More Stable and Secure Connection
More Stable and Secure Connection
More Stable and Secure Connection
(ii) Give two advantages to Kiki of using a wireless method to connect to the smartphone.(2)
Can move around while transferring data, and does not have to waste time connecting to
cables.
(c) The smartphone uses a SIM card. Which one of these is a type of connectivity that the SIM
card provides?(1)
A WLAN
B Bluetooth
C Infrared
D 4G
(ii) Explain why sharing an Internet connection would affect the bandwidth available to Kiki’s
smartphone.(2)
KiKi will have less bandwidth as it will have to be divided between each divice.
(e) Kiki’s smartphone and Zara’s tablet computer share a lot of the same functionality. State the
term used to describe this.(1)
Convergence
(e) Zara uses a PIN to unlock her tablet computer. List three other methods she could use to
prevent unauthorised access to her data. (3)
Voice recognition, Password, Pattern
(b) The health monitor uses Bluetooth to transfer data to the smartwatch.
(i) Explain why Bluetooth rather than infrared is used for this transfer.(2)
Infrared requires line of sight but the Bluetooth doesn’t require line of sight which is not
always possible when exercising.
(ii) Give two factors that might affect the speed of the transfer.(2)
Bandwidth and physical blockage.
(c) Some data needs to be encrypted when it is transferred. Describe how encryption helps
keep data secure.(2)
Randomize data so that it requires a key.
(d) Ruwan’s smartwatch uses GPS to monitor his location. Give two pieces of information that
could be calculated using GPS data.(2)
The distance to the destination and the quickest route.
(e) Some social networking services use GPS data. Describe how the use of GPS data could
place social network users at risk.(2)
User’s location is published and that information might be shared.
4.(d) Which one of these is a protocol used to transfer data on the Internet?(1)
A ISP
B HTTPS
C HTML
D VPN
(e) Describe how MAC addresses can be used to prevent access to networks.(3)
Every device has a unique MAC address that can be checked by a firewall.
5 James teaches in a school that uses a local area network and a wide area network.
(a) Give one example of a wide area network.(1)
The internet.
.
5.(c) Describe two benefits to teachers of using a local area network.(4)
Can communicate using emails, and can share printers to reduce printer cost.
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: