IGCSE Computer Science C2

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Describe the structure of a data packet.

1) header (IP addresses, packet number, size),

Consists of: 

  • IP addresses of sender and receiver 

  • Packet number 

  • Sequence number of the packet (for correct reassembly at destination) 

  • Size of packet (ensures receiving data has received all data) 

2) payload (actual data),

Consists of: 

  • The actual data being sent in the packet

3) trailer (end-of-packet marker and error check)

.Consists of: 

  • Method of identifying end of packet (allows each packet to be separated as they travel from sending to receiving station) 

  • An error checking method

2
New cards

Describe the process of packet switching.

  1. Data is broken down into packets to be transmitted 

  1. Each packet takes its own route 

  1. A router controls the route a packet takes (using destination IP address in header) 

  • Router selects the shortest path available  

  1. Packets may arrive out of order at destination 

  1. Once the last packet has arrived, packets are reordered (using packet number in header) 

  1. If packet is missing/corrupted, it is requested 

3
New cards

Describe how data is transmitted between devices.

Data is transmitted over wired or wireless media using:

  • serial or parallel methods and

  • simplex, half-duplex, or full-duplex directions.

4
New cards

Explain simplex transmission with an example.

Data flows in one direction only (e.g., computer to printer).

5
New cards

Explain half-duplex transmission with an example.

Data flows both ways, but NOT at the same time

(e.g., walkie-talkie).

6
New cards

Explain full-duplex transmission with an example.

Data flows both ways simultaneously

(e.g., broadband connection).

7
New cards
<p>Describe serial data transmission.</p>

Describe serial data transmission.

Better for long distances (telephone lines) 

Cheaper option 

Used when size of data transmitted is small 

Slower option 

Easier to synchronise as there is only one data stream 

8
New cards
<p>Describe parallel data transmission.</p>

Describe parallel data transmission.

Better for short distances (internal circuits) 

Expensive (more hardware required) 

Used when speed is necessary 

Faster than serial 

Asynchronous due to skew between bits 

9
New cards

Explain the advantages of serial transmission.

  • Reliable over long distances

  • Less interference

  • Cheaper

  • Fewer errors.

10
New cards

Explain the disadvantages of parallel transmission.

  • Prone to interference

  • Only used over short distances

  • Skew between bits.

11
New cards

Describe the role of USB in data transmission.

Universal serial bus (USB) 

  • A form of serial data transmission 

  • Widely used standard for transmitting data between devices 

  • Operates asynchronously 

  • Most common type of input/output port found on computers 

  • Allows both half- duplex and full- duplex data transmission 

  • e.g. of devices that use USB: Keyboards, mice, video cameras, printers, phones... 

12
New cards

State two benefits of USB.

Has become an industry standard 

Can support different transmission rates 

No need for external power source 

Notifies transmitter to re transmit data if any errors have occurred 

13
New cards

State one drawback of USB.

  • Limited to 5m cables

  • Older versions may not be supported

  • Slower than Ethernet.

14
New cards

Explain the need to check for errors during data transmission.

Data may become corrupted, lost, or changed due to interference

15
New cards

Describe how a parity check works.

  • Can be even or odd 

  • Checks whether data has been changed or corrupted 

  • Based on number of 1-bits in a byte of data 

  • Sender and receiver must agree before transmission whether they are using odd or even parity 

  • Number of 1s are counted 

  • If parity is incorrect, error is detected 

16
New cards

Describe how a checksum is used.

  • Determines if data has been corrupted or altered 

  • Transmitted with the data 

  • Value is recalculated after transmission 

  • Values are compared after transmission to check for errors 

17
New cards

Describe how an echo check works.

  • Involves transmitting the received data back to the sender 

  • Sender checks the data to see if any errors occurred during transmission 

  • This method isn’t reliable as an error could have occurred when the sender transmits the data or when the receiver transmits the data 

  • If an error does occur the sender will retransmit the data 

18
New cards

Describe how a check digit is used.

  • The last digit included in a code or other identification number 

  • Commonly caused by mistyping and scanning errors 

  • Calculated from all the other digits in the code 

  • Digit is added to the data 

  • 2 common types of methods: ISBN 13 and MODULO 11   

  • Commonly used with: 

  • International standard book numbers (ISBN) 

  • Bar codes 

  • Vehicle Identification numbers (VIN) 

<ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>The last digit included in a code or other identification number&nbsp;</span></p></li></ul><ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>Commonly caused by mistyping and scanning errors&nbsp;</span></p></li></ul><ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>Calculated from all the other digits in the code&nbsp;</span></p></li></ul><ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>Digit is added to the data&nbsp;</span></p></li></ul><ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>2 common types of methods: ISBN 13 and MODULO 11&nbsp;&nbsp;&nbsp;</span></p></li></ul><ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>Commonly used with:&nbsp;</span></p></li></ul><ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>International standard book numbers (ISBN)&nbsp;</span></p></li></ul><ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>Bar codes&nbsp;</span></p></li></ul><ul><li><p class="Paragraph SCXW181243540 BCX4" style="text-align: left"><span>Vehicle Identification numbers (VIN)&nbsp;</span></p></li></ul><p></p>
19
New cards

Describe how ARQ (Automatic Repeat Request) works.

  • A protocol that notifies the sender that an error has occurred and that the data received in incorrect 

  • Once data is sent, a timer is started 

 

It works as follows: 

  • Sender sends a block of data  

  • Receiving computer then sends back an acknowledgement 

  • When sender receives acknowledgement, it sends another block of data 

  • Error detected --> receiver sends a negative acknowledgement transmission to indicate the data is corrupted 

  • No error detected --> receiver sends a positive acknowledgement transmission meaning the data is correct 

  • Receiver does not send any acknowledgement transmission --> timeout occurs sender waits before automatically resending the data 

  • This process is continuous until all data has been received and acknowledged correctly 

20
New cards

Explain the purpose of encryption.

  • A method of scrambling data before being transmitted across a network 

  • Helps to protect the contents from unauthorised access by making data meaningless 

  • Important on both wired and wireless networks, more critical on wireless networks (data transmitted over radio waves --> easy to intercept)   

  • Encrypted using encryption algorithm and a key 

  • Key used to decrypt cypher text and transmitted separately 

21
New cards

Define plaintext and ciphertext.

  • Plaintext is the original readable data (name for data before it is encrypted  ).

  • Ciphertext is the encrypted version that looks meaningless without a key (name for data after it is encrypted).

22
New cards
<p>Describe how symmetric encryption works.</p>

Describe how symmetric encryption works.

  • Uses an encryption key. 

  • The same key is used to encrypt and decrypt the encoded message. 

  • One method is called the Caesar Cipher. 

  • If a hacker gains access to the key, then they can decrypt intercepted information 

  • The secret key can be shared with the receiver without sending it electronically 

Process: 

  1. Plain text is encrypted into cypher text using the encryption key. 

  1. The encryption key and the cypher text are sent separately to the receiver. 

  1. At the receiver, the encryption key is used to decrypt the cypher text into plain text. 

23
New cards

Describe how asymmetric encryption works.

1. When a message is ciphered ready for transmission by a sender, the receiver will generate a pair of keys, a public key and a private key. 

2. The public key is shared with any device that might wish to send a message to the receiver. 

3. The sender will then use the receiver’s public key to encrypt the message the message. 

4. When the receiving device obtains the message, it then has to use the private key to decipher the message. 

<p><span>1. When a message is ciphered ready for transmission by a sender, the receiver will generate a pair of keys, a public key and a private key.&nbsp;</span></p><p class="Paragraph SCXW197557736 BCX4" style="text-align: left"><span>2. The public key is shared with any device that might wish to send a message to the receiver.&nbsp;</span></p><p class="Paragraph SCXW197557736 BCX4" style="text-align: left"><span>3. The sender will then use the receiver’s public key to encrypt the message the message.&nbsp;</span></p><p class="Paragraph SCXW197557736 BCX4" style="text-align: left"><span>4. When the receiving device obtains the message, it then has to use the private key to decipher the message.&nbsp;</span></p>
24
New cards

Compare symmetric and asymmetric encryption.

Symmetric: Fast, simple, but less secure (same key used).
Asymmetric: Slower, more secure (uses public/private key pair), harder to compromise.

25
New cards

Explain one advantage of packet switching.

It uses multiple routes for transmission, reducing network congestion and making efficient use of bandwidth.

26
New cards

Explain why packet switching might cause delays.

Packets may arrive out of order and require reassembly; missing or corrupted packets must be re-requested, causing delay.

27
New cards

State one advantage of full-duplex transmission over half-duplex.

Full-duplex allows data to be sent and received simultaneously, increasing efficiency and speed.

28
New cards

Explain why parallel transmission is only suitable over short distances.

Bits sent simultaneously over multiple wires can arrive at different times (bit skew), causing errors over long distances.

29
New cards

Explain why ARQ is useful in data transmission.

ARQ uses acknowledgements and timeouts to ensure that data is correctly received; if no response is received, the data is automatically resent.

30
New cards

Explain how asymmetric encryption improves security.

The public key encrypts the data, but only the private key can decrypt it, ensuring that only the intended recipient can read the message

31
New cards

Explain the differences between public and private keys

Public key 

Private key 

Both created by receiver  

Different but mathematically related 

Accessible by anyone 

Kept secret by receiver 

Used to encrypt data 

Used to decrypt data 

Cannot be used to decrypt a message 

Never shared