Chapter 2 Data Transmission Guess Papers
Chapter 2 Data Transmission Guess Papers
3$*(
3$*(
5 The three binary numbers in the registers X, Y and Z have been transmitted from one computer to
another.
Parity bit
Register X 1 0 0 1 0 0 1 0
Register Y 1 1 1 0 0 1 1 1
Register Z 1 1 1 0 1 0 0 1
Only one binary number has been transmitted correctly. This is identified through the use of a
parity bit.
Identify which register contains the binary number that has been transmitted correctly. Explain
the reason for your choice.
Explanation .........................
...
..............................................................................................................
..
......................................................................................................................................
...................................
...................
. .......................................................................................................
..........................................................................................................................................................
.........
........
....................
.......................
.. . ....................................................
............................................
.............................
..........................................................................................................................................................
.............
..........
. ...........
....
.. ..
..................
. .......................................................................................................
..........................................................................................................................................................
..
.............
...
.. .. .. .........
....
.. ....
. .................................................................................................................................
..........................................................................................................................................................
..................................................
..........................................................................................................
..........................................................................................................................................................
[4]
11
12 (a) Selma has some important personal information that she needs to email to her employer.
She wants to make sure that if the personal information is intercepted, it cannot be understood.
(i) State how Selma could email her personal data more securely.
...................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................
.........................................................................................................
...........................................................................................................................................
...............................
................................................................................................................
...........................................................................................................................................
...................
........
....
.....................................................................................................................
...........................................................................................................................................
.....
........
. .....
.........................................
.......................
. .................
.. ..........
. ..............
.........
......
......
.......................................
...........................................................................................................................................
.......................................................................................................................................
........................................................................................................................................... [5]
(b) Selma
(b) Selm
ma wa
want
ntss to
nt
wants to make sure tthat
hat the information received is correct.
d to
A parity check can be used to detect errors.
detec
e tion method that can be used to check the information received
ec
Describe another error detection
is correct.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...................................
.........................................................................................................
...........................................................................................................................................
...............................
............................................................................................................[2]
.......................................................................................................................................[2]
.....
.......
. .....
.........................................
.......................
. .................
.. ..........
. ..............
.........
......
......
.......................................
...........................................................................................................................................
............................................................................................................................................
................................................................................................................................................
............................................................................................................................................
...............
................................................................................................................................
...................................
......................................................................................................[2]
.......................................................................................................................................[2]
10
(b) Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.
Identify and describe three methods of error detection that could be used to see if an error
has occurred.
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Description ................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
.......................................
................................................................................................................
...................................................................................................................................................
...........................
.............................................................................................................................
...................................................................................................................................................
Erro
Er rorr de
ro
Error dete
tte
ect
c io
detectionon me
ethod 3 ..
method .................
.......................
.....................
.........
. ..............
..............
...........................................
..........................................................................................................
Des
scri
scri
r pttio
ion
Description n ..................................................................................................................................
.......
.....................
. .......................................................................................................
......
....................
................................................................................................................................
...................................................................................................................................................
...........................................
..........................................................................................................
...................................................................................................................................................
.............................................
. ......................................................................................................
..
...................................................................................................................................................
[9]
2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check for errors during data
transmission and storage.
(a) A system uses even parity. Write the appropriate parity bit for each byte.
Parity Bit
1 0 1 0 0 1 1
1 0 1 1 1 1 1
1 0 1 0 0 0 1
[2]
(b) Explain how Automatic Repeat reQuests (ARQ) are used in data transmission and storage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
.....................................................................................................[2]
...............................................................................................................................................[2]
.............
.......
. ..
....
....
. ................................................
.. . ......................................................................
. ......................[1]
...............................................................................................................................................[1]
3 eleva
va
ato
or (lift)
An elevator ( ifift)
(l t)) has
has a maximum u weight limit of 2400 kg. The weight carried is monitored by a
um
sensor
orr and
nd a microprocessor.
and mic icro
ropr
roproc
pr occessor.
D scribe
De
Describebe how
how the
the
h sensor and the
t e microprocessor are used to make sure the maximum weight
th
limit is n
not exceeded.
ot exceeded.
..........................................................................................................................................................
...................................................
........................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[6]
© UCLES 2018 2210/13/O/N/18 [Turn over
3$*(
A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.
(a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.
6A FF 08 93
01101010
[3]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
.....................................................................................................[2]
...............................................................................................................................................[2]
(a) Describe
Descri
riibe serial
ser
eria
ia
al transmission.
trran
anssmission
on.
on
........
.........
........
....
.................................................................................................................................
...................................................................................................................................................
....................................................................................................................................................
....
...
....
....
.......
. ...............................................................................................................................................
.....
...
......
..............................................................................................................................................
...................................................................................................................................................
.............................................
...................................................................................................[2]
...............................................................................................................................................[2]
...................................................................................................................................................
...............................................................................................................................................[1]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
To transmit the website data to the webserver she uses parallel duplex data transmission.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
................................................................................................... [4]
.............................................................................................................................................
State what is me
ean
antt by a U
meant RL.
URL.
..
.............
.. ......... .....
.........................................
.......................
...................
..........
. ..............
.........
......
......
................
................................................................................................................................................... . ......
................
.....
................................................................................................................................................ [1]
.............................................................................................................................................
((e)
e) Priyya is cconcerned
Priya once
oncern
cerned about a denial of service attack (DoS) occurring on her webserver.
denial
.....................................
. ......................................................................................................
..
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [4]
(ii) Give one security device that can be used to help prevent a denial of service attack.
..................................................................................................................................... [1]
10
9 The contents of three binary registers have been transmitted from one computer to another. Even
parity has been used as an error detection method.
Complete the Parity bit for each register to show the given outcome.
Parity bit
Register A 0 1 0 0 1 0 1
Register B 1 0 0 0 0 0 1
Register C 1 0 0 0 0 1 1
[3]
(b) Nico asks Audrey why she used lossy compression rather than lossless.
(i) State one advantage Audrey could give of using lossy rather than lossless to compress
the sound file.
...........................................................................................................................................
..................................................................................................................................... [1]
(ii) State one disadvantage Nico could give of using lossy rather than lossless to compress
the sound file.
...........................................................................................................................................
..................................................................................................................................... [1]
............................................................................................................................................
...........................................................................................................................................
...............................
................................................................................................................
...........................................................................................................................................
...........................
....
.....................................................................................................................
...........................................................................................................................................
.............
. .....
.........................................
.......................
. .................
.. ..........
. ..............
.........
......
......
.......................................
...........................................................................................................................................
.................................................................................................................................................
...........................................................................................................................................
................
................................................................................................................................
...........................................................................................................................................
.............................................................................................................................................
...........................................................................................................................................
.....................................
. ................................................................................................ [4]
..
.....................................................................................................................................
Explain two advantages of using serial transmission rather than parallel transmission.
Advantage 1 ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Advantage 2 ......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[4]
© UCLES 2019 2210/12/O/N/19
3$*(
9 Maisey purchases a new router and attaches it to her computer. The connection she sets up uses
duplex data transmission.
True False
Statement
() ()
Duplex data transmission can be either serial or
parallel
Duplex data transmission is when data is transmitted
both ways, but only one way at a time
Duplex data transmission is always used to connect
a device to a computer
Duplex data transmission is when data is transmitted
both ways at the same time
Duplex data transmisission automatically detects any
is
transmission
errors in data
[5]
Stat
te wh
State het
e he
er th
whether the
e IC uses se
erial
serial or parallel data transmission.
.........
................
.. . ..
. ......................................................................................................................... [1]
.............................................................................................................................................
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
(a) Companies use error detection methods to make sure that data is accurate.
Explain what is meant by a check digit and how it is used to detect errors.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
.......................................
.......................................................................................................... [4]
.............................................................................................................................................
Id
den
enti
tify
tify
Identifyy ttw
wo ssecurity
two e urritity methods
ec method
o s that
od th
hat a company
compa
om
mpa
p ny
n can
can use
use to
o keep
k ep
kee their
the
heir data
dat
ata secure
secu
secure
e an
anddexplain
explain
how eae ach method
each met
etho
hod can keep
ho p the data secure.
Secu
Se curi
cu rity
Securityty m etho
etho
h d 1 .............
method ..........................................................................................................
.....................................................................................................................
.....
...
....
. ..
.............................................................................................................................................
...................................................................................................................................................
............................................
........................................................................................................
...................................................................................................................................................
.............................................
........................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[6]
1 A library has a system that allows customers to check out the books that they want to borrow.
Each book has a barcode that can be used to identify the book.
Thee data
d ta
da a is
is encrypted
encr
en cryp
crypted with an
yp an 8-bit key. As some of the data is confidential, the library wants
om
to ake th
ak
make the en
the encr
cryyption mor
cr
encryption re secure.
more
(i) Stat
State
ate how
State ho
how the library could
co make the encryption more secure.
...................................
.........................................................................................................
...........................................................................................................................................
.....................................
.................................................................................................. [1]
.....................................................................................................................................
(ii) The term used to describe data before it is encrypted is plain text.
..................................................................................................................................... [1]
(iii) 7KHOLEUDU\·VDUFKLYHV\VWHPXVHVDQHUURUGHWHFWLRQDQGFRUUHFWLRQV\VWHPWKDWFRPELQHV
a parity check with an automatic repeat request (ARQ).
Describe how this system uses the parity check and ARQ.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................
.........................................................................................................
...........................................................................................................................................
.........................
...
. ..................................................................................................................
...........................................................................................................................................
...
........
. ..
....
....
..................................................
. ....................................
. ..................................
. ...........................
...........................................................................................................................................
...
.....
...........
. ........................................................................................................................ [6]
.....................................................................................................................................
(c) Th
The
e libr
llibrary
ibra
brrar
ary ha
ary hass a website th
website hat customers can use to search for a book.
that
(i) T
Thhe
Thee website
web
we bsite has a background
back
ckground colour with the hexadecimal colour code #F92A10
ck
F92
A10
[6]
3 Blair writes a paragraph about data transmission in her Computer Science examination.
• duplex
• half-duplex
• parallel
• serial
• simplex
multiple bits of data are sent all at once. If a user wants to transmit data over a long distance, with
should be used. If data needs to be transmitted in one direction only, for example from a computer
................................
......................................... data transmission should be used. If a
to a printer, .......................................................................
....................
.....
....
....
....
....
....
. .......................
.............
............. da
....................................................................... d ta
dataa ttransmission
r nssmi
ra miss
sssion
n sshould
hou
ould
ld be
e us
useed.
used.
[5]
10
5 The contents of three binary registers have been transmitted from one computer to another. Odd
parity has been used as an error detection method.
Write the appropriate Parity bit for each register to show the given outcome.
Parity
bit
Register A 0 1 0 0 0 1 1
Register B 0 0 0 0 1 1 1
Register C 0 0 0 0 0 1 1
[3]
(a) Fo
or th
For the
e fi
firs
rs
st qu
first ques
esti
st on
on, he w
question, rittes th
ri
writes he an
the a swe
swer:
answer:
“Thi
is ty
“This type
p o
pe off so
ssoftware
oft
ftwa
w re can be copied and shared without the permission of the owner.”
be
State
at
te wh
State what
at JJesse
esse
es se is describ
bing.
describing.
...........................................
.................................................................................................... [1]
.............................................................................................................................................
............................................................................................................................................. [1]
“This type of software is often a trial version of the full software. To use the full version the
user normally needs to pay a fee.”
............................................................................................................................................. [1]
Carla uses the USB port to connect her mobile device to her computer, to transfer her photos.
(a) Give three benefits of using a USB port to connect the mobile device to the computer.
Benefit 1 ...................................................................................................................................
...................................................................................................................................................
Benefit 2 ...................................................................................................................................
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(b) State the type of data transmission used when transferring data using a USB port.
...........................................
................................................................................................... [1]
.............................................................................................................................................
De
esc
s ri
ribe
be
e how
Describe how
w lossless
los
o sl
sless compression
comp
m res
mp ssio
on reduces
re
edu
d ce
c s the
the file
file size
siz
izee of the
the
h photos.
pho
hoto
os..
.....
...
. ..
..................................................................................................................................................
...................................................................................................................................................
......
................
. ....
................................................................................................................................
...................................................................................................................................................
...........................................
..........................................................................................................
...................................................................................................................................................
.............................................
. ......................................................................................................
..
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
4 Two error detection methods that Allison’s computer uses are check digit and checksum.
(a) Give two similarities between the check digit and checksum methods.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Identify one otherr error detection method that Allison’s computer could use.
Method ......................................................................................................................................
Description ................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
.................................
...
. ..................................................................................................................
...................................................................................................................................................
.............
.......
. ..
....
....
. ................................................
.. . ......................................................................
. ..........................
...................................................................................................................................................
........
.........
............
. ..............................................................................................................................
...................................................................................................................................................
....................................................................................................................................................
.......
.. ....
. .....
................................................................................................................................................
[4]
(b) Give three reasons why a programmer would choose to write a program in a high-level
language, instead of a low-level language.
Reason 1 ..................................................................................................................................
...................................................................................................................................................
Reason 2 ..................................................................................................................................
...................................................................................................................................................
Reason 3 ..................................................................................................................................
...................................................................................................................................................
[3]
3 A company collects and stores data about its customers. The data is stored on a server in the
company’s office.
..
.....................
. .....
.............................................................
....................
..........
. ..............
.........
......
.....................
................................................................................................................................................... . ......
................
.....
...
. ..
..................................................................................................................................................
...................................................................................................................................................
......
................
. ....
................................................................................................................................
...................................................................................................................................................
...........................................
..........................................................................................................
...................................................................................................................................................
.............................................
. ......................................................................................................
..
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
(b) Give three other methods that can be used to secure the data in the office.
Method 1 ...................................................................................................................................
...................................................................................................................................................
Method 2 ...................................................................................................................................
...................................................................................................................................................
Method 3 ...................................................................................................................................
...................................................................................................................................................
[3]
© UCLES 2020 2210/12/M/J/20 [Turn over
3$*(
(i) Identify three security threats to her web server that Tina might be concerned about.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
[3]
(ii) Tina installs a proxy server to help protect her website from security threats.
Describe how the proxy server will help protect the website.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................
.........................................................................................................
...........................................................................................................................................
.........................
...
. ..................................................................................................................
...........................................................................................................................................
.....
.......
. ..
....
....
. ................................................
.. . ....................................
. ..................................
. ...........................
...........................................................................................................................................
...
.....
............
. ..............................................................................................................................
...........................................................................................................................................
...
...
.......................................................................................................................................... [4]
.....................................................................................................................................
(a) Tick () to show whether an Even or an Odd parity check has been used for each binary
value.
Even Odd
8-bit binary value
() ()
11111111
01100110
01111011
10000000
[4]
Describe how a checksum can be used to check that the data has been transmitted correctly.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
......................................
......................................................................................................... [5]
...
.............................................................................................................................................
He is concerned
conc
ncce
errne
nedd about
abo
ab out accidental
accidenttal damage to his data.
(a) ((i)
i) IIden
dent
enti
en tify thre
tify
Identify th
hre
ree
threee ways that
a the data could be accidentally damaged.
at
1 .........................................................................................................................................
.........................................................................................................................................
..
2 ................................
.........................................................................................................
........................................................................................................................................
3 .................................
........................................................................................................
........................................................................................................................................
[3]
(ii) State what Alessandro could do to make sure that he can retrieve his data if it is
accidentally damaged.
..................................................................................................................................... [1]
(a) Tick () to show if the USB connection uses Parallel or Serial data transmission.
Parallel
Serial
Description
...................................................................................................................................................
...................................................................................................................................................
...........................................
.........................................................................................................
...................................................................................................................................................
.................................
...
. ..................................................................................................................
...................................................................................................................................................
[3]
(b) Give
Give
e three
thre
three ben
enef
en
nefitititss of a USB
benefits S co
SB onne
onne
nect
cttio
ion
connection.n.
Ben
nefi
nefi
f t 1 ...
Benefit .........
...............................................................................................................................
...................................................................................................................................
......
................
. ....
................................................................................................................................
...................................................................................................................................................
Benefit 2 ...........................
..........................................................................................................
...................................................................................................................................
.............................................
. ......................................................................................................
..
...................................................................................................................................................
Benefit 3 ...................................................................................................................................
...................................................................................................................................................
[3]
(c) Arjun uses the Internet to send the digital documents to his friend. He wants to make sure the
documents are sent securely.
Protocol 1 .................................................................................................................................
Protocol 2 .................................................................................................................................
[2]
7 Fourr 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.
(a) Tick () to show whether an Even or an Odd parity check has been used for each binary
value.
Even Odd
8-bit binary value
() ()
10000001
10000010
00101001
00101000
[4]
(b) A parity check may not always detect errors that have occurred in data transmission.
State why a parity check may not detect data transmission errors.
may
...................................
...
....
.......................................................................................................... [1]
.............................................................................................................................................
......
............
......
.....
. ..
....
. ....
...................................................................................................................... [1]
.............................................................................................................................................
(a) The website data is broken down into packets to be transmitted to a user.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...........................................
.................................................................................................... [4]
..............................................................................................................................................
(i
i)
(i) T
The videos
The v de
videos
os are
arre
e compressed
comprre
essse
ed before
befo
be fo
ore
re they
they are
arre uploaded
a upload
uplo
oad
aded
ded to
to the
th
he website.
webs
we
ebs
bsititte.
Tick
Tick 9) one
k ((9) one box to sh
how which statement is a benefit of compressing the videos.
show
A Da
Data
ata
t is encrypted.
encrypted
d.
(ii) Give two methods of compression that could be used to compress the videos.
1 ........................................................................................................................................
2 ................................................................................................................................... [2]
(iii) The company uses parallel half-duplex data transmission to transmit the data for the
new videos to the web server.
Explain why parallel half-duplex data transmission is the most appropriate method.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
.....
............
............................................................
.. . .................
.. .........................
... ....
........
.. .....
.. ......................
..
........................................................................................................................................... . ....................
............................................................................................................................................
...............................................................................................................................................
............................................................................................................................................
.........
.......................................................................................................................................
...................................
..........................................................................................................
...........................................................................................................................................
.....................................
. ......................................................................................................
..
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...................................................................................................................................... [4]
(ii) Suggest one security device that can be used to help prevent a DDoS attack.
...................................................................................................................................... [1]
11
Some of the terms in the list will not be used. You should only use a term once.
of .................................................., is used.
(QFU\SWLRQSUHYHQWVWKHGDWDIUR
RPEHLQJE\DKDFNHU
(QFU\SWLRQSUHYHQWVWKHGDWDIURPEHLQJE\DKDFNHU >@
re
e socket
10 An art gallery uses secure socke
ket layer (SSL) to provide a secure connection when selling art on
its website.
Descri
ribe
ribe
e the
Describe the process
proce
ess
s of
of SSL and
an
nd explain
exxpl
plai
plai
ain how
h w iti provides
ho pro
ovide
es a secure
secu
secu
secure
u e connection.
con
onnnectio
ion.
n.
............
......................................................................................................................................................
..........................................................................................................................................................
...........................................................................................................................................................
...............................................................................................................................................................
..................................................
..........................................................................................................
..........................................................................................................................................................
...................................................
........................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..................................................................................................................................................... [6]
3$*(
2210/12 Cambridge O Level – Mark Scheme May/June 2018
PUBLISHED
Question Answer Marks
– Register Y
Question Answer
Answ
wer Marks
– fetches
– immediate access store // IAS
– program counter // PC
3$*(
– ARQ
– uses acknowledgment and timeout
– A request is sent with data to acknowledge all data is received
– Acknowledgement sent back to say all data is recei ved
ed
received
3$*(
8 Fourr from: 4
x Used to attend to certain tasks/issues
x Used to make sure that vital tasks are d dealt with
ealtt w ith immediately
im
mme
m di diately
CPU/processor
x The interrupt/signal tells the CPU/proces sor (that
so (ttha
(tha
hat
at its
ts attention
a te
at tent ntion is required)
attta
x A signal that can be sent from a device ((attached t ch hed
ed ttoo th
thee coccomputer)
omputer)
x A signal that can be sent from software (inst (installed
stal
st a led
ed o onn tthe
h ccomputer)
he o puter)
om
x The interrupt will cause the OS/current processproce essss to pause
pa
p aus
use
x The OS/CPU/ISR will service/handle the interrup interrupt
upt
uppt
x They have different levels of priority
x After the interrupt is serviced, the (previous) process is continue continued
ued
ueed
x It enables multi-tasking to be carried out on a ccomputer ompu
om p te
pu terr
interrupt
x A valid example of an interru ptt e.g. ‘‘out paper’
outt off pape r’’ message ffor printer
or a p riinter
t
Question Answer
Answ
wer
e Marks
Checksum
x Calculation performed on data (to get the checksum)
x Checksum sent with data
x Checksum recalculated after transmission
x Comparison made between checksum before and and
n checksum
check
cksu
ck sum
sum after transmission
x Error detected if checksums are different
acknowledgement
edge
ed
x Request is sent (with data) requiring acknowled g mentt
x If no response/acknowledgment within certain tittime
me frame
m d
me data
a a package is resent
at
request
x When data received contains an error a requ esst is sentt (a
((automatically)
utom
ut o atically) to resend the data
pac
accke
k t is received
x The resend request is repeatedly sent until packet rec
e eive
ec eiiv d error free/limit is reached/acknowledgement received
Question Answer
Answ
wer Marks
10 Five from: 5
x The sensor sends data to the microprocessor
us
sin
x The analogue data is converted to digital ((using ing ADC)
C))
x The microprocessor compares the reading to th the range/stored
e set ra
ang
nge/
e/st
e/ s ored values/stored data (6 to 8) «
range
– « If the reading is >8 or <6 / outside rangge «
o « the microprocessorr sends a sig signal
na output
al to outpu
pu
p ut th
the
he alert
x The process is continuous/repeated
Parity Bit
0 1 0 1 0 0 1 1
0 1 0 1 1 1 1 1
1 1 0 1 0 0 0 1
2(c) Checksum 1
Question Answer
Answ
wer
e Marks
3 Six from: 6
x A pressure sensor is used
micropro oce
x The sensor sends data/signals to the microprocessorcessor
x Data is converted to digital format
x Microprocessor compares data value against se sett value
e
2400ௗKg/under
x If value <= 2400 permitted
Kg/under weight limit lift is pe
erm
rmitted to
oooperate
p rate
pe
2400ௗKg/over
x If value > 2400 Kg/over weight limit signal is se
s
sent n from
nt m th
the
e microprocessorr to deliver warning message to
passengers
2400ௗKg
x If value > 2400 Kg signal is sent from the mi microprocessor
icrroproceesssor
or to lift mechanism to stop lift operating
x Weight continuously monitored
Question Answer
Answ err Marks
6(c) tim
me/
e simultaneously
Several/multiple bits are transmitted at a time/simultaneously 4
Several/multiple wires are used
Data is transmitted in both directions «
« at the same time/simultaneously
Proxy server
Firewall
Parity bit
Register A 1 0 1 0 0 1 0 1
Register B 1 1 0 0 0 0 0 1
Register C 1 1 0 0 0 0 1 1
Question Answer
Answ
wer Marks
3$*(
10 Fourr from: 4
Electrical field/charge is spread across the screen
Sensors are located around the screen // sensors are e used
u ed to read the electric field
us
transferred
When finger touches screen, the charge/ is transferred d toto the user
ctt
« as it is affected by the conductivity of another object
determined/calculated/measured
Coordinates of touch determined/calculated/measur ed
d
True
u
True False
Statement
(9)
(9) (9)
Duplex data transmission can be either serial or
9
parallel
Duplex data transmission is when data is transmitted
9
both ways, but only one way at a time
Duplex data transmission is always used to connect a
9
device to a computer
Duplex data transmission is when data iss ttransmitted
rans
ra nsmi
ns mitt
mi tted
tt ed
9
both ways at the same time
Duplex data transmission automatically detects any
9
errors in data
x It is a high-speed connection «
x « so data will be transmitted quicker
x It is backwards compatible «
x « so no additional technology is needed
x Encryption «
x « Data will be scrambled
x « Key is required to decrypt the data
x « If data is stolen it will be meaningless
x Antispyware «
x « will remove any spyware from system
x « will prevent data being relayed to a third party
x Speaker
x Printer
x LED // Light
1(b)(i) x Increase the length of the key // make key 12-bit, etc. 1
1(c)(i) 6
1 1 1 1 1 0 0 1 0 0 1 0
3$*(
1 mark 1 mark 1 ma
m
mark
rk
1 0 1 0 0 0 0 1 0 0 0 0
1 mark 1 mark 1 ma
m
mark
rk
1011100000110000
0000011011100010
INP
STA ONE
INP
STA TWO
ADD ONE
a = input()
b = input()
if a == b:
9
print("Correct")
3$*(
else:
print("Incorrect")
Question Answer
An swer
wer Marks
Parity
bit
Register A 0 0 1 0 0 0 1 1
Register B 0 0 0 0 0 1 1 1
Register C 0 0 0 0 0 0 1 1
Question Answer
Answ
wer
e Marks
3$*(
6(b) x Freeware 1
6(c) x Shareware 1
6(e) x Copyright 1
2(b) 4
A B C Working space X
0 0 0 1
0 0 1 0
0 1 0 1
0 1 1 0
1 0 0 1
1 0 1 0
1 1 0 1
1 1 1 0
3$*(
Question Answer
Answ
wer Marks
3(b) − Serial 1
Question Answer
Answ err Marks
Parity Check
− A parity bit is added (to the parity byte)
− Counts / checks number of 1’s
− Can be even or odd
− If parity is incorrect, error is detected
Question Answer
An swer
wer Marks
3$*(
4(a)(i) − NAND 2
4(a)(ii) − NOR 2
Even Odd
8-bit binary value
(9) (9)
11111111 9
01100110 9
01111011 9
10000000 9
− Serial
correct
If parallel given, no mark for parallel, but follow through for corr
rec description
ectt de
d scription of parallel:
3$*(
Question Answer
A
An sw
werr Marks
6 − Key // Algorithm 5
− Algorithm // Key (must be opposite of first one)
− Plain
− Cypher
− Key // Algorithm
Question Answer
Answ
wer
e Marks
Even Odd
8-bit binary value
(9) (9)
10000001 9
10000010 9
00101001 9
00101000 9
Question Answer
Answ
An s er
sw er Marks
For example:
Hard drive
RAM Transfer of pages Virtual
Virtua
uall
memory
Question An swer
wer
e
Answer Marks
9 One mark for each correct term in the correct place. 5
plain
algorithm/key
key/algorithm
cipher
understood