0% found this document useful (0 votes)
55 views

DataTransmis Top

The document discusses various types and methods of data transmission, including parallel, serial, simplex, duplex, and half-duplex. It outlines definitions, benefits, applications, and characteristics of each transmission method, along with examples and scenarios for their use. Additionally, it addresses specific technologies like USB and their advantages in data transmission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

DataTransmis Top

The document discusses various types and methods of data transmission, including parallel, serial, simplex, duplex, and half-duplex. It outlines definitions, benefits, applications, and characteristics of each transmission method, along with examples and scenarios for their use. Additionally, it addresses specific technologies like USB and their advantages in data transmission.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Data Transmission Topical

Saturday, July 15, 2023 11:29 PM

TYPES AND METHODS OF DATA TRANSMISSION


Q.
a) State what is meant by the terms:
Parallel data transmission
Serial data transmission [2]
b) Give one benefit of each type of data transmission.
Parallel data transmission
Serial data transmission [2]
c) Give one application of each type of data transmission. Each
application must be different.
Parallel data transmission
Serial data transmission [2] (Q1/11/M/J/15)
Ans.
a) parallel
any one from:
– 8 bits/1 byte/multiple bits sent at a time
– using many/multiple/8 wires/lines (1 mark)
serial
any one from:
– one bit sent at a time
– over a single wire (1 mark)
b) parallel
– faster rate of data transmission (1 mark)
serial
any one from:
– more accurate/fewer errors over a longer distance
– less expensive wiring
– less chance of data being skewed/out of synchronisation/order (1
mark)
c) parallel
any one from:
– sending data from a computer to a printer
– internal data transfer (buses) (1 mark)
serial
– connect computer to a modem (1 mark)

Q.
a) Three descriptions of data transmission are given below.
Tick (✓) the appropriate box in each table to show the:
• type of transmission
• method of transmission [6]

2210 Page 1
b) Give two reasons why serial transmission, rather than parallel
transmission, is used to connect devices to a computer. [2]
(Q6/12/M/J/16)
Ans.

a)

b) Any two from:


– single wire means there is less chance of interference/data corruption
– single wire reduces costs
– more reliable over greater distances
– bits will still be synchronised after transmission

2210 Page 2
Q.
a) Explain what is meant by:
i) Serial data transmission [2]
ii) Parallel data transmission [2]
b) A computer in a factory is connected to a printer. The printer is
located in an office 1km away from the factory.
Identify which data transmission method would be most suitable for
this connection
.......................................................................................................
Give two reasons for your choice. [3] (Q3/12/O/N/16)
Ans.
i) Any two from:
serial

– one bit sent at a time // bits sent sequentially


– over a single wire
– synchronous or asynchronous
ii) Any two from:
parallel

– several bits / a byte sent at a time


– using many / multiple wires
– synchronous
b) – serial
Any two from:
– serial data transmission more reliable over long distances
– less likely for the data to be skewed/out of synchronisation
– less interference as only a single wire
– it is a cheaper connection as only single wire needed // cheaper to set
up
– a fast connection is not required as a printer is limited by its printing
speed

Q. Five statements about serial half-duplex data transmission are shown


in the table below.Tick (3) to show whether each statement is true or
false. [5] (Q4/11/M/J/17)

Ans.

2210 Page 3
Q. Computer A is communicating with computer B.
a) Draw an arrow or arrows to show simplex, duplex and half-duplex
data transmission. The direction of the data transmission must be fully
labelled. [6]

b) State a use for the following data transmission methods. The use must
be different for each data transmission method. [2] (Q7ab/12/M/J/17)
Ans.

2210 Page 4
a)

b) 1 mark each use, must be different.


Simplex e.g.:
Microphone to computer
Sensor to computer
Computer to printer
Computer to speaker
Computer to monitor
Webcam to computer
Sending data to a device // sending data from a device
Duplex e.g.:
Telephone call
Voice over IP
Computer to printer (only award once)
Instant messaging
Broadband connections
Video conferencing
Sending data to and from devices e.g wireless technology Computer to
modem

Q. A file server is used as a central data store for a network of


computers.Rory sends data from his computer to a file server that is
approximately 100 metres away.
It is important that the data is transmitted accurately. Rory needs to

2210 Page 5
It is important that the data is transmitted accurately. Rory needs to
be able to read data from and write data to the file server at the same
time.
a)

ii) Explain why your answer to part (a)(i) is the most suitable data
transmission. [4] (Q4a/12/O/N/17)
Ans.

i)

ii) Any four from (Max 3 for serial):


• Serial has less/lower interference
• Serial is (more) reliable/accurate over distances
• In serial the bits won’t be skewed
• In serial it is easier to collate the bits together again after transmission
• Duplex transmits data in both directions at the same time
• simplex/half-duplex/remaining methods won’t allow read and write at
same time

Q. Computers can transmit data using different methods. Describe the


three data transmission methods given.
i) Serial data transmission [2]
ii) Parallel data transmission [2]
iii) Duplex data transmission [2] (Q9a/12/O/N/18)
Ans.
i) Two from:
• Data is transmitted one bit at a time
• Data is transmitted using a single wire
• Bits arrive in order/sequence
ii) Two from:
• Data is transmitted multiple bits at a time/simultaneously
• Data is transmitted using multiple wires
• Bits may arrive out of sequence/skewed (and are reordered)
iii) 1 mark for each:
• Data is transmitted in both directions
• « at the same time/simultaneously

Q. Data can be transferred using half-duplex serial transmission.


a) Describe serial transmission. [2]
b) Give one application of serial data transmission. [1]
c) Describe half-duplex data transmission. [2] (Q5/13/O/N/18)
Ans.
a) • Bits sent one at a time
• Uses a single wire
b) USB / SATA / Wifi /PCI Express / Any appropriate serial device
c) • Data is transferred in two directions

2210 Page 6
c) • Data is transferred in two directions
• Data is sent in only one direction at a time

Q. MIDI uses serial data transmission. Explain two advantages of using


serial transmission rather than parallel transmission. [4]
(Q5cii/12/O/N/19)
Ans.
Four from:
• It uses a single wire
«
• « therefore, it is cheaper to manufacture / buy / install
• « therefore, less likely to have interference // no crosstalk
• « therefore, can be used over longer distances
• Data is sent a bit at a time
«
• « therefore, less chance of data being skewed // data is received in
order
• Transmission can be synchronised
«
• « can reduce rate of errors

Q. Maisey purchases a new router and attaches it to her computer. The


connection she sets up uses duplex data transmission.
a) Five statements are given about duplex data transmission. Tick (✓) to
show if the statement is True or False. [5]

b) M ’ g IC
that sends multiple bits at the same time. State whether the IC uses
serial or parallel data transmission. [1] (Q9ab/12/O/N/19)
Ans.

a)

b) Parallel data transmission

Q. Blair writes a paragraph about data transmission in her Computer


S x gv B ’ g

2210 Page 7
S x gv B ’ g
by inserting the correct five missing terms. Not all terms will be used.
Terms can be used more than once.
• duplex
• half-duplex
• parallel
• serial
• simplex
....................................................................... data transmission is
when data is transmitted a single bit at a
time. ....................................................................... data transmission
is when multiple bits of data are sent all at once. If a user wants to
transmit data over a long distance, with the highest chance of
accuracy, ....................................................................... data
transmission should be used. If data needs to be transmitted in one
direction only, for example from a computer to a
printer, ....................................................................... data
transmission should be used. If a user has a large amount of data to
transmit and this needs to be done as quickly as
possible ....................................................................... data
transmission should be used. [5] (Q3/13/O/N/19)
Ans.
One mark for each correct term in the correct order
• Serial
• Parallel
• Serial
• Simplex
• Parallel

A. A company has a website that is stored on a web server.


a) The website data is broken down into packets to be transmitted to a
user. Describe the structure of a data packet. [4]
b) The website hosts videos that users can stream. The company uploads
new videos to the website.
iii) The company uses parallel half-duplex data transmission to transmit
the data for the new videos to the web server. Explain why parallel
half-duplex data transmission is the most appropriate method. [4]
(Q2abiii/01/SP/23)
Ans.
a) Any four from:
• it has a header
• … that contains the destination address
• … that contains the packet number
• … that contains the originator’s address
• it has a payload
• it has a trailer.
b) Any four from:
• parallel would allow fastest transmission
• … of the large amount of data
• data can be uploaded and downloaded …
• … but this does not have to be at the same time
• data is not required to travel a long distance
• … therefore skewing is not a problem.

Q. Priya stores her website on a webserver. To transmit the website data


to the webserver she uses parallel duplex data transmission. Describe
how data is transmitted using parallel duplex data transmission. [4]
(Q6c/12/M/J/19)

2210 Page 8
(Q6c/12/M/J/19)
Ans.
• Several/multiple bits are transmitted at a time /simultaneously.
• Several/multiple wires are used.
• Data is transmitted in both directions...
• ...at the same time /simultaneously.

Q. Arjun uses a scanner to create digital versions of some printed


documents.
The scanner is attached to his computer using a USB connection.
a) Tick (3) to show if the USB connection uses Parallel or Serial data
transmission.
Describe your chosen method of data transmission.
Parallel⬜
Serial ⬜[3] (Q5a/13/O/N/20)
Ans.
One mark for correct tick, two marks for description
− Serial
− Bits sent one at a time
− Single wire
If parallel given, no mark for parallel, but follow through for correct
description of parallel:
− Multiple bits sent at a time
− Multiple wires

Q. Three data transmission methods and three descriptions are given.


Draw a line to connect each transmission method to a correct
description. [2] (Q2/3175/12/M/J/21)

Ans.

Q. The data is sent using parallel half-duplex data transmission.


i) Describe how data is sent using parallel half-duplex data transmission.
[4]
ii) State two drawbacks of using parallel data transmission. [2]
(Q8c/11/M/J/21)
Ans.
i) Four from:
− Multiple bits are sent at the same time

2210 Page 9
− Multiple bits are sent at the same time
− Uses multiple wires
− Data is sent in both directions …
− … but only one direction at a time
ii) Any two from:
− Bits may arrive skewed
− More expensive to setup/manufacture/purchase cable
− Limited distance
− More prone to interference/error

Q. Six statements are given about methods of data transmission. Tick (✓)
to show if each statement applies to serial simplex, parallel simplex,
parallel half-duplex or serial duplex data transmission. Some
statements may apply to more than onedata transmission method. [6]
(Q3a/12/O/N/21)

Ans.
One mark per each correct row.

Q. Three data transmission methods and three descriptions are


given.Draw a line to connect each transmission method to a correct
description. [2] (Q2/3175/12/M/J/21)

Ans.

2210 Page 10
Q. Explain two benefits of Malik using serial data transmission to
transmit data around the network. [4] (Q9c/3175/12/M/J/21)
Ans.
Any four from:
− Suitable for long distances
− Data is sent one bit at a time
− Single wire used
− … cheaper to buy/install/maintain
− … less chance of interference/crosstalk
− … data should arrive in order / won’t be skewed
− … less chance of error

USB
a) State what is meant by the term USB. [1]
b) Describe two benefits of using USB connections between a computer
and a device.[2] (Q2/11/M/J/15)
Ans.
a) – universal serial bus
– description of USB
b) Any two from:
– devices are automatically detected and configured when initially
attached
– impossible to connect device incorrectly/connector only fits one way
– has become the industry standard
– supports multiple data transmission speeds
– lots of support base for USB software developers
– supported by many operating systems
– backward compatible
– faster transmission compared to wireless

Q. Nikita wishes to print out some documents and connects her printer to
the computer using one of the USB ports.
i) Identify what type of data transmission is being used. [1]
ii) Give three reasons for using a USB port. [3] (Q4ai,ii/11/M/J/16)
Ans.
i) serial
ii) Any three from:
– automatically detects the hardware/installs drivers
– plug only goes in one way/can’t connect incorrectly
– supports different data transmission speeds/a range of data
transmission speeds

2210 Page 11
transmission speeds
– has become the industry standard/universally used
– backwards compatible (with earlier versions of USB ports)

Q. A computer includes a Universal Serial Bus (USB) for data


transmission.
Describe how the computer uses this for data transmission, including
the type of data transmission used. [2] (part of Q7c/12/M/J/17)
Ans.
• serial transmission // description of serial
• for sending data externally (to and from peripherals / between
devices)

Q. Maisey purchases a new printer and connects it to her computer using


the USB port. Explain two benefits of using a USB connection. [4]
(Q9c/12/O/N/19)
Ans.
Four from (maximum two marks per benefit):
• It is a universal standard
«
• « so it is likely to be compatible with the computer
• It can only be inserted one way
«
• « so there is less chance of connecting a device incorrectly
• It is a high-speed connection
«
• « so data will be transmitted quicker
• It uses serial transmission
«
• « so it is cheaper to manufacture/buy
• « less chance of skewing / errors
• It doesn’t require a (wireless) network
«
• « therefore, can be used if a network is down
• It is backwards compatible
«
• « so no additional technology is needed
• It can power the device
«
• « therefore no separate source of power is needed
• Drivers are automatically downloaded // device is automatically
identified
«
• « so no need to find them online / install them manually

Q. C ’ SB C SB
her mobile device to her computer, to transfer her photos.
a) Give three benefits of using a USB port to connect the mobile device
to the computer. [3]
b) State the type of data transmission used when transferring data using
a USB port. [1] (Q3ab/11/M/J/20)
Ans.
a) Any three from:
− It is a universal standard
− It can’t be inserted the wrong way around
− Supports different transmission speeds
− Automatically detects if correct driver installed
− It will charge the mobile device at the same time

2210 Page 12
− It will charge the mobile device at the same time
b) Serial

A. Leonard has a new laser printer to print letters for his


business.Leonard connects his printer to his computer using the USB
port.
a) Give three benefits of using the USB port to connect the printer to the
computer. [3] (8a/12/M/J/20)

Ans. Any three from;


• It is a universal standard
• It can’t be inserted the wrong way around
• Supports different transmission speeds
• Automatically detects if correct driver installed.

Q. Give three benefits of a USB connection. [3] (Q5b/13/O/N/20)


Ans.
Any three from:
− Universal connection // industry standard
− Can only be inserted one way
− Backward compatible
− Auto configures // automatically recognised devices
− Can power devices
− Fast data transfer speed
− Inexpensive to purchase/manufacture

Q. Julia uses a USB connection to transfer data onto her USB flash
memory drive.
i) One benefit of using a USB connection is that it is a universal
connection. State two other benefits of using a USB connection. [2]
ii) Identify the type of data transmission used in a USB connection. [1]
(Q2c/11/M/J/21)
Ans.
i) Any two from:
− It cannot be inserted incorrectly
− Supports different transmission speeds
− High speed transmission
− Automatically detected (not connected) // automatically downloads
drivers
− Powers the device (for data transfer)
− Backward compatible
ii) Serial

Q. A Universal Serial Bus (USB) connection can be used to transmit data


from a mobile device to a computer. Give three benefits of using a
USB connection for this purpose. [3] (Q3b/12/O/N/21)
Ans.
Any three from:
− Can charge/power the mobile device (at the same time)
− (Uses serial transmission so) data less likely to be skewed / corrupted
− Universal / industry standard / connection
− Cable can only be plugged in one way // Cannot be inserted
incorrectly
− Fast transmission speed
− Backward compatible
− Supports different transmission speeds
− Automatically detects device // Automatically downloads drivers

2210 Page 13
A. The mobile phone has a USB port to allow a USB connection to a
computer.
i) Describe how data is transmitted using a USB connection. [2]
ii) One benefit of a USB connection is that the cable can only be inserted
into the port one way, so an incorrect connection cannot be made.
Give three other benefits of using a USB connection to connect a
mobile phone to a computer. [3] (Q4c/13/O/N/22)
Ans.
i) Any two from:
• Using serial transmission
• Data is sent one bit at a time
• Data is sent down a single wire
ii) Any three from:
• It can charge/power the device
• It is a universal/industry standard
• Fast rate of data transfer
• Supports different data transmission speeds
• Automatically detects the phone
• Backward compatible
• Little chance of data being skewed

METHODS OF ERROR DETECTION


Q. Parity checks are often used to check for errors that may occur during
data transmission.
a) A system uses even parity. Tick (✓) to show whether the following
three bytes have been transmitted correctly or incorrectly.

b) A parity byte is used to identify which bit has been transmitted


incorrectly in a block of data.
T w “F L O W C H A R T” w g
(one byte per character). A tenth byte, the parity byte, was also
transmitted.
The following block of data shows all ten bytes received after
transmission. The system uses even parity and column 1 is the parity
bit.

i) One of the bits has been transmitted incorrectly. Write the byte
number and column number of this bit:
Byte number ................................................................
Column number ........................................................... [2]
ii) Explain how you arrived at your answer for part (b)(i). [2]

2210 Page 14
ii) Explain how you arrived at your answer for part (b)(i). [2]
d) A parity check may not identify that a bit has been transmitted
incorrectly. Describe one situation in which this could occur. [1]
(Q5abd/12/M/J/15)
Ans.
a) 1 mark per correctly placed tick

b) i) byte number: 7 column number: 6


ii) Any two from:
− letter “A”(byte 7) transmitted as odd parity (three 1s)
− column 6 has odd parity (seven 1s)
− intersection of byte 7 and column 6 indicates incorrect bit value
d) Any one from:
− 2 bits interchanged (e.g. 1 → 0 and 0 → 1) that won’t change parity
value
− even number of bits/digits are transposed
− If there are multiple errors in the same byte/column, that still
produce the same parity bit,
the error will not be detected

Q.
a) Check digits are used to ensure the accuracy of input data. A 7-digit
code number has an extra digit on the right, called the check digit.

The check digit is calculated as follows:


• each digit in the number is multiplied by its digit position
• the seven results are then added together
• this total is divided by 11
• the remainder gives the check digit (if the remainder = 10, the check
digit is X)
i) Calculate the check digit for the following code number. Show all your
working.
4 2 4 1 5 0 8 … [2]
ii) An operator has just keyed in the following code number:
3240045X
Has the operator correctly keyed in the code number? Give a reason
for your answer. [3]
b) When data are transmitted from one device to another, a parity check
is often carried out on each byte of data. The parity bit is often the
leftmost bit in the byte.
i) If a system uses even parity, give the parity bit for each of the
following bytes:[2]

2210 Page 15
ii) A parity check can often detect corruption of a byte. Describe a
situation in which it cannot detect corruption of a byte. [1]
(Q7/12/O/N/15)
Ans.
a) i) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
Check digit is 6
ii) 1 mark – No/incorrect check digit
2 marks
– Total is 78
– 78/11 …
– … gives 7 remainder 1
– check digit should be 1
b) i) 1 mark for each correct parity bit

ii) Any one from:


– an even number of digits are changed
– a transposition error(s) has occurred

Q. The information from seven sensors is sent to an engine management


system in the car. The status of each sensor is stored in an 8-bit
register; a value of 1 indicates a fault condition:

For example, a register showing 0 1 0 1 1 0 0 0 indicates:


• temperature too high
• fuel pressure too low
• voltage too low
i) Identify the fault condition(s) that the following register indicates:
00100101 [2]
ii) The system uses odd parity. Write the correct parity bit in each
register.
⬜1110010

2210 Page 16
⬜1110010
⬜0001110 [2]
iii) A car has a faulty airbag and the CO level is too high. Write what
should be contained in the 8-bit register.
⬜⬜⬜⬜⬜⬜⬜⬜ [2]
iv) Give the hexadecimal value of the binary number shown in part (iii).
[1] {from chapter 1: data representation} (Q2b/13/O/N/15)
Ans.
i) 2 marks for all correct conditions, 1 mark for 2 correct conditions
CO (carbon monoxide) level too high
oil pressure too low
brake pads too thin
ii) 1 mark for each correct parity bit in position
11110010
00001110
iii) 1 mark for correct parity bit + 1 mark for remainder of binary value
10100010
iv) A 2 (allow follow through from part (iii)

Q. A company selling CDs uses a unique 6-digit identification number for


each CD title. The right-most digit (position 1) is a check digit. For
example,

The validity of the number and check digit is calculated as follows:


• multiply each digit by its digit position
• add up the results of the multiplications
• divide the answer by 11
• if the remainder is 0, the identification number and check digit are
valid.
a) Show whether the following identification numbers are valid or not.
You must show how you arrived at your answer.
Identification number 1: 4 2 1 9 2 3
Working: ...............................................................................................
..............................................................................................................
..............................................................................................................
..............................................................................................................
valid or not valid? .................................................................................
Identification number 2: 8 2 0 1 5 6
Working: ...............................................................................................
..............................................................................................................
..............................................................................................................
..............................................................................................................
valid or not valid? .................................................................................
[3]
b) Find the check digit for this identification number.
5 0 2 4 1 __
Working: ...............................................................................................
..............................................................................................................
..............................................................................................................
..............................................................................................................
Check digit: ...........................................................................................
c) Describe, with examples, two different types of data entry errors that
a check digit would detect. [2] (Q1/01/SP/16)
Ans.
a) 1 mark for the correct working in BOTH parts

2210 Page 17
a) 1 mark for the correct working in BOTH parts
1 mark for valid
1 mark for not valid
Identification number 1:
working
= (4 × 6) + (2 × 5) + (1 × 4) + (9 × 3) + (2 × 2) + (3 × 1)
= 24 + 10 + 4 + 27 + 4 + 3
= 72 ÷ 11
= 6 remainder 6
valid/not valid: NOT valid
Identification number 2:
working
= (8 × 6) + (2 × 5) + (0 × 4) + (1 × 3) + (5 × 2) + (6 × 1)
= 48 + 10 + 0 + 3 + 10 + 6
= 77 ÷ 11 = 7 remainder 0
valid/not valid: VALID
b) 1 mark for correct working + 1 mark for check digit
working
= (5 × 6) + (0 × 5) + (2 × 4) + (4 × 3) + (1 × 2)
= 30 + 0 + 8 + 12 + 2
= 52
need to add 3 to make the total 55 (i.e. exactly divisible by 11)
check digit: 3
c) 1 mark for each description and example
2 digits transposed (e.g. 280419 becomes 280149/two digits have
been switched)
incorrect digit (e.g. 280419 becomes 250419/one of the digits has
been mistyped)

Q. Bytes of data transferred using a serial cable are checked for errors at
the receiving end using an even parity check. Can these bytes of data
pass the even parity check?
a) 01010101 [1]
b) 11001000 [1]
c) How can any errors be corrected?[2] (Q5/01/SP/16)
Ans.
a) Yes
b) No
c) – re-reading the byte that was sent
– request that the byte is resent

Q. Check digits are used to ensure the accuracy of entered data.A 7-digit
number has an extra digit on the right, called the check digit.

The check digit is calculated as follows:


• each digit in the number is multiplied by its digit position
• the seven results are then added together
• this total is divided by 11
• the remainder gives the check digit (if the remainder = 10, the check
digit is X)
a) Calculate the check digit for the following number. Show all your
working.
4 2 4 1 5 0 8 … [2]

2210 Page 18
4 41508…
b) An operator has just keyed in the following number:
3240045X
Circle below correct if the check digit is correct OR incorrect if the
check digit is incorrect.
correct incorrect
Explain your answer. [3] (Q9/11/M/J/16)
Ans.

Q. This file will be transmitted to Mashuda as an email attachment.


Mashuda then stores it on her computer.
Explain how checksums can be used to verify that the file has not been
corrupted during transmission or data storage. [4] (Q4a/12/M/J/16)
Ans.
Any four from:
– the checksum for the bytes is calculated
– this value is then transmitted with the block of data
– at the receiving end, the checksum is re-calculated from the block of
data received
– the calculated value is then compared to the checksum transmitted
– if they are the same value, then the data was transmitted without any
error
– if the values are different, then an error has been found
– if the values are different, then a request is sent for the data to be re-
transmitted

Q. In the following barcode, each binary number is made up of seven


E g A “1”
g “0”
a) Write the binary numbers that would be produced from this barcode:
[ 2]

b) This barcode system uses odd parity. Write the parity bit for each of
the binary numbers in part (a):

2210 Page 19
the binary numbers in part (a):
Parity bit
Binary number A: ⬜
Binary number B: ⬜ [2] (Q9/12/M/J/16)
Ans.
a) Binary number A: 1 1 1 0 0 1 0
Binary number B: 1 0 0 1 1 1 0
b) Binary number A: 1
Binary number B: 1

Q. Nine bytes of data are transmitted from one computer to another.


Even parity is used. An additional parity byte is also sent.The ten bytes
arrive at the destination computer as follows:

a) Circle the corrupt bit in the corrupt byte in the table above. [1]
b) Explain how the corrupted bit was found. [2] (Q4/12/O/N/16)
Ans.
a) Intersection of Row 7 and column 4 circled
b) – Row (byte number) 7 has an odd number of 1s (five 1s)
– Column (bit number) 4 has an odd number of 1s (five 1s)

Q. Five computer terms and seven descriptions are shown below.Draw a


line to connect each computer term to its correct description. [5]
(Q3/13/O/N/16)

2210 Page 20
Ans.

2210 Page 21
Q. c) A microprocessor regularly samples the output, X. Each sample
value is stored in an 8-bit register as shown below. One bit of this
register is reserved as a parity bit. Five consecutive output values of 1
indicate a fault condition. Identify which of the following registers
shows a fault condition.

Register ........................ [1]


d) When eight bytes of data have been collected, they are transmitted to
a computer 100km away. Parity checks are carried out to identify if
the data has been transmitted correctly. The system uses even parity
and column 1 is the parity bit. The eight bytes of data are sent
together with a ninth parity byte:

2210 Page 22
i) Identify which of the eight bytes contains an error. [1]
ii) Identify which column contains an error. [1]
iii) The incorrect bit is indicated where the byte number and column
cross. Give the corrected byte.
⬜⬜⬜⬜⬜⬜⬜⬜ [1]
iv) Calculate the denary value of the corrected byte. [1] (from chapter 1)
v) Considering the fault condition given in part (c), explain why it is very
important that the incorrect bit is located and corrected. [2]
(Q5cd/13/O/N/16)
Ans.

Q. g
T v ww
g T ww
g g

b) Another method of error detection is Automatic Repeat reQuest


(ARQ). Explain how ARQ is used in error detection. [4] (Q5/11/M/J/17)
Ans.

2210 Page 23
a)

b) Four from:
• Uses acknowledgement and time out
• Check performed on received data // error is detected by e.g. parity
check, check sum
• If error detected, request sent to resend data // negative
acknowledgment is used
• If no acknowledgement is sent that data is received // positive
acknowledgement is used
• Data is resent / Resend request repeated, till data is resent correctly «
• « or request times out // limit is reached

Q. There are various methods used to detect errors that can occur during
data transmission and storage.Describe each of the following error
detection methods.
• Parity check
• Checksum
• Check digit
• Automated Repeat Request ARQ [8] (Q4/12/M/J/17)
Ans.
Two marks for each correct description
Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected
Check digit
• A digit that is calculated from the data // uses modulo to calculate
digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error
Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error
Automatic Repeat reQuest
• Uses acknowledgement / request and time-out
• Error control protocol
• Check performed on receiving data // error is detected by e.g. parity
check, check sum
• If error detected, request is sent to resend data // negative
acknowledgement is used
• Resend request is repeated till data is sent correctly / requests time

2210 Page 24
• Resend request is repeated till data is sent correctly / requests time
out / limit is reached
• Send acknowledgement that data is received // positive
acknowledgement is used
• If acknowledgement not received in set time data is resent

Q. Identify and describe two methods of error checking that can be used
to make sure that the data stored after transmission is accurate. [6]
(Q4b/12/O/N/17)
Ans.
1 mark for error checking method, 2 marks for description:
Checksum
• A value is calculated from the data // Description of calculation
• Value is transmitted with data
• Value is recalculated after transmission
• If the values match the data is (more likely to be) accurate
Parity check
• A parity bit is transmitted with each byte of data
• Odd or even (parity can be used)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• (Each byte is) checked after transmission to see if it matches the
odd/even parity used
Automatic Repeat Request (ARQ)
• Uses acknowledgement and timeout
• When a device detects an error in data transmission it asks for the
packet to be resent / no error detected, positive acknowledgment sent
• The sending device resends the packet after the request to resend/
timeout received
• This process is continuous until the packet received is correct/until
the ARQ limit is reached
Echo (check)
• Copy of data is sent back to sender
• Data is compared to see if it matches
• If it does not match error detected

Q. Selma writes the following four answers in her Computer Science


examination.State which computer terms she is describing.
“W , v
a signal is sent to ask for the data to be retransmitted. This continues
v ”
Selma is describing ........................................................ [1](part of
Q6/12/O/N/17)
Ans.
Automated Repeat Query (ARQ)

Q. The three binary numbers in the registers A, B and C have been


transmitted from one computer to another.

One binary number has been transmitted incorrectly. This is identified

2210 Page 25
One binary number has been transmitted incorrectly. This is identified
through the use of a parity bit.Identify which register contains the
binary number that has been transmitted incorrectly. Explain the
reason for your choice. [4] (Q3/11/M/J/18)
Ans.
1 mark for correct register, 3 marks for reason:
− Register C
Any three from:
− Count the number of 1/0 bits (in each byte/register)
− Two bytes/registers have an odd number of 1/0 bits // Two use odd
parity
− Odd parity must be the parity used
− One byte/register has an even number of 1/0 bits // One uses even
parity
− One with an even number of one bits/even parity is incorrect //
Register C should have odd parity

Q. The three binary numbers in the registers X, Y and Z have been


transmitted from one computer to another.

Only one binary number has been transmitted correctly. This is


identified through the use of a parity bit.Identify which register
contains the binary number that has been transmitted correctly.
Explain the reason for your choice. [4] (Q5/12/M/J/18)
Ans.
1 mark for correct register, 3 marks for reason:
– Register Y
Any three from:
– Count the number of 1/0 bits (in each byte/register)
– Two bytes/registers have an odd number of 1/0 bits // Two have odd
parity
– Even parity must be the parity used
– One byte/register has an even number of 1/0 bits // One uses even
parity
– The two with an odd number of one bits/odd parity are incorrect //
Register X and Z should have even parity

Q. Selma wants to make sure that the information received is correct. A


parity check can be used to detect errors. Describe another error
detection method that can be used to check the information received
is correct. [3] (Q12b/12/M/J/18)
Ans.
Any three from a single error method:
– Checksum
– Calculation carried out on data
– (checksum/calculated) value sent with data
– recalculated after transmission and compared to original
– If they do not match an error is present
– ARQ
– uses acknowledgment and timeout
– A request is sent with data to acknowledge all data is received

2210 Page 26
– A request is sent with data to acknowledge all data is received
– Acknowledgement sent back to say all data is received
– If no acknowledgement is received in a time frame an error in
transmission detected / data automatically resent.

Q. Data can sometimes be corrupted when it is transmitted from one


computer to another, causing errors to be present in the data. Identify
and describe three methods of error detection that could be used to
see if an error has occurred. [9] (Q9b/12/O/N/18)
Ans.
Maximum of three marks per error detection method.
1 mark for naming the method, 2 marks for describing it.
Parity (check)
• Odd or even parity can be used
• Bits are added together // 1 bits are counted
• Parity bit added (depending on parity set)
• Parity checked on receipt
• If parity bit is incorrect an error is detected
Checksum
• Calculation performed on data (to get the checksum)
• Checksum sent with data
• Checksum recalculated after transmission
• Comparison made between checksum before and checksum after
transmission
• Error detected if checksums are different
Automatic repeat request (ARQ)
• Uses acknowledgement and timeout
• Request is sent (with data) requiring acknowledgement
• If no response/acknowledgment within certain time frame data
package is resent
• When data received contains an error a request is sent (automatically)
to resend the data
• The resend request is repeatedly sent until packet is received error
free/limit is reached/acknowledgement received

Q. Parity checks and Automatic Repeat reQuests (ARQ) can be used to


check for errors during data transmission and storage.
a) A system uses even parity. Write the appropriate parity bit for each
byte.
Parity Bit
⬜ 1010011
⬜ 1011111
⬜ 1 0 1 0 0 0 1 [2]
b) Explain how Automatic Repeat reQuests (ARQ) are used in data
transmission and storage. [2]
c) State one other method that could be used to check for
transmission errors. [1] (Q2/13/O/N/18)
Ans.
a) 2 marks for 3 correct bits, 1 mark for 2 correct bits
0
0
1
b) Two from:
• Set of rules for controlling error checking/detection // it’s an error
detection method // used to detect errors
• Uses acknowledgement and timeout
• Request is sent (with data) requiring acknowledgement
• If no response/acknowledgment within certain time frame data

2210 Page 27
• If no response/acknowledgment within certain time frame data
package is resent
• When data received contains an error a request is sent (automatically)
to resend the data
• The resend request is repeatedly sent until packet is received error
free/limit is reached/acknowledgement received
c) Checksum

Q. Data is valuable to a company.


a) Companies use error detection methods to make sure that data is
accurate. One error detection method is the use of a check digit.
Explain what is meant by a check digit and how it is used to detect
errors. [4] ( Q10a/12/O/N/19)
Ans.
a) Four from:
• Validation method
• Used to check data entry
• Digit is calculated from data // by example
• Digit is appended / added to data
• Digit is recalculated when data has been input
• Digits are compared
• If digits are different, error is detected // If digits match, no error is
detected

A. 8 bytes of data are transmitted from one computer to another. Each


byte of data has a parity bit.The data is also sent with a parity byte.
Each bit in the parity byte allows a check to be performed on each
column of bits.A parity check is performed on the data and an error is
found in one bit. The table shows the data that was received.

Identify which bit has an error by giving the Byte number and Bit
number.
Explain how you found the error.
[4] (Q5/12/O/N/22)
Ans. One mark each for the correct
byte and bit.
• Byte 4
• Byte 5
Any two from:

2210 Page 28
Any two from:
• Counted all the 1s
• An even parity was used
• Odd number of ones in that row (byte 4) and column (bit 5)

Q. A system uses parity checks and Automatic Repeat reQuests (ARQ) to


detect and correct errors in the transmission of data.Describe how
parity checks and ARQ operate together to detect and correct errors.
[6] (Q9/13/O/N/22)
Ans. Any six from (MAX four for ARQ):
• Odd or even parity is set/agreed for the data
• A parity bit is added to each byte of data
• … to make the number of 1s match parity
• Data is checked after transmission to see if parity is correct
• ARQ uses acknowledgement and timeout
• If no error is found, a positive acknowledgement is sent to the sender /
no acknowledgement is sent to the sender
• If an error is found, a negative acknowledgement is sent to the sender …
• … that triggers the data to be resent
• When the data is sent, a timer is started
• If an acknowledgement is not received within the time set, the data is
resent ...
• … until an acknowledgement is received / resend limit is reached

Q. The data stored by the library is archived at the end of each day. The
archive is held on a server in the library office.
The data is encrypted with an 8-bit key. As some of the data is
confidential, the library wants to make the encryption more secure.
i) State how the library could make the encryption more secure. [1]
ii) The term used to describe data before it is encrypted is plain text.
State the term used to describe encrypted data. [1]
iii) T ’ v
system that combines a parity check with an automatic repeat request
(ARQ). Describe how this system uses the parity check and ARQ. [6]
(q1b/13/O/N/19)
Ans.
i) Increase the length of the key // make key 12-bit, etc.
ii) Cypher text
iii) Six from:
• The system could use odd or even parity
• A parity bit is added.
• The data is checked to see if it has incorrect/correct parity // by
example.

• If parity is correct, no error is found.


• An acknowledgement is sent that data is received correctly.
• The next packet of data is transmitted.

• If incorrect parity is found an error has occurred


• A signal is sent back to request the data to be resent.
• The data is resent until data is received correctly/timeout occurs.

Q. The contents of three binary registers have been transmitted from one
computer to another. Odd parity has been used as an error detection
method.The outcome after transmission is:
• Register A and Register B have been transmitted correctly.
• Register C has been transmitted incorrectly.Write the appropriate
Parity bit for each register to show the given outcome. [3] (2019)

2210 Page 29
Parity bit for each register to show the given outcome. [3] (2019)

Ans.
0
0
0

Q. Two error detection methods that Allison’s computer uses are check
digit and checksum.
a) Give two similarities between the check digit and checksum methods.
[2]
b) Identify one other error detection method that Allison’s computer
could use. Describe how the method checks for errors. [4]
(Q4/11/M/J/20)
Ans.
a) Any two from:
− They both calculate a value from the data
− They both append the calculated value to the data
− They both recalculate the value
− … They both report an error if they don’t match
b) One mark for method, three marks for description:
Automatic Repeat reQuest
− Uses acknowledgement / request and time-out
− Error control protocol
− Check performed on receiving data // error is detected by e.g. parity
check, check sum
− If error detected, request is sent to resend data // negative
acknowledgement is used
− Resend request is repeated till data is sent correctly / requests
timeout / limit is reached
− Send acknowledgement that data is received // positive
acknowledgement is used
− If acknowledgement not received in set time data is resent
Parity Check
− A parity bit is added (to the parity byte)
− Counts / checks number of 1’s
− Can be even or odd
− If parity is incorrect, error is detected

Q. Four 7-bit binary values are transmitted from one computer to


another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values
have been transmitted
correctly.
a) Tick (✓) to show whether an Even or an Odd parity check has been
used for each binary value [4]

2210 Page 30
b) The data will also be checked using a checksum. Describe how a
checksum can be used to check that the data has been transmitted
correctly. [4] (Q2/12/O/N/20)
Ans.

Q. Four 7-bit binary values are transmitted from one computer to


another. A parity bit is added to each binary value creating 8-bit binary
values. All the binary values are transmitted and received correctly.
a) Identify whether each 8-bit binary value has been sent using odd or
even parity by writing odd or even in the type of parity column. [4]

b) An error may not be detected when using a parity check. Identify why

2210 Page 31
b) An error may not be detected when using a parity check. Identify why
an error may not be detected. [1] (Q8ab/11/M/J/21)
Ans.
a) − Odd − Odd − Even − Even
b) Any one from:
− there is a transposition of bits
− it does not check the order of the bits (just the sum of 1s/0s)
− even number of bits change
− incorrect bits still add up to correct parity

Q. A system uses odd parity when transferring data.


a) Indicate the correct parity bits for the data shown.

b) A parity check may not always be able to detect an error in


transmission. Give a situation in which this could occur. [1]
c) A parity byte can be used to identify bits that have been incorrectly
transmitted in a block of data. The table shows a block of data that
uses odd parity.

One of the bits has been transmitted incorrectly. State the Byte
number and Bit number of the incorrect bit.
Byte number .........................................................................................
Bit number ...........................................................................................
[2] (Q12/3175/12/M/J/21)
Ans.

Q. A check digit is to be used to validate an identification number on


input. The identification number contains five digits and the check
digit. The check digit is calculated by adding up the first five digits,

2210 Page 32
digit. The check digit is calculated by adding up the first five digits,
dividing by 10 and taking the remainder.For example, 5 + 1 + 2 + 4 + 3
divided by 10 gives a remainder of 5 so the six-digit identification
number would be 512435.
a)
i) Calculate the check digit for 69321 [1]
ii) State which of these identification numbers have incorrect check
digits.
A 123455
B 691400
C 722855
D 231200 [2]
b)
i) Describe an input error that would not be found using this check
digit.[2]
ii) Describe a more suitable algorithm to calculate the check digit for this
identification number. [2] (Q3ab/23/O/N/22)
Ans. a)
i) 1
ii) One mark for each correct letter seen, max two
• C
• D
b)
i) One mark per mark point, max two
• Two or more digits
• Transposed
ii) One mark per mark point, max two
• multiply each digit by a different number / its place value
• before adding them together and dividing by a number

ENCRYPTION
Q. Choose five correct terms from the following list to complete the
spaces in the sentences below:
• cypher text
• encryption algorithm
• encryption key
• firewall
• plain text
• proxy server
• symmetric encryption
............................................................................ is a security system.
It uses the same ............................. to encrypt and decrypt a message.
Before encryption, the message is
called ...................................................................................... .
The ..................................................... processes the original message.
The output is known as ....................................................................... .
[5] (Q10/13/O/N/15)
Ans.
symmetric encryption
encryption key
plain text
encryption algorithm
cypher text

2210 Page 33
cypher text

Q. In a simple symmetric encryption system, each letter of the alphabet is


substituted with another.
The plain text message:
The quick brown fox jumps over the lazy dog.
becomes the cypher text message:
Zag towvs jumpy dmh coilr mngu zag bfke qmx.
a) i) Decode this cypher text message.
Agbbm Pmubq [2]
ii) Convert these words to cypher text.
Computer Science [2] (Q10a/01/SP/16)
Ans.
a) One mark for each correct word
i) Hello World
ii) Vmilozgu Rvwgyvg

Q. Selma has some important personal information that she needs to


email to her employer. She wants to make sure that if the personal
information is intercepted, it cannot be understood.
i) State how Selma could email her personal data more securely. [1]
ii) Describe how your chosen solution works. [5] (Q12a/12/M/J/18)
Ans.
i) Encryption
ii) Any five from:
– Her personal details before encryption is the plain text
– The plain text/her personal details is encrypted using an encryption
algorithm
– The plain text/her personal details is encrypted using a key
– The encrypted text is cypher/cipher text
– The key is transmitted separately (from the text)
– The key is used to decrypt the cypher text (after transmission)

Q. The data stored by the library is archived at the end of each day. The
archive is held on a server in the library office. The data is encrypted
with an 8-bit key. As some of the data is confidential, the library wants
to make the encryption more secure.
i) State how the library could make the encryption more secure. [1]
ii) The term used to describe data before it is encrypted is plain text.
State the term used to describe encrypted data. [1] (Qbi,ii/13/O/N/19)
Ans.
i) • Increase the length of the key // make key 12-bit, etc.
ii) Cypher text

Q. A company collects and stores data about its customers. The data is
v ’ T
cloud storage to create a back-up.The data is encrypted using
symmetric encryption before it is sent to the cloud storage.
a) Describe how the data is encrypted. [4] (Q3a/12/M/J/20)

Ans. Any four from;


• Encryption key is used
• Encryption algorithm is used
• Encryption key / algorithm is applied to plain text
• ... to convert it to cypher text
• Same key is used to encrypt and decrypt the text

Q. Elsa writes a paragraph in an examination about encryption.There are

2210 Page 34
Q. Elsa writes a paragraph in an examination about encryption.There are
several terms missing from the paragraph.Complete the paragraph
using the list of given terms. Not all terms may need to be used.Some
terms may be used more than once.
• algorithm
• alphanumeric
• cookie
• cypher
• key
• padlock
• plain
• word processed
The data is encrypted using a .............................................................. .
This is an ....................................................................... that is used to
scramble the data. The data before encryption is known
as ....................................................................... text. When the data
has been encrypted it is known as .....................................................
text. To read the encrypted data it needs to be decrypted using
a ....................................................................... .[5] (Q6/13/O/N/20)
Ans.
− Key // Algorithm
− Algorithm // Key (must be opposite of first one)
− Plain
− Cypher
− Key // Algorithm

Q. To help protect personal data when it is transmitted over the network,


Malik decides to use symmetric encryption. Explain how symmetric
encryption is used to protect the data. [4] (Q9b/3175/12/M/J/21)
Ans.
One from:
− Data is encrypted and decrypted using the same key
Any three from:
− Data is scrambled
− … to make it meaningless
− Data before encryption is known as plain text
− Data after encryption is known as cypher text
− Key is sent to receiver (to allow data to be decrypted) // Values are
sent to receiver that are used to generate key

A. Adele encrypts the data on her mobile device to keep it more secure.
State how encryption will keep the data more secure. [1]
(Q7d/11/M/J/22)

Ans. It makes the data meaningless.

2210 Page 35

You might also like