Paper 1: Data Transmission Flashcards

1
Q

Serial Data Transmission

A

Data is sent one bit at a time over a single wire. Useful for long distances where fewer wires are preferred (e.g., USB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Parallel Data Transmission

A

Multiple bits of data are sent simultaneously over several parallel wires. Generally faster for short distances (e.g., within a computer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Simplex Transmission

A

Data transmission in only one direction (e.g., a radio broadcast).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Half-Duplex Transmission

A

Data transmission in both directions, but only one direction at a time (e.g., a walkie-talkie).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Full-Duplex Transmission

A

Data transmission in both directions simultaneously (e.g., a phone call).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet Switching

A

A method of transmitting data by dividing it into small units called packets, which are then sent independently over a network and reassembled at the destination. Makes efficient use of network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Parity Check

A

A simple method of error detection where an extra bit (parity bit) is added to a group of bits to indicate whether the number of 1s is even or odd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Check Digit

A

An extra digit added to a code (like an ISBN or barcode) to help detect errors during data entry or transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Checksum

A

A more sophisticated error detection method where a numerical value is calculated from a block of data and transmitted with it. The receiver recalculates the checksum and compares it to the received one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption

A

The process of converting data into a secret code (ciphertext) to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric Encryption

A

An encryption method that uses the same key for both encrypting and decrypting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric Encryption

A

An encryption method that uses two different keys: a public key for encryption and a private key for decryption. The public key can be shared, but the private key must be kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet

A

A global network of interconnected computer networks that use the Internet Protocol Suite (TCP/IP) to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

World Wide Web (WWW)

A

A system of interlinked hypertext documents (web pages) accessed via the Internet. It’s one of the services that runs on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

URL (Uniform Resource Locator)

A

The address of a resource on the internet (like a web page). It tells the browser how and where to find the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTP (Hypertext Transfer Protocol)

A

The protocol used for transferring files (like web pages, images, etc.) on the World Wide Web.

17
Q

HTTPS (Hypertext Transfer Protocol Secure)

A

A secure version of HTTP that encrypts the communication between the web browser and the web server, protecting sensitive data.

18
Q

HTML (Hypertext Markup Language)

A

The standard markup language for creating web pages. It defines the structure and content of a web page.

19
Q

CSS (Cascading Style Sheets)

A

A style sheet language used for describing the look and formatting of a document written in HTML. It controls the visual presentation of a web page.

20
Q

IP Address (Internet Protocol Address)

A

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

21
Q

MAC Address (Media Access Control Address)

A

A unique hardware address assigned to a network interface controller (NIC) of a device. It’s used for communication within a local network.

22
Q

Cookie (Internet)

A

A small piece of data sent from a website and stored on the user’s computer by the web browser. It can be used to remember information about the user or their browsing activity.

23
Q

Malware

A

Software that is intended to damage or disable computers and computer systems. Examples include viruses, worms, and spyware.

24
Q

Phishing

A

A type of online fraud where criminals try to trick you into giving them personal information (like passwords or credit card details) by pretending to be a legitimate organization.

25
Q

Denial-of-Service (DoS) Attack

A

An attack that aims to make a computer resource unavailable to its intended users, often by overwhelming it with traffic.

26
Q

Firewall (Software/Hardware)

A

A security system that monitors and controls incoming and outgoing network traffic based on pre-defined security rules. It acts as a barrier between a trusted internal network and an untrusted external network (like the internet).

27
Q

Antivirus Software

A

Software designed to detect, prevent, and remove malware from a computer system.

28
Q

Password

A

A secret sequence of characters used to verify the identity of a user and grant access to a system or resource.

29
Q

Authentication (Methods)

A

The process of verifying the identity of a user. Examples include passwords, PINs, biometric scans (fingerprint, facial recognition), and two-step verification (using two different methods).