Question 2, May 2022, 1R, Pearson Edexcel International GCSE (9-1) Information and Communication Technology, Paper-1
Nihal arrives at a hotel.
(a) Nihal fills in a form at the hotel reception desk.
State one use of OCR. (1)
OCR can recognize characters.
(b) Nihal connects his laptop to the hotel's local area network.
(i) Explain one advantage of using Media Access Control (MAC) addresses rather than Internet Protocol (IP) addresses to identify devices on a local area network. (2)
MAC addresses can provide a more reliable and efficient way to identify and track individual devices on a local area network, compared to using IP addresses alone.
(ii) State two issues caused by not identifying devices correctly on a network. (2)
1 If devices on a network are not properly identified, it may cause security risks.
2 If devices on a network are not properly identified, it can lead to network performance problems.
(iii) Complete this sentence by adding the correct network devices. (2)
A local are network uses a router to control devices, whereas a wide area network uses a gateway to control local area network.
(iv) Explain one disadvantage of connecting a printer to a network. (2)
Printer in a network may be overloaded with requests because any device connected to the network can send jobs.
(v) Draw a straight line from each method of protecting a network to the correct description. (3)
(vi) Which one of these is an example of a device that connects using a personal area network? (1)
A Hard drive
B Router
C Server
D Smartphone
D Smartphone
(c) Nihal streams a film using a low bandwidth connection.
Explain why reducing the bit rate of the file improves the user experience. (2)
By reducing the bit rate of the file, the size of the data that needs to be transferred is reduced, which means that less data needs to be transmitted over the network. This can help to ensure that the available bandwidth is sufficient to stream the video without interruption.
(d) Describe low latency. (2)
Low latency refers to the delay or lag between the time when a signal is sent and the time when it is received.
(e) The hotel's computers are shared between users.
The network manager has administrator privileges.
(i) Describe how the network manager can make sure users cannot see each other's data. (2)
The network manager can make sure users cannot see each other's data by setting user accounts with access rights.
(ii) Describe one way that the network manager can make sure the hotel still has access to its data if a storage server was flooded by water. (2)
By restoring data from the backup, the network manager can make sure the hotel still has access to its data if a storage server was flooded by water.
(f) The hotel staff use project management software.
State the feature of project management software that gives a timeline of all dependent tasks. (1)
Critical path gives a timeline of all dependent tasks.
(Total for Question 2 = 22 marks)


Comments
Post a Comment