................................
2 .......................................................................................................................................................................
.......................................................................................................................................................................
3 .......................................................................................................................................................................
.......................................................................................................................................................................
b Describe two potential disadvantages and two clear advantages of using video conferencing
rather than face-to-face meetings.
Disadvantages:
1 .......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
30 Photocopying prohibited Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
2 .......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
Advantages:
1 .......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
2 .......................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
ii phone conferencing:
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition Photocopying prohibited
31
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
6 A research company needs to control which personnel are allowed access to secure areas. The
company has issued each member of staff with a magnetic stripe card.
a Describe how the magnetic stripe card can be used to limit access to the secure areas.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Describe additional features which can be added to the card to improve security even further.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
32 Photocopying prohibited Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
7 Asif logs into his bank’s website using his debit card number (1234 5678 9012 3456). The logon
page at this stage is as shown below.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
b Explain how the physical token can be used to generate the one-time password (OTP)
which Asif needs to complete the login to his bank.
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition Photocopying prohibited
33
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.......................................................................................................................................................................
.......................................................................................................................................................................
1
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
2
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
34 Photocopying prohibited Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition
1
.......................................................................................................................................................................
2
.......................................................................................................................................................................
Indicate whether each statement is true or false by putting a tick (✓) in the correct box.
Statement True (✓) False (✓)
A network interface card has a MAC address hard-wired at the
manufacturing stage
Hubs only send data packets to a specific device on the local network
A bridge is used to connect a local area network (LAN) to any
external network
Routers use IP addresses to direct data packets to the correct
network
Bluetooth uses spread-spectrum frequency hopping to allow device
pairing
Cloud computing does not require access to the internet to enable
files to be downloaded or uploaded
Wide area networks (WANs) only work over a very limited distance
geographically
Zero login depends on biometrics and behavioural patterns
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition Photocopying prohibited
35
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
Advantage 1: ...................................................................................................................................................
.............................................................................................................................................................................
Advantage 2: ...................................................................................................................................................
.............................................................................................................................................................................
Advantage 3: ...................................................................................................................................................
.............................................................................................................................................................................
Disadvantage 1: ..............................................................................................................................................
.............................................................................................................................................................................
Disadvantage 2: ..............................................................................................................................................
.............................................................................................................................................................................
Disadvantage 3: ..............................................................................................................................................
.............................................................................................................................................................................
36 Photocopying prohibited Cambridge IGCSE™ Information and Communication Technology Theory Workbook 2nd Edition