0% found this document useful (0 votes)
146 views14 pages

Class 6 ICT Chapter 4 Q&A Guide

The document contains a series of questions and answers related to computer networking concepts, including hardware identification, network devices, intranet vs. extranet, cloud storage advantages and disadvantages, and the Internet of Things. It emphasizes the roles of various network devices like routers, switches, and hubs, as well as the importance of security measures in cloud storage. Additionally, it compares Bluetooth and Wi-Fi, and discusses the popularity of the World Wide Web.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views14 pages

Class 6 ICT Chapter 4 Q&A Guide

The document contains a series of questions and answers related to computer networking concepts, including hardware identification, network devices, intranet vs. extranet, cloud storage advantages and disadvantages, and the Internet of Things. It emphasizes the roles of various network devices like routers, switches, and hubs, as well as the importance of security measures in cloud storage. Additionally, it compares Bluetooth and Wi-Fi, and discusses the popularity of the World Wide Web.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Sithi Rafeeka Kulam Class: ________

Name: ____________________ 18/04/2025


Year-10 Date: __________
1 Identify the hardware from the description given.

A printed circuit board that is installed in a computer so that the computer can be connected
to a network.

Network Interface Card (NIC)


(1 m ar k )

2 State two network devices.

Actuator Bridge

Database DVD

Hub Lin ke r

Monitor Printer

Hub

Bridge
(2 m ar k s)
3 (a) Network devices are used in computer systems.

Complete each sentence by identifying the most appropriate network device.

The network device that connects a LAN to a WAN

The network device that connects a LAN to a WAN:


Router (1 m ar k )

(b) The network device that allows data to be directed to a specific computer on a LAN

The network device that allows data to be directed to a


specific computer on a LAN: Switch (1 m ar k )

(c) The internal network device that allows a computer to connect to a LAN

The internal network device that allows a computer to


connect to a LAN: Network Interface Card (NIC) (1 m ar k )
4 (a) Both the internet and the intranet are used for communication.

Define the term internet.

A global network that connects millions of private, public,


academic, business, and government networks.
(2 m ar k s)

(b) Define the term Intranet.

A private network accessible only to an organization's


staff, used to share information and computing resources
within the organization.
(2 m ar k s)
5 (a) Write down the most appropriate network device to match the following statements.

Your answers should be different in each part.

This network device checks the data packet arriving from one computer and sends the data to
a specific computer.

Switch
(1 m ar k )

(b) This network device sends the data packet from a computer to all devices connected to it.

Hub
(1 m ar k )

(c) This network device connects a LAN to the internet.

Router
(1 m ar k )

(d) This network device connects one LAN to another with the same protocol.

Bridge
(1 m ar k )
6 (a) Describe two uses of a company intranet.

Sharing internal documents securely

Internal communication
(2 m ar k s)

(b) Social networking is used to communicate with friends; this is one use of the internet.

Describe four other uses of the internet.

Online shopping

Email communication

Research and information access


(4 m ar k s)
Streaming media
Medium Questions
1 A company may use an intranet or an extranet.

Describe the differences between an intranet and an extranet.

An intranet is a private network used within an organization.


An extranet allows controlled access to outsiders like partners or
customers.
(2 m ar k s)

2 A systems analyst has been asked to carry out an analysis of a company’s current
computer system.

The systems analyst is working with a team to create some new software. The software
documentation will be stored on the cloud.

Describe how the team can use the cloud to share the documentation.

The team can upload documents to a shared cloud folder.

Members can access, edit, and collaborate in real-time.

Version history can track changes.

Accessible from any location with internet access.


(4 m ar k s)
3 (a) The program collects a large amount of data and this could be stored using either a fixed
solid-state drive (SSD) or cloud storage.

The developer is planning to use cloud storage.

Describe four advantages to the school of using cloud storage rather than using the
SSD.

Accessible from anywhere

Automatic backups

Scalable storage

Collaboration in real-time
(4 m ar k s)

(b) Describe three disadvantages to the school of using cloud storage rather than using the
SSD.

Requires internet connection

Risk of data breaches

Possible subscription costs


(3 m ar k s)

4 A company has an extranet.

Explain what is meant by an extranet.

A private network that allows external users, limited access to


internal company resources. (1 m ar k )

5 Compare the similarities and differences between Bluetooth and wi-fi.

similarities differences
Both are wireless Bluetooth has a shorter range; Wi-Fi
communication methods covers a wider area

Both use radio signals Bluetooth is mainly for personal


devices; Wi-Fi for internet access
Used for data transmission
Wi-Fi is faster than Bluetooth
6 (a) Explain what is meant by cloud storage and how it is used.

Cloud storage means saving data


on remote servers accessed over
the internet. Users can upload,
retrieve, or manage data from
anywhere with internet.

(6 m ar k s)

(b) Describe two issues related to the security of data in the cloud.

Unauthorized access or hacking

Data loss due to server failure or cyber attacks


(2 m ar k s)
7 (a) Computers can store data in the cloud rather than using storage devices in the computer

Describe three benefits of storing data in the cloud.

Easy file access from anywhere

Saves physical storage space

Enables sharing and collaboration


(3 m ar k s)

(b) Describe three drawbacks of storing data in the cloud.

Security risks

Needs internet access

Possible ongoing cost


(3 m ar k s)
8 (a) The Internet of Things (IoT) allows devices as well as computers to connect to the
internet using a router. Each device uses an IP address.

Explain what is meant by an IP address.

A unique identifier for a device on a network,


allowing communication between devices.

(3 m ar k s)

(b) Explain how a router sends data packets to another network.

Breaks data into packets

Uses IP addresses to direct packets

Sends them to the appropriate network or device


(3 m ar k s)

9 The World Wide Web is part of the internet.

Explain why the World Wide Web has become so popular.

- Easy access to information

- Multimedia content support

- Global connectivity

- Supports e-commerce

- Communication via websites and email

- Constantly updated content


(6 m ar k s)

10 Bluetooth is a method of communication to connect devices together.

Describe how a smartphone can use Bluetooth to connect to another device.


Enable Bluetooth on both devices

Pair the devices

Establish secure connection

Transfer files or stream audio


(4 m ar k s)

11 An organisation uses the internet and an intranet.

Explain how the purpose of the internet differs from the purpose of an intranet.

Internet: Intranet:
Used for global Used internally for secure
communication, public communication,
access to information document sharing within
an organization

(4 m ar k s)

12 The Internet of Things (IoT) is a computer network which allows users to control
household devices remotely. It has many benefits, for example a user can turn on the
house central heating via a smartphone. The IoT can use WiFi and Bluetooth which can
cause problems regarding data security.

Describe the methods that could be taken to protect the user’s data.

Use strong passwords and change default ones

Encrypt data transmission

Use firewalls and antivirus software

Regularly update firmware

Enable two-factor authentication

Restrict device access


(6 m ar k s)
13 Compare and contrast the features of a switch and a hub.

Switch: Hub:

Sends data only to the intended Broadcasts data to all devices


device
Less secure and slower
More efficient
No data filtering
Can reduce network traffic

(6 m ar k s)

You might also like