Chapter 2
Chapter 2
Question 1
(a) parallel
any one from:
– 8 bits/1 byte/multiple bits sent at a time
– using many/multiple/8 wires/lines (1 mark)
serial
any one from:
– one bit sent at a time
– over a single wire (1 mark) [2]
(b) parallel
– faster rate of data transmission (1 mark)
serial
any one from:
– more accurate/fewer errors over a longer distance
– less expensive wiring
– less chance of data being skewed/out of synchronisation/order (1 mark) [2]
(c) parallel
any one from:
– sending data from a computer to a printer
– internal data transfer (buses) (1 mark)
serial
– connect computer to a modem (1 mark) [2]
Question 2
(a)
– universal serial bus
– description of USB [1]
Chapter 2 Data Transmission
Question 3
Question 4
(a) (i) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
Chapter 2 Data Transmission
(ii) 1 mark
– No/incorrect check digit
2 marks
– Total is 78
– 78/11 …
– … gives 7 remainder 1
– check digit should be 1 [3]
Question 5
(a) 1 mark for correct check digit and 1 mark for showing the calculation
(4 × 1) + (2 × 2) + (4 × 3) + (1 × 4) + (5 × 5) + (0 × 6) + (8 × 7)
= 4 + 4 + 12 + 4 + 25 + 0 + 56 = 105
105/11 = 9 remainder 6
check digit is: 6 [2]
Question 6
Question 7
(a) (i) Any two from:
serial
– one bit sent at a time // bits sent sequentially
– over a single wire
– synchronous or asynchronous
[2]
Chapter 2 Data Transmission
Question 8
(a) Intersection of Row 7 and column 4 circled [1]
(b) – Row (byte number) 7 has an odd number of 1s (five 1s)
– Column (bit number) 4 has an odd number of 1s (five 1s)
[2]
Chapter 2 Data Transmission
Question 9
Question 10
(a) Register Z [1]
(b) (i) (byte) 5 [1]
(ii) (column) 4 [1]
(iii) corrected byte is: 1 0 0 1 1 1 1 1 [1]
(iv) that gives the value: 1 5 9
(follow through applies) [1]
Chapter 2 Data Transmission
Question 11
(a)
(b)
Four from:
• Uses acknowledgement and time out
• Check performed on received data // error is detected by e.g. parity
check, check sum
• If error detected, request sent to resend data // negative
acknowledgment is used
• If no acknowledgement is sent that data is received // positive
acknowledgement is used
• Data is resent / Resend request repeated, till data is resent correctly
• or request times out // limit is reached
Question 12
Two marks for each correct description
Parity Check
• Checks a byte of data
• Check is performed when data is received
• A parity bit is added (to the parity byte)
• Counts / checks number of 1’s // counts / checks to see if 1’s are even
// counts / checks to see if 1’s are odd
• Can be even or odd
• If parity is incorrect, error is detected
Chapter 2 Data Transmission
Check digit
• A digit that is calculated from the data // uses modulo to calculate digit
// valid description of modulo
• It is appended / added to the data
• Digit is recalculated when data is entered
• Digits are compared to check for error
Checksum
• A value is calculated from the data // Valid description of calculation
• It is transmitted with the data
• Value is recalculated after transmission
• Values are compared after transmission to check for error
Automatic Repeat reQuest
• Uses acknowledgement / request and time-out
• Error control protocol
• Check performed on receiving data // error is detected by e.g. parity
check, check sum
• If error detected, request is sent to resend data // negative
acknowledgement is used
• Resend request is repeated till data is sent correctly / requests time
out / limit is reached
• Send acknowledgement that data is received // positive
acknowledgement is used
• If acknowledgement not received in set time data is resent
Question 13
4(a)(i)
Question 14
2(c) Checksum
Question 15
Packet switching
Any three from:
• A circuit does not have to be established at the start of the communication
• The data to be sent is divided into packets
• That can travel along different routes
• From node to node
• Packets are reassembled in the correct order at the receiver’s end
• Must wait until the last packet is received to put the data back together
Asymmetric encryption uses different keys for encrypting and decrypting data. When Wiktor sends a
message to his manager, the message is encrypted into cipher text using his manager’s public key. When
the manager receives the message, it is decrypted using her private key. When the manager replies, the
message is encrypted using Wiktor’s public key, and when Wiktor receives the message, it is decrypted
into plain text using his private key.
Chapter 2 Data Transmission
Question 16
Question 17
9(c)
Four from (maximum two marks per benefit):
• It is a universal standard « • « so it is likely to be compatible with the computer
• It can only be inserted one way « • « so there is less chance of connecting a device incorrectly
• Drivers are automatically downloaded // device is automatically identified « • « so no need to find them
online / install them manually