0% found this document useful (0 votes)
7 views

CS Ch2 WS 1

Uploaded by

TasmiaNiazi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

CS Ch2 WS 1

Uploaded by

TasmiaNiazi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Chapter 2

2.2 Methods of error detection


When data is transmitted from one device to another, there is a chance that errors can occur in the data. This could be because
packets of data go missing, or because of interference during transmission. Therefore, several error detection methods can be
used to find any errors.

Exercise 1 Error dectection

1 Which error detection method adds an 8th bit to 7 bits of data, to make each byte meet an odd or even check?
Circle the answer.
Parity check      Checksum      Echo check

2 In which error detection method does the receiver send data back to the sender, to compare the two versions of the data?
Circle the answer.
Parity check      Checksum      Echo check

3 Which error detection method uses an algorithm to calculate a value from the data?This value is transmitted with the data
to the receiver. Circle the answer.

Parity check      Checksum      Echo check

4 The following four bytes of data have been transmitted from one computer to another. Each byte was transmitted using an
even parity check. All the bytes have arrived correctly. Write the parity bit that was added to each byte for it to be correct for
an even parity check.

Parity bit Byte


1 0 1 1 0 1 1
0 1 1 1 0 0 0
1 0 1 0 1 1 0
0 0 0 0 1 1 1

5 Can you think of a reason why an error that has occurred in the transmission of data from one device to another is not
detected by a parity check?

Errors can also occur when data is entered into a device. The data entry could be manual (being typed into a device),
or automatic, (such as scanning a barcode). Therefore, there is also an error detection method for data entry, which is
called a check digit.

Data transmission 23

IGCSE_CS_WB_Ch 2.indd 23 26/01/21 9:52 PM


Chapter 2

Exercise 2 Check digit

1 How is a check digit used to detect errors in data entry?

Exercise 3 Automatic repeat request

Sometimes errors are found in data after transmission. So, systems need a way to request that the data is resent. One method for
this is an automatic repeat request (ARQ).

1 During an ARQ process, data is transferred from the sending device to the receiving device. The sending device then
starts a timer. The receiving device checks the data for errors, using one of the error detection methods you have
studied. What happens next in the ARQ process?

24 Data transmission

IGCSE_CS_WB_Ch 2.indd 24 26/01/21 9:52 PM


Chapter 2

2.3 Encryption
Data is very valuable and we should always make sure that it is stored and transmitted in a secure way. Encryption is one way
that data can be kept secure.

Exercise 1 Encryption

1 What is the name given to the data before encryption?

2 Name the encryption algorithm that is used to encrypt the data.

3 What is the name given to the data after encryption?

4 Tick (✔) to show whether same key or different keys are used to encrypt and decrypt data in symmetric encryption.

Keys used Tick (✔)


Same key
Different key

The paragraph below explains how asymmetric encryption is used to encrypt data.

Fill in the missing words.

The text is encrypted into text using

a key. The encrypted data is transmitted to the receiving device.

The text is decrypted using a key.

5 Which encryption method is more secure? Why?

Data transmission 25

IGCSE_CS_WB_Ch 2.indd 25 26/01/21 9:52 PM

You might also like