State the seven layers of the OSI model
Name three types of cables used in data communication
Twisted pair cables
Coaxial cables
Fibre optic cables
Identify four different types of computer network.
Describe two differences between a switch and a repeater
Describe the role of a repeater when used in a network.
a repeater will amplify a signal and resend it to overcome reduction in signal strength (attenuation) because over a distance network signals diminish in size/amplitude (are attenuated) due to characteristics of the media.
Satellite services are used to provide broadband internet connectivity to regional and remote areas of Kenya. State one advantage and one disadvantage of using satellites for this purpose.
Advantages
Disadvantages
State the primary function of the Dynamic Host Configuration Protocol (DHCP) protocol.
List three characteristics of Internet Protocol version 6 (IP6).
Explain two ways in which an interpreter and a compiler are different.
Explain each of the strategies listed below.
(a) Phishing
(b) DoS
(a) Phishing
(b) DoS
List two primary functions of a domain name server.
When developing a network security policy, it is important to understand the threats that can be made against a network. ‘IP spoofing’ and ‘back doors’ are two techniques that can compromise the security of a network. Describe each of these techniques.
IP spoofing
A technique used to gain unauthorised access to a computer whereby an intruder sends messages to that computer from a false IP address
Back door:
An undocumented method of gaining access to a program, online service or an entire computer system
Explain, with examples where appropriate, the following five computer terms.
(a) Buffer
(b)batch processing
(c) e-commerce
(d) simulation
(a) Buffer
(b)batch processing
(c) e-commerce
(d) simulation
(e) Email
Describe three possible threats to the computers connected to the network and give one way each threat can be reduced or prevented
Virus / trojan / worm / malware
Prevention
Spyware / malware / keylogger
Prevention
Data interception / passive
Prevention
Phishing
Prevention
Pharming
Prevention
Hacker
Prevention
Give two other uses of hexadecimal in computer science.
A company has a website that is stored on a web server.
(a) The website data is broken down into packets to be transmitted to a user.
Describe the structure of a data packet.
A web server has an internet protocol (IP) address. Give three characteristics of an IP address.
Identify the network component that uses the IP address to send data only to its correct destination
Router
The website has a uniform resource locator (URL).
An example of a URL is given.
https://www.google.co.ke/index.html
Complete the table to identify the name of each section of the URL.
https : protocol
google.co.ke: domain name
/index.html: webpage/file name
State two advantages and one disadvantage of having a network of computers, rather than a series of stand-alone machines, in a school classroom.
Advantages
Disadvantages