Protocols are used to transmit data through the network and over the internet.
Identify one protocol that can be used to perform each of the following tasks:
Send an email | |
---|---|
Access a website securely |
Did this page help you?
Protocols are used to transmit data through the network and over the internet.
Identify one protocol that can be used to perform each of the following tasks:
Send an email | |
---|---|
Access a website securely |
Did this page help you?
The owners of a large bakery have a Local Area Network (LAN) with a star topology. They order their supplies over the Internet.
When data is transmitted from the bakery to the supplier, network protocols are used.
Define what is meant by a ‘network protocol’.
Did this page help you?
Data transmitted over the network uses different protocols.
Tick one box in each row to identify whether the protocol is related to email, transferring files or accessing websites.
Protocol | Transferring files | Accessing websites | |
---|---|---|---|
POP | |||
FTP | |||
SMTP | |||
HTTPS |
Did this page help you?
TCP/IP is one example of a protocol.
Give the name of one appropriate protocol for each task in the table.
Task | Protocol for this task |
---|---|
Sending an email from one mail server to another | |
Transmitting a file from a client to a server | |
Viewing a website using a web browser | |
Downloading an email to your computer |
Did this page help you?
The following table has descriptions of Ethernet and WiFi.
Tick (✓) one box in each row to identify if the description is more appropriate for Ethernet or WiFi.
Description | Ethernet | WiFi |
---|---|---|
A wired connection | ||
More likely to be affected by interference | ||
Data can be transmitted at a faster speed | ||
Wireless transmission | ||
Shorter transmission range before data is lost |
Did this page help you?
Users can access websites from library computers.
Complete the description of accessing websites using the given list of terms.
Not all terms will be used.
'0' ' 1' '127' '128' '255' ' 256' ' Colon'
'Domain Name Server' 'Embedded systems' 'File server'
'Full stop' 'Hyphen' 'Internet protocol' 'MAC address'
'Router' 'Uniform Resource Locator' 'Web server' 'Clients'
A website is hosted on a ...................... The computers that access the websites are called .................... . The user enters the .......................................... into a web browser. The web browser sends a request to the ............................. for the matching IP (Internet Protocol) address. If found the IP address is returned. A request is then sent to this IP address. An IPv4 address is made of 4 groups of digits. Each group can be between the denary values ..... and ..... . The groups of digits are separated by a ............... . |
---|
Did this page help you?
A library does not use encryption when data is transmitted through the network.
Give two reasons why the library should use encryption.
Did this page help you?
The network has one wireless access point in the kitchen that transmits data on the 5GHz frequency.
When the laptop is in the kitchen, it has better network performance.
Explain why the laptop’s network performance is lower in the bedroom.
State two ways Hope could improve the wireless network performance in the bedroom.
1 | |
---|---|
2 |
Did this page help you?
Ethernet cables are used within the office building.
Tick one box in each row to identify if the statement about Ethernet is True or False.
Statement | True | False |
---|---|---|
Ethernet is a protocol | ||
Ethernet uses wireless data transmission | ||
Ethernet can transmit data at speeds of up to 100Gbits per second | ||
Ethernet is a protocol within the TCP/IP stack |
Did this page help you?
Computers access the Internet using the TCP/IP model.
The TCP/IP model uses layers including the application layer and transport layer.
Explain why the TCP/IP model uses layers.
Did this page help you?
For the scenario below, identify the most appropriate protocol to be used and explain the function of the protocol.
A user wants to transfer a file directly from his computer to his friend’s computer. |
---|
For the scenario below, identify the most appropriate protocol to be used and explain the function of the protocol.
A customer wants to securely log into her bank’s website to check her account balance. |
---|
Did this page help you?
The wired connection is an Ethernet connection.
Ethernet is considered a standard.
Explain why Ethernet is a standard.
Did this page help you?
TCP/IP is a set of protocols based on layers.
With regards to network protocols, define what is meant by a ‘layer’.
Describe one advantage of using layers to construct network protocols.
Did this page help you?
Explain the difference between how the IMAP (Internet message access protocol) and SMTP (simple mail transfer protocol) protocols are used.
Did this page help you?