Complete the diagram of the 4-layer TCP/IP model - Edexcel - GCSE Computer Science - Question 2 - 2023 - Paper 1
Question 2
Complete the diagram of the 4-layer TCP/IP model.
Name the network topology that uses terminators to absorb signals.
Identify the reason computers are connected ... show full transcript
Worked Solution & Example Answer:Complete the diagram of the 4-layer TCP/IP model - Edexcel - GCSE Computer Science - Question 2 - 2023 - Paper 1
Step 1
Complete the diagram of the 4-layer TCP/IP model.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The completed diagram should contain the layers labeled as follows:
Application
Transport
Internet
Link
Step 2
Name the network topology that uses terminators to absorb signals.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The network topology that uses terminators to absorb signals is called a Bus topology.
Step 3
Identify the reason computers are connected in a network.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The primary reason computers are connected in a network is to share peripherals.
Step 4
State the network protocol used to request a webpage.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The network protocol used to request a webpage is HTTP (Hypertext Transfer Protocol).
Step 5
Explain one benefit to a user of using IMAP to access emails.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One benefit of using IMAP (Internet Message Access Protocol) is that it allows users to access their emails from multiple devices without deleting messages from the server, ensuring that emails are synchronized across all devices.
Step 6
Explain one other method of physical security that could be used to protect the servers.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One other method of physical security that could be used to protect the servers is the installation of biometric locks. These locks require users to provide unique biological traits, such as fingerprints, for access, thereby preventing unauthorized personnel from entering.
Step 7
Describe how a router enables data to arrive at its destination.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A router enables data to arrive at its destination by analyzing the data packets' destination addresses and determining the best path through the network. It forwards each packet to the appropriate next hop until it reaches its final destination.