0% found this document useful (0 votes)
12 views56 pages

Chapter 2 Data Transmission Guess Papers

Uploaded by

xainab800
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views56 pages

Chapter 2 Data Transmission Guess Papers

Uploaded by

xainab800
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

3$*(


3$*(
3$*(

5 The three binary numbers in the registers X, Y and Z have been transmitted from one computer to
another.

Parity bit

Register X 1 0 0 1 0 0 1 0

Register Y 1 1 1 0 0 1 1 1

Register Z 1 1 1 0 1 0 0 1

Only one binary number has been transmitted correctly. This is identified through the use of a
parity bit.

Identify which register contains the binary number that has been transmitted correctly. Explain
the reason for your choice.

The binary number that has been


bee
en transmitted correctly is in Registerr ............................................

Explanation .........................
...
..............................................................................................................
..
......................................................................................................................................

...................................
...................
. .......................................................................................................
..........................................................................................................................................................

.........
........
....................
.......................
.. . ....................................................
............................................
.............................
..........................................................................................................................................................

.............
..........
. ...........
....
.. ..
..................
. .......................................................................................................
..........................................................................................................................................................

..
.............
...
.. .. .. .........
....
.. ....
. .................................................................................................................................
..........................................................................................................................................................

..................................................
..........................................................................................................
..........................................................................................................................................................
[4]

© UCLES 2018 2210/12/M/J/18 [Turn over


3$*(

11

12 (a) Selma has some important personal information that she needs to email to her employer.

She wants to make sure that if the personal information is intercepted, it cannot be understood.

(i) State how Selma could email her personal data more securely.

...................................................................................................................................... [1]

(ii) Describe how your chosen solution works.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................
.........................................................................................................
...........................................................................................................................................

...............................
................................................................................................................
...........................................................................................................................................

...................
........
....
.....................................................................................................................
...........................................................................................................................................

.....
........
. .....
.........................................
.......................
. .................
.. ..........
. ..............
.........
......
......
.......................................
...........................................................................................................................................

.......................................................................................................................................
........................................................................................................................................... [5]

(b) Selma
(b) Selm
ma wa
want
ntss to
nt
wants to make sure tthat
hat the information received is correct.

d to
A parity check can be used to detect errors.

detec
e tion method that can be used to check the information received
ec
Describe another error detection
is correct.

Error detection method .............................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

© UCLES 2018 2210/12/M/J/18


3$*(

9 (a) Computers can transmit data using different methods.

Describe the three data transmission methods given.

(i) Serial data transmission

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Parallel data transmission

...........................................................................................................................................

...........................................................................................................................................

...................................
.........................................................................................................
...........................................................................................................................................

...............................
............................................................................................................[2]
.......................................................................................................................................[2]

(iii) Duplex data


a transmission
tran
transm
an smisssio
sm sion

.....
.......
. .....
.........................................
.......................
. .................
.. ..........
. ..............
.........
......
......
.......................................
...........................................................................................................................................

............................................................................................................................................
................................................................................................................................................

............................................................................................................................................
...............
................................................................................................................................

...................................
......................................................................................................[2]
.......................................................................................................................................[2]

© UCLES 2018 2210/12/O/N/18 [Turn over


3$*(

10

(b) Data can sometimes be corrupted when it is transmitted from one computer to another,
causing errors to be present in the data.

Identify and describe three methods of error detection that could be used to see if an error
has occurred.

Error detection method 1 ..........................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Error detection method 2 ..........................................................................................................

Description ................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................

.......................................
................................................................................................................
...................................................................................................................................................

...........................
.............................................................................................................................
...................................................................................................................................................

Erro
Er rorr de
ro
Error dete
tte
ect
c io
detectionon me
ethod 3 ..
method .................
.......................
.....................
.........
. ..............
..............
...........................................
..........................................................................................................

Des
scri
scri
r pttio
ion
Description n ..................................................................................................................................
.......
.....................
. .......................................................................................................

......
....................
................................................................................................................................
...................................................................................................................................................

...........................................
..........................................................................................................
...................................................................................................................................................

.............................................
. ......................................................................................................
..
...................................................................................................................................................
[9]

© UCLES 2018 2210/12/O/N/18


3$*(

2 Parity checks and Automatic Repeat reQuests (ARQ) can be used to check for errors during data
transmission and storage.

(a) A system uses even parity. Write the appropriate parity bit for each byte.

Parity Bit
1 0 1 0 0 1 1
1 0 1 1 1 1 1
1 0 1 0 0 0 1
[2]

(b) Explain how Automatic Repeat reQuests (ARQ) are used in data transmission and storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
.....................................................................................................[2]
...............................................................................................................................................[2]

(c) State one other met


tho
hod
methodd tthat
hat
att could be used to check for transmission errors.

.............
.......
. ..
....
....
. ................................................
.. . ......................................................................
. ......................[1]
...............................................................................................................................................[1]

3 eleva
va
ato
or (lift)
An elevator ( ifift)
(l t)) has
has a maximum u weight limit of 2400 kg. The weight carried is monitored by a
um
sensor
orr and
nd a microprocessor.
and mic icro
ropr
roproc
pr occessor.
D scribe
De
Describebe how
how the
the
h sensor and the
t e microprocessor are used to make sure the maximum weight
th
limit is n
not exceeded.
ot exceeded.

..........................................................................................................................................................
...................................................
........................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]
© UCLES 2018 2210/13/O/N/18 [Turn over
3$*(

4 The MAC address of a device is represented using hexadecimal.

A section of a MAC address is shown. Each pair of hexadecimal digits is stored using 8-bit binary.

(a) Complete the table to show the 8-bit binary equivalents for the section of MAC address. The
first number has already been converted.

6A FF 08 93
01101010
[3]

(b) Explain why data is stored as binary in computers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
.....................................................................................................[2]
...............................................................................................................................................[2]

5 Data can be transferred using


usin
usin
ng half-duplex
ha
alf-duplex serial transmission.

(a) Describe
Descri
riibe serial
ser
eria
ia
al transmission.
trran
anssmission
on.
on

........
.........
........
....
.................................................................................................................................
...................................................................................................................................................

....................................................................................................................................................
....
...
....
....
.......
. ...............................................................................................................................................

.....
...
......
..............................................................................................................................................
...................................................................................................................................................

.............................................
...................................................................................................[2]
...............................................................................................................................................[2]

(b) Give one application of serial


seriial data transmission.

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Describe half-duplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 2210/13/O/N/18


3$*(

(c) Priya stores her website on a webserver.

To transmit the website data to the webserver she uses parallel duplex data transmission.

Describe how data is transmitted using parallel duplex data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
................................................................................................... [4]
.............................................................................................................................................

(d) Priya has a URL for herr we


ebsite.
website.

State what is me
ean
antt by a U
meant RL.
URL.

..
.............
.. ......... .....
.........................................
.......................
...................
..........
. ..............
.........
......
......
................
................................................................................................................................................... . ......
................

.....
................................................................................................................................................ [1]
.............................................................................................................................................

((e)
e) Priyya is cconcerned
Priya once
oncern
cerned about a denial of service attack (DoS) occurring on her webserver.
denial

(i) Explain what is meant by a denial of service attack.


by

.....................................
. ......................................................................................................
..
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]

(ii) Give one security device that can be used to help prevent a denial of service attack.

..................................................................................................................................... [1]

© UCLES 2019 2210/12/M/J/19 [Turn over


3$*(

10

9 The contents of three binary registers have been transmitted from one computer to another. Even
parity has been used as an error detection method.

The outcome after transmission is:

Register A and Register C have been transmitted correctly.

Register B has been transmitted incorrectly.

Complete the Parity bit for each register to show the given outcome.

Parity bit

Register A 0 1 0 0 1 0 1

Register B 1 0 0 0 0 0 1

Register C 1 0 0 0 0 1 1

[3]

© UCLES 2019 2210/12/M/J/19


3$*(

(b) Nico asks Audrey why she used lossy compression rather than lossless.

(i) State one advantage Audrey could give of using lossy rather than lossless to compress
the sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) State one disadvantage Nico could give of using lossy rather than lossless to compress
the sound file.

...........................................................................................................................................

..................................................................................................................................... [1]

(c) Audrey sometimes records MIDI files.

(i) Explain what is meant by a MIDI file.

............................................................................................................................................
...........................................................................................................................................

...............................
................................................................................................................
...........................................................................................................................................

...........................
....
.....................................................................................................................
...........................................................................................................................................

.............
. .....
.........................................
.......................
. .................
.. ..........
. ..............
.........
......
......
.......................................
...........................................................................................................................................

.................................................................................................................................................
...........................................................................................................................................

................
................................................................................................................................
...........................................................................................................................................

.............................................................................................................................................
...........................................................................................................................................

.....................................
. ................................................................................................ [4]
..
.....................................................................................................................................

(ii) MIDI uses serial data transmission.

Explain two advantages of using serial transmission rather than parallel transmission.

Advantage 1 ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Advantage 2 ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[4]
© UCLES 2019 2210/12/O/N/19
3$*(

9 Maisey purchases a new router and attaches it to her computer. The connection she sets up uses
duplex data transmission.

(a) Five statements are given about duplex data transmission.

Tick () to show if the statement is True or False.

True False
Statement
() ()
Duplex data transmission can be either serial or
parallel
Duplex data transmission is when data is transmitted
both ways, but only one way at a time
Duplex data transmission is always used to connect
a device to a computer
Duplex data transmission is when data is transmitted
both ways at the same time
Duplex data transmisission automatically detects any
is
transmission
errors in data
[5]

(b) 0DLVH\·VFRPSX SXWH


SXWHHU
U XV
XVHV DQLQWH
WH
HJU
J DW
D HG
G FLUFX
0DLVH\·VFRPSXWHUXVHVDQLQWHJUDWHGFLUFXLW XLW ,& IRUGDWDWUDQVPLVVLRQWKDWVHQGVPXOWLSOH
IR
IRU
RUGD
G WD
DWUDQV
QVP
PLVVVLR
LRQWKDW
DW VHQ
QGV PXOWLSOH
bi
its
sa
bits att th
tthe
he
e sa
ssame
me ttime.
im
me.

Stat
te wh
State het
e he
er th
whether the
e IC uses se
erial
serial or parallel data transmission.

.........
................
.. . ..
. ......................................................................................................................... [1]
.............................................................................................................................................

(c) Maisey purchases a new pri


r nter and connects it to her computer using the USB port.
ri
printer

Explain two benefits of using


n a USB connection.
ng

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[4]

© UCLES 2019 2210/12/O/N/19


3$*(

10 Data is valuable to a company.

(a) Companies use error detection methods to make sure that data is accurate.

One error detection method is the use of a check digit.

Explain what is meant by a check digit and how it is used to detect errors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................

.......................................
.......................................................................................................... [4]
.............................................................................................................................................

(b) Companies can use


use a range
rang
ge of securityy methods to keep their data secure.

Id
den
enti
tify
tify
Identifyy ttw
wo ssecurity
two e urritity methods
ec method
o s that
od th
hat a company
compa
om
mpa
p ny
n can
can use
use to
o keep
k ep
kee their
the
heir data
dat
ata secure
secu
secure
e an
anddexplain
explain
how eae ach method
each met
etho
hod can keep
ho p the data secure.

Secu
Se curi
cu rity
Securityty m etho
etho
h d 1 .............
method ..........................................................................................................
.....................................................................................................................

.....
...
....
. ..
.............................................................................................................................................
...................................................................................................................................................

............................................
........................................................................................................
...................................................................................................................................................

.............................................
........................................................................................................
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Security method 2 .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[6]

© UCLES 2019 2210/12/O/N/19 [Turn over


3$*(

1 A library has a system that allows customers to check out the books that they want to borrow.

Each book has a barcode that can be used to identify the book.

(a) (i) Identify twoLQSXWGHYLFHVWKDWPD\EHXVHGLQWKHOLEUDU\·VV\VWHP

Input device 1 ....................................................................................................................

Input device 2 ....................................................................................................................


[2]

(ii) Identify twoVWRUDJHGHYLFHVWKDWPD\EHXVHGLQWKHOLEUDU\·VV\VWHP

Storage device 1 ...............................................................................................................

Storage device 2 ...............................................................................................................


[2]

(iii) Identify twoRXWSXWGHYLFHVWKDWPD\EHXVHGLQWKHOLEUDU\·VV\VWHP

Output device 1 .........


.........................................................................................................
.................................................................................................................

Output device 2 ...


...
................................................................................................................
.................................................................................................................
[2]

(b) The data


da
ata stored
sto
tore
red
re d by
b the
the library
libra
ra
ary is
is archived
arrchiv
ivved at
at the
the end
end of
o each
each
ac day.
dayy. The
da The archive
arch
hive
ve iss held
h ld on a
he
se
erv
ver
e in
server in the
the library
th lilibr
b arry office.
br

Thee data
d ta
da a is
is encrypted
encr
en cryp
crypted with an
yp an 8-bit key. As some of the data is confidential, the library wants
om
to ake th
ak
make the en
the encr
cryyption mor
cr
encryption re secure.
more

(i) Stat
State
ate how
State ho
how the library could
co make the encryption more secure.

...................................
.........................................................................................................
...........................................................................................................................................

.....................................
.................................................................................................. [1]
.....................................................................................................................................

(ii) The term used to describe data before it is encrypted is plain text.

State the term used to describe encrypted data.

..................................................................................................................................... [1]

© UCLES 2019 2210/13/O/N/19


3$*(

(iii) 7KHOLEUDU\·VDUFKLYHV\VWHPXVHVDQHUURUGHWHFWLRQDQGFRUUHFWLRQV\VWHPWKDWFRPELQHV
a parity check with an automatic repeat request (ARQ).

Describe how this system uses the parity check and ARQ.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................
.........................................................................................................
...........................................................................................................................................

.........................
...
. ..................................................................................................................
...........................................................................................................................................

...
........
. ..
....
....
..................................................
. ....................................
. ..................................
. ...........................
...........................................................................................................................................

...
.....
...........
. ........................................................................................................................ [6]
.....................................................................................................................................

(c) Th
The
e libr
llibrary
ibra
brrar
ary ha
ary hass a website th
website hat customers can use to search for a book.
that

(i) T
Thhe
Thee website
web
we bsite has a background
back
ckground colour with the hexadecimal colour code #F92A10
ck

The colour code is store


red in two 12-bit binary registers.
re
stored

Show how the colour code


co
ode would be stored in the registers.

F92

A10
[6]

© UCLES 2019 2210/13/O/N/19 [Turn over


3$*(

3 Blair writes a paragraph about data transmission in her Computer Science examination.

8VHWKHOLVWJLYHQWRFRPSOHWH%ODLU·VSDUDJUDSKE\LQVHUWLQJWKHFRUUHFWfive missing terms. Not all


terms will be used. Terms can be used more than once.

• duplex
• half-duplex
• parallel
• serial
• simplex

....................................................................... data transmission is when data is transmitted a

single bit at a time. ....................................................................... data transmission is when

multiple bits of data are sent all at once. If a user wants to transmit data over a long distance, with

the highest chance of accuracy, ....................................................................... data transmission

should be used. If data needs to be transmitted in one direction only, for example from a computer

................................
......................................... data transmission should be used. If a
to a printer, .......................................................................

user has a large amount


nt off data
amoun ata to transmit and this needs to be done as quickly as possible
data

....................
.....
....
....
....
....
....
. .......................
.............
............. da
....................................................................... d ta
dataa ttransmission
r nssmi
ra miss
sssion
n sshould
hou
ould
ld be
e us
useed.
used.
[5]

© UCLES 2019 2210/13/O/N/19


3$*(

10

5 The contents of three binary registers have been transmitted from one computer to another. Odd
parity has been used as an error detection method.

The outcome after transmission is:

• Register A and Register B have been transmitted correctly.

• Register C has been transmitted incorrectly.

Write the appropriate Parity bit for each register to show the given outcome.

Parity
bit
Register A 0 1 0 0 0 1 1

Register B 0 0 0 0 1 1 1

Register C 0 0 0 0 0 1 1
[3]

6 Jesse is taking his Comp


mp
put
u er Sc
Computer cience examination. He answers five questions about ethics.
ci
Science

(a) Fo
or th
For the
e fi
firs
rs
st qu
first ques
esti
st on
on, he w
question, rittes th
ri
writes he an
the a swe
swer:
answer:

“Thi
is ty
“This type
p o
pe off so
ssoftware
oft
ftwa
w re can be copied and shared without the permission of the owner.”
be

State
at
te wh
State what
at JJesse
esse
es se is describ
bing.
describing.

...........................................
.................................................................................................... [1]
.............................................................................................................................................

(b) For the second question, he


e writes the answer:

“With this type of software, the


the owner still retains the copyright for the software, but he gives
away copies of it for free.”

State what Jesse is describing.

............................................................................................................................................. [1]

(c) For the third question, he writes the answer:

“This type of software is often a trial version of the full software. To use the full version the
user normally needs to pay a fee.”

State what Jesse is describing.

............................................................................................................................................. [1]

© UCLES 2019 2210/13/O/N/19


3$*(

3 Carla’s computer has a USB port.

Carla uses the USB port to connect her mobile device to her computer, to transfer her photos.

(a) Give three benefits of using a USB port to connect the mobile device to the computer.

Benefit 1 ...................................................................................................................................

...................................................................................................................................................

Benefit 2 ...................................................................................................................................

...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

(b) State the type of data transmission used when transferring data using a USB port.

...........................................
................................................................................................... [1]
.............................................................................................................................................

(c) Carla wants to reduc


uce
uc
reduce e the
e file size of the photos she has transferred to her computer.
She does not want
wan
an
nt the
the quality
quallitty of the photos to be reduced, so she uses lossless compression.
comp
pression.

De
esc
s ri
ribe
be
e how
Describe how
w lossless
los
o sl
sless compression
comp
m res
mp ssio
on reduces
re
edu
d ce
c s the
the file
file size
siz
izee of the
the
h photos.
pho
hoto
os..

.....
...
. ..
..................................................................................................................................................
...................................................................................................................................................

......
................
. ....
................................................................................................................................
...................................................................................................................................................

...........................................
..........................................................................................................
...................................................................................................................................................

.............................................
. ......................................................................................................
..
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2020 2210/11/M/J/20 [Turn over


3$*(

4 Two error detection methods that Allison’s computer uses are check digit and checksum.

(a) Give two similarities between the check digit and checksum methods.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................
[2]

(b) Identify one otherr error detection method that Allison’s computer could use.

Describe how the method checks for errors.

Method ......................................................................................................................................

Description ................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................

.................................
...
. ..................................................................................................................
...................................................................................................................................................

.............
.......
. ..
....
....
. ................................................
.. . ......................................................................
. ..........................
...................................................................................................................................................

........
.........
............
. ..............................................................................................................................
...................................................................................................................................................

....................................................................................................................................................
.......
.. ....
. .....
................................................................................................................................................
[4]

© UCLES 2020 2210/11/M/J/20


3$*(

(b) Give three reasons why a programmer would choose to write a program in a high-level
language, instead of a low-level language.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

Reason 3 ..................................................................................................................................

...................................................................................................................................................
[3]

3 A company collects and stores data about its customers. The data is stored on a server in the
company’s office.

The data is transmitted to cloud storage to create a back-up.

The data is encrypted using


g sy
ymm
m etric encryption before it is sent to the cloud storage.
symmetric

(a) Describe how the


e data
dat
a a is encrypted.
en
ncrypt
p ed.

..
.....................
. .....
.............................................................
....................
..........
. ..............
.........
......
.....................
................................................................................................................................................... . ......
................

.....
...
. ..
..................................................................................................................................................
...................................................................................................................................................

......
................
. ....
................................................................................................................................
...................................................................................................................................................

...........................................
..........................................................................................................
...................................................................................................................................................

.............................................
. ......................................................................................................
..
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Give three other methods that can be used to secure the data in the office.

Method 1 ...................................................................................................................................

...................................................................................................................................................

Method 2 ...................................................................................................................................

...................................................................................................................................................

Method 3 ...................................................................................................................................

...................................................................................................................................................
[3]
© UCLES 2020 2210/12/M/J/20 [Turn over
3$*(

(e) Tina is concerned about security threats to her web server.

(i) Identify three security threats to her web server that Tina might be concerned about.

1 ........................................................................................................................................

2 ........................................................................................................................................

3 ........................................................................................................................................
[3]

(ii) Tina installs a proxy server to help protect her website from security threats.

Describe how the proxy server will help protect the website.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................
.........................................................................................................
...........................................................................................................................................

.........................
...
. ..................................................................................................................
...........................................................................................................................................

.....
.......
. ..
....
....
. ................................................
.. . ....................................
. ..................................
. ...........................
...........................................................................................................................................

...
.....
............
. ..............................................................................................................................
...........................................................................................................................................

...
...
.......................................................................................................................................... [4]
.....................................................................................................................................

2 Fourr 7-bit binary values are tra


ansmitted from one computer to another. A parity bit was added
transmitted
to each binary value creating 8-bit
8 bit binary values. All the binary values have been transmitted
8-
correctly.

(a) Tick () to show whether an Even or an Odd parity check has been used for each binary
value.

Even Odd
8-bit binary value
() ()

11111111

01100110

01111011

10000000
[4]

© UCLES 2020 2210/12/O/N/20 [Turn over


3$*(

(b) The data will also be checked using a checksum.

Describe how a checksum can be used to check that the data has been transmitted correctly.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................

......................................
......................................................................................................... [5]
...
.............................................................................................................................................

3 Alessandro has ssome


has o e imp
om im
mportantt d
important ata
a sstored
data to
ored
do nh
on is ccomputer.
his om
mpu
ute
er.

He is concerned
conc
ncce
errne
nedd about
abo
ab out accidental
accidenttal damage to his data.

(a) ((i)
i) IIden
dent
enti
en tify thre
tify
Identify th
hre
ree
threee ways that
a the data could be accidentally damaged.
at

1 .........................................................................................................................................
.........................................................................................................................................
..

2 ................................
.........................................................................................................
........................................................................................................................................

3 .................................
........................................................................................................
........................................................................................................................................
[3]

(ii) State what Alessandro could do to make sure that he can retrieve his data if it is
accidentally damaged.

..................................................................................................................................... [1]

© UCLES 2020 2210/12/O/N/20


3$*(

5 Arjun uses a scanner to create digital versions of some printed documents.

The scanner is attached to his computer using a USB connection.

(a) Tick () to show if the USB connection uses Parallel or Serial data transmission.

Describe your chosen method of data transmission.

Parallel

Serial

Description

...................................................................................................................................................

...................................................................................................................................................

...........................................
.........................................................................................................
...................................................................................................................................................

.................................
...
. ..................................................................................................................
...................................................................................................................................................
[3]

(b) Give
Give
e three
thre
three ben
enef
en
nefitititss of a USB
benefits S co
SB onne
onne
nect
cttio
ion
connection.n.

Ben
nefi
nefi
f t 1 ...
Benefit .........
...............................................................................................................................
...................................................................................................................................

......
................
. ....
................................................................................................................................
...................................................................................................................................................

Benefit 2 ...........................
..........................................................................................................
...................................................................................................................................

.............................................
. ......................................................................................................
..
...................................................................................................................................................

Benefit 3 ...................................................................................................................................

...................................................................................................................................................
[3]

(c) Arjun uses the Internet to send the digital documents to his friend. He wants to make sure the
documents are sent securely.

Identify two protocols that can be used to transfer data securely.

Protocol 1 .................................................................................................................................

Protocol 2 .................................................................................................................................
[2]

© UCLES 2020 2210/13/O/N/20


3$*(

7 Fourr 7-bit binary values are transmitted from one computer to another. A parity bit was added
to each binary value creating 8-bit binary values. All the binary values have been transmitted
correctly.

(a) Tick () to show whether an Even or an Odd parity check has been used for each binary
value.

Even Odd
8-bit binary value
() ()
10000001

10000010

00101001

00101000
[4]

(b) A parity check may not always detect errors that have occurred in data transmission.

State why a parity check may not detect data transmission errors.
may

...................................
...
....
.......................................................................................................... [1]
.............................................................................................................................................

(c) Give one other er error


err
rro
or checking
che
eckin
ng method
method
od that
tha
hatt could
ha coul
could
uld be
b used
use
s d to check
che
heck
ck forr errors
error
orss in data
tran
an
nsm
mis
i siion
o .
transmission.

......
............
......
.....
. ..
....
. ....
...................................................................................................................... [1]
.............................................................................................................................................

© UCLES 2020 2210/13/O/N/20


3$*(

2 A company has a website that is stored on a web server.

(a) The website data is broken down into packets to be transmitted to a user.

Describe the structure of a data packet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...........................................
.................................................................................................... [4]
..............................................................................................................................................

(b) The website hosts videos


vid
vide
eos that
eo that users can stream. The company uploads new videos to the
website.

(i
i)
(i) T
The videos
The v de
videos
os are
arre
e compressed
comprre
essse
ed before
befo
be fo
ore
re they
they are
arre uploaded
a upload
uplo
oad
aded
ded to
to the
th
he website.
webs
we
ebs
bsititte.

Tick
Tick 9) one
k ((9) one box to sh
how which statement is a benefit of compressing the videos.
show

A Da
Data
ata
t is encrypted.
encrypted
d.

B Duration of each video


video will be reduced.

C Less storage space on the web server is required.

D More bandwidth is required when viewing the videos.


[1]

(ii) Give two methods of compression that could be used to compress the videos.

1 ........................................................................................................................................

2 ................................................................................................................................... [2]

© UCLES 2020 2210/01/SP/23


3$*(

(iii) The company uses parallel half-duplex data transmission to transmit the data for the
new videos to the web server.

Explain why parallel half-duplex data transmission is the most appropriate method.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

(c) The company is concern


rn
ned
ed a
concerned bout a distributed denial of service (DDoS) attack.
about

(i) Describe wha


ha
at is m
what eant
nt byy a DDoS attack.
nt
meant

.....
............
............................................................
.. . .................
.. .........................
... ....
........
.. .....
.. ......................
..
........................................................................................................................................... . ....................

............................................................................................................................................
...............................................................................................................................................

............................................................................................................................................
.........
.......................................................................................................................................

...................................
..........................................................................................................
...........................................................................................................................................

.....................................
. ......................................................................................................
..
...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

(ii) Suggest one security device that can be used to help prevent a DDoS attack.

...................................................................................................................................... [1]

© UCLES 2020 2210/01/SP/23 [Turn over


3$*(

11

9 Complete the sentences about symmetric encryption.

Use the terms from the list.

Some of the terms in the list will not be used. You should only use a term once.

algorithm cipher copied delete key plain

private public standard stolen understood unreadable

The data before encryption is known as .................................................. text.

To scramble the data, an encryption .................................................., which is a type

of .................................................., is used.

The data after encryption is known as .................................................. text.

(QFU\SWLRQSUHYHQWVWKHGDWDIUR
RPEHLQJE\DKDFNHU
(QFU\SWLRQSUHYHQWVWKHGDWDIURPEHLQJE\DKDFNHU >@

re
e socket
10 An art gallery uses secure socke
ket layer (SSL) to provide a secure connection when selling art on
its website.

Descri
ribe
ribe
e the
Describe the process
proce
ess
s of
of SSL and
an
nd explain
exxpl
plai
plai
ain how
h w iti provides
ho pro
ovide
es a secure
secu
secu
secure
u e connection.
con
onnnectio
ion.
n.

............
......................................................................................................................................................
..........................................................................................................................................................

...........................................................................................................................................................
...............................................................................................................................................................

..................................................
..........................................................................................................
..........................................................................................................................................................

...................................................
........................................................................................................
..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2020 2210/01/SP/23


3$*(
3$*(


3$*(
2210/12 Cambridge O Level – Mark Scheme May/June 2018
PUBLISHED
Question Answer Marks

5 1 mark for correct register, 3 marks for reason: 4

– Register Y

Any three from:


– Count the number of 1/0 bits (in each by te
e/r
/reg
reg
egisisste
byte/register) ter))
– Two bytes/registers have an odd number o 1/0
off 1/ 0 bi
b ts
bits T
s //// Twwo have odd parity
Two
– Even parity must be the parity used
– One byte/register has an even number of 1/0 bits // One e us es even parity
es
uses
– The two with an odd number of one bits/odd parity are in co
orrrec
ect // Register X and Z should have even parity
incorrect

Question Answer
Answ
wer Marks

6 1 mark for each correct missing word, in the given order: 8

– fetches
– immediate access store // IAS
– program counter // PC
3$*(

– memory address register // MAR


– memory data register // MDR
– executed
– arithmetic logic unit // ALU
– accumulator // ACC

© UCLES 2018 Page 6 of 10


2210/12 Cambridge O Level – Mark Scheme May/June 2018
PUBLISHED
Question Answer Marks

12(a)(ii) Any five from: 5


– Her personal details before encryption is the plain
plain text
texxt
– The plain text/her personal details is encrypted
encry
crypt
pe
pt edd using
usis ng
n anan encryption algorithm
– The plain text/her personal details is encrypted
enccry
ypttedd using
usis ngg a key
key
– The encrypted text is cypher/cipher text
– The key is transmitted separately (from ttheh tex
he text)
ext)
ex t)
afte
af terr tr
te
– The key is used to decrypt the cypher text ((after a smisssi
an s on)
ttransmission)

12(b) Any three from a single error method: 3


– Checksum
– Calculation carried out on data
– (checksum/calculated) value sentse
ent with
wit
ithh data
data
– recalculated after transmission and compared to original
– If they do not match an error is present

– ARQ
– uses acknowledgment and timeout
– A request is sent with data to acknowledge all data is received
– Acknowledgement sent back to say all data is recei ved
ed
received
3$*(

– If no acknowledgement is received in a time frame an ne rror


rr or in transmission detected / data automatically resent.
error

© UCLES 2018 Page 10 of 10


2210/12 Cambridge O Level – Mark Scheme October/November 2018
PUBLISHED
Question Answer Marks

8 Fourr from: 4
x Used to attend to certain tasks/issues
x Used to make sure that vital tasks are d dealt with
ealtt w ith immediately
im
mme
m di diately
CPU/processor
x The interrupt/signal tells the CPU/proces sor (that
so (ttha
(tha
hat
at its
ts attention
a te
at tent ntion is required)
attta
x A signal that can be sent from a device ((attached t ch hed
ed ttoo th
thee coccomputer)
omputer)
x A signal that can be sent from software (inst (installed
stal
st a led
ed o onn tthe
h ccomputer)
he o puter)
om
x The interrupt will cause the OS/current processproce essss to pause
pa
p aus
use
x The OS/CPU/ISR will service/handle the interrup interrupt
upt
uppt
x They have different levels of priority
x After the interrupt is serviced, the (previous) process is continue continued
ued
ueed
x It enables multi-tasking to be carried out on a ccomputer ompu
om p te
pu terr
interrupt
x A valid example of an interru ptt e.g. ‘‘out paper’
outt off pape r’’ message ffor printer
or a p riinter
t

Question Answer
Answ
wer
e Marks

9(a)(i) Two from: 2


x Data is transmitted one bit at a time
3$*(

x Data is transmitted using a single wire


x Bits arrive in order/sequence

9(a)(ii) Two from: 2


time/simultaneously
u ta
ul
x Data is transmitted multiple bits at a time/simul aneouslslly
x Data is transmitted using multiple wires
x Bits may arrive out of sequence/skewed (and a are
r reo
re reordered)
rder
derered
ed))
ed

9(a)(iii) 1 mark for each: 2


x Data is transmitted in both directions
x « at the same time/simultaneously

© UCLES 2018 Page 11 of 12


2210/12 Cambridge O Level – Mark Scheme October/November 2018
PUBLISHED
Question Answer Marks

9(b) Maximum of three marks per error detection method. 9


1 mark for naming the method, 2 marks for describing iit.
t
t.
Parity (check)
x Odd or even parity can be used
x Bits are added together // 1 bits are counted e
ed
x Parity bit added (depending on parity set)
x Parity checked on receipt
x If parity bit is incorrect an error is detected

Checksum
x Calculation performed on data (to get the checksum)
x Checksum sent with data
x Checksum recalculated after transmission
x Comparison made between checksum before and and
n checksum
check
cksu
ck sum
sum after transmission
x Error detected if checksums are different

Automatic repeat request (ARQ)


x Uses acknowledgement and timeout
3$*(

acknowledgement
edge
ed
x Request is sent (with data) requiring acknowled g mentt
x If no response/acknowledgment within certain tittime
me frame
m d
me data
a a package is resent
at
request
x When data received contains an error a requ esst is sentt (a
((automatically)
utom
ut o atically) to resend the data
pac
accke
k t is received
x The resend request is repeatedly sent until packet rec
e eive
ec eiiv d error free/limit is reached/acknowledgement received

Question Answer
Answ
wer Marks

10 Five from: 5
x The sensor sends data to the microprocessor
us
sin
x The analogue data is converted to digital ((using ing ADC)
C))
x The microprocessor compares the reading to th the range/stored
e set ra
ang
nge/
e/st
e/ s ored values/stored data (6 to 8) «
range
– « If the reading is >8 or <6 / outside rangge «
o « the microprocessorr sends a sig signal
na output
al to outpu
pu
p ut th
the
he alert
x The process is continuous/repeated

© UCLES 2018 Page 12 of 12


2210/13 Cambridge O Level – Mark Scheme October/November 2018
PUBLISHED
Question Answer Marks

2(a) 2 marks for 3 correct bits, 1 mark for 2 correct bits 2

Parity Bit

0 1 0 1 0 0 1 1

0 1 0 1 1 1 1 1

1 1 0 1 0 0 0 1

2(b) Two from: 2


checking/detection
x Set of rules for controlling error checking/d etecti
t tion //// it’s an error detection method // used to detect errors
x Uses acknowledgement and timeout
acknowledgement
x Request is sent (with data) requiring acknowled edge
ed g mentt
x If no response/acknowledgment within certain ti ttime
m frame
me m data package is resent
me
request
x When data received contains an error a reques es (automatically)
st is sentt (a
(aut
utom
ut o atically) to resend the data
pac
accke
x The resend request is repeatedly sent until packet k t is received
rec
e eive
ec ed error free/limit is reached/acknowledgement received
3$*(

2(c) Checksum 1

Question Answer
Answ
wer
e Marks

3 Six from: 6
x A pressure sensor is used
micropro oce
x The sensor sends data/signals to the microprocessorcessor
x Data is converted to digital format
x Microprocessor compares data value against se sett value
e
2400ௗKg/under
x If value <= 2400 permitted
Kg/under weight limit lift is pe
erm
rmitted to
oooperate
p rate
pe
2400ௗKg/over
x If value > 2400 Kg/over weight limit signal is se
s
sent n from
nt m th
the
e microprocessorr to deliver warning message to
passengers
2400ௗKg
x If value > 2400 Kg signal is sent from the mi microprocessor
icrroproceesssor
or to lift mechanism to stop lift operating
x Weight continuously monitored

© UCLES 2018 Page 5 of 13


2210/13 Cambridge O Level – Mark Scheme October/November 2018
PUBLISHED
Question Answer Marks

4(a) 1 mark for each correct conversion 3


01101010 1
11111111 00001000
00001000 10010011

4(b) x Computers use switches / logic gates 2


x Only uses 2 states / On or Off / 1 or 0

Question Answer
Answ err Marks

5(a) x Bits sent one at a time 2


x Uses a single wire

5(b) USB / SATA / Wifi /PCI Express / Any appropriate serial


a d
al device
evice 1

5(c) x Data is transferred in two directions 2


x Data is sent in only one direction at a time
3$*(

© UCLES 2018 Page 6 of 13


2210/12 Cambridge O Level – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

6(c)  tim
me/
e simultaneously
Several/multiple bits are transmitted at a time/simultaneously 4
 Several/multiple wires are used
 Data is transmitted in both directions «
 « at the same time/simultaneously

6(d) One from: 1


 Uniform resource locator
 The website’s address
 User friendly version of the IP address

6(e)(i) Fourr from: 4


acc
cesss to a website
 Designed to deny people access web
ebsi
bsi
site
ite
server)
 A large number/numerous requests are sent (to a ser rve
ver)) «
 « all at the same time
t alll the requests
 The server is unable to respond/struggles to respond to
 The server fails/times out as a result

6(e)(ii) One from: 1


3$*(

 Proxy server
 Firewall

© UCLES 2019 Page 8 of 12


2210/12 Cambridge O Level – Mark Scheme May/June 2019
PUBLISHED
Question Answer Marks

9 1 mark per each correct parity bit: 3

Parity bit
Register A 1 0 1 0 0 1 0 1

Register B 1 1 0 0 0 0 0 1

Register C 1 1 0 0 0 0 1 1

Question Answer
Answ
wer Marks
3$*(

10 Fourr from: 4
 Electrical field/charge is spread across the screen
 Sensors are located around the screen // sensors are e used
u ed to read the electric field
us
transferred
 When finger touches screen, the charge/ is transferred d toto the user
ctt
 « as it is affected by the conductivity of another object
determined/calculated/measured
 Coordinates of touch determined/calculated/measur ed
d

© UCLES 2019 Page 12 of 12


2210/12 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

5(c)(i) Fourr from: 4


x Musical Instrument Digital Interface file
x Stores a set of commands / instructions for h how
ow
w the
he ssound
o nd
ou d sshould
h ul
ho u d be played
x Does not store the actual sounds
inst
nst
stru
r me
ru ment
x Data in the file has been recorded using digital instruments ns
x Specifies pitch of the note // specifies the note to be p played
l ye
la yed
d
x Specifies when each note plays and stops playing // S Specifies
pecifies
pe s kkey on/off
ey o
ey n/off
x Specifies duration of the note
x Specifies volume of the note
x Specifies the tempo
x Specifies the type of instrument

5(c)(ii) Fourr from: 4


x It uses a single wire «
x « therefore, it is cheaper to manufacture / buy / install
x « therefore, less likely to have interference // no crosstalk
x « therefore, can be used over longer distances
3$*(

x Data is sent a bit at a time «


rece
eiv
ived
x « therefore, less chance of data being skewed // data is received ed in order
x Transmission can be synchronised «
x « can reduce rate of errors

© UCLES 2019 Page 7 of 15


2210/12 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

9(a) One mark per each correct tick 5

True
u
True False
Statement
(9)
(9) (9)
Duplex data transmission can be either serial or
9
parallel
Duplex data transmission is when data is transmitted
9
both ways, but only one way at a time
Duplex data transmission is always used to connect a
9
device to a computer
Duplex data transmission is when data iss ttransmitted
rans
ra nsmi
ns mitt
mi tted
tt ed
9
both ways at the same time
Duplex data transmission automatically detects any
9
errors in data

9(b) x Parallel data transmission 1


3$*(

© UCLES 2019 Page 12 of 15


2210/12 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

9(c) Fourr from (maximum two marks per benefit): 4


x It is a universal standard «
computer
x « so it is likely to be compatible with the compu
ute
er

x It can only be inserted one way «


x inco
in correc
co ectl
ec ty
tl
« so there is less chance of connecting a device incorrectly

x It is a high-speed connection «
x « so data will be transmitted quicker

x It uses serial transmission «


x « so it is cheaper to manufacture/buy
x « less chance of skewing / errors

x It doesn’t require a (wireless) network «


x « therefore, can be used if a network is down
3$*(

x It is backwards compatible «
x « so no additional technology is needed

x It can power the device «


x « therefore no separate source of power is needed

x Drivers are automatically downloaded // device is automatically


automatical
ally
ly identified
ide
dentified «
x « so no need to find them online / install them manually

© UCLES 2019 Page 13 of 15


2210/12 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

10(a) Fourr from: 4


x Validation method
x Used to check data entry
x Digit is calculated from data // by example
x Digit is appended / added to data
x Digit is recalculated when data has been input
x Digits are compared
x If digits are different, error is detected // If digits match, no error iis detected
s de
d tected
te

10(b) Six from (maximum three marks per security method): 6


x Firewall «
x « Monitors the traffic
x « Blocks any traffic that doesn’t meet the criteria / rules

x (Strong) password // biometric «


x password
« Data cannot be accessed without the use of the passwo rd bio
d/b io data
x « Prevent brute force attacks
3$*(

x Encryption «
x « Data will be scrambled
x « Key is required to decrypt the data
x « If data is stolen it will be meaningless

x Physical security methods «


x « The physical security will need to be overcome
x « This can help deter theft of the data

x Antispyware «
x « will remove any spyware from system
x « will prevent data being relayed to a third party

© UCLES 2019 Page 14 of 15


2210/13 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1(a)(i) Two from: 2


x 2D scanner
x Touchscreen
x Keypad/keyboard
x Card reader
x Mouse
x Digital camera

1(a)(ii) Two from: 2


x HDD
x SSD
x USB flash memory drive
x SD card
x Any optical

1(a)(iii) Two from: 2


x Monitor/Touch screen
3$*(

x Speaker
x Printer
x LED // Light

1(b)(i) x Increase the length of the key // make key 12-bit, etc. 1

1(b)(ii) x Cypher text 1

© UCLES 2019 Page 4 of 14


2210/13 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

1(b)(iii) Six from: 6


x The system could use odd or even parity
x A parity bit is added
incorrect/correct
ectt parity
ec
x The data is checked to see if it has incorrect/correc pari
pa rriity //
// by example
exa
x mple

x If parity is correct no error is found


x correctly
An acknowledgement is sent that data is received corr
rrec
recctl
tly
x The next packet of data is transmitted

x If incorrect parity is found an error has occurred


x A signal is sent back to request the dadata
ata
a iis resent
s re
rese
sent
se nt
x occurs
The data is resent until data is received correctly/timeout occur
us
ur

1(c)(i) 6
1 1 1 1 1 0 0 1 0 0 1 0
3$*(

1 mark 1 mark 1 ma
m
mark
rk

1 0 1 0 0 0 0 1 0 0 0 0

1 mark 1 mark 1 ma
m
mark
rk

© UCLES 2019 Page 5 of 14


2210/13 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

2(b) One mark for the correct tick 1

Example program Tick


Tick
k
(9)

1011100000110000
0000011011100010

INP
STA ONE
INP
STA TWO
ADD ONE

a = input()
b = input()
if a == b:
9
print("Correct")
3$*(

else:
print("Incorrect")

Question Answer
An swer
wer Marks

3 One mark for each correct term in the correct order 5


x Serial
x Parallel
x Serial
x Simplex
x Parallel

© UCLES 2019 Page 8 of 14


2210/13 Cambridge O Level – Mark Scheme October/November 2019
PUBLISHED

Question Answer Marks

5 One mark for each correct parity bit 3

Parity
bit
Register A 0 0 1 0 0 0 1 1

Register B 0 0 0 0 0 1 1 1

Register C 0 0 0 0 0 0 1 1

Question Answer
Answ
wer
e Marks
3$*(

6(a) x Free software 1

6(b) x Freeware 1

6(c) x Shareware 1

6(d) x Plagiarism // Intellectual property theft 1

6(e) x Copyright 1

© UCLES 2019 Page 11 of 14


2210/11 Cambridge O Level – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

2(b) 4
A B C Working space X

0 0 0 1

0 0 1 0

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 0

1 1 0 1

1 1 1 0
3$*(

4 marks for 8 correct outputs


3 marks for 6 or 7 correct outputs
2 marks for 4 or 5 correct outputs
1 mark for 2 or 3 correct outputs

Question Answer
Answ
wer Marks

3(a) Any three from: 3


− It is a universal standard
− It can’t be inserted the wrong way around
− Supports different transmission speeds
− Automatically detects if correct driver installed
− It will charge the mobile device at the same time

© UCLES 2020 Page 6 of 11


2210/11 Cambridge O Level – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

3(b) − Serial 1

3(c) − A compression algorithm is used 4


− No data is removed in the compression p process
rro
oce
cess
s
ss
− An index/dictionary of pixels is created
− The number of times a pixel is repeated inn a row
rro
ow is
i stored
sto
t red
ed

Question Answer
Answ err Marks

4(a) Any two from: 2


from
rom
ro
om th
− They both calculate a value fro the
e da
data
ta
a
− They both append the calculated value to the data
− They both recalculate the value
− … They both report an error if they don’t match

4(b) One mark for method, three marks for description: 4


Automatic Repeat reQuest
3$*(

− Uses acknowledgement / request and time-out


− Error control protocol
− Check performed on receiving data // error is detected d by e e.g.
.g. parity check, check sum
negative
gati
− If error detected, request is sent to resend data // nega tive
ti ve
e acknowledgement is used
requ
re ques
qu e ts timeout / limit is reached
− Resend request is repeated till data is sent correctly / requests
positive
− Send acknowledgement that data is received // positive ve acknowledgement is used
res
esen
− If acknowledgement not received in set time data is resent entt

Parity Check
− A parity bit is added (to the parity byte)
− Counts / checks number of 1’s
− Can be even or odd
− If parity is incorrect, error is detected

© UCLES 2020 Page 7 of 11


2210/12 Cambridge O Level – Mark Scheme May/June 2020
PUBLISHED
Question Answer Marks

3(a) Any fourr from: 4


− Encryption key is used
− Encryption algorithm is used
plai
a n text
− Encryption key / algorithm is applied to plain t xt
te x
− … to convert it into cypher text
− Same key is used to encrypt and decrypt the h text
he tex
extt

3(b) Any three from: 3


− Firewall
− Password
− Proxy server
ee
− Physical methods (by example e.g.
.g CCTV,
g. C CTV
CT Locks)
V, L ocks
oc ks))
ks
− Access rights
− Asymmetric encryption
− Disconnect from network

Question Answer
An swer
wer Marks
3$*(

4(a)(i) − NAND 2

4(a)(ii) − NOR 2

© UCLES 2020 Page 5 of 10


2210/12 Cambridge O Level – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

2(a) One mark for each correct row: 4

Even Odd
8-bit binary value
(9) (9)

11111111 9

01100110 9

01111011 9

10000000 9

2(b) Any five from: 5


− A value is calculated from the data
− The value is calculated using an algorithm // by exampexample
le
e
− The value is appended to the data to be transmitted
− Value is recalculated after transmission
3$*(

− Values are compared


− If the values match the data is correct // if the values do not match
ot m a ch the data is incorrect
at

© UCLES 2020 Page 7 of 13


2210/13 Cambridge O Level – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

4(b) Any three from: 3


− Hacking
− Denial of service (DoS)
− Malware
− Virus

NOTE: three suitable types of malware can be awarded


award
rded
ed

Question Answer Marks

5(a) One mark for correct tick, two marks ffor


orr d
description
escr
es crip
cr ipti
ip tion
tion 3

− Serial

− Bits sent one at a time


− Single wire

correct
If parallel given, no mark for parallel, but follow through for corr
rec description
ectt de
d scription of parallel:
3$*(

− Multiple bits sent at a time


− Multiple wires

5(b) Any three from: 3


− Universal connection // industry standard
− Can only be inserted one way
− Backward compatible
− Auto configures // automatically recognised devices
− Can power devices
− Fast data transfer speed
− Inexpensive to purchase/manufacture

© UCLES 2020 Page 6 of 13


2210/13 Cambridge O Level – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

5(c) Any two from: 2


− TLS
− SSL
− HTTPS

Question Answer
A
An sw
werr Marks

6 − Key // Algorithm 5
− Algorithm // Key (must be opposite of first one)
− Plain
− Cypher
− Key // Algorithm

Question Answer
Answ
wer
e Marks

7(a) One mark for each correct row: 4


3$*(

Even Odd
8-bit binary value
(9) (9)

10000001 9

10000010 9

00101001 9

00101000 9

7(b) Any one from: 1


− Transposition error
− When bits still add up to odd/even number
− Even number of incorrect bits

© UCLES 2020 Page 7 of 13


2210/13 Cambridge O Level – Mark Scheme October/November 2020
PUBLISHED
Question Answer Marks

7(c) Any one from: 1


− ARQ
− Checksum

Question Answer
Answ
An s er
sw er Marks

8(a) Any three from: 3


− Liquid crystal display
− The display is made of pixels
− … arranged in a matrix
− Uses a flat panel display
− Backlit display
− … with CCFLs/LEDs
− Uses light-modulating properties of liquid crystals
(to
t allow
− Crystals can be turned between opaque and transparent (to alll ow
o light to pass)
− Colours created using RGB

8(b) Any three from: 3


3$*(

− Low power consumption


− Runs at cool temperature
− Do not suffer image burn
− Do not suffer flicker issues
− Bright image/colours
− High resolution image
− Cheaper to purchase than e.g. LED screen

© UCLES 2020 Page 8 of 13


2210/01 Cambridge O Level – Mark Scheme For examination
SPECIMEN from 2023

Question Answer Marks


2(a) Any fourr from: 4
x it has a header
x … that contains the destination address
x … that contains the packet number
x … that contains the originator’s address
x it has a payload
x it has a trailer.
2(b)(i) C 1
2(b)(ii) x lossy 2
x lossless
2(b)(iii) Any fourr from: 4
x parallel would allow fastest transmission
x … of the large amount of data
x data can be uploaded and downloaded …
x … but this does not have to be at the same time
x data is not required to travel a long distance
x … therefore skewing is not a problem.
3$*(

2(c)(i) Any fourr from: 4


x multiple computers are used as bots
x designed to deny people access to a website
x a large number / numerous requests are sent (to a seserv
r er) …
server)
x … all at the same time
x the server is unable to respond / struggles to respond
nd to all th
he requests
the
x the server fails / times out as a result.
2(c)(ii) firewall OR proxy server 1

© UCLES 2020 Page 5 of 10


2210/01 Cambridge O Level – Mark Scheme For examination
SPECIMEN from 2023

Question Answer Marks


8(a) One mark for each part of the diagram: 4

The diagram shows:


x a hard drive
x irrtu
ual
al m
the hard drive portioned in some way to create vvirtual e or
em
memoryory
x RAM
x an indication of pages transferred between the RRAMA a
AM nd
and he
d tthe irtu
ir t al memory.
e vvirtual

For example:

Hard drive
RAM Transfer of pages Virtual
Virtua
uall
memory

8(b) x to extend the RAM capacity 3


x … to stop the 3D modelling software from freezing/crashing
freezing/cr
crras
a hing when
whe
hen n the physical RAM is full
x to allow the computer to process the large amount of ddata required
ata re
equ
quir
ired
ire for 3D modelling.
ed
3$*(

Question An swer
wer
e
Answer Marks
9 One mark for each correct term in the correct place. 5

plain
algorithm/key
key/algorithm
cipher
understood

© UCLES 2020 Page 8 of 10


3$*(

You might also like