Chapter 2 Computer science

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:24 AM on 4/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

28 Terms

1
New cards

Data packets

small chunks of data that is broken down to transmit data through the internet use by the TCP (Transmission Control Protocol) 📦

2
New cards

Routing

Involves in finding the optimal path over the network 📍

3
New cards

Header

Destination IP, Originated IP, Packet number 📑

4
New cards

Payload

Actual data 💾

5
New cards

Trailer

Additional form of security or checks e.g Cyclic redundancy checks for error e.g checksum, Notification for end of the packet 🏁

6
New cards

Packet Switching

-> Method of sending and receiving data across the network. Data is broken down to packets

Each packet is assigned a Packet Number

Each packets have it's own route

Router controls the route data packets taken

Packets arrived and reordered by it's packet number 🔄

7
New cards

Packet Switching ADV

+ Less prone to interference and corruption

+ Saves time and bandwidth

+ Harder to hack the data

+ Easy to expand packet usage

+ No need a single line of communication ✅

8
New cards

Packet Switching DISADV

+ Packets can be lost and need to be resent -> Takes along time and cause corruption in data

+ Does not work for real time streaming -> Delay in the destination as packets need to be reordered ⚠️

9
New cards

Serial data transmission

Data are sent one bit at a time down a single line/wire/channel

+ This means less risks of interference as used only one line

+ More reliable over long distances

+ Transmit bits will not be skewed (not synchronised)

+ Used if the amount of data sent is small and only need low transmission rate/speed

+ Less expensive less requirements for hardware 🧵

10
New cards

Parallel data transmission

Several bits of data are sent down several channels at the same time-> each wire transmit each bit

+ Faster rate of transmission over short distances e.g internal computer components

+ Data can be skewed not synchronised when being transmitted

+ Data can also experienced a cross talk, an event of a bit flip can happen

+ Used when data sent is in large amounts

+ Requires alot of hardware 🚥

11
New cards

Simplex

data travel in one direction only e.g sending data to printer ➡️

12
New cards

Half-duplex

Data is sent in either direction but not at the same time e.g a walkie talkie 📶

13
New cards

Full-Duplex

Sent in both directions at the same time 🔄

14
New cards

Universal Serial Bus (USB)

type of Serial data transmission, an industry standard 🔌

15
New cards

USB ADV

+ Device are automatically detected and device drivers will be automatically uploaded

+ An industry standard with wide use + support different transmission rates

+ No need external power supplies

+ easy to add more USB ports with USB hubs

+ Backward compatible with previous versions + No need screw like VGA or other type of old cables ✨

16
New cards

USB DISADV

+Only supports 5m cable length over that error will occur + Veryold USB version will not be able to bu supported + Data transfer slow in comparison to the ethernet or other types of transmission methods ⏳

17
New cards

USB-C

Newer version of the USB with a round appearance and no orientation, much smaller and thinner than USB A that offers charging to laptops and phones, can carry data at a whopping 10Gbps of speed and not to mention it is backwards compatible too ⚡

18
New cards

Parity check

Method of error detection where the computer adds an extra parity bit to check for it's standard of use wether the data has experienced a bit flip which have two situation an ODD or an EVEN 🔢

19
New cards

Parity blocks

An upgraded version of parity bit where they add a new vertical columns to check in a two dimensional board to check for ODD or EVEN 📊

20
New cards

Check Sum

+ A Calculation is performed by the sending computer and attached at the trailer of the data packet using the agreed checksum algorithm

+ The data is then sent along the routes

+ The computer then checks the check sum at the trailer attached by the sending computer with their own calculation

+ An differences of colculatiosn mean the data have an error 🧮

21
New cards

Echo check

+ WHen the received computer received the data it made a copy of the data + The copied data is the sent abc by the sender + A comparison is performed between two data the original and the one sent back + The difference indicate an error -> It is entirely unclear where the data is corrupted at 🗣️

22
New cards

ARQ (Automate Repeat Request)

+ The receiving device gets the data block + Is no error detected a positive ack is sent back + If an error is detected the receiving device send a negative ack and request resent + If the sending device experienced a time out the data will be transmitted anagin and again until ackgnowledments are made or after a number of transmission 🔁

23
New cards

Check digit

A single digit is input to verify data integrity during transmission and input -> Error input could be +Incorrect digit entered + Transposition of digits +omitted or extra digits + Phonetics error of digits 🔍

24
New cards

Encryption

Makes the data unreadable so no body could read it, Used to prevent interception of data from hackers and eavesdropper 🔐

25
New cards

Plaintext

Original data 📄

26
New cards

Ciphertext

data which are encrypted 🔏

27
New cards

Symmetric encryption

+ Uses a single encryption key The same key is used to both encrypt and decrypt the data + The key is then used by the sender and sended to the receiver for decryption 🔑

28
New cards

Asymmetric encryption

+ Uses two keys Public and Private key -> Matching pairs of key is generated by the encryption algorithm + The receiver will send the public key to encrypt the data for the dender the sender then send the data to the sender who haves the private key to decrypt it. 🗝️