Cambridge IGCSE and O Level Computer Science Second Edition

Created by Harvey

p.8

What are the risks during data transmission?

Click to see answer

p.8

Data may be corrupted, lost, or even gained.

Click to see question

1 / 195
p.8
Error Detection Methods

What are the risks during data transmission?

Data may be corrupted, lost, or even gained.

p.2
Packet Switching

What is packet switching?

A method of data transmission in which a message is broken up into packets that can be sent independently.

p.8
Error Detection Methods

Why is it important to check for errors in data transmission?

Computers cannot understand corrupted text, making error checking essential.

p.10
Error Detection Methods

What was the original byte sent in the example provided?

0 1 0 1 1 1 0 0.

p.3
Packet Switching

What is the main function of Computer 'B' in data transmission?

To reassemble packets into the original sequence.

p.1
Packet Structure

What is the purpose of splitting data into packets during transmission?

To facilitate reassembly of the data at its destination.

p.13
Error Detection Methods

What happens at the receiving end during checksum verification?

The checksum is recalculated and compared to the transmitted checksum.

p.10
Error Detection Methods

How is an error detected by the recipient's computer in parity checking?

By re-calculating the parity of the received byte.

p.17
Encryption: Symmetric and Asymmetric

In symmetric encryption, what type of key is used?

The same key is used for both encryption and decryption.

p.17
Encryption: Symmetric and Asymmetric

How does a simple symmetric encryption key function?

It shifts letters in a word across the alphabet by specific amounts.

p.1
Packet Structure

What information is included in the packet header?

IP addresses of sender and receiver, packet size, sequence number.

p.14
Error Detection Methods

What is the final step to determine the check digit in ISBN 13?

If the remainder from division by 10 is zero, that is the check digit; otherwise, subtract the remainder from 10.

p.1
Packet Structure

What does the payload of a packet contain?

The actual data being sent, usually about 64 KiB.

p.18
Encryption: Symmetric and Asymmetric

What is a significant issue with symmetric encryption?

Keeping the encryption key a secret.

p.8
Error Detection Methods

Name three methods used to check for errors in data transmission.

Parity checks, checksum, echo check.

p.6
Universal Serial Bus (USB)

What does USB stand for?

Universal Serial Bus.

p.14
Error Detection Methods

In which system is the check digit the thirteenth digit?

ISBN 13.

p.14
Error Detection Methods

What is the first step in generating the check digit for ISBN 13?

Add all the odd numbered digits together.

p.9
Error Detection Methods

What bit in a byte is reserved for the parity check?

The parity bit, usually the most significant bit.

p.12
Error Detection Methods

What is the role of a parity byte in data transmission?

To provide a check against errors in the transmitted data.

p.3
Packet Switching

What is the purpose of hop numbers in packet transmission?

To limit the number of routers a packet can traverse before being deleted if it hasn't reached its destination.

p.15
Error Detection Methods

In the modulo-11 method, what weight is assigned to the first digit?

p.16
Error Detection Methods

What is the process to determine if an eight-digit number is correct?

Multiply each digit by its weighting, sum the values, divide by 11, and check if the remainder is zero.

p.13
Error Detection Methods

What is a checksum?

A method used to check if data has been changed or corrupted following data transmission.

p.4
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What is simplex data transmission?

Data can be sent in one direction only, like from a computer to a printer.

p.13
Error Detection Methods

What is an echo check?

A method where data is sent back to the sender for comparison to check for errors.

p.2
Packet Switching

Why might packets arrive in a different order at the destination?

Because each packet can take its own independent route in the network.

p.5
Serial vs. Parallel Data Transmission

What is parallel data transmission?

A method where several bits of data are sent down several channels/wires simultaneously.

p.17
Encryption: Symmetric and Asymmetric

What is an example of sensitive data that requires encryption?

Credit card or bank details.

p.19
Encryption: Symmetric and Asymmetric

What do all five workers need to do for two-way communication?

Each worker needs to generate their own matching public and private key pair and exchange their public keys.

p.19
Encryption: Symmetric and Asymmetric

What is ciphertext in the context of encryption?

An encrypted message.

p.19
Encryption: Symmetric and Asymmetric

What is the purpose of sharing public keys among users?

To enable secured encrypted communication between them.

p.3
Packet Switching

What is circuit switching?

Another method of sending packets that differs from packet switching.

p.11
Error Detection Methods

What happens when an error is flagged in the transmission?

It becomes impossible to know exactly which bit is in error without additional methods.

p.16
Automatic Repeat Requests (ARQ)

What happens if an error is detected in ARQ?

The receiving device sends a negative acknowledgement and requests re-transmission of the data.

p.12
Error Detection Methods

What is the purpose of identifying the incorrect bit in a transmitted data block?

To correct the error and ensure accurate data transmission.

p.2
Packet Switching

What role do routers play in packet switching?

Routers receive data packets and determine their next route based on the header information.

p.9
Error Detection Methods

What is the purpose of parity checking?

To check whether data has been changed or corrupted following data transmission.

p.9
Error Detection Methods

What are the two types of parity in parity checking?

Even parity and odd parity.

p.4
Serial vs. Parallel Data Transmission

What is a key advantage of serial data transmission?

It works well over long distances and data arrives fully synchronized.

p.2
Packet Switching

What considerations do routers take into account when selecting a route for a packet?

They may select the shortest available path, considering congestion at different nodes.

p.4
Serial vs. Parallel Data Transmission

What is parallel data transmission?

Data is sent multiple bits at a time over multiple wires/channels.

p.4
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

Can serial data transmission be simplex, half-duplex, or full-duplex?

Yes, serial data transmission can be any of these types.

p.11
Error Detection Methods

What indicates that an error has occurred in the parity block method?

A change in parity from even to odd in any row or column.

p.5
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What characterizes full-duplex transmission?

Data can be sent in both directions simultaneously.

p.21
Encryption: Symmetric and Asymmetric

What is an eavesdropper?

Another name for a hacker who intercepts data being transmitted over a network.

p.20
Packet Structure

What is meant by 'payload' in a data packet?

The actual data being carried in a data packet.

p.21
Encryption: Symmetric and Asymmetric

What is a private key?

An encryption key that is known only to a single user or computer.

p.17
Encryption: Symmetric and Asymmetric

What is the primary purpose of encryption?

To minimize the risk of data interception by eavesdroppers.

p.4
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What is half-duplex data transmission?

Data can be sent in both directions but not at the same time, like a walkie-talkie.

p.10
Error Detection Methods

When using even parity, how many 1-bits does the byte contain if it has even parity?

An even number of 1-bits.

p.10
Error Detection Methods

In the provided example, what could happen if more than one bit changes during data transmission?

It may be impossible to locate the error using parity checking.

p.14
Error Detection Methods

How do you generate the check digit using ISBN 13?

Add odd digits, multiply the sum of even digits by 3, and combine the results to find the check digit.

p.11
Error Detection Methods

What is the purpose of parity blocks in error detection?

To identify not only that an error has occurred but also where it is located.

p.11
Error Detection Methods

How does the parity block method work?

It totals the number of 1-bits horizontally and vertically to check for errors.

p.1
Packet Structure

What is the role of the packet trailer?

To identify the end of the packet and provide error checking.

p.5
Serial vs. Parallel Data Transmission

Why is parallel data transmission preferred within a computer's internal circuits?

Because distances are short and high-speed transmission is essential.

p.6
Serial vs. Parallel Data Transmission

Why is serial transmission considered less expensive than parallel?

It has fewer hardware requirements.

p.20
Packet Structure

What does the packet trailer indicate?

The end of the data packet and includes the cyclic redundancy check (CRC) for error checking.

p.21
Encryption: Symmetric and Asymmetric

What is symmetric encryption?

A type of encryption where the same key is used for both encrypting and decrypting a message.

p.7
Error Detection Methods

What is a benefit of using the USB protocol for data transmission?

It notifies the transmitter to re-transmit data if errors are detected.

p.10
Error Detection Methods

What indicates an error when using even parity during data transmission?

An odd number of 1-bits at the receiver's end.

p.12
Error Detection Methods

How can an error in a byte be automatically corrected during data transmission?

By adjusting the incorrect bit according to the parity check.

p.17
Encryption: Symmetric and Asymmetric

What do we call data after it has been encrypted?

Ciphertext.

p.13
Error Detection Methods

What are the limitations of echo check?

It is not very reliable as it's unclear when an error occurred during the original or returned transmission.

p.19
Encryption: Symmetric and Asymmetric

Why is asymmetric encryption considered more secure than symmetric encryption?

It allows the use of a public key for encryption and a private key for decryption, eliminating the need to share a secret key.

p.19
Encryption: Symmetric and Asymmetric

What can Jane do with her public key?

She can exchange it with anyone to receive encrypted messages that can be decrypted with her private key.

p.1
Packet Structure

What is the sequence number in a packet used for?

To ensure packets can be reassembled in the correct order.

p.18
Encryption: Symmetric and Asymmetric

How does the decryption process in symmetric encryption work?

It is the reverse of encryption with each letter shifted by a negative value.

p.17
Encryption: Symmetric and Asymmetric

What is the difference between plaintext and ciphertext?

Plaintext is readable data, while ciphertext is unreadable data after encryption.

p.6
Serial vs. Parallel Data Transmission

What is a disadvantage of parallel data transmission?

It can have skewed bits due to multiple channels.

p.9
Error Detection Methods

What is the parity bit for the byte 1110000 using even and odd parity?

Even parity bit is 1, odd parity bit is 0.

p.5
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What does simplex data transmission entail?

Data is sent one bit at a time in one direction only.

p.16
Error Detection Methods

What is typically used as an error detection code in ARQ?

Cyclic Redundancy Check (CRC).

p.21
Encryption: Symmetric and Asymmetric

What is the process of encryption?

Making data meaningless using encryption keys, which cannot be decoded without the correct decryption key.

p.21
Encryption: Symmetric and Asymmetric

What is asymmetric encryption?

A type of encryption that uses public and private keys to secure data.

p.20
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What is full-duplex transmission?

Data that can be sent in both directions simultaneously.

p.14
Error Detection Methods

What is the purpose of check digits in data transmission?

To identify errors in data entry caused by mis-typing or mis-scanning a barcode.

p.12
Error Detection Methods

What parity was used in Activity 2.6 for the first block of data?

Odd parity.

p.6
Universal Serial Bus (USB)

What type of data transmission does USB use?

Serial data transmission.

p.15
Error Detection Methods

What is the purpose of the check digit in an ISBN number?

To verify that the 13-digit code is correct.

p.12
Error Detection Methods

In the second block of data, which type of parity was used?

Even parity.

p.9
Error Detection Methods

How is the parity bit set for even parity?

To 0 if there is already an even number of 1-bits in the byte.

p.9
Error Detection Methods

How is the parity bit set for odd parity?

To 1 if there is already an even number of 1-bits in the byte.

p.9
Error Detection Methods

What agreement needs to be established before data transfer regarding parity checks?

An agreement between sender and receiver about which type of parity is being used.

p.9
Error Detection Methods

What is the parity bit for the byte 1101101 using even parity?

1, since it should have an even number of 1-bits.

p.1
Error Detection Methods

How does the CRC method ensure data integrity?

By comparing the number of 1-bits in the payload between sender and receiver.

p.19
Encryption: Symmetric and Asymmetric

How does asymmetric encryption enhance security?

It ensures that even if the public key is shared widely, only the owner of the private key can decrypt messages.

p.21
Automatic Repeat Requests (ARQ)

What does 'timeout' refer to in the context of ARQ?

The time interval allowed to elapse before an acknowledgement is received.

p.18
Encryption: Symmetric and Asymmetric

Why can't Jane use the public key to decrypt the message?

Because the private key is required for decryption.

p.21
Encryption: Symmetric and Asymmetric

What is ciphertext?

Encrypted data resulting from applying an encryption algorithm to plaintext.

p.7
Universal Serial Bus (USB)

Why might very early USB standards (V1) not always be supported by the latest computers?

Compatibility issues with older versions.

p.8
Error Detection Methods

What is an example of corrupted text?

The sentence with jumbled letters: 'Can you raed tihs?'

p.2
Packet Switching

What happens to a photograph sent from computer 'A' to computer 'B' in packet switching?

It is split up into several packets before being sent.

p.14
Error Detection Methods

What is an example of a transposition error?

Entering 5037 instead of 5307.

p.19
Encryption: Symmetric and Asymmetric

What needs to happen for Jane to send encrypted documents back to Tom?

Jane needs to generate her own public and private key pair and share her public key with Tom.

p.11
Error Detection Methods

What method is suggested to complement parity for error checking?

Checksum.

p.15
Error Detection Methods

How do you verify an ISBN number using the check digit?

Add the results of odd and even digit sums and divide by 10; the number is correct if the remainder is zero.

p.15
Error Detection Methods

What is the modulo-11 method used for?

Generating and verifying check digits for varying lengths of numbers, such as product codes or VINs.

p.16
Error Detection Methods

What is the first step in recalculating the check digit for an eight-digit number?

Assign each digit a weighting from 8 to 1 starting from the left.

p.18
Encryption: Symmetric and Asymmetric

What are the two keys used in asymmetric encryption?

Public key and private key.

p.5
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

In half-duplex transmission, how is data sent?

Data is sent one bit at a time in one direction only.

p.18
Encryption: Symmetric and Asymmetric

What is the purpose of the matching pair of keys in asymmetric encryption?

To encrypt and decrypt messages securely.

p.7
Universal Serial Bus (USB)

What is the maximum power connectivity offered by USB-C?

100 watts (20 volts).

p.7
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What type of data transmission occurs in simplex mode?

Data is transmitted one bit at a time.

p.20
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What is half-duplex transmission?

Data that can be sent in both directions but not at the same time.

p.1
Packet Structure

What are the three main components of a typical packet?

Header, Payload, Trailer.

p.8
Error Detection Methods

How does the human mind read jumbled text?

It recognizes the first and last letters, but not every letter individually.

p.14
Error Detection Methods

What types of errors can check digits typically detect?

Incorrect digits, transposition errors, omitted or extra digits, and phonetic errors.

p.2
Packet Switching

What determines which route a packet will take in a network?

The destination IP address and the number of packets waiting at each node.

p.3
Packet Switching

What are some benefits of packet switching?

No need to tie up a single communication line, overcoming failed lines, easy expansion, and high data transmission rates.

p.13
Error Detection Methods

What is a check digit?

The final digit in a code calculated from all other digits in that code.

p.5
Serial vs. Parallel Data Transmission

How does parallel data transmission differ from serial data transmission?

Parallel transmission sends multiple bits at once, while serial sends one bit at a time.

p.18
Encryption: Symmetric and Asymmetric

What must be done to retrieve the original message in symmetric encryption?

Apply the same decryption key.

p.17
Encryption: Symmetric and Asymmetric

What is the effect of applying an encryption algorithm to plaintext?

It converts it into an unreadable form (ciphertext).

p.5
Serial vs. Parallel Data Transmission

What issues can arise with parallel data transmission over long distances?

Data can become skewed, arriving unsynchronized or out of order.

p.15
Error Detection Methods

What is the final step to find the check digit in the modulo-11 method?

Subtract the remainder from 11.

p.16
Automatic Repeat Requests (ARQ)

What is the purpose of Automatic Repeat Requests (ARQs)?

To verify that data has arrived at its destination unchanged.

p.18
Encryption: Symmetric and Asymmetric

How many possible combinations does a 256-bit binary encryption key provide?

Approximately 1.2 × 10^77 combinations.

p.7
Error Detection Methods

According to the statement, do packets require error checking?

False.

p.20
Packet Switching

What does a router do?

Moves data packets between different networks, such as connecting a LAN to a WAN.

p.20
Serial vs. Parallel Data Transmission

What is parallel data transmission?

Sending data down several channels/wires several bits at a time.

p.8
Error Detection Methods

What causes data corruption during transmission?

Interference, problems during packet switching, and skewing of data.

p.13
Error Detection Methods

How is a checksum calculated?

Using an agreed algorithm from the block of data before transmission.

p.13
Error Detection Methods

What indicates that no transmission errors have occurred using a checksum?

If the recalculated checksum matches the transmitted checksum.

p.12
Error Detection Methods

What might be relayed back to the sender if an error is detected in the transmitted block?

An error message asking them to re-transmit the block of data.

p.4
Serial vs. Parallel Data Transmission

How does serial data transmission work?

Data is sent one bit at a time over a single wire/channel.

p.3
Packet Switching

What are some drawbacks of packet switching?

Packets can be lost, prone to errors in real-time streaming, and delays while re-ordering packets at the destination.

p.3
Packet Switching

What issue can cause packets to get lost in a network?

Packets may keep 'bouncing' around from router to router without reaching their destination.

p.6
Universal Serial Bus (USB)

What happens when a device is plugged into a USB port?

The computer automatically detects the device and loads the appropriate driver software.

p.3
Packet Switching

What happens when a packet's hop number reaches zero?

The packet is deleted when it reaches the next router.

p.15
Error Detection Methods

What happens if the remainder is 10 when calculating a check digit using the modulo-11 method?

The check digit is represented by 'X'.

p.16
Error Detection Methods

What happens if the remainder is zero when checking the eight-digit number?

The number is considered correct.

p.18
Encryption: Symmetric and Asymmetric

What key does Jane use to decrypt the document sent by Tom?

Her private key.

p.16
Automatic Repeat Requests (ARQ)

What is a timeout in the context of ARQ?

The time interval allowed to elapse before receiving an acknowledgement.

p.16
Automatic Repeat Requests (ARQ)

What does a sending device do if no acknowledgement is received in ARQ?

It automatically re-sends the data until a positive acknowledgement is received or a pre-determined number of re-transmissions has been reached.

p.7
Serial vs. Parallel Data Transmission

Does serial data transmission suffer from data skewing?

True.

p.20
Data Transmission Basics

What is real-time streaming?

The transmission of data over a network for live events where data is sent as soon as it is received.

p.10
Error Detection Methods

In a byte transmitted using even parity, how many 1-bits would indicate a transmission error if received byte has an odd count?

An odd number of 1-bits.

p.10
Error Detection Methods

What is the resulting number of 1-bits in the received byte if an error occurs in the provided example?

Three 1-bits (odd parity).

p.3
Packet Switching

What is packet switching?

A method of data transmission where packets are sent over various paths and reassembled at the destination.

p.6
Universal Serial Bus (USB)

What are the two types of data transmission allowed by USB?

Half-duplex and full-duplex.

p.2
Packet Switching

What must happen to packets once they reach their destination in packet switching?

They need to be reassembled into their correct order using the header information.

p.6
Universal Serial Bus (USB)

What do the white and green wires in a USB cable transmit?

Data.

p.17
Encryption: Symmetric and Asymmetric

What is an eavesdropper?

A hacker who intercepts data transmitted over a network.

p.5
Serial vs. Parallel Data Transmission

Over what distances does parallel data transmission work well?

Over short distances.

p.6
Serial vs. Parallel Data Transmission

Which data transmission method is preferred for longer distances?

Serial.

p.9
Error Detection Methods

What is the parity bit for the byte 0001111 using odd parity?

0, since it should have an odd number of 1-bits.

p.21
Automatic Repeat Requests (ARQ)

What is the Automatic Repeat Request (ARQ) method?

A method of checking transmitted data for errors, using acknowledgement and timeout to request re-sending of data if no acknowledgment is received in time.

p.7
Universal Serial Bus (USB)

What is the new type of USB connector becoming common?

USB-C.

p.21
Error Detection Methods

What is the purpose of an echo check?

To check if data has been transferred correctly by sending data to a receiver and immediately getting it sent back for verification.

p.7
Universal Serial Bus (USB)

What data transfer speed can USB-C support?

10 gigabits per second (10 Gbps).

p.20
Error Detection Methods

What is cyclic redundancy check (CRC)?

An error checking method that adds all 1-bits in the data packet payload and stores the total in the packet trailer.

p.21
Encryption: Symmetric and Asymmetric

What is a public key?

An encryption key that is known to all users.

p.20
Error Detection Methods

What is a parity check?

A method used to check if data has been transferred correctly, using even or odd parity.

p.17
Encryption: Symmetric and Asymmetric

What is the original data called before encryption?

Plaintext.

p.4
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What is full-duplex data transmission?

Data can be sent in both directions simultaneously, like in a broadband internet connection.

p.12
Error Detection Methods

What does even vertical parity ensure in data transmission?

It ensures that the number of 1-bits in a byte is even.

p.6
Universal Serial Bus (USB)

What is the purpose of the red and black wires in a USB cable?

For power supply.

p.13
Error Detection Methods

Where are check digits commonly used?

In barcodes, such as International Standard Book Numbers (ISBN) and Vehicle Identification Numbers.

p.5
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What types of data transmission can parallel data transmission be?

Simplex, half-duplex, or full-duplex.

p.6
Serial vs. Parallel Data Transmission

What is a notable difference between serial and parallel data transmission?

Serial has less risk of external interference than parallel.

p.3
Packet Switching

What request is made by the receiving computer for missing packets?

A request to re-send the missing packets.

p.11
Error Detection Methods

Which byte and bit showed incorrect parity in the example given?

Byte 8 (row 8) and Bit 5 (column 5).

p.1
Error Detection Methods

What happens if the CRC values do not match during packet reception?

The packet needs to be re-sent.

p.20
Packet Structure

What is contained in the packet header?

The IP addresses of the sender and receiver, along with the packet number for reassembly.

p.21
Encryption: Symmetric and Asymmetric

What is plaintext in encryption?

The original text/message before it is encrypted.

p.7
Universal Serial Bus (USB)

What is a significant drawback of USB connections?

Standard USB only supports a maximum cable length of 5 meters.

p.20
Checksum and Parity Checks

What is a checksum?

A verification method used to check if transferred data has been altered or corrupted, calculated from the data block.

p.11
Error Detection Methods

What is the limitation of using even parity for error detection?

It can miss identifying errors if the byte retains even parity despite being corrupted.

p.15
Error Detection Methods

What is the first step in calculating the check digit for an ISBN?

Add all the odd-numbered digits together, including the check digit.

p.4
Serial vs. Parallel Data Transmission

What is a disadvantage of serial data transmission compared to parallel?

It transmits data at a slower rate.

p.12
Error Detection Methods

What can be concluded if the calculated parity of a byte does not match the expected parity?

There is an error in that byte.

p.11
Error Detection Methods

What does a parity byte consist of?

Parity bits produced by the vertical parity check, indicating the end of the data block.

p.1
Error Detection Methods

What error checking method is commonly used in packet transmission?

Cyclic Redundancy Check (CRC).

p.19
Encryption: Symmetric and Asymmetric

What is required for secure two-way communication between all five workers?

Each worker must swap public keys with all others.

p.21
Automatic Repeat Requests (ARQ)

What is an acknowledgement in data transmission?

A message sent to the sender indicating that data has been received correctly, used in the ARQ error detection method.

p.18
Encryption: Symmetric and Asymmetric

What problem does the modulo-11 system address in symmetric encryption?

The key distribution problem.

p.7
Universal Serial Bus (USB)

Is USB-C backward compatible?

Yes, with USB 2.0 and 3.0 using a suitable adaptor.

p.20
Packet Switching

What is a node in a network?

Stages in a network that can receive and transmit data packets; routers are examples of nodes.

p.21
Data Transmission Basics

What is a quantum computer?

A computer capable of performing fast calculations based on probability, potentially processing more data than traditional computers.

p.19
Encryption: Symmetric and Asymmetric

What do users do with their private keys?

They use their private keys to decrypt information sent to them.

p.15
Error Detection Methods

How is the check digit calculated from a 7-digit number in the modulo-11 method?

Each digit is multiplied by its weighting, summed, divided by 11, and the remainder is used to find the check digit.

p.7
Universal Serial Bus (USB)

How many pins does the USB-C connector have?

24 pins.

p.16
Automatic Repeat Requests (ARQ)

In which networks is ARQ often used?

Mobile phone networks to guarantee data integrity.

p.20
Packet Switching

What is packet switching?

A method of transmission where a message is broken into many data packets sent independently along different pathways.

p.7
Universal Serial Bus (USB)

What is a limitation of USB-C compared to Ethernet connections?

USB data transfer rates are slower compared to Ethernet.

p.18
Encryption: Symmetric and Asymmetric

What is the public key used for in asymmetric encryption?

It is made available to everybody for encrypting messages.

p.16
Automatic Repeat Requests (ARQ)

How does ARQ use acknowledgements?

It uses positive and negative acknowledgements to indicate if data has been received correctly.

p.20
Packet Structure

What is a data packet?

A small part of a message/data transmitted over a network, which can be reassembled at the destination.

p.7
Universal Serial Bus (USB)

What is the maximum cable length supported by standard USB?

5 meters or less.

p.20
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What is simplex transmission?

Data that can be sent in one direction only.

p.21
Error Detection Methods

What is a check digit?

An additional digit appended to a number to verify if the entered number is error-free.

p.7
Transmission Modes: Simplex, Half-Duplex, Full-Dup...

What does full-duplex data transmission involve?

Sending 8 bits of data at a time.

p.20
Serial vs. Parallel Data Transmission

What is serial data transmission?

Sending data down one channel/wire one bit at a time.

Study Smarter, Not Harder
Study Smarter, Not Harder