0% found this document useful (0 votes)
22 views

1.2.1 Data transmission

Uploaded by

pubgmaan7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

1.2.1 Data transmission

Uploaded by

pubgmaan7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

UZZAM

Computer Science 2210 ABBASI


Topical Past Papers (Work Sheet # 3)

Topic: 1.2.1 Data transmission

May/June 2006 P1 (7010)

3 (a) Give one effect of hacking. [1]


(b) Give two ways of protecting computer systems against hacking. [2]

10 Many bank customers now bank on-line using the Internet.


(a) State two advantages for the bank of on-line banking. [2]
(b) State two disadvantages for a bank customer of on-line banking. [2]

12 A music club keeps its members’ details on a computer file.


(a) Complete the table below which shows the data type, field length and validation check used
for the club members’ data.

Page 1 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI

Topic: 1.2.1 Data transmission

May/June 2003 (9691)

2. (c) State two advantages and one disadvantage of having a network of


computers, rather than a series of standalone machines, in a school classroom.
[3]

7. (a) Explain the difference between


(i) Serial and parallel modes of data transmission. [4]
(b) When data is transmitted it is subject to corruption. Explain how a parity check could
be used to determine whether corruption has taken place. [4]

Oct/NOV 2003(9691)

7. A college has a number of stand-alone machines. The decision is taken to turn them into a
LAN.
(a) State two items of hardware and one of software which will be necessary for the
conversion. [3]
(b) Explain why students find that access to text based files does not cause a
problem,while graphics files download very slowly. [2]

(c) State two advantages and two disadvantages of the college converting to a
network system. [4]
(d) (i) Explain why a protocol is needed for this network. [4]

May/June 2004(9691)
5. (b) (i) Describe how buffers and interrupts are used in the transfer of data
from primary memory to secondary storage. [5]
(ii) State which of the modes of data transmission would be most suitable for
theprocedure in (i), justifying your answer. [2]

Oct/NOV 2004(9691)
5. (a) State what is meant by a protocol. [2]
(b) Describe two features of a protocol necessary for the successful transmission of
databetween two devices. [4]

Page 2 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI

Topic: 1.2.1 Data transmission


May/June 2005(9691)
6. (b) A school computer room is to be equipped with a network of machines.
Give three advantages and one disadvantage of installing a network compared to
stand alone machines. [4]

12. (a) State the meaning of


(i) serial,
(ii) parallel,
modes of data transmission. [4]

Oct/NOV 2005(9691)
5. (a) Errors can occur when data is transmitted from one device to another.
Explain how achecksum can be used to monitor a transmission for errors. [3]
May/June 2006(9691)
4. (a) State two ways in which a local area network (LAN) differs from a wide area
network (WAN). [2]
(c) (i) Explain what is meant by the term protocol. [2]

Oct/NOV 2006(9691)
5. (a) State what is meant by the following types of data transmission.
(iii) Serial.
(iv) Parallel. [4]

(c) State two of the modes of data transmission mentioned in part (a) which would be
used to transfer data from primary memory to a hard drive. Give reasons for your
answers. [4]

6. Authors send books to a publishing company. At this stage books are text documents with
anyillustrations being added at the end of the publishing process.
When a book is sent to the company by an author, it is sent in hard copy form as well as on adisk.
It is read and, if accepted, is then sent electronically to a person called a copy editor. Thecopy
editor reformats the text to make it suitable for publication.
(a) Explain why the original copy of the book is in
(i) hard copy form; [2]
(ii) electronic form on a disk. [2]

(c) All copy editors are expected to have a stand-alone computer.


Copy editors need to communicate with head office. State what extra hardware
and software the company would have to supply to each copy editor to allow this
communication. Givereasons for your answers. [4]

7. (b) (ii) During transmission data can be corrupted. Check sums and parity
checks can be carried out on the data.
Explain how check sums and parity checks are used to detect transmission errors.
[4]

Page 3 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI

Topic: 1.2.1 Data transmission


May/June 2007 (9691)
A garage sells cars and also has servicing and parts departments. Details of customers who
purchase cars are stored in a file.Details of cars for sale are stored in another file. Some computers
are used in the offices for clerical tasks like word processing and accounting. Someare in the
showroom so that customers can see details of cars and videos of them being driven.
Thecomputers used at the garage are networked and all data is stored on a central server.
10. (a) State a difference between a local area network (LAN) and a wide area
network (WAN). [1]

Oct/NOV 2007(9691)
11. The data which is transmitted between survey sites and head office is liable to errors. Data
which is received is checked for errors.
(a) One method of checking for errors is to use parity checks.
The following four bytes have been received:
01101001 10111100 10101010 00100100
(i) One of the bytes contains an error. State which byte. [1]
(ii) Explain your choice of answer in (i). [2]
(iii) Explain why a byte may still be in error even if it passes the parity test.[1]
(b) A second method of checking for errors is to use check sums.
Explain how check sums are used to check data for transmission errors. [4]

Oct/NOV 2008(9691)
6. (a) State two extra pieces of hardware and one piece of software which would
be necessary to create the network. [3]
(b) A protocol will be required.
Explain what is meant by a protocol. [2]
(c) Discuss the advantages and disadvantages of networking the computers. [5]

May/June 2009(9691)
6. (a) State what is meant by the following types of data transfer:
(i) serial, [1]
(ii) parallel, [1]

(b) In a certain computer system parity checking is used to check that data has been
transferred correctly. The type of parity checking used is even parity.
Using the byte 01101001 as an example:
(i) explain what is meant by an even parity check, [2]
(ii) give an example of an error which would not be detected. [1]

Oct/NOV 2009. P11(9691)


8. (a) The machines in the tax office are networked.
State two differences between a local area network (LAN) and a wide area network
(WAN). [2]
(c) (i) State why the process known as handshaking is necessary between a
computer and the file server before use.

Page 4 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI

Topic: 1.2.1 Data transmission


Oct/NOV 2009. P12(9691)

4. (a) A medical centre has a number of stand-alone computers. It is decided that


these should be linked in a LAN.
(i) State three advantages and one disadvantage of networking the computers.
[4]
(b) Describe the additional hardware required when a LAN is connected to a WAN.
[4]

May/June 2010. P11(9691)


4. (a) Define the term protocol. [2]

May/June 2010. P12(9691)


4. (a) Define the term protocol. [2]

May/June 2010. P13(9691)


1. (b) (i) Explain why a NIC is used when a computer is to communicate with
Othercomputers. [2]
(ii) State one other piece of hardware which is needed for successful
communication to take place. Justify your answer. [2]

4. (a) Define the term protocol. [2]


(b) (i) Explain what features of a protocol need to be established before
communication can take place. [5]
Oct/NOV 2010. P11(9691)
6. (a) State two items of hardware and one item of software used to create a
local area network (LAN) with a number of computers. [3]
(c) When data is transmitted around a network it is possible that the data becomes
corrupted.
Explain how parity checking can be used to detect such transmission errors. [4]

Oct/NOV 2010. P12(9691)


6. (a) State two items of hardware and one item of software used to create a
local area network (LAN) with a number of computers. [3]
(c) When data is transmitted around a network it is possible that the data becomes
corrupted.
Explain how parity checking can be used to detect such transmission errors.[4]

Oct/NOV 2010. P13(9691)


6. (a) State two items of hardware and one item of software used to create a
local area network (LAN) with a number of computers. [3]
(c) When data is transmitted around a network it is possible that the data becomes
corrupted.
Explain how check sums can be used to detect such transmission errors. [4]

Page 5 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI

Topic: 1.2.1 Data transmission


May/June 2011. P11/12(9691)
8 (a) State two differences between a local area network (LAN) and a wide area
network(WAN). [2]
(b) State what is meant by each of the following types of data transmission. Give
anadvantage of each.
(i) Serial
(ii) Parallel [4]

(c) The following bytes were received during a data transmission.


01101101 10101010 10111101 10110001
Parity is being used as an error check.
State which one of the bytes has been corrupted. Explain why you chose the one that you
did. [3]

May/June 2011. P13(9691)


8. (a) State two differences between a local area network (LAN) and a wide area
network(WAN). [2]
(b) (i) State what is meant by data being transmitted serially using a simplex mode
ofdata transmission. [2]
(ii) State what is meant by data being transmitted in parallel using a half-duplex
mode of data transmission. [2]
(c) The following bytes were sent during a data transmission.
01101100 10101010 10110001
Explain how a check sum can be used to check whether or not the bytes have been
corrupted during transmission. [3]

Page 6 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI

Topic: 1.2.1 Data transmission


Oct/NOV 2011. P11(9691)
8 The computers in a school classroom are networked. It is decided that this network
Should be linked to the Internet.
(a) State two items of hardware and one type of software which would be necessary
To connect this network to the Internet. [3]
(b) When a video file is accessed on a network it can be watched as it is downloading
or itcan be stored for watching at a later date. [4]
Explain the relationship between the required bit rates and the data being
transmitted.
(c) When communications are required across a network a protocol is necessary.
(i) Explain the need for a handshake as part of a protocol, giving examples of
What occurs during a handshake. [3]
(ii) Explain why a protocol consists of a number of layers. [2]

Oct/NOV 2011. P12(9691)


8 A building firm has a main office with stand-alone computers for the workers to use.
It is decided to link these stand-alone computers to make a network.
(a) State two items of hardware and one type of software which would be necessary
tocreate the network. [3]
(b) When data is passed around a network it can be corrupted.
Explain how check sums can be used to detect errors in transmitted data. [4]

Oct/NOV 2011. P13(9691)


8 A factory specialises in making components for cars.
The offices of the factory have a number of stand-alone computers. The decision is taken
tolink these machines in a network.
(a) (i) State two items of hardware which would be necessary to network the
computers. [2]
(ii) State one extra item of hardware which would be required if the network was
to be linked to the Internet. [1]
(b) When data is transmitted around a network it can be corrupted.
Explain, giving examples, how parity can be used to detect errors in transmitted
data. [4]

May/June 2012. P11/12(9691)


8 (a) The manager of a firm has been advised to link all the firm’s computers to form a
LocalArea Network (LAN).
(i) Explain to the manager two benefits of connecting the computers in a LAN.
[2]
(ii) One computer is connected to its own printer using parallel data
transmission.
Explain what is meant by parallel data transmission. [2]

Page 7 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI

Topic: 1.2.1 Data transmission


May/June 2012. P13(9691)
8 (a) A firm has offices in the three major cities in a country. The manager is advised that
theLocal Area Networks (LANs) in each of the cities should be connected to provide aWide
Area Network (WAN).
(i) Explain to the manager what is meant by a WAN. [2]
(ii) Communication across a LAN is by serial data transmission. Explain what is
meant by serial data transmission. [2]
(b) When data is transmitted it may become corrupted.
(i) Explain how a parity check can be used to detect a possible error in a
transmittedbyte. [3]
(ii) Describe how parity can be used to identify and correct the single error in
thistransmitted data block:
0 1 1 0 1 1 0 1
1 0 0 1 0 1 1 1
0 1 0 1 0 1 0 0
1 0 0 0 1 0 0 1
0 1 1 0 0 0 1 1
1 0 0 0 0 1 1 0
0 1 1 0 1 1 0 1
0 1 0 0 0 0 0 0 Parity byte [3]

Oct/NOV 2012. P13(9691)


9 (a) Describe what is meant by the following types of data transmission:
(i) serial, full duplex transmission [2]
(ii) parallel, half duplex transmission [2]
(b) Define the term protocol. [2]
(c) When data is transmitted between devices it can be corrupted. One method to
Detect corruption is the use of a checksum.
Explain how a checksum can be used to detect the presence of errors in a
transmission. [4]

Page 8 of 11
The City School UZZAM
Computer Science 2210 UZZAM
ABBASI
Topical Past Papers ABBASI

Topic: 1.2.1 Data transmission


May/June 2013. P11/P12(9691)
3 (a) Describe what is meant by:
(i) serial, simplex transmission
(ii) parallel, full duplex transmission [2]
(b) The word C O M P U T I N G is to be transmitted as nine bytes of data. Each
character in the word has an ASCII value.
The system uses even parity and the left most bit is added to make each byte even
parity.
(i) Complete the codes so that they all have even parity.

[2]
(ii) Fill in the parity byte in the final row in the table above. [1]
(iii) The character ‘P’ is received incorrectly as 0 1 0 1 1 0 0 0
Describe how horizontal and vertical parity checking would be used to detect the
erroneous bit. [3]

May/June 2015. P11 (2210)


1 (a) State what is meant by the terms:
Parallel data transmission
Serial data transmission [2]
(b) Give one benefit of each type of data transmission.
Parallel data transmission
Serial data transmission [2]
2 (a) State what is meant by the term USB. [1]
(b) Describe two benefits of using USB connections between a computer and a device. [2]
(c) Give one application of each type of data transmission. Each application must be different.
Parallel data transmission Serial data transmission [2]
Page 9 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI

Topic: 1.2.1 Data transmission


May/June 2015. P12 (2210)

5 Parity checks are often used to check for errors that may occur during data transmission.
(a) A system uses even parity.
Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.

(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per character). A
tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.

(i) One of the bits has been transmitted incorrectly.


Write the byte number and column number of this bit:
Byte number
Column number [2]
(ii) Explain how you arrived at your answer for part (b)(i). [2]

Page 10 of 11
UZZAM
Computer Science 2210
Topical Past Papers ABBASI

Topic: 1.2.1 Data transmission


(c) Give the denary (base 10) value of the byte: 1 0 1 1 1 1 1 0 [1]
(d) A parity check may not identify that a bit has been transmitted incorrectly.
Describe one situation in which this could occur. [1]

May/June 2016. P12 (2210)


UZZAM
Computer Science 2210
Topical Past Papers
ABBASI

2. Describe the use of structure and presentation in a HTML document. [4]


UZZAM
Computer Science 2210
Topical Past Papers
ABBASI

You might also like