NAME/CLASS:
PP04 - Throwback Thursday (TOPIC 3) [25 marks]
1. 23M.1.SL.TZ1.7
Identify two layers in the Open Systems Interconnection (OSI) seven-layer model.
[2]
Data Link
Network
2. 22N.1.SL.TZ0.5
A student posts images and videos on a public website of her friends at a party.
(a) Outline one ethical issue with the student posting these images and videos.
[2]
Their friends may not consent to the photos being shared which is a privacy concern
(b) Outline one technical issue that may prevent the images and videos from being
viewed.
[2]
The images and videos may be corrupted when uploaded which will unable people to view them
Network might be slow which will prevent the video will being viewed
3. 21M.1.SL.TZ0.6
Identify two reasons why fibre optic cable would be preferred over wireless
connectivity.
Faster transmission speeds [2]
More secure
Allow greater bandwidth
PP03 - Throwback Thursday (TOPIC 3 – Networks) [SL/HL] 1
4. 23M.1.SL.TZ1.11
Many organizations use a virtual private network (VPN) to enable employees working
remotely to access files that are held on the organization’s server.
(a) State two technologies that are required to provide a virtual private network (VPN).
[2]
Encryption
Tunneling Protocol
(b) Identify two factors that may affect the speed of data transmission.
[2]
Range
Signal interference
(c) Explain why data compression would be used when data is transmitted.
[3]
Because servers are limited in storage, compression is used to reduce the file size
allowing for faster transmission time and lower storage used
A large amount of sensitive data is stored online and needs to be protected.
(d) Outline how encryption is used to protect data.
It is the process of converting readable plaintext to unreadable ciphertext using [2]
algorithms that are based on cryptography in order to prevent unauthorized access.
In fact, there are two types of encryptions:
1- Symmetric key
2- Public key
(e) Describe the role of a firewall.
[2]
Security system to protect an internal network from unauthorized servers and
networks based on predefined rules. It acts as a barrier and only allows the secured
network to send or receive data.
PP03 - Throwback Thursday (TOPIC 3 – Networks) [SL/HL] 2
Employees are increasingly working from home.
(f) Discuss the social impacts of this changed work pattern on employees.
Work-Life Balance:
+ Positive: Better balance and time management. [4]
- Negative: Blurred boundaries and increased stress.
Social Isolation:
+ Positive: Reduced distractions and increased focus.
- Negative: Loneliness and lack of social interaction.
Communication:
+ Positive: Technology facilitates virtual collaboration.
- Negative: Lack of non-verbal cues leads to misunderstandings.
Health and Well-being:
+ Positive: Elimination of commute improves physical health.
- Negative: Eye strain due to longer hours spent looking at screens.
5. 19M.1.SL.TZ0.11
Outline one reason why protocols are used in communications between computers.
[2]
Protocols are used to maintain compatibility between different computer systems
PP03 - Throwback Thursday (TOPIC 3 – Networks) [SL/HL] 3