Security 1
Explain what a ‘Brute Force Attack’ is and outline 2 preventative measures that a network could have in place, to reduce the threat.
Explain what a ‘Brute Force Attack’ is and outline 2 preventative measures that a network could have in place, to reduce the threat.
Packet Switching enables files to be sent from one computer to another, across a network.
Describe the steps involved in ‘packet switching’.
Ethernet, WiFi & Protocols 4 Read More »
Explain the similarity and difference between the POP and IMAP email protocols.
Ethernet, WiFi & Protocols 3 Read More »
In networking, what is a protocol?
Ethernet, WiFi & Protocols 2 Read More »
Describe two differences between a MAC address and an IP address.
Ethernet, WiFi & Protocols 1 Read More »
The term ‘Cloud Computing’ relates to online services such as Office365 and GoogleDocs.
An organisation has decided to invest in a cloud service to provide the necessary productivity tools for its workforce.
Describe 5 benefits that ‘Cloud Computing’ can bring to the organisation and highlight 2 drawbacks of relying on ‘Cloud Computing’.
Wide Area Networks 4 Read More »
The terms ‘Internet’ and ‘World Wide Web’ are often used interchangeably, but are in fact very different. Describe the difference between the ‘Internet’ and the ‘World Wide Web’.
Wide Area Networks 2 Read More »
Define what is meant by a ‘Wide Area Network’.
Wide Area Networks 1 Read More »
A company has decided to implement a ‘Client-Server’ network in their offices. What benefits do ‘Client-Server’ networks provide?
Local Area Networks 3 Read More »