1.2.1 Data transmission
1.2.1 Data transmission
Page 1 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI
Oct/NOV 2003(9691)
7. A college has a number of stand-alone machines. The decision is taken to turn them into a
LAN.
(a) State two items of hardware and one of software which will be necessary for the
conversion. [3]
(b) Explain why students find that access to text based files does not cause a
problem,while graphics files download very slowly. [2]
(c) State two advantages and two disadvantages of the college converting to a
network system. [4]
(d) (i) Explain why a protocol is needed for this network. [4]
May/June 2004(9691)
5. (b) (i) Describe how buffers and interrupts are used in the transfer of data
from primary memory to secondary storage. [5]
(ii) State which of the modes of data transmission would be most suitable for
theprocedure in (i), justifying your answer. [2]
Oct/NOV 2004(9691)
5. (a) State what is meant by a protocol. [2]
(b) Describe two features of a protocol necessary for the successful transmission of
databetween two devices. [4]
Page 2 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI
Oct/NOV 2005(9691)
5. (a) Errors can occur when data is transmitted from one device to another.
Explain how achecksum can be used to monitor a transmission for errors. [3]
May/June 2006(9691)
4. (a) State two ways in which a local area network (LAN) differs from a wide area
network (WAN). [2]
(c) (i) Explain what is meant by the term protocol. [2]
Oct/NOV 2006(9691)
5. (a) State what is meant by the following types of data transmission.
(iii) Serial.
(iv) Parallel. [4]
(c) State two of the modes of data transmission mentioned in part (a) which would be
used to transfer data from primary memory to a hard drive. Give reasons for your
answers. [4]
6. Authors send books to a publishing company. At this stage books are text documents with
anyillustrations being added at the end of the publishing process.
When a book is sent to the company by an author, it is sent in hard copy form as well as on adisk.
It is read and, if accepted, is then sent electronically to a person called a copy editor. Thecopy
editor reformats the text to make it suitable for publication.
(a) Explain why the original copy of the book is in
(i) hard copy form; [2]
(ii) electronic form on a disk. [2]
7. (b) (ii) During transmission data can be corrupted. Check sums and parity
checks can be carried out on the data.
Explain how check sums and parity checks are used to detect transmission errors.
[4]
Page 3 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI
Oct/NOV 2007(9691)
11. The data which is transmitted between survey sites and head office is liable to errors. Data
which is received is checked for errors.
(a) One method of checking for errors is to use parity checks.
The following four bytes have been received:
01101001 10111100 10101010 00100100
(i) One of the bytes contains an error. State which byte. [1]
(ii) Explain your choice of answer in (i). [2]
(iii) Explain why a byte may still be in error even if it passes the parity test.[1]
(b) A second method of checking for errors is to use check sums.
Explain how check sums are used to check data for transmission errors. [4]
Oct/NOV 2008(9691)
6. (a) State two extra pieces of hardware and one piece of software which would
be necessary to create the network. [3]
(b) A protocol will be required.
Explain what is meant by a protocol. [2]
(c) Discuss the advantages and disadvantages of networking the computers. [5]
May/June 2009(9691)
6. (a) State what is meant by the following types of data transfer:
(i) serial, [1]
(ii) parallel, [1]
(b) In a certain computer system parity checking is used to check that data has been
transferred correctly. The type of parity checking used is even parity.
Using the byte 01101001 as an example:
(i) explain what is meant by an even parity check, [2]
(ii) give an example of an error which would not be detected. [1]
Page 4 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI
Page 5 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI
Page 6 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI
Page 7 of 11
Computer Science 2210 UZZAM
Topical Past Papers
ABBASI
Page 8 of 11
The City School UZZAM
Computer Science 2210 UZZAM
ABBASI
Topical Past Papers ABBASI
[2]
(ii) Fill in the parity byte in the final row in the table above. [1]
(iii) The character ‘P’ is received incorrectly as 0 1 0 1 1 0 0 0
Describe how horizontal and vertical parity checking would be used to detect the
erroneous bit. [3]
5 Parity checks are often used to check for errors that may occur during data transmission.
(a) A system uses even parity.
Tick (✓) to show whether the following three bytes have been transmitted correctly or
incorrectly.
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data.
The word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per character). A
tenth byte, the parity byte, was also transmitted.
The following block of data shows all ten bytes received after transmission. The system uses
even parity and column 1 is the parity bit.
Page 10 of 11
UZZAM
Computer Science 2210
Topical Past Papers ABBASI