1.2 Communication and Internet Technologies PDF
1.2 Communication and Internet Technologies PDF
Q1 2016-Nov, P12
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
...........................................................................................................................................[2]
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
...........................................................................................................................................[2]
(b) A computer in a factory is connected to a printer. The printer is located in an office 1 km away
from the factory.
Identify which data transmission method would be most suitable for this connection.
.........................................................................................................................................................
1 ................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
2 ................................................................................................................................................
.........................................................................................................................................................
.................................................................................................................................................... [3]
Q2 2016-Nov, P12
……...................................................................................................................................................
……...................................................................................................................................................
……...................................................................................................................................................
……...................................................................................................................................................
……...................................................................................................................................................
.....................................................................................................................................................[3]
http://www.cie.org.uk/ComputerSciencePapers
This URL is composed of three parts. State the part of this URL that is the:
Protocol ....................................................................................................................................
Q3 2016-Nov, P13 Q3
[5]
Q4 2016-June, P12
full-duplex
full-duplex
(b) Give two reasons why serial transmission, rather than parallel transmission, is used to connect
devices to a computer.
1 ……................................................................................................................................................
.........................................................................................................................................................
2 ......................................................................................................................................................
.....................................................................................................................................................[2]
Q5 2016-June, P12
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
...................................................................................................................................................................
..............................................................................................................................................................[4]
Q6 2015-June, P12
5 Parity checks are often used to check for errors that may occur during data transmission.
(a) A system uses even parity. Tick (✓) to show whether the following three bytes have been
transmitted correctly or incorrectly
(b) A parity byte is used to identify which bit has been transmitted incorrectly in a block of data. The
word “F L O W C H A R T” was transmitted using nine bytes of data (one byte per character). A
tenth byte, the parity byte, was also transmitted. The following block of data shows all ten bytes
received after transmission. The system uses even parity and column 1 is the parity bit.
(i) One of the bits has been transmitted incorrectly. Write the byte number and column
number of this bit:
(ii) Explain how you arrived at your answer for part (b)(i).
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
.......................................................................................................................................... [2]
………………................................................................................................................................... [1]
(d) A parity check may not identify that a bit has been transmitted incorrectly.
Describe one situation in which this could occur.
.........................................................................................................................................................
.........................................................................................................................................................
................................................................................................................................................... [1]
Q7 2015-Nov, P12
4 (b) (i) The following code shows HTML ‘tag’ pairs on either side of the text stating the colour that
each creates.
Yellow is a combination of red and green, magenta a combination of red and blue and
cyan a combination of green and blue.
State what 6-digit hexadecimal values should replace X, Y and Z in the above code.
X ........................................................................................................................................
Y .......................................................................................................................................
Z ...................................................................................................................................[3]
(ii) Describe how other colours, such as a darker shade of blue, are created.
...............................................................................................................................................
...............................................................................................................................................
...........................................................................................................................................[2]
(i) Identify what the first six and last six hexadecimal digits represent.
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
.......................................................................................................................................... [2]
Q8 2015-June, P11
.........................................................................................................................................................
.........................................................................................................................................................
.........................................................................................................................................................
.................................................................................................................................................... [2]
.........................................................................................................................................................
.........................................................................................................................................................
........................................................................................................................................................
................................................................................................................................................…. [2]