Fundamentals of Computer Networks (AQA GCSE Computer Science): Exam Questions

Exam code: 8525

2 hours30 questions
1a
1 mark

PANs and LANs are two different types of network.

Describe one difference between a PAN and a LAN.

1b
1 mark

Give one example of where a PAN could be used.

1c
2 marks

When two computers on a network communicate with each other they need to use the same protocol.

Define the term network protocol.

1d
1 mark

Used to make a payment securely when purchasing goods from a website.

  • HTTP

  • HTTPS

  • SMTP

  • IMAP

1e
1 mark

Used to send an email from a client machine to an email server.

  • HTTP

  • HTTPS

  • SMTP

  • IMAP

2a
2 marks

Identify two choices to show which statements are true about LANs.

  • LANs always use the Ethernet protocol.

  • LANs always use wireless technology.

  • LANs are usually controlled or owned by a single organisation

  • LANs connect a maximum of 150 devices.

  • LANs cover one room, building or site

2b
2 marks

HTTP is an example of a network protocol.

Define the term network protocol.

3a
1 mark

Computer networks can be installed using wired or wireless technology.

State one wireless method used to connect devices on a Personal Area Network (PAN).

3b
1 mark

Identify one choice to indicate the application layer protocol used for sending emails from a client device to a mail server.

  • IMAP

  • HTTP

  • SMTP

  • IP

4a
2 marks

Define the term computer network.

4b
2 marks

Identify two choices that are correct statements about network protocols.

  • A protocol is a set of rules.

  • All protocols only work with specific hardware.

  • All protocols transmit data secure

  • Ethernet is a family of protocols.

  • Wi-Fi is a single protocol.

5a
1 mark

LANs and WANs are two different types of network.

Describe one difference between a LAN and a WAN.

5b
1 mark

Give one example of where a LAN could be used.

1a
2 marks

Most schools have a computer network.

Some schools allow teachers to access the school network from their home computers.

Give one reason why some schools allow this and one reason why some schools do not allow this.

1b
3 marks

State three advantages of using a computer network.

1c
3 marks

TCP/IP is a protocol used in networking. There are 4 layers in the TCP/IP stack.

Complete the table by placing the four layers of the TCP/IP stack into order (1-4) where 1 is the top layer and 4 is the bottom layer.

Layer

Order (1-4)

Transport

Link

Internet

Application

2a
2 marks

Describe two differences between a PAN and a WAN.

2b
2 marks

The application layer and the transport layer are two of the layers within the TCP/IP model.

What are the names of the other two layers of the TCP/IP model?

3a
1 mark

Describe two differences between a Local Area Network (LAN) and a Wide Area Network (WAN).

3b
3 marks

Give three advantages of using a wireless network instead of a wired network.

3c
2 marks

Explain the purpose of the HTTPS protocol.

4a
2 marks

Explain how a firewall can be used to improve the security of a computer network.

4b
2 marks

Authentication and MAC address filtering can be used to improve network security.

Explain how one of these security methods works.

5
2 marks

Explain one data privacy concern an organisation would need to consider when setting up a wireless network.

1
2 marks

Explain why it would not be appropriate for the café to use MAC address filtering on their wireless network.

2
9 marks

Table 4 shows three layers of the TCP/IP model and some protocols that operate at each of these layers.

Table 4

Layer

Protocol

Application layer

HTTP
HTTPS
SMTP
IMAP

Transport layer

TCP

Internet layer

IP

Describe the role of one protocol from each layer in Table 4.

You must state which protocol you are describing.

3
5 marks

Explain how the concept of layers in network protocols provides advantages for data transmission, using the TCP/IP model as an example.

4a
4 marks

A small online shop wants to improve the security of its wireless network after a recent cyberattack.

They are considering implementing:

  • Authentication

  • Encryption

  • Firewalls

  • MAC address filtering

Explain how authentication and encryption could work together to make the network more secure.

4b
4 marks

Describe the advantages and disadvantages of using a firewall and MAC address filtering to protect the network.

5a
2 marks

A school’s wireless network uses WPA3 encryption but no MAC address filtering.

A hacker gains access to the network after stealing a teacher’s Wi‑Fi password through phishing.

Explain why encryption alone was not enough to prevent this attack.

5b
4 marks

Suggest and justify two additional network security measures (other than encryption) the school could use to prevent similar attacks in future.