Paper 1: Data Transmission Flashcards

(53 cards)

1
Q

Serial Data Transmission

A

Data is sent one bit at a time over a single wire. Useful for long distances where fewer wires are preferred (e.g., USB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Parallel Data Transmission

A

Multiple bits of data are sent simultaneously over several parallel wires. Generally faster for short distances (e.g., within a computer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Simplex Transmission

A

Data transmission in only one direction (e.g., a radio broadcast).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Half-Duplex Transmission

A

Data transmission in both directions, but only one direction at a time (e.g., a walkie-talkie).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Full-Duplex Transmission

A

Data transmission in both directions simultaneously (e.g., a phone call).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet Switching

A

A method of transmitting data by dividing it into small units called packets, which are then sent independently over a network and reassembled at the destination. Makes efficient use of network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Parity Check

A

A simple method of error detection where an extra bit (parity bit) is added to a group of bits to indicate whether the number of 1s is even or odd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Check Digit

A

An extra digit added to a code (like an ISBN or barcode) to help detect errors during data entry or transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

The process of converting data into a secret code (ciphertext) to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symmetric Encryption

A

An encryption method that uses the same key for both encrypting and decrypting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Encryption

A

An encryption method that uses two different keys: a public key for encryption and a private key for decryption. The public key can be shared, but the private key must be kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet

A

A global network of interconnected computer networks that use the Internet Protocol Suite (TCP/IP) to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

World Wide Web (WWW)

A

A system of interlinked hypertext documents (web pages) accessed via the Internet. It’s one of the services that runs on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

URL (Uniform Resource Locator)

A

The address of a resource on the internet (like a web page). It tells the browser how and where to find the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTP (Hypertext Transfer Protocol)

A

The protocol used for transferring files (like web pages, images, etc.) on the World Wide Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HTTPS (Hypertext Transfer Protocol Secure)

A

A secure version of HTTP that encrypts the communication between the web browser and the web server, protecting sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HTML (Hypertext Markup Language)

A

The standard markup language for creating web pages. It defines the structure and content of a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CSS (Cascading Style Sheets)

A

A style sheet language used for describing the look and formatting of a document written in HTML. It controls the visual presentation of a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP Address (Internet Protocol Address)

A

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

MAC Address (Media Access Control Address)

A

A unique hardware address assigned to a network interface controller (NIC) of a device. It’s used for communication within a local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cookie (Internet)

A

A small piece of data sent from a website and stored on the user’s computer by the web browser. It can be used to remember information about the user or their browsing activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Malware

A

Software that is intended to damage or disable computers and computer systems. Examples include viruses, worms, and spyware.

23
Q

Phishing

A

A type of online fraud where criminals try to trick you into giving them personal information (like passwords or credit card details) by pretending to be a legitimate organization.

24
Q

Denial-of-Service (DoS) Attack

A

An attack that aims to make a computer resource unavailable to its intended users, often by overwhelming it with traffic.

25
Firewall (Software/Hardware)
A security system that monitors and controls incoming and outgoing network traffic based on pre-defined security rules. It acts as a barrier between a trusted internal network and an untrusted external network (like the internet).
26
Antivirus Software
Software designed to detect, prevent, and remove malware from a computer system.
27
Password
A secret sequence of characters used to verify the identity of a user and grant access to a system or resource.
28
Authentication (Methods)
The process of verifying the identity of a user. Examples include passwords, PINs, biometric scans (fingerprint, facial recognition), and two-step verification (using two different methods).
29
What is a packet in data transmission?
A small unit of data that is transmitted over a network. The original data is broken down into these smaller pieces.
30
What information is typically included in a packet?
The actual data being sent (the payload), the sender's address, the receiver's address, and sequence numbers.
31
What are the advantages of using packets for data transmission?
More efficient use of network bandwidth, improved reliability (if one packet is lost, only that packet needs to be retransmitted), and allows for different routes to be taken.
32
Name some common serial data transmission methods.
Simplex, half-duplex, and full-duplex.
33
What are the advantages and disadvantages of serial transmission compared to parallel transmission?
Serial: Advantage - fewer wires needed, less cost, longer distances. Disadvantage - slower for transmitting multiple bits at once. Parallel: Advantage - faster for transmitting multiple bits at once. Disadvantage - more wires needed, higher cost, shorter distances due to signal interference.
34
What does USB stand for?
Universal Serial Bus.
35
What is the purpose of USB?
To provide a standardized interface for connecting various peripheral devices (e.g., keyboards, mice, printers, external drives) to a computer.
36
What are some advantages of using USB?
Plug and play capability (devices are automatically detected), supports multiple data transfer rates, can provide power to some devices.
37
What is the goal of error detection methods?
To identify if errors have occurred during transmission so that corrective action can be taken (e.g., retransmission).
38
What are the limitations of a parity check?
It can only detect an odd number of errors within a data block. If an even number of errors occur, the parity will still appear correct, and the errors will go undetected.
39
Describe how a checksum works for error detection.
A numerical value is calculated from the data being sent. This checksum is transmitted along with the data. The receiver performs the same calculation on the received data and compares the result with the received checksum. If they don't match, an error is detected.
40
Describe how the echo method works for error detection.
The receiver sends the received data back to the sender. The sender then compares the echoed data with the original data. If they are different, an error has occurred.
41
What is a disadvantage of the echo method?
It requires transmission in both directions and can introduce delays.
42
How is a check digit typically used?
An algorithm is applied to the original digits to calculate the check digit. When the number is entered or received, the same algorithm is applied, and the result is compared to the check digit. If they don't match, an error is likely.
43
What does ISBN stand for?
International Standard Book Number.
44
What does ARQ stand for in data transmission?
Automatic Repeat Request.
45
What is the purpose of ARQ?
It's a group of protocols used for error control in data transmission. If an error is detected, ARQ mechanisms automatically request the retransmission of the data that was received in error.
46
Name some basic ARQ protocols.
Stop-and-wait ARQ, Go-Back-N ARQ, and Selective Repeat ARQ.
47
Why is there a need for encryption in data transmission?
To protect the confidentiality and security of data being transmitted, especially over public networks like the internet. It prevents unauthorized access and ensures that only the intended recipient can understand the information.
48
What is the basic principle of encryption?
Converting data (plaintext) into an unreadable format (ciphertext) using an algorithm and a key. The ciphertext can only be converted back to plaintext using the correct key.
49
What is a key challenge with symmetric encryption?
Securely sharing the secret key between the sender and the receiver.
50
What are some advantages of symmetric encryption?
Generally faster and less computationally intensive than asymmetric encryption.
51
How does asymmetric encryption work for secure communication?
The sender encrypts the message using the recipient's public key. Only the recipient's private key can decrypt the message.
52
What are some advantages of asymmetric encryption?
Solves the key distribution problem of symmetric encryption, as the public key can be shared openly.
53
What is a disadvantage of asymmetric encryption?
Generally slower and more computationally intensive than symmetric encryption.