1. What does a protocol define?
2. Give the full name for the following protocols:
a. HTTPS
b. IMAP
c. POP
d. HTTP
e. SMTP
3. What is the purpose of the IMAP and POP protocols?
4. What does the S add to the HTTP protocol?
1. A protocol defines a set of rules for a computer to follow when connecting to the internet.
2. Give the full name for the following protocols:
a. HyperText Transfer Protocol Secure
b. Internet Message Access Protocol
c. Post Office Protocol
d. HyperText Transfer Protocol
e. Simple Mail Transfer Protocol
3. IMAP and POP are used to download email messages from the server onto the device you are using.
4. The S stands for secure which means an addition Secure Socket Layer has been added to the protocol to encrypt the data that is being transmitted.
How email works:
Voice over Internet Protocols (VoIP)
H.323 protocols suite is used to control the setup, management and termination of video and audio calls over the internet.
Media Gateway Control Protocol (MGCP) is a text-based protocol consisting of commands and responses, creating a centralised gateway for administration. This protocol is used to convert traditional electronic media to the internet protocol network.
Simple Gateway Control Protocol (SGCP) is the predecessor to the MGCP, which is used to connect residential telephones.
TCP/IP
Transmission Control Protocol (TCP) is used to break up messages into packets, reassembles those packets at the other end of the transmission, detects any errors that may have occurred and will resend any lost packets.
Internet Protocol (IP) is in charge of setting up the route for the individual packets to follow via the network to reach their destination.
TCP/IP
The protocol stack defines four layers in which different protocols operate to pass data packets across a network.
These are the:
HTTP & HTTPS
Another type of security you can add instead of SSL is a Transport Layer Security (TLS).
File Transfer Protocol
This is used to transmit data to and from a remote server or computer, e.g., accessing your files on a cloud server.
Many customers worry about the security of personal data when paying for good and services online. HTTPS is a method used to secure data transmitted between a user and a website.
Describe how HTTPS is used to securely transmit data. (4)
Award one mark for any four of the following.
SSL (secure sockets layer) added to the HTTP to add layer of security (to give HTTPS)/security certificate. (1)
SSL uses encryption to secure the data (1)
Only those with the 'key' can read the data. (1)
SSL certificate provides private communication channels for data transmission/only the website server and the customer's device. (1)
Accept any other relevant phrasing/wording.
An operating system is software that manages a computer's hardware and provides a user interface.
What can an operating system manage in a computer?
An operating system is software that manages a computer's hardware and provides a user interface.
What can an operating system manage in a computer?
Types of User interfaces:
Josie’s new laptop has a pre-installed operating system.
Describe the role of the operating system in memory management. (3)
Award one mark for each of the following, up to a maximum of three marks.
The memory manager needs to allocate blocks of memory to applications (and data) (1) the memory manager should allow many applications to occupy memory at the same time (1) the applications need to be protected from one another so that they do not overwrite each other. (1)