Give the names of two protocols that may be used in a LAN.
Did this page help you?
Give the names of two protocols that may be used in a LAN.
How did you do?
Did this page help you?
Anika’s computer runs a multi-tasking operating system. She has access to a printer and a broadband internet connection through a wireless connection. The operating system uses scheduling algorithms such as first come first served and round-robin.
Anika uses an encrypted messaging program to communicate with her friends. The computer uses the TCP/IP stack.
Explain what happens at the link layer (sometimes referred to as the “network interface layer”, “network access layer” or simply the “network layer”) of the TCP/IP stack when using this program.
How did you do?
Did this page help you?
Anika’s computer runs a multi-tasking operating system. She has access to a printer and a broadband internet connection through a wireless connection. The operating system uses scheduling algorithms such as first come first served and round-robin.
Anika uses an encrypted messaging program to communicate with her friends. The computer uses the TCP/IP stack.
Explain what happens at the application layer of the TCP/IP stack when using this program
How did you do?
Did this page help you?
A hotel uses a computer system to keep track of room bookings. The hotel staff are able to query a database to discover which rooms are booked or which rooms are free.
The hotel is concerned about the security of its computer network.
Discuss the threats which potentially exist to the hotel’s computer network and how these threats could be eliminated or reduced.
How did you do?
Did this page help you?
A hotel uses a computer system to keep track of room bookings. The hotel staff are able to query a database to discover which rooms are booked or which rooms are free.
The hotel’s computer network uses a client-server model.
Describe what is meant by the term ‘client-server’ in this context.
How did you do?
Did this page help you?
Give two advantages of client-server compared to peer-to-peer.
How did you do?
Did this page help you?
Explain the purpose of a network switch
How did you do?
Did this page help you?
All computers owned by the business are connected together into a Local Area Network (LAN). Various network protocols are used in this network.
Give three advantages to the business of connecting computers together in a LAN
How did you do?
Did this page help you?
Explain what is meant by a network protocol.
How did you do?
Did this page help you?
Explain why protocol layering is used
How did you do?
Did this page help you?