Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Personalised Feedback Sheet for IGCSE Section 4 - Networks

Name: Niamh Rhodes


Target grade: C
General feedback/class needs:
There was a lot of material covered in this unit from the definition of a network,
to LANs, WANs, WLANs, network hardware, security, authentication methods,
video conferencing, Fax, Email and the Data Protection Act. This meant that there
really wasnt anywhere to hide if you didnt do your revision. Unfortunately for
many of you, this was your problem in this test. If you look back over the lessons
you did:

Notes from each topic


Multiple practise exam questions
Revision lessons

Worse you all went over the correct answers in class and you also had access
to ALL past exam questions, answers and revision material on my site, so even if
you didnt get it the first time you couldve improved by doing some revision.
Those who didnt do so well also fell in to the same old traps:

Not reading the question or relating to it in your answer


Giving short or one word answers when you need to explain yourself!

These three things should now be considered so basic that no one is making
these mistakes. There is no magic formula for passing a test and no one is just
better than you, it all comes down to how much work youve done and are
prepared to do. If you are able to sit yourself down, practise questions from my
site and test yourself then you stand a chance of doing seriously well.
Finally, you have GOT to stop talking about hackers in your answers! It seems
that as soon as one of you is unsure of an answer you revert to itll get
hacked!!! This is NEVER going to be an exam answer so please, stop using it
unless I explicitly tell you that its ok.
Your performance:
Marks: 33/54
Percentage: 61.111111111111114%
Grade: C
Your personal targets:
1. To be able to name and describe four authentication techniques
2. To be able to give an advantage and disadvantage of each authentication
method.
3. To be able to state the purpose of the Data Protection Act.
Challenge/Extension
Copy out and answer questions 2, 7, 8, 9, 11, 12, 13 and 14 from the test, with
their full and correct answers.

2. A large company has a LAN. The manager of the company wants to replace it
with a WLAN. Explain the differences between a LAN and a WLAN, giving an
advantages and a disadvantage of a WLAN.
The difference between a LAN and a WLAN is that a LAN means that it can be
only used in a certain area as a WLAN isnt, you will still be allowed to access
your data out of an area. The advantage of using WLAN is that you can access
your data from anywhere. The disadvantage of using a WLAN is security of your
data.
7. Give two advantages and two disadvantages of having computers networked.
Advantage 1: you can send people your data
Advantage 2: you can use the same printer
Disadvantage 1: hackers cant get on and steal your data
Disadvantage 2: viruses cant get on and mess up your computer.
8. To protect the customers data the company owner will make sure the system
uses encryption. Describe encryption.
Answer: encryption can protect your data and make it more secure so no one
hacker or you get a virus on your computer. Only certain people can read it. You
have to use a key.
9. Describe the role of a proxy server when a LAN is connected to the internet.
Proxy server blocks out unsafe websites and networks from hackers and viruses
from getting onto your computer.
11. Describe four differences between an internet and the intranet.
Answer 1: intranet is only for certain people
Answer 2: internet access for all
Answer 3: intranet has true information
Answer 4: internet can have true and false information.
12. Mobile phones are used for accessing the internet. Give two advantages and
two disadvantages of using a mobile phone rather than a PC to access the
internet.
Advantage 1: its quicker
Advantage 2:
Disadvantage 1: its on a smaller screen
Disadvantage 2: it has less data on there than a PC.
13: explain the purpose of the data protection act and one of the principles.
Data protection laws exist to strike a balance between the rights of individuals to
privacy and the ability of organizations for example (a) is being processed by

means of equipment operating automatically in response to instructions given for


that purpose,
14 : give three advantages of video conferencing.
Advantage 1: see people from far away
Advantage 2: its quicker
Advantage 3: cheaper so you dont have to travel

You might also like