0% found this document useful (0 votes)
66 views6 pages

Comp Notes

ARQ is an error detection method used in data transmission and storage to detect errors. It uses acknowledgements and timeouts - if a response is not received within a certain time, the data is resent. When errors are detected, requests are sent to resend the data until it is received correctly. Serial data transmission such as USB and compression algorithms can reduce file sizes by identifying and replacing repeating patterns with indexes.

Uploaded by

Vaneeza Mehar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views6 pages

Comp Notes

ARQ is an error detection method used in data transmission and storage to detect errors. It uses acknowledgements and timeouts - if a response is not received within a certain time, the data is resent. When errors are detected, requests are sent to resend the data until it is received correctly. Serial data transmission such as USB and compression algorithms can reduce file sizes by identifying and replacing repeating patterns with indexes.

Uploaded by

Vaneeza Mehar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

How is ARQ used in data transmission and storage?

• Set of rules for controlling error checking/detection // it’s an error detection method // used to
detect errors • Uses acknowledgement and timeout • Request is sent (with data) requiring
acknowledgement • If no response/acknowledgment within certain time frame data package is
resent • When data received contains an error a request is sent (automatically) to resend the data •
The resend request is repeatedly sent until packet is received error free/limit is
reached/acknowledgement received

Give one application of serial data transmission = USB / SATA / Wifi /PCI Express / Any appropriate
serial device

He uses lossless compression to reduce the file size. Explain how the file size is reduced.

from: • Uses compression algorithm / by example e.g. RLE • Repeating words / phrases / patterns
identified « • « replaced with value • File / dictionary / index of phrases created • Index will store
word/phrase with value

• A (compression) algorithm is used • No data is removed in the process // original file can be
restored • Repeated words (are identified) // Patterns in the data (are identified) • « and are
indexed/put into a table // by example • « and are replaced with their index // by example • « and
their positions are stored (in the table) // by example • « and the number of times the word/pattern
appears is stored (in the table) // by example

Explain how the web browser uses the URL to access the webpage.

Uniform Resource Locator. The web browser sends URL to DNS • DNS stores an index of URL and
matching IP address • DNS searches for URL to obtain the IP address • IP address sent to web
browser, (if found) • Web browser sends request to IP of webserver • Webserver sends web page to
web browser • Web browser interprets HTML to display web page • If URL not found DNS returns
error

Difference between RAM and ROM

ROM is permanent « • « RAM is temporary • ROM is non-volatile • « RAM is volatile « • ROM is read
only « • « RAM can have read/write operations • ROM holds instructions for boot up « • « RAM
holds files / instructions in use

Difference between MIDI and MP3

MP3 • Digital recording of sound • Produced by recording software / microphone • Used when
distributing sound files • Compressed file format

MIDI • Instructions of how to make sound • Non-audio recording • File created using digital musical
instruments • Produced by synthesizer • Used when composing music • Individual
notes/instruments can be changed

Creating a backup of 150GB of data =external/Removable HDD // External/Removable SSD // Large


capacity USB Flash Drive • Backups must be stored separately • Will hold sufficient data • Faster
write abilities (SSD/USB drive only

Storing applications on a tablet device = SSD // SD card // Flash memory • Small physical size •
Lightweight • Low heat production • Low power consumption • It’s quiet • Fast read/write times
Storing a 1200MB high-definition promotional movie about a new car. The movie is to be given to
people who are interested in buying a new car = DVD // Blu-ray // USB Flash Drive // SD card • Easy
to distribute • Small in size • Cheap to buy • Universal storage therefore compatible with many
devices

Give three other uses of hexadecimal notation in computer science.

• (HTML) colour codes • Error messages • MAC addresses • IP addresses • Assembly language •
Memory dump • Locations in memory

State two benefits of using hexadecimal notation to represent binary values.

Easier to read/write/understand (for humans) • Easier to remember (for humans) • Short way to
represent binary // Uses less screen/display space • Fewer errors made (in data transcription) •
Easier to debug (for humans)

Explain what is meant by off-line storage.

Non-volatile storage • Storage that can be disconnected/removed from the computer • Any suitable
example • Must be (physically) connected to computer to obtain stored data • Used to store files as
a backup

“It is responsible for powering and moving a motor in machinery, such as a robot arm in a factory.” =
actuator

Describe the purpose of an interrupt in a computer system.

• Used to attend to certain tasks/issues • Used to make sure that vital tasks are dealt with
immediately • The interrupt/signal tells the CPU/processor (that its attention is required) • A signal
that can be sent from a device (attached to the computer) • A signal that can be sent from software
(installed on the computer) • The interrupt will cause the OS/current process to pause • The
OS/CPU/ISR will service/handle the interrupt • They have different levels of priority • After the
interrupt is serviced, the (previous) process is continued • It enables multi-tasking to be carried out
on a computer • A valid example of an interrupt e.g. ‘out of paper’ message for a printer.

Explain why data is stored as binary in computers.

Computers use switches / logic gates • Only uses 2 states / On or Off / 1 or 0

What does an anti virus do? Anti-virus (software) // Anti-malware (software) • Scans the computer
system (for viruses) • Has a record of known viruses • Removes/quarantines any viruses that are
found • Checks data before it is downloaded • « and stops download if virus found/warns user may
contain virus

How to make a computer more secure:

Firewall // proxy server • Monitors traffic coming into and out of the computer system • Check that
the traffic meets any criteria/rules set • Blocks any traffic that does not meet the criteria/rules set //
set blacklist/whitelist NOTE: Cannot be awarded if already given in 4(a)(i) Passwords • Making a
password stronger // by example • Changing it regularly • Lock out after set number of attempts //
stops brute force attacks // makes it more difficult to guess Biometrics • Data needed to enter is
unique to individual • « therefore very difficult to replicate • Lock out after set number of attempts
Two-step verification // Two-factor authentication • Extra data is sent to device, pre-set by user • «
making it more difficult for hacker to obtain it • Data has to be entered into the same system • « so
if attempted from a remote location, it will not be accepted

Anti-spyware software // Anti-malware (software) • Scans the computer for spyware •


Removes/quarantines any spyware that is found • Can prevent spyware being downloaded NOTE:
Anti-malware (software) cannot be awarded if already given in 4(a)(i) Drop-down boxes //
onscreen/virtual keyboard • Means key logger cannot collect data // key presses cannot be recorded
• « and relay it to third party Two-step verification // Two-factor authentication • Extra data is sent
to device, pre-set by user • « making it more difficult for hacker to obtain it • Data has to be entered
into the same system • « so if attempted from a remote location, it will not be accepted NOTE:
Cannot be awarded if already given in 4(a)(ii) Firewall // proxy server • Monitors traffic coming into
and out of the computer system • Check that the traffic meets any criteria/rules set • Blocks any
traffic that does not meet the criteria/rules set // set blacklist/whitelist

How to make a bank website more secure:

Four from (max 2 marks per improvement): • Make the password require more characters • Makes
the password harder to crack/guess • More possible combinations for the password • Make the
password require different types of characters • Makes the password harder to crack/guess • More
possible combinations for the password • Use a biometric device • Hard to fake a person’s biological
data // data is unique • Two-step verification // Two factor-authentication • Adds an additional level
to hack • Have to have the set device for the code to receive it • Drop-down boxes // onscreen
keyboard • To prevent passwords being obtained using keylogger • Request random characters •
Won’t reveal entire password • Set number of password attempts • Will lock account if attempting
to guess • Will stop brute-force attacks

Explain why would one use magnetic storage over SSD

Four from (max 3 marks for benefits only, without an explanation): • More read/write cycles (over
its lifetime) // greater longevity « • « likely to be a lot of read/write functions each day • Read/write
speed is sufficient « • « even though it is slower than solid-state • Cheaper per unit of data stored «
• « better value for the company to purchase • « so the law company can afford to buy a server with
greater storage capacity • No requirement for portability « • « as a server, it does not need to be
moved • Trusted technology « • « it has been traditionally used for many years

What are computer ethics?

A set of guidelines • Rules/laws that govern the use of computers / by example • Tell people how to
behave when using computers // helps keep users safe when using computers // by example • Art
gallery could be subject to plagiarism / intellectual property theft • Art gallery could copyright their
work (to make it illegal to steal it)

If u want the person to open data on that time: Password protection − Password is released on the
release date − Encryption − Encryption key is released on the release date

Structure − This is the layout of the web page − e.g. placing an image alongside some text //
example of tag, such as
Presentation − This is the formatting/style of the web page − e.g. the colour that is applied to
some text // example of tag, such as
What is a DOS
Four from: − Designed to deny people access to a website − A large number/numerous requests are
sent (to a server) « − « all at the same time − The server is unable to respond/struggles to respond to
all the requests − The server fails/times out as a result. Prevention: proxy server or firewall.

What is ROM?

Read only memory − Non-volatile memory // Contents of memory are retained when power is
turned off//permanent storage − Primary storage // directly accessed by the CPU − Holds
firmware/boot-up instructions/start-up instructions/BIOS − Cannot be written to

How does capacitive screen touch work?

Electrical field/charge is spread across the screen − Sensors are located around the screen // sensors
are used to read the electric field − When finger touches screen, the charge/ is transferred to the
user − « as it is affected by the conductivity of another object − Coordinates of touch
determined/calculated/measured

Describe what is meant by main memory and how it is used in the Von Neumann model for a
computer system.

RAM • Primary memory • Volatile memory • Holds currently in use data/instructions • Directly
accessed by the CPU

Describe how an LCD screen operates to display this data.

The display is made up of pixels « • « that are arranged together as a matrix • Each pixel has three
filters, red, blue and green • Shades of colour are achieved by mixing red, blue and green • The
screen is backlit • Light is shone through the liquid crystals • The liquid crystals can be made to turn
solid or transparent/on or off « • « by changing the shape of the crystal

Digital data:

Analogue data:

Describe how the webpages are requested and displayed on the customer’s computer.

Browsers sends URL to DNS − … using HTTP − DNS finds matching IP addresses for URL − … and sends
IP address to web browser − Web browser sends request to IP address/web server for web pages −
Web pages are sent from web server to browser − Browser renders HTML to display web pages −
Any security certificates are exchanged/authenticated // SSL/HTTPS is used to secure the data − …
encrypting any data sent

Similarities between dvd and cd: Both need a red laser to read/write data − Both are spun to be read
− Both use spiral tracks for data − Both are optical storage − Both are off-line storage // both non-
volatile − Both use pits and lands to store data

Differences b/w dvd and cd: − DVD can be dual layer, but CD can only be single − DVD has higher
storage capacity − DVD has a shorter wavelength laser − DVD are spun faster − DVDs have a higher
data transfer rate

Similarities between phishing and pharming: Both are designed to steal/collect personal data − Both
pretend to be a real company − Both use fake websites
differences between phishing and pharming: Phishing involves use of an email whereas pharming
involves installing malicious code − Phishing involves clicking a link or an attachment whereas
pharming creates a redirection

lossy or loseless compression process

A (compression) algorithm is used − Removes redundant/unnecessary data from the file − Removes
sounds that cannot be heard by the human ear/background noise − Reduces sample rate − Reduces
sample resolution − Data is permanently removed // original file cannot be re-instated − Perceptual
music shaping is used

NOTE: If lossless given, marks can be awarded for a correct description of lossless as follow through.

Any three from (lossless): − A (compression) algorithm is used − Repeating patterns are identified −
… are replaced with a value − … and indexed − No data is permanently removed // original file can be
re-instated − Suitable example of a lossless algorithm

Why compression is required: Quicker for her to upload − Quicker for users to download − Won’t
slow website down as much when loading − Takes up less storage space

Explain how data is sent securely using the TLS protocol.

Client/browser requests secure connection to server − Client/browser requests the server to identify
itself − Server provides a digital certificate − Client/browser validates the certificate − Client/browser
send signal back to server (to begin transmission) − Session caching can be used − A session key is
generated − Encryption method is agreed // data is encrypted

Identify three security threats to her web server: virus, hacking, DOS

Role of proxy server: Acts as a firewall − Monitor/filters/examines incoming and outgoing traffic −
Rules/criteria for traffic can be set // blacklist/whitelist set − Blocks any traffic that does not meet
criteria … − … and can send a warning message to the user − Stop the website failing in a DoS
attack // DoS attack hits the proxy server and not the webserver

How to calculate checksum: A value is calculated from the data − The value is calculated using an
algorithm // by example − The value is appended to the data to be transmitted − Value is
recalculated after transmission − Values are compared − If the values match the data is correct // if
the values do not match the data is incorrect

What is SSD and how does it operate: Solid state drive − Non-volatile − Secondary storage − Flash
memory − Has no mechanical/moving parts − Uses transistors − … and cells that are laid out in a grid
− Uses control gates and floating gates − Can be NAND/NOR (technology) − Use EEPROM technology

Max two from: − Stores data by flashing it onto the chips − Data stored by controlling the flow of
electrons through/using transistors/chips/gates − The electric current reaches the control gate and
flows through to the floating gate to be stored − When data is stored the transistor is converted
from 1 to 0

Role of a browser: Allows user to view web pages − Renders HTML − Allows user to
bookmark/favourite web pages − Provides navigation features − Allows (multiple) tabs − Stores
cookies − Records history of pages visited − Has a homepage − Runs active script − Allows files to be
downloaded from website/internet − Sends a request to the IP address/web server (to obtain the
contents of a web page) − Sends URL to DNS − Manages HTTP/HTTPS protocol

You might also like