Ahmed Abid CS Past - Paper - Assignment
Ahmed Abid CS Past - Paper - Assignment
Ahmed Abid CS Past - Paper - Assignment
QUESTION 1. 6
5 Parity checks are often used to check for errors that may occur during data transmission.
Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.
01111100 incorrectly
01101001 correctly
[3]
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per
character). A tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.
7
Column number .................................................................................................................
[2]
(ii) Explain how you arrived at your answer for part (b)(i).
I...........................................................................................................................................
checked for an odd parity in the byte row first, after evaluating each row, I saw
7th row had an odd parity. I checked for the same odd parity bit in the coloumns as
...........................................................................................................................................
I...........................................................................................................................................
did for the rows, then I evaluated that there was a odd parity in the 7th coloumn.
.......................................................................................................................................[2]
(c) Give the denary (base 10) value of the byte: 1 0111110
(1×128)+(0×64)+(1×32)+(1×16)+(1×8)+(1×4)+(1×2)+(0×1)= 128 + 32+16+8+4+2
...................................................................................................................................................
= 190
...............................................................................................................................................[1]
(d) A parity check may not identify that a bit has been transmitted incorrectly.
5 (a) Parity checks are often used to detect errors that may occur during data transmission.
The received bytes in the table below were transmitted using odd parity.
Tick (3) to show whether each byte has been corrupted during transmission or not
corrupted during transmission.
10110100 corrupted
10000001 corrupted
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [4]
(a) Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.
Computer A Computer B
Computer A Computer B
Computer A Computer B
[6]
(b) State a use for the following data transmission methods. The use must be different for each
data transmission method.
Simplex .....................................................................................................................................
this is usually used for slow speed data tranmission, for example transmission of data
...................................................................................................................................................
between the keyboard and the CPU of a computer
It is usually used for fast speed data transmission, for example transmission of data
Duplex ......................................................................................................................................
...................................................................................................................................................
between 2 computers in a network
[2]
(a) Parity checks can be used to check for errors during data transmission.
(i) Tick (✓) to show for each of the received bytes whether they have been transmitted
correctly or transmitted incorrectly.
10001011 incorrectly
10101110 correctly
01011101 correctly
00100101 correctly
[4]
(ii) State one other method that could be used to check for transmission errors.
......................................................................................................................................
Automated Repeat Request (ARQ) [1]
...........................................................................................................................................
Parallel Data transmission involves of sending multiple bits of data simultaneouly across
...........................................................................................................................................
...................................................................................................................................... [2]
...................................................................................................................................... [1]
(iii) Explain why serial data transmission is normally used for transferring data over a long
distance.
It...........................................................................................................................................
uses a single dedicated line for data transmission, it also send multiple bits simultaneously
over multiple channels at once. It is also faster than serial transmission so preferable for
...........................................................................................................................................
long distance data transmission
...........................................................................................................................................
...................................................................................................................................... [2]
...........................................................................................................................................
Encryption usually put some kind of firewall in front the data so it can not be accessed by any 3rd party
This helps keeping the data more secure and keeps the data private aswell. It may aswell change
...........................................................................................................................................
the data according to a algorithm that may be only known by the user and receiver so only can
...........................................................................................................................................
be accessed by them. There are many encryption methods.
...................................................................................................................................... [2]
(ii) Explain one method that could be used to increase the level of security provided by the
encryption.
Public key is an asymmetric encryption method that involves of sending a public and a
...........................................................................................................................................
private key during data transmission.Whenever data is transferred, one public key goes first
...........................................................................................................................................
because if any 3rd party accesses the public key, it will not reveal the encrypted data
...........................................................................................................................................
......................................................................................................................................
and they will be baited, another private key is then sended which makes the data accessible
[2]
9 Four 7-bit binary values are being transmitted from one computer to another. An odd parity check
is being used to check for errors in the binary values.
Write the correct Parity bit for each 7-bit binary value to make sure it meets odd parity.
Rory sends data from his computer to a file server that is approximately 100 metres away.
It is important that the data is transmitted accurately. Rory needs to be able to read data from and
write data to the file server at the same time.
(a) (i) Use ticks (3) to identify the most suitable data transmission methods for this application.
(ii) Explain why your answer to part (a)(i) is the most suitable data transmission.
Because rory needs to read and write data, serial will be a better option due to its speed and
...........................................................................................................................................
data transmission abilities, it will be a better option than serial also given the distance.
...........................................................................................................................................
Duplex will also be a better option as Rory will simultaneously read and write data on the
...........................................................................................................................................
file server therefore duplex being able to transmit data simultaneously would be a better option
...........................................................................................................................................
also that it transmits data in both directions aswell
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
(b) Identify and describe two methods of error checking that can be used to make sure that the
data stored after transmission is accurate.
Method 1 ...................................................................................................................................
Checksum method.Checksums are values calculated from a block of data using a specific
algorithm. They are appended to the data before transmission. Upon reception, the recipient
...................................................................................................................................................
recalculates the checksum using the same algorithm and compares it with the received checksum.
...................................................................................................................................................
If they match, the data is assumed to be correct otherwise an error is detected
...................................................................................................................................................
...................................................................................................................................................
.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]