Igcse Ict 3ed TR Ws Answers 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.

3 ANSWERS

4.1 Network devices, Wi-Fi and


Bluetooth answers
Getting started
1 Learner successfully completes the puzzle.
Across
1 bridge
2 packet
4 router
5 switch
Down
1 Bluetooth
3 server
6 hub

Practice
2 a USB tethering; Bluetooth.
b USB tethering advantages:
• allows the phone to provide internet
• allows the phone to be charged whilst in use
• has a secure, reliable and faster connection than Bluetooth.
USB tethering disadvantage:
• has a slow internet connection compared to Wi-Fi.
Bluetooth advantages:
• multiple devices can connect via Bluetooth
• Bluetooth is a standard so most mobile devices have one built in.
Bluetooth disadvantages:
• Bluetooth has a shorter range of about 10 m
• Bluetooth has a slower transmission speed compared to Wi-Fi.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 1
CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.3 ANSWERS

Challenge
3 Benefits:
• Devices can stay connected to the network but still roam about.
• Can access content from anywhere within the range of the Wi-Fi.
• Easy to set up/no trailing cables/no safety issues.
• Less expensive since no cables are required.
Drawbacks:
• Security issues/data leaks/network can be compromised.
• Less reliable over longer distances/bad weather/obstacles.
• Slower compared to wired network.
• Shorter range/coverage.
Learner gives reasonable conclusion.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 2
CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.3 ANSWERS

4.2 Network types and environments,


cloud computing and electronic
conferencing answers
Getting started
1 LAN (✓) WAN (✓) WLAN (✓) Bluetooth (✓)
Has a range of about 10 m ✓
Has a range of around 100 m ✓
Has a range of about 100–1000 m ✓
Spans over a large geographical area ✓

Practice
2 Learner successfully prepares a presentation on intranet, stating what it is, its advantages
and disadvantages
Description:
• An intranet is a private network within an organisation/restricted network.
• Can exist in a school or company.
• Uses the normal internet technology.
Advantages:
• Private network/cannot be accessed by outsiders/cannot bring viruses through the internet.
• Content on the network is relevant to the organisation.
• Improves internal communications among workers.
Disadvantages:
• Limited content/restricted to internal use only.
• Costly and time consuming to set up.
• Some employees can be less content/satisfied hence decreased employee performance/Poor
user experience.

3 Learner correctly distinguishes between the internet and an extranet – the internet is a global
network of networks while an extranet is a type of intranet with user extensions so that it can be
accessed outside the organisation.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 3
CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.3 ANSWERS

Challenge
4 a Learner correctly identifies three pieces of hardware, other than a computer, that a client
might need to participate in the training:
• headphones/speakers/headset
• microphone
• webcam.
b Learner suggests a piece of software that can be used:
• VOIP client software/web conferencing software
• not brand names.

5 Learner correctly explains the benefits to the client of accessing the material via cloud storage:
• Can be accessed from any device with supported software or network access.
• No need to buy expensive storage devices.
• Possible to collaborate on the training material with other trainees.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 4
CAMBRIDGE IGCSE™ ICT: WORKSHEET 4.1–4.3 ANSWERS

4.3 Security issues and authentication


techniques answers
Getting started
1 Learner correctly identifies the items described.
a Biometrics
b Magnetic stripes
c Smart cards
d Physical tokens
e Zero login

Practice
2 Learner correctly states four characteristics of a strong password.
• Should contain both letters and numbers.
• Combination of both upper and lowercase letters.
• Should contain at least one character such as @, #, $, etc.
• Avoid names that can easily be guessed.
• Should be at least eight characters long.

3 Learner explains the difference between the confidentiality of data and the privacy of data.
Privacy is the right of an individual or organisation to have control over how their personal
information is accessed, stored, used or disclosed.
Confidentiality is the duty of authorised personnel requiring them to ensure information is
kept secret and can only be accessed by people authorised.

Challenge
4 a Learner correctly describes how antiviruses remove viruses and prevent viruses from
infecting a computer.
• Antivirus scans an incoming file/program/application/stored files.
• Compares specific code in the file/program/application with information stored in its
knowledge base.
• If code similar/identical to known malware is identified, it is removed or quarantined.
b Learner explains why it is important to update antivirus software regularly.
• Viruses evolve/new viruses are a threat.
• Latest antivirus update contains new virus definitions/information about possible viruses.
• System runs fast and safely.

Cambridge IGCSE™ ICT – Waller, Wright, Taylor & Chikasa © Cambridge University Press 2022 5

You might also like