GCSE Computer Science - Topic 4 Networks

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:30 PM on 2/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

What is the difference between a LAN and a WAN?

LAN (Local Area Network) covers a small site like a building; WAN (Wide Area Network) connects LANs over a large geographical area using leased lines or satellites.

2
New cards

Define Bandwidth and Latency.

Bandwidth is the volume of data that can be sent in a given time (bps); Latency is the time delay for data to travel from source to destination.

3
New cards

List 3 factors that affect network performance.

  1. Bandwidth, 2. Number of users (contention), 3. Transmission media (e.g. copper vs fibre).
4
New cards

How are network speeds measured?

Measured in bits per second (bps): Kilobits (1,000), Megabits (1,000,000), and Gigabits (1,000,000,000).

5
New cards

What is the formula for network transmission time?

Time (seconds) = File size (bits) / Transmission rate (bps).

6
New cards

What is a Protocol?

A set of rules that govern how devices communicate and how data is transmitted across a network.

7
New cards

What are the roles of IP addresses and Routers?

IP addresses uniquely identify a device's location on a network; Routers use these addresses to direct data packets to their destination.

8
New cards

Describe Ethernet and Wi-Fi.

Ethernet is a protocol for wired LANs; Wi-Fi is a family of protocols for wireless data transmission using radio waves.

9
New cards

What are TCP and IP responsible for?

TCP (Transmission Control Protocol) handles packet sequencing and error checking; IP (Internet Protocol) handles the routing of packets.

10
New cards

What are HTTP and HTTPS used for?

Used by web browsers to access websites; HTTPS is the secure, encrypted version.

11
New cards

What is FTP used for?

File Transfer Protocol is used for the transmission of files across a network.

12
New cards

What are the three email protocols (POP3, SMTP, IMAP)?

SMTP sends emails; POP3 downloads and deletes them from the server; IMAP syncs emails across devices.

13
New cards

Name the 4 layers of the TCP/IP model.

  1. Application, 2. Transport, 3. Internet, 4. Link.
14
New cards

What happens at the Application and Transport layers?

Application provides services to apps (HTTP/FTP); Transport handles packet switching and error checking (TCP).

15
New cards

What happens at the Internet and Link layers?

Internet handles routing and IP addressing; Link handles the physical transmission of data via hardware/drivers.

16
New cards

Describe a Star Topology.

All devices connect to a central switch. If one cable fails, only that device is affected. High performance but expensive.

17
New cards

Describe a Mesh Topology.

Devices are interconnected. Very reliable as there is no single point of failure, but complex to set up.

18
New cards

Describe a Bus Topology.

All devices share a single backbone cable. Cheap to install but slow if many users are on it; if the backbone fails, the whole network goes down.

19
New cards

What is the difference between the Internet and the WWW?

The Internet is the physical infrastructure (cables/routers); the WWW is a collection of web pages accessed via the internet.

20
New cards

What is the role of the DNS?

Translates human-readable domain names (e.g. https://www.google.com/search?q=google.com) into IP addresses that computers can understand.

21
New cards

What is Penetration Testing?

Simulating a cyber attack on a network to identify and fix security vulnerabilities.

22
New cards

What is the difference between Ethical Hacking and a real attack?

Ethical hacking is legal, authorized testing to find flaws; a real attack is unauthorized and malicious.

23
New cards

What is Access Control?

Security that restricts user permissions, ensuring people can only access the data and files they are authorized to see.

24
New cards

Give examples of Physical Security.

Locking server rooms, using CCTV, security guards, or biometric scanners for building entry.

25
New cards

How do Firewalls protect a network?

They monitor incoming and outgoing traffic and block unauthorized access based on a set of security rules.

Explore top flashcards

Vocab 4-6
Updated 753d ago
flashcards Flashcards (30)
PSYC 100 Exam 1
Updated 487d ago
flashcards Flashcards (61)
Vocabulary
Updated 1047d ago
flashcards Flashcards (57)
Travel and leisure
Updated 276d ago
flashcards Flashcards (112)
Vocab 4-6
Updated 753d ago
flashcards Flashcards (30)
PSYC 100 Exam 1
Updated 487d ago
flashcards Flashcards (61)
Vocabulary
Updated 1047d ago
flashcards Flashcards (57)
Travel and leisure
Updated 276d ago
flashcards Flashcards (112)