Professional Documents
Culture Documents
ICT-OL-10-THEORYNOT-ver0-8-5 Sect4
ICT-OL-10-THEORYNOT-ver0-8-5 Sect4
ICT-OL-10-THEORYNOT-ver0-8-5 Sect4
Table of Content
Web browser
Use of a browser:
Short for Web browser, a software application that runs on your Internet-connected
computer used to locate and display Web pages.
It allows you to view Web pages, as well as use other content and technologies such as
video and graphics files.
Web browsers are not all created equal, and Web pages also will not be displayed the
same in different browsers.
All browsers will have a number of similar features to help you use the Web:
o Forward and back buttons to move between pages
o A history folder which stores details of recently visited web pages
o A stop button if a page is taking too long to load
o Favourites and bookmark options to store often visited pages
o Options to cut, copy, save and print the information viewed
Disadvantages of email:
o E-mail can only be used by people who subscribe to the service.
o A user does not realize that he has new mail until he logs in.
o It is expensive to prepare a set up (i.e. computer and router)
o Other people may be able to access others’ mail (security).
o The spread of E-mail usage is a threat to the postal and office workers.
o Viruses are spread via email attachments
Bulletin boards:
It is an electronic equivalent of a notice board.
It carries short items that may be of interest to
wide number of people.
The users access the computer by a network or
Internet. Users of the bulletin board can leave
messages and review messages left by other
users.
Large bulletin boards are run by organizations
that offer comprehensive information services.
e) Local Area Network (LAN), WLAN & Wide Area Network (WAN)
Network:
It is a set of linked computer systems to share computer power, its peripherals and resources
such as software, printers, large disk drives, CD Rom, and databases.
Advantages of networks:
o Sharing devices (peripherals) such as printers to save money.
o Files can easily be shared between users.
o Software site licences are likely to be cheaper than buying several stand-alone licences.
o Network users can communicate by email.
o A file server is easy to back up as all the data is stored in one place.
Disadvantages of networks:
o Purchasing the network cabling and file servers can be expensive.
o Managing a large network is complicated, requires training and a network manager usually
needs to be employed.
o If the file server breaks down the files on the file server become inaccessible.
o Viruses can spread to other computers throughout a computer network.
o There is a danger of hacking, particularly with wide area networks. Security procedures are
needed to prevent such abuse.
Types of Network
Local Area Network (LAN): Is a network in which similar computer systems are situated
relatively close to each other, for example same building or cluster of buildings such as a school.
Wireless Local Area Network (WLAN), it behaves like a LAN but has no wires or cables, other
than wiring that connects the WLAN access points together. WLAN uses Wi-Fi (spread spectrum
radio waves or infrared signals) to enable devices to communicate with each other.
WLAN mean: all computers can access same services, e.g. printers and Internet access, from
any place the user chooses to work and new computers or devices can be added to the network
without added expense and/or inconvenience of extra cabling.
Wide Area Network (WAN): Is a network in which various computer systems are geographically
remote. Wide Area Networks make use of variety of a range of connection methods including
communication satellites. Examples: Internet is a WAN. A school network is a LAN.
Hubs:
A network hub is a hardware device that connects multiple
Hub...
computers in a network. (In creating a LAN) - used at the centre of a star network
It allows networked computers to share data transmission - simple and cheap device
- any message sent to the hub is broadcast to all
connected computers. Data security is thus poor
Switches:
Switch...
- a more intelligent hub
A switch is a component which is used within a - also used at the centre of a star network
computer network. - more expensive than a hub
- the switch inspects the address of any message it receives
A switch has a number of ports and it stores the - a message is sent only to the correct computer
addresses of all network devices that are directly or
indirectly connected to it on each port.
As a data packet comes into the switch, its destination address is examined and a
direct connection is made between the sending and receiving machines. (In creating
a LAN)
Bridges:
Bridge...
A Bridge joins two networks together
- used to join different types of network together
so as far as data is concerned it - e.g. an old ring network with a modern Ethernet network
- acts as a 'translator' so that messages can pass between networks
looks like one large network
Proxy servers:
Also called a "proxy," it is a computer system that breaks the connection
between sender and receiver. Functioning as a relay between client and
server, proxy servers help prevent an attacker from invading a private
network and are one of several tools used to build a firewall.
It acts as a buffer between a WAN (usually the internet) and a LAN. The
server passes on the service requests to the Proxy Server...
- used in a similar way to a router - connecting a LAN to the Internet
internet and then passes back the requested - allows several computers on a LAN to use a single Internet
connection
pages. Any page retrieved from the internet is - one computer, the proxy, shares its Internet connection
stored on the server, which means that when a different computer requests the same page it is
available immediately thus considerably speeding up the browsing process.
Data problems:
Data might be incorrect or unsecured etc....and here comes the problems
Data privacy; describes the need of some data only to be accessed by, or disclosed to,
authorised person, Data Protection Act provides legal protection for individuals’ data privacy.
Data Security; involves the use of various methods to make sure that data is correct, is kept
confidential and is safe. Data security includes ensuring the integrity and privacy of data, as well
as preventing the loss or destruction of the data.
Hacking; Is attempting to gain unauthorised access to computer system. This may be the
unauthorised use of a computer or simply unauthorised access to particular programs or data
stored on a computer.
Virus; is a program designed to make a computer system unreliable and to copy itself between
and within computers. The virus includes instructions to do the copying automatically, via a disk or
network. The virus may also include instructions to damage data or affect the computers
operation, such as displaying silly messages. These effects are activated when some pre-
determined condition occur (such as particular date)
Computer/Data misuse:
In common network environment there are major threats on data confidentiality and privacy.
o Hackers gain unauthorised access to networks and computers they could:
Do changes in programs causing data inconsistency.
Changing data during any process damaging data integrity.
Access the personal data of individuals harming the data confidentiality.
Copying data to be used for malicious purposes, for example using individual credit card
number and ID to pay for purchases over the net or use individual bank details to withdraw
money from their accounts (Phishing - Data Abuse).
Copying software and use it without proper authority (Software Piracy).
Prepared by: M. Kamel & G. Orphy
Computer Networks 01/09/2012 Section-Page 4-9 of 21/126
Information & Communication Technology 0417 Knowledge & Understanding (Theory)
F:\Magda Dell 08122012\Teaching\IT\0417 ICT\New ICT 0417 notes\Syllabus 2013\ICT-OL-10-THEORYNOT-ver0-8-5 sect4.docx
o Use Anti Spam programs; which prevent certain programs running on the Internet to gain
control on the local PC for example programs which cause advertisement to continue on the
local PC or get it to automatically log in specific sites. Anti spam programs are also used on
email service providers to control spam email.
o Use user name and password/pin number; Access to any server on the Internet should be
controlled by giving each user a user name and password or PIN (Personal Identification
Number) number to allow log in to the computer system.
o Encrypt Data; Data encryption is converting data in a computer system
unreadable/meaningless form (sometimes called scrambled data).
o Government acts to protect data confidentiality;
Government enforce copyright law, this provides protection to owners of the software and other
materials (e.g. music, movies) which run on computers to be illegally copied or used.
Data Protection Act: That is an Act sets out current requirements for the control of stored data
about individual, both in computer systems and in other forms.
The Act defines data protection principals which are given here in simplified form;
1. Data should be fairly and lawfully processed.
2. Data should be only used or disclosed for the specified notified purposes.
3. Data should be adequate, relevant, and not excessive.
4. Data should be accurate and kept up-to-date.
5. Security measures should be implemented to prevent any unauthorised access.
6. Data should not be kept any longer than is necessary.
7. The individuals have the right to view the data stored about them and have the data changed
if it is incorrect.
Exercise – Section 4
Question (1)
Choose 3 of the following that make it easier for people to work from home:; [3]
TELETEXT cheap PCs MICR electronic mail
Local Area Networks bar codes fax
Question (2)
(a) What is the difference between a LAN and a WAN? [1]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
(b) Which of the two (LAN and WAN) is more likely to need a modem to use it? [1]
……………………………………
Question (3)
State what Internet service is being described in each of the following sentences;
a) Three people typing messages to one another so all three see both messages and replies. [1]
……………………………………
b) One person sending a message to another person which they then find when they log in. [1]
……………………………………
Question (4)
Give three different tasks an electronic mail system carries out. [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (5)
Many companies around the world use electronic conferencing to communicate with their employees
around the world. (a) Describe electronic conferencing? [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
(b) Describe the advantage and disadvantage of using electronic conferences? [4]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (6)
a) Name two different methods of communication that make direct use of a computer system. [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
b) Explain how one of these methods of communication would be used. [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
c) Compare and contrast Electronic mail with traditional post service. [4]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (7)
Many medical practices and health centres now store patient information on computer files.
a) In a particular health centre, a local area network (LAN) is used, providing terminals and local printers in
each of the doctors’ rooms. Give TWO advantages of this network instead of using stand alone machines
in each doctor’ room [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
b) It is proposed to link the network in all surgeries and health centres in the area to the main hospital
computer system to form a wide area network (WAN).
i. Name an extra device that will be needed in the surgery to allow the connection to be made. [1]
………………………………………………………………………………………………………………………….
ii. What is the function of this device? [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
c) Give an example of data which:
i. Might be transmitted from a doctor in a surgery to the hospital. [1]
………………………………………………………………………………………………………………………….
II) Might be transmitted from the hospital to the doctor. [1]
………………………………………………………………………………………………………………………….
d) Give TWO advantages of the WAN being available:
i. To the patient [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
ii. To the hospital [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
e) What extra security problems might arise when the WAN is set up? [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (8) [4]
Give THREE advantages and ONE disadvantage of existence of a world wide network such as Internet?
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (9)
State two ways by which you can prevent a virus getting onto your computer [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (10)
State two disadvantages of having an Internet connection at home [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (11)
The school registers its data. Describe two rules from the Data Protection Act that the school must
comply with. [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (12)
A student in a school has nearly completed his History coursework. He has done it all on
computer. Write down two ways he could use to prevent another student from copying his work.
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (13)
Describe three ways in which computers containing personal data can be misused. [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
For each of your answers above, explain a method for preventing it. [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (14) [4]
A school has been given some money to buy computers. It can now buy enough computers for
every student. Discuss the advantages and disadvantages of having laptop computers or extra
computer rooms connected to the network.
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (15)
A school is going to buy computers to create a new IT room. They will be connected to the
existing network.
(a) Give two factors other than cost that should be taken into account when choosing suitable
computers to add to the network. [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
(b) The purchase of new computers will cause the fileserver to be short of storage space and run
more slowly. Describe two solutions to these problems. [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
(c)Apart from the computer, describe one item of hardware which would be needed and explain
how it could be connected to the network.
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (16)
Library members must type in two items of information before they can access the Internet. List
these items. [2]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (17)
A tennis club intends to connect to other local clubs using a Wide Area Network. Some of the
members are concerned about this plan because they are frightened that their data may be
misused. Describe three ways in which their data might be misused. [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (18)
The employees of many companies communicate through the use of electronic mail and video
conferencing. (a) What is meant by video conferencing? [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
(b) Describe advantages & disadvantages of video conferencing when compared with Email. [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (19)
Ali and Lee work in different offices of a multi-national company. They use e-mail to send
messages to each other. (a) Describe the computer processing involved after a message has
been written on Ali’s computer and before Lee opens the e-mail. [3]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
(b) Describe two advantages and two disadvantages of using electronic mail rather than using
ordinary letter post. [4]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (20)
Name each type of network [3]
C Bus
A Star B Ring
Question (21)
Discuss the needs of encryption including one of encryption techniques used in common network
environment. [4]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (22)
Discuss the needs of authentication and state three techniques used in authentication on common
network environment like Internet. [4]
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Blank lines
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………….
Question (2)
LAN works on one site within a limited area where WAN operates using external communication within a
very large geographical scale. [1]
(b) WAN [1]
Question (3)
a) Electronic conferencing [1]
b) E-mail [1]
Question (4) [3]
o Allows users to read their messages.
o Allows users to send their messages.
o Stores messages in the appropriate mailboxes.
o Allows a user to search his/her mailbox to see what is in it.
Question (5)
(a) Electronic conferencing: It is a system that allows a group of people to have a discussion or a
debate without being together in the same location using:
o terminals,
o telephone lines,
o communication device,
o And maybe web cameras. [3]
b) The advantages of using electronic conferences: [2]
o Allow people staying at different places to have discussion without the need to travel.
The disadvantages of using electronic conferences:
o It needs special equipment and programs to operate.
Question (6)
a) 1. Electronic mail 2. Fax via computer [2]
b) Explain how one of these methods of communication would be used.
Electronic mail needs a computer with a Router, communication line, and software. It can be used by:
o Creating a document to be sent
o Run the communication program, dial the appropriate phone number for communication and log on.
o Select E-mail and select send.
o Send the document log off. [2]
c) Advantages of using E-mail over the post: [4]
o Less use of paper:
o Mail can be read and replies made without printing.
o A letter can be written using a word processing and transmitted directly without use of paper.
o Fast delivery – messages can be received immediately after they are sent.
o The cost is usually the same to anywhere in the world.
o Simple method for computer users; if any employee in a company sends a letter by post to another
one a chain of people is involved. But E-mail only involves the computer system and the people
concerned.
Disadvantages of using E-mail over the post:
o E-mail can only be sent to people who subscribe to the service and use it regularly.
o A user does not know any mail has been received until he/she logs on.
o It is expensive to use a public network
o Widespread use of E-mail might threaten the jobs of postal and office workers.
Question (7)
a) All connected computers or workstations can share peripherals.
Other people cannot access user’s files.
A user can use any software on the network with the appropriate authorization. [2]
b) It is proposed to link the network in all surgeries and health centres in the area to the main hospital
computer system to form a wide area network (WAN).
Router [1]
If a computer user is using a Router to access a public network the Router: [3]
- Connects LANs together or a LAN to a WAN such as the Internet
- Keeps the private LAN separate from the WAN
- Any messages that are addressed for a computer not in the LAN are passed to the router
c) i. Medical record of a patient is being admitted to the hospital. [1]
ii. Results of Lab and other medical tests [1]
d) i. To the patient [2]
o Medical tests results are received more quickly.
o The hospital knows the patient’s medical history
ii. To the hospital [2]
o Staff time is saved by not having to write same information many times.
o Better utilization of resources, e.g. inpatient beds, Radiology rooms…etc. due to the
availability of on time information and better booking planning.
o Saving on postage costs and time through better communication over email.
e) Confidential information is available from more places
o Possibility of hacking.
o Possibility of accidental corruption of data. [2]
Question (8) Give THREE advantages and ONE disadvantage of existence of a world wide network such
as Internet? [4]
Advantages:
o Vast world-wide source of information.
o People can easily meet people from anywhere else.
o People can tell the world about their problems.
o Internet can be accessed from anywhere.
o Goods can be sold through it.
Disadvantage:
o it sometimes takes a long time to find the data because sometimes too many users are accessing
the servers available on the Internet that might cause the servers to take longer time to respond
(i.e. There are sometimes too many users for the number of servers available.)
o Data security and confidentiality is an issue.
Question (9) State two ways by which you can prevent a virus getting onto your computer
o Use a virus scanner/install antivirus program.
o Software in the computer which checks every disk placed in the drive.
o Do not allow others to place discs in the disc drive.
o Do not allow the use of floppy discs.
o Do not use the Internet without using Firewalls.
o Do not use software of unknown origin. [2]
Question (10) State two disadvantages of having an Internet connection at home. [2]
o Larger telephone bill.
o Collecting pornography.
o Disputes over who can use it.
o Time spent by individuals on the Internet.
o Tends to make people reclusive.
Question (11)
The school registers its data. Describe two rules from the Data Protection Act that the school must
comply with. [2]
Two from:
o Information shall be obtained fairly.
o Information shall be obtained lawfully.
o Data should be kept securely
o Data held only for one or more specified and lawful purpose
o Data shall not be used for anything other than that purpose
o Data shall not be disclosed for anything other than that purpose
Prepared by: M. Kamel & G. Orphy
Computer Networks 01/09/2012 Section-Page 4-18 of 21/126
Information & Communication Technology 0417 Knowledge & Understanding (Theory)
F:\Magda Dell 08122012\Teaching\IT\0417 ICT\New ICT 0417 notes\Syllabus 2013\ICT-OL-10-THEORYNOT-ver0-8-5 sect4.docx
o Data held for any purpose shall be adequate in relation to that purpose
o Data held for any purpose shall be relevant in relation to that purpose
o Data held for any purpose shall not be excessive in relation to that purpose
o Data shall be accurate/correct/valid and up-to-date
o Data shall not be kept for longer than necessary
Question (12)
A student in a school has nearly completed his History coursework. He has done it all on
computer. Write down two ways he could use to prevent another student from copying his work.
o Student may save the work on a secure network area
o Student may use files password
o Student may save the work on removable storage media such as floppy disc or CD
o Student may encrypt the work.
Question (13)
Describe three ways in which computers containing personal data can be misused. [3]
o Hackers may read/obtain the data and pass it on
o Hackers may delete the data
o Hackers may amend/alter the data
For each of your answers above, explain a method for preventing it. [3]
o Data can be encrypted
o Usernames and passwords can be used
o Do not connect the computers to unsecured network
o Use of physical security such as locks on computer room doors
Question (14) [4]
A school has been given some money to buy computers. It can now buy enough computers for
every student. Discuss the advantages and disadvantages of having laptop computers or extra
computer rooms connected to the network.
Advantage: - Laptops can be transported from classroom to another.
- When the network is down we cannot use the network computers, we can use
the laptops.
- We can store personal data on laptops.
- Can use laptops outside the classroom in Science/Geography
Disadvantage: - Cannot share resources on laptops
- Print work is difficult
- Can not access work that have been saved in other lessons
- Laptops are more expensive than network stations.
- It is difficult to use keyboards and mouse on laptops.
- Laptops need recharging from time to time.
- Battery life limits outdoor usage.
Question (15) A school is going to buy computers to create a new IT room. They will be
connected to the existing network.
(a) Give two factors other than cost that should be taken into account when choosing suitable
computers to add to the network. [2]
o Compatibility with existing system
o Speed of processing and power needed
o Amount of Interface network cards needed
o Amount of hard disc space needed
o Reliability of the new equipment
(b) The purchase of new computers will cause the fileserver to be short of storage space and run
more slowly. Describe two solutions to these problems. [2]
Problems:
o Will cause reduction in server speed
o Will fill up server hard disc / no room to save work
Solutions:
o Buy extra internal memory for server
o Buy another hard disc for server
o Buy another server to act as a slave
(C) Apart from the computer, describe one item of hardware which would be needed and explain
how it could be connected to the network.
Printer / scanner connected to a computer locally and driver installed on a computer and
configured to be shared, if network card is present, connected directly to a network point and
driver installed on a server, configured to be shared
Question (16)
Library members must type in two items of information before they can access the Internet. List
these items. [2]
1) user identification / membership number
2) password
Question (17)
A tennis club intends to connect to other local clubs using a Wide Area Network. Some of the
members are concerned about this plan because they are frightened that their data may be
misused. Describe three ways in which their data might be misused. [3]
1 Their data can be seen and passed on or spread
2 Their data can be changed/amended/altered/deleted
3 Their data can be theft and inappropriately used by others.
Question (18)
Employees of many companies communicate through use of Email and video conferencing.
(a) What is meant by video conferencing? [3]
o Employees are connected to an on-line system at the same time using computers (1)
o Members contribute to the conversation by typing their text that appears (1)
o on everyone else's screen (1)
o Real time images of the people in the conference who has a web camera may appear on the
screen like a TV picture (1)
o This type of connection needs communication software at both ends to make the conferencing
work (1)
o Use of communication lines, microphones, speakers and video/web cameras (1)
(b) Describe advantages & disadvantages of video conferencing when compared with E-mail [3]
o In Video conferencing more than two people can participate and response immediately and
they can see each other that leads to visual demonstration and body language can be
interpreted
o E-mail costs less as video conferencing setup costs a lot
o Time zones may become a difficulty with synchronise video conference timing
o Video conferencing is like real meeting that needs a lot of preparation work to gather people in
one event but using e-mail needs less preparation work
Question (19) Ali and Lee work in different offices of a multi-national company. They use e-mail to
send messages to each other. (a) Describe the computer processing involved after a message
has been written on Ali’s computer and before Lee opens the e-mail. [3]
Message is transmitted to senders’ ISP central host computer and stored on it.
Received by the addressee’s host computer/ISP
The addressee logs in to a local computer and receives the mail
(b) Describe two advantages and two disadvantages of using electronic mail rather than using
ordinary letter post. [4] Advantages: Two from:
o Messages can be sent instantaneously by e-mail/delivery times are quicker
o You do not have to leave your house to send e-mail
o Replies to e-mails can be quicker
o Sending e-mail can be cheaper/the cost of a phone call is less than the cost of a stamp [2]
C Bus
A Star
B Ring
Question (21)
Discuss the needs of encryption including one of encryption techniques used in common network
environment. [4]
Data should be confidential, different users have different needs and different authorities to
access data. The networks, computer systems, and the data should be secure from unauthorised
access and also kept confidential.
Encryption is used to secure data and keeps it confidential, the authorised users only would have
the encryption and decryption key/keys.
Question (22)
Discuss the needs of authentication and state three techniques used in authentication on common
network environment like Internet. [4]
One of the main risks on data security on common network environment is the unauthorised
access of data including hacking, theft, alteration and corruption.
Authentication is the process of attempting to verify the digital identity of the sender of a
communication such as a request to log in to the computer system.
Authentication techniques:
o Allocate password and identification number associated with access rights to each user of
computer system to be checked at login to the system and accordingly giving them access or
not and define which part of the system they would be allowed to use.
o Use firewall to control access to computer system
o Use digital signature to ensure users are who they are.