0% found this document useful (0 votes)
0 views

Department of Computer Science

The document outlines an assignment for students in the Department of Computer Science and ICT, focusing on computer networking and data representation. It includes definitions, comparisons, explanations of protocols, and various tasks related to data security, internet services, and binary operations. The assignment is due by November 5th and emphasizes the use of personal research without AI assistance.

Uploaded by

tebidnerus05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Department of Computer Science

The document outlines an assignment for students in the Department of Computer Science and ICT, focusing on computer networking and data representation. It includes definitions, comparisons, explanations of protocols, and various tasks related to data security, internet services, and binary operations. The assignment is due by November 5th and emphasizes the use of personal research without AI assistance.

Uploaded by

tebidnerus05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Department of Computer Science and ICT

First sequence test

Mode: Assignment

Instruction: Do research on the topics on networking and Data representation combine ideas with notes and provide
comprehensive unique answers to the questions

Deadline: this assignments shall be submitted on or before November 5th.

Part A: Computer networking and Data communication


1. Define the following terms as used in networking
a. Computer Network
b. Workstation
c. Node
d. Protocol
e. Internet
f. Topology
g. Modulation
h. Multicast
i. Multiplexer
j. Security
2. Differentiate between the following pairs providing diagrams where applicable:
i. Client/server and peer-to-peer architecture
ii. Star topology and token ring topology
iii. Half duplex and simplex transmission mode
iv. Serial and parallel communication
v. Synchronous and asynchronous data communication
vi. TCP and UDP protocol
vii. LAN and WAN
viii. OSI and TCP/IP reference models
ix. Symmetric and asymmetric data encryption
x. Ipv4 and ipv6 address
xi. Data verification and validation
3. Briefly explain the different layers stating the protocols involve in the OSI model
4. What is a parity bit and how is a parity bit implemented in error detection and correction
5. Data security is essential in every IT institution explain what the following terms are and how they can be used to
enforced security in a system
i. Authentication
ii. Authorization
iii. Availability
iv. Integrity
v. Confidentiality
vi. Firewalls
6. What is data backup, explain three types of backup techniques
7. Network connection can either be wired or wireless, wireless network uses wave principles to propagate signals
from one transmitter antenna to a recievers antenna. These signals can either be analogue or digital and require a
repeater to amplify them over longer distances. Define wired transmission explain the different types of cables
used
8. Merge topology is known for its fault tolerant and redundant cabling. How many links or cables are required to
build a merge network of 13 computers
9. What is internet and what are some of the services provided on the internet
10. https://www.computer-dept-ccc.com/home-page is a URL use to access the web document on the internet
through the browser
i. What is a URL
ii. Explain the various part of the URL
iii. Computers understand ip address which are sequence of numbers rather than url. Which protocol is
responsible for mapping domains found in url to ip addresses
iv. Which language is used to structure and build webpages
v. Which protocol is responsible for uploading and downloading files on the internet
vi. What is web cookies and what is it significance
vii. What is a ISP and give three ISP in Cameroon
viii. Define and give examples social media and whats is its negative influence in the society
ix. Name three cybercrimes and measures to combat them

Part 2: Data Representation

1. Define the following terms


i. Binary notation
ii. Machine language
iii. Encoding
iv. ASCII
v. EBCDIC
vi. BCD
2. Differentiate between
i. Binary and Hexadecimal number system
ii. AND and OR gates
iii. NOT and NOR gates
iv. Truth table and Boolean expressions
3. State De Morgan’s laws
4. Covert the following:
i. 2FA base 16 to Octal
ii. 1001011 base 2 to hexadecimal
iii. 236 base 8 to denary
5. Perform the following binary operations in a 8 bit sytem
i. Add 10110 to 10111
ii. Substract 1011 from 10000
iii. 2’ compliment of 101101
6. A digital system is describe by the equation F = A’.B’ +A.B
i. Construct a truth table of the system
ii. Design a logic circuit for the system

Use available resources like Notes given, text books and internet to answer the question
NB: don’t use Ai
Good luck

You might also like