DataTransmis Top
DataTransmis Top
Q.
a) Three descriptions of data transmission are given below.
Tick (✓) the appropriate box in each table to show the:
• type of transmission
• method of transmission [6]
2210 Page 1
b) Give two reasons why serial transmission, rather than parallel
transmission, is used to connect devices to a computer. [2]
(Q6/12/M/J/16)
Ans.
a)
2210 Page 2
Q.
a) Explain what is meant by:
i) Serial data transmission [2]
ii) Parallel data transmission [2]
b) A computer in a factory is connected to a printer. The printer is
located in an office 1km away from the factory.
Identify which data transmission method would be most suitable for
this connection
.......................................................................................................
Give two reasons for your choice. [3] (Q3/12/O/N/16)
Ans.
i) Any two from:
serial
Ans.
2210 Page 3
Q. Computer A is communicating with computer B.
a) Draw an arrow or arrows to show simplex, duplex and half-duplex
data transmission. The direction of the data transmission must be fully
labelled. [6]
b) State a use for the following data transmission methods. The use must
be different for each data transmission method. [2] (Q7ab/12/M/J/17)
Ans.
2210 Page 4
a)
2210 Page 5
It is important that the data is transmitted accurately. Rory needs to
be able to read data from and write data to the file server at the same
time.
a)
ii) Explain why your answer to part (a)(i) is the most suitable data
transmission. [4] (Q4a/12/O/N/17)
Ans.
i)
2210 Page 6
c) • Data is transferred in two directions
• Data is sent in only one direction at a time
b) M ’ g IC
that sends multiple bits at the same time. State whether the IC uses
serial or parallel data transmission. [1] (Q9ab/12/O/N/19)
Ans.
a)
2210 Page 7
S x gv B ’ g
by inserting the correct five missing terms. Not all terms will be used.
Terms can be used more than once.
• duplex
• half-duplex
• parallel
• serial
• simplex
....................................................................... data transmission is
when data is transmitted a single bit at a
time. ....................................................................... data transmission
is when multiple bits of data are sent all at once. If a user wants to
transmit data over a long distance, with the highest chance of
accuracy, ....................................................................... data
transmission should be used. If data needs to be transmitted in one
direction only, for example from a computer to a
printer, ....................................................................... data
transmission should be used. If a user has a large amount of data to
transmit and this needs to be done as quickly as
possible ....................................................................... data
transmission should be used. [5] (Q3/13/O/N/19)
Ans.
One mark for each correct term in the correct order
• Serial
• Parallel
• Serial
• Simplex
• Parallel
2210 Page 8
(Q6c/12/M/J/19)
Ans.
• Several/multiple bits are transmitted at a time /simultaneously.
• Several/multiple wires are used.
• Data is transmitted in both directions...
• ...at the same time /simultaneously.
Ans.
2210 Page 9
− Multiple bits are sent at the same time
− Uses multiple wires
− Data is sent in both directions …
− … but only one direction at a time
ii) Any two from:
− Bits may arrive skewed
− More expensive to setup/manufacture/purchase cable
− Limited distance
− More prone to interference/error
Q. Six statements are given about methods of data transmission. Tick (✓)
to show if each statement applies to serial simplex, parallel simplex,
parallel half-duplex or serial duplex data transmission. Some
statements may apply to more than onedata transmission method. [6]
(Q3a/12/O/N/21)
Ans.
One mark per each correct row.
Ans.
2210 Page 10
Q. Explain two benefits of Malik using serial data transmission to
transmit data around the network. [4] (Q9c/3175/12/M/J/21)
Ans.
Any four from:
− Suitable for long distances
− Data is sent one bit at a time
− Single wire used
− … cheaper to buy/install/maintain
− … less chance of interference/crosstalk
− … data should arrive in order / won’t be skewed
− … less chance of error
USB
a) State what is meant by the term USB. [1]
b) Describe two benefits of using USB connections between a computer
and a device.[2] (Q2/11/M/J/15)
Ans.
a) – universal serial bus
– description of USB
b) Any two from:
– devices are automatically detected and configured when initially
attached
– impossible to connect device incorrectly/connector only fits one way
– has become the industry standard
– supports multiple data transmission speeds
– lots of support base for USB software developers
– supported by many operating systems
– backward compatible
– faster transmission compared to wireless
Q. Nikita wishes to print out some documents and connects her printer to
the computer using one of the USB ports.
i) Identify what type of data transmission is being used. [1]
ii) Give three reasons for using a USB port. [3] (Q4ai,ii/11/M/J/16)
Ans.
i) serial
ii) Any three from:
– automatically detects the hardware/installs drivers
– plug only goes in one way/can’t connect incorrectly
– supports different data transmission speeds/a range of data
transmission speeds
2210 Page 11
transmission speeds
– has become the industry standard/universally used
– backwards compatible (with earlier versions of USB ports)
Q. C ’ SB C SB
her mobile device to her computer, to transfer her photos.
a) Give three benefits of using a USB port to connect the mobile device
to the computer. [3]
b) State the type of data transmission used when transferring data using
a USB port. [1] (Q3ab/11/M/J/20)
Ans.
a) Any three from:
− It is a universal standard
− It can’t be inserted the wrong way around
− Supports different transmission speeds
− Automatically detects if correct driver installed
− It will charge the mobile device at the same time
2210 Page 12
− It will charge the mobile device at the same time
b) Serial
Q. Julia uses a USB connection to transfer data onto her USB flash
memory drive.
i) One benefit of using a USB connection is that it is a universal
connection. State two other benefits of using a USB connection. [2]
ii) Identify the type of data transmission used in a USB connection. [1]
(Q2c/11/M/J/21)
Ans.
i) Any two from:
− It cannot be inserted incorrectly
− Supports different transmission speeds
− High speed transmission
− Automatically detected (not connected) // automatically downloads
drivers
− Powers the device (for data transfer)
− Backward compatible
ii) Serial
2210 Page 13
A. The mobile phone has a USB port to allow a USB connection to a
computer.
i) Describe how data is transmitted using a USB connection. [2]
ii) One benefit of a USB connection is that the cable can only be inserted
into the port one way, so an incorrect connection cannot be made.
Give three other benefits of using a USB connection to connect a
mobile phone to a computer. [3] (Q4c/13/O/N/22)
Ans.
i) Any two from:
• Using serial transmission
• Data is sent one bit at a time
• Data is sent down a single wire
ii) Any three from:
• It can charge/power the device
• It is a universal/industry standard
• Fast rate of data transfer
• Supports different data transmission speeds
• Automatically detects the phone
• Backward compatible
• Little chance of data being skewed
i) One of the bits has been transmitted incorrectly. Write the byte
number and column number of this bit:
Byte number ................................................................
Column number ........................................................... [2]
ii) Explain how you arrived at your answer for part (b)(i). [2]
2210 Page 14
ii) Explain how you arrived at your answer for part (b)(i). [2]
d) A parity check may not identify that a bit has been transmitted
incorrectly. Describe one situation in which this could occur. [1]
(Q5abd/12/M/J/15)
Ans.
a) 1 mark per correctly placed tick
Q.
a) Check digits are used to ensure the accuracy of input data. A 7-digit
code number has an extra digit on the right, called the check digit.
2210 Page 15
ii) A parity check can often detect corruption of a byte. Describe a
situation in which it cannot detect corruption of a byte. [1]
(Q7/12/O/N/15)
Ans.
a) i) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
Check digit is 6
ii) 1 mark – No/incorrect check digit
2 marks
– Total is 78
– 78/11 …
– … gives 7 remainder 1
– check digit should be 1
b) i) 1 mark for each correct parity bit
2210 Page 16
⬜1110010
⬜0001110 [2]
iii) A car has a faulty airbag and the CO level is too high. Write what
should be contained in the 8-bit register.
⬜⬜⬜⬜⬜⬜⬜⬜ [2]
iv) Give the hexadecimal value of the binary number shown in part (iii).
[1] {from chapter 1: data representation} (Q2b/13/O/N/15)
Ans.
i) 2 marks for all correct conditions, 1 mark for 2 correct conditions
CO (carbon monoxide) level too high
oil pressure too low
brake pads too thin
ii) 1 mark for each correct parity bit in position
11110010
00001110
iii) 1 mark for correct parity bit + 1 mark for remainder of binary value
10100010
iv) A 2 (allow follow through from part (iii)
2210 Page 17
a) 1 mark for the correct working in BOTH parts
1 mark for valid
1 mark for not valid
Identification number 1:
working
= (4 × 6) + (2 × 5) + (1 × 4) + (9 × 3) + (2 × 2) + (3 × 1)
= 24 + 10 + 4 + 27 + 4 + 3
= 72 ÷ 11
= 6 remainder 6
valid/not valid: NOT valid
Identification number 2:
working
= (8 × 6) + (2 × 5) + (0 × 4) + (1 × 3) + (5 × 2) + (6 × 1)
= 48 + 10 + 0 + 3 + 10 + 6
= 77 ÷ 11 = 7 remainder 0
valid/not valid: VALID
b) 1 mark for correct working + 1 mark for check digit
working
= (5 × 6) + (0 × 5) + (2 × 4) + (4 × 3) + (1 × 2)
= 30 + 0 + 8 + 12 + 2
= 52
need to add 3 to make the total 55 (i.e. exactly divisible by 11)
check digit: 3
c) 1 mark for each description and example
2 digits transposed (e.g. 280419 becomes 280149/two digits have
been switched)
incorrect digit (e.g. 280419 becomes 250419/one of the digits has
been mistyped)
Q. Bytes of data transferred using a serial cable are checked for errors at
the receiving end using an even parity check. Can these bytes of data
pass the even parity check?
a) 01010101 [1]
b) 11001000 [1]
c) How can any errors be corrected?[2] (Q5/01/SP/16)
Ans.
a) Yes
b) No
c) – re-reading the byte that was sent
– request that the byte is resent
Q. Check digits are used to ensure the accuracy of entered data.A 7-digit
number has an extra digit on the right, called the check digit.
2210 Page 18
4 41508…
b) An operator has just keyed in the following number:
3240045X
Circle below correct if the check digit is correct OR incorrect if the
check digit is incorrect.
correct incorrect
Explain your answer. [3] (Q9/11/M/J/16)
Ans.
b) This barcode system uses odd parity. Write the parity bit for each of
the binary numbers in part (a):
2210 Page 19
the binary numbers in part (a):
Parity bit
Binary number A: ⬜
Binary number B: ⬜ [2] (Q9/12/M/J/16)
Ans.
a) Binary number A: 1 1 1 0 0 1 0
Binary number B: 1 0 0 1 1 1 0
b) Binary number A: 1
Binary number B: 1
a) Circle the corrupt bit in the corrupt byte in the table above. [1]
b) Explain how the corrupted bit was found. [2] (Q4/12/O/N/16)
Ans.
a) Intersection of Row 7 and column 4 circled
b) – Row (byte number) 7 has an odd number of 1s (five 1s)
– Column (bit number) 4 has an odd number of 1s (five 1s)
2210 Page 20
Ans.
2210 Page 21
Q. c) A microprocessor regularly samples the output, X. Each sample
value is stored in an 8-bit register as shown below. One bit of this
register is reserved as a parity bit. Five consecutive output values of 1
indicate a fault condition. Identify which of the following registers
shows a fault condition.
2210 Page 22
i) Identify which of the eight bytes contains an error. [1]
ii) Identify which column contains an error. [1]
iii) The incorrect bit is indicated where the byte number and column
cross. Give the corrected byte.
⬜⬜⬜⬜⬜⬜⬜⬜ [1]
iv) Calculate the denary value of the corrected byte. [1] (from chapter 1)
v) Considering the fault condition given in part (c), explain why it is very
important that the incorrect bit is located and corrected. [2]
(Q5cd/13/O/N/16)
Ans.
Q. g
T v ww
g T ww
g g
2210 Page 23
a)
b) Four from:
• Uses acknowledgement and time out
• Check performed on received data // error is detected by e.g. parity
check, check sum
• If error detected, request sent to resend data // negative
acknowledgment is used
• If no acknowledgement is sent that data is received // positive
acknowledgement is used
• Data is resent / Resend request repeated, till data is resent correctly «
• « or request times out // limit is reached
Q. There are various methods used to detect errors that can occur during
data transmission and storage.Describe each of the following error
detection methods.
• Parity check
• Checksum
• Check digit
• Automated Repeat Request ARQ [8] (Q4/12/M/J/17)
Ans.
Two marks for each correct description
Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected
Check digit
• A digit that is calculated from the data // uses modulo to calculate
digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error
Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error
Automatic Repeat reQuest
• Uses acknowledgement / request and time-out
• Error control protocol
• Check performed on receiving data // error is detected by e.g. parity
check, check sum
• If error detected, request is sent to resend data // negative
acknowledgement is used
• Resend request is repeated till data is sent correctly / requests time
2210 Page 24
• Resend request is repeated till data is sent correctly / requests time
out / limit is reached
• Send acknowledgement that data is received // positive
acknowledgement is used
• If acknowledgement not received in set time data is resent
Q. Identify and describe two methods of error checking that can be used
to make sure that the data stored after transmission is accurate. [6]
(Q4b/12/O/N/17)
Ans.
1 mark for error checking method, 2 marks for description:
Checksum
• A value is calculated from the data // Description of calculation
• Value is transmitted with data
• Value is recalculated after transmission
• If the values match the data is (more likely to be) accurate
Parity check
• A parity bit is transmitted with each byte of data
• Odd or even (parity can be used)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• (Each byte is) checked after transmission to see if it matches the
odd/even parity used
Automatic Repeat Request (ARQ)
• Uses acknowledgement and timeout
• When a device detects an error in data transmission it asks for the
packet to be resent / no error detected, positive acknowledgment sent
• The sending device resends the packet after the request to resend/
timeout received
• This process is continuous until the packet received is correct/until
the ARQ limit is reached
Echo (check)
• Copy of data is sent back to sender
• Data is compared to see if it matches
• If it does not match error detected
2210 Page 25
One binary number has been transmitted incorrectly. This is identified
through the use of a parity bit.Identify which register contains the
binary number that has been transmitted incorrectly. Explain the
reason for your choice. [4] (Q3/11/M/J/18)
Ans.
1 mark for correct register, 3 marks for reason:
− Register C
Any three from:
− Count the number of 1/0 bits (in each byte/register)
− Two bytes/registers have an odd number of 1/0 bits // Two use odd
parity
− Odd parity must be the parity used
− One byte/register has an even number of 1/0 bits // One uses even
parity
− One with an even number of one bits/even parity is incorrect //
Register C should have odd parity
2210 Page 26
– A request is sent with data to acknowledge all data is received
– Acknowledgement sent back to say all data is received
– If no acknowledgement is received in a time frame an error in
transmission detected / data automatically resent.
2210 Page 27
• If no response/acknowledgment within certain time frame data
package is resent
• When data received contains an error a request is sent (automatically)
to resend the data
• The resend request is repeatedly sent until packet is received error
free/limit is reached/acknowledgement received
c) Checksum
Identify which bit has an error by giving the Byte number and Bit
number.
Explain how you found the error.
[4] (Q5/12/O/N/22)
Ans. One mark each for the correct
byte and bit.
• Byte 4
• Byte 5
Any two from:
2210 Page 28
Any two from:
• Counted all the 1s
• An even parity was used
• Odd number of ones in that row (byte 4) and column (bit 5)
Q. The data stored by the library is archived at the end of each day. The
archive is held on a server in the library office.
The data is encrypted with an 8-bit key. As some of the data is
confidential, the library wants to make the encryption more secure.
i) State how the library could make the encryption more secure. [1]
ii) The term used to describe data before it is encrypted is plain text.
State the term used to describe encrypted data. [1]
iii) T ’ v
system that combines a parity check with an automatic repeat request
(ARQ). Describe how this system uses the parity check and ARQ. [6]
(q1b/13/O/N/19)
Ans.
i) Increase the length of the key // make key 12-bit, etc.
ii) Cypher text
iii) Six from:
• The system could use odd or even parity
• A parity bit is added.
• The data is checked to see if it has incorrect/correct parity // by
example.
Q. The contents of three binary registers have been transmitted from one
computer to another. Odd parity has been used as an error detection
method.The outcome after transmission is:
• Register A and Register B have been transmitted correctly.
• Register C has been transmitted incorrectly.Write the appropriate
Parity bit for each register to show the given outcome. [3] (2019)
2210 Page 29
Parity bit for each register to show the given outcome. [3] (2019)
Ans.
0
0
0
Q. Two error detection methods that Allison’s computer uses are check
digit and checksum.
a) Give two similarities between the check digit and checksum methods.
[2]
b) Identify one other error detection method that Allison’s computer
could use. Describe how the method checks for errors. [4]
(Q4/11/M/J/20)
Ans.
a) Any two from:
− They both calculate a value from the data
− They both append the calculated value to the data
− They both recalculate the value
− … They both report an error if they don’t match
b) One mark for method, three marks for description:
Automatic Repeat reQuest
− Uses acknowledgement / request and time-out
− Error control protocol
− Check performed on receiving data // error is detected by e.g. parity
check, check sum
− If error detected, request is sent to resend data // negative
acknowledgement is used
− Resend request is repeated till data is sent correctly / requests
timeout / limit is reached
− Send acknowledgement that data is received // positive
acknowledgement is used
− If acknowledgement not received in set time data is resent
Parity Check
− A parity bit is added (to the parity byte)
− Counts / checks number of 1’s
− Can be even or odd
− If parity is incorrect, error is detected
2210 Page 30
b) The data will also be checked using a checksum. Describe how a
checksum can be used to check that the data has been transmitted
correctly. [4] (Q2/12/O/N/20)
Ans.
b) An error may not be detected when using a parity check. Identify why
2210 Page 31
b) An error may not be detected when using a parity check. Identify why
an error may not be detected. [1] (Q8ab/11/M/J/21)
Ans.
a) − Odd − Odd − Even − Even
b) Any one from:
− there is a transposition of bits
− it does not check the order of the bits (just the sum of 1s/0s)
− even number of bits change
− incorrect bits still add up to correct parity
One of the bits has been transmitted incorrectly. State the Byte
number and Bit number of the incorrect bit.
Byte number .........................................................................................
Bit number ...........................................................................................
[2] (Q12/3175/12/M/J/21)
Ans.
2210 Page 32
digit. The check digit is calculated by adding up the first five digits,
dividing by 10 and taking the remainder.For example, 5 + 1 + 2 + 4 + 3
divided by 10 gives a remainder of 5 so the six-digit identification
number would be 512435.
a)
i) Calculate the check digit for 69321 [1]
ii) State which of these identification numbers have incorrect check
digits.
A 123455
B 691400
C 722855
D 231200 [2]
b)
i) Describe an input error that would not be found using this check
digit.[2]
ii) Describe a more suitable algorithm to calculate the check digit for this
identification number. [2] (Q3ab/23/O/N/22)
Ans. a)
i) 1
ii) One mark for each correct letter seen, max two
• C
• D
b)
i) One mark per mark point, max two
• Two or more digits
• Transposed
ii) One mark per mark point, max two
• multiply each digit by a different number / its place value
• before adding them together and dividing by a number
ENCRYPTION
Q. Choose five correct terms from the following list to complete the
spaces in the sentences below:
• cypher text
• encryption algorithm
• encryption key
• firewall
• plain text
• proxy server
• symmetric encryption
............................................................................ is a security system.
It uses the same ............................. to encrypt and decrypt a message.
Before encryption, the message is
called ...................................................................................... .
The ..................................................... processes the original message.
The output is known as ....................................................................... .
[5] (Q10/13/O/N/15)
Ans.
symmetric encryption
encryption key
plain text
encryption algorithm
cypher text
2210 Page 33
cypher text
Q. The data stored by the library is archived at the end of each day. The
archive is held on a server in the library office. The data is encrypted
with an 8-bit key. As some of the data is confidential, the library wants
to make the encryption more secure.
i) State how the library could make the encryption more secure. [1]
ii) The term used to describe data before it is encrypted is plain text.
State the term used to describe encrypted data. [1] (Qbi,ii/13/O/N/19)
Ans.
i) • Increase the length of the key // make key 12-bit, etc.
ii) Cypher text
Q. A company collects and stores data about its customers. The data is
v ’ T
cloud storage to create a back-up.The data is encrypted using
symmetric encryption before it is sent to the cloud storage.
a) Describe how the data is encrypted. [4] (Q3a/12/M/J/20)
2210 Page 34
Q. Elsa writes a paragraph in an examination about encryption.There are
several terms missing from the paragraph.Complete the paragraph
using the list of given terms. Not all terms may need to be used.Some
terms may be used more than once.
• algorithm
• alphanumeric
• cookie
• cypher
• key
• padlock
• plain
• word processed
The data is encrypted using a .............................................................. .
This is an ....................................................................... that is used to
scramble the data. The data before encryption is known
as ....................................................................... text. When the data
has been encrypted it is known as .....................................................
text. To read the encrypted data it needs to be decrypted using
a ....................................................................... .[5] (Q6/13/O/N/20)
Ans.
− Key // Algorithm
− Algorithm // Key (must be opposite of first one)
− Plain
− Cypher
− Key // Algorithm
A. Adele encrypts the data on her mobile device to keep it more secure.
State how encryption will keep the data more secure. [1]
(Q7d/11/M/J/22)
2210 Page 35