You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
This lesson brings together everything you have learned about networks in this course. It provides guidance on tackling exam questions, common question types, key definitions you must know, and worked examples with model answers.
The following definitions are commonly tested in GCSE Computer Science exams. Learn them precisely.
| Term | Definition |
|---|---|
| LAN | A network covering a small geographical area (e.g. a building), owned and maintained by the organisation |
| WAN | A network covering a large geographical area, using third-party infrastructure |
| PAN | A very small network around an individual person, typically using Bluetooth |
| Protocol | A set of rules that governs how data is transmitted across a network |
| IP address | A unique numerical address assigned to every device on a network |
| MAC address | A unique hardware address permanently assigned to a network interface card |
| DNS | A system that translates domain names into IP addresses |
| Packet | A small unit of data sent across a network, containing a header, payload and trailer |
| Firewall | A security system that monitors and controls network traffic based on rules |
| Encryption | Converting data into an unreadable format to prevent unauthorised access |
| Malware | Malicious software designed to harm, exploit or gain unauthorised access to a system |
| Phishing | A social engineering attack using fake emails/messages to trick users into revealing personal information |
| SQL injection | An attack that inserts malicious SQL code into a website's input field to manipulate its database |
| DDoS | An attack that overwhelms a server with traffic from many sources, preventing legitimate access |
Questions asking you to compare LAN vs WAN, wired vs wireless, star vs mesh, TCP vs UDP, etc.
Strategy:
Example Question: Compare a LAN with a WAN. (4 marks)
Model Answer:
Questions asking you to describe how DNS works, how data is transmitted using packet switching, how an email is sent, etc.
Strategy:
Example Question: Describe how packet switching is used to transmit data across the internet. (6 marks)
Model Answer:
Questions about phishing, malware, SQL injection, DDoS, etc.
Strategy:
Example Question: Explain what a phishing attack is and describe two ways an organisation can protect against it. (4 marks)
Model Answer: Phishing is a social engineering attack where an attacker sends fake emails or messages that appear to come from a trusted source. The message contains a link to a fake website designed to trick the user into entering personal information such as login credentials or bank details (2 marks for description).
Prevention 1: Staff training — educating employees to recognise suspicious emails, check sender addresses carefully and avoid clicking unknown links (1 mark).
Prevention 2: Email filtering software that scans incoming messages for known phishing indicators and blocks or flags suspicious emails (1 mark).
Scenario-based questions asking you to advise on network setup, topology choice, security measures, etc.
Strategy:
Example Question: A small business has 15 computers in a single office. The owner wants to set up a network. Recommend a suitable network topology and justify your choice. (4 marks)
Model Answer: I would recommend a star topology. In a star topology, each computer is connected to a central switch (1 mark).
If one computer or cable fails, only that device is affected and the rest of the network continues to work, which is important for business continuity (1 mark).
A star topology is easy to add new devices to — the business can simply connect a new computer to a spare port on the switch as the business grows (1 mark).
The central switch makes it easier to manage and monitor the network, and performance is good because a switch directs data only to the intended device, avoiding collisions (1 mark).
| Mistake | Correction |
|---|---|
| Confusing the internet with the World Wide Web | The internet is the infrastructure; the WWW is a service running on it |
| Confusing a switch with a router | A switch connects devices within a LAN using MAC addresses; a router connects different networks using IP addresses |
| Confusing MAC address with IP address | A MAC address is a permanent hardware identifier; an IP address is a logical address that can change |
| Saying encryption "stops hackers" | Encryption makes data unreadable if intercepted — it does not prevent interception, just makes the data useless to the attacker |
| Vague answers about security | Always name specific measures and explain how they work |
| Describing only one side of a comparison | Ensure you cover both items being compared |
Use this checklist to ensure you have revised all the key topics:
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.