Chapter 2 Test
Obtained marks: 43
Total marks: 77
1 A company owns a number of vending machines. Data is sent from each of these machines at the end
of the day. The data contains amount of money taken, products sold and any error conditions/reports.
a) The company uses both echo checking and automatic repeat requests (ARQs).
i Describe how echo checks work. Explain whether this is a suitable error checking method in this
application. [2]
1 a i) With echo checks, when data is sent to another device, this data is sent back again to the sender.
The sender’s computer compares the two sets of data to check if any errors occurred during the data
transmission. However, this is not very reliable as we do not know if the data occurred when sending the
data in the first place or if the error occurred when sending data back for checking so it is not suitable for
this task as it can lead to inaccuracies.
2/2 marks
ii Describe how automatic repeat request (ARQ) works.
ii) ARQ uses positive and negative acknowledgements (messages sent to the receiver indicating that data
has/has not been received correctly) and timeout (this is the time interval allowed to elapse before
acknowledgement is received. The receiving device receives an error detection code as part of the data
transmission (this is typically a Cyclic Redundancy Check). It is used to detect whether the received data
contains any transmission errors. If no error is detected, a positive acknowledgement is sent back to the
sending device. However, if an error is detected, the receiving device now sends a negative
acknowledgement to the sending device and requests re-transmission of the data. A timeout is used by
the sending device by waiting a pre-determined amount of time and if no acknowledgement of any type
has been received by the sending device within this time limit, then it automatically re-sends data until a
positive acknowledgment is received or until a pre-determined number of re-transmissions have taken
place.
3/3 marks.
b Checksum and check digit are two terms often confused by students.
Describe three differences of the two techniques.
b) Check digit is the final digit included in a code. It is used to detect errors in data entry caused by mis-
typing or mis-scanning a barcode. Check digits are used on barcodes on products such as ISBN and VIN.
0/3 marks.
Only explained check digit with examples. No mention of checksum or clear differences. To get full 3
marks, the answer must:
• Mention both techniques.
• Make clear distinctions (not just definitions).
• Give examples or applications where relevant.
Model full-mark answer for Q1(b): check page 59 and 60
• A check digit is a single digit added to the end of a code (e.g., ISBN, VIN) and is used mainly to
detect data entry errors such as mis-typing or scanning mistakes.
• A checksum is a value calculated from a block of data using an agreed algorithm; it is
transmitted with the data and checked at the receiving end to detect corruption during
transmission.
• Key difference: check digits are used with identification numbers and barcodes, whereas
checksums are used in data transmission over networks or storage to check integrity.
Tips for Students:
Always compare directly — if the question says “differences,” don’t just define one term.
Think: check digit = barcodes, checksum = networks — that quick link helps recall.
For 3-mark questions, aim to give 3 separate differences, not one long explanation.
• 1 mark: check digit = single digit at end of code.
• 1 mark: checksum = whole block calculation with algorithm.
• 1 mark: different uses (data entry vs data transmission).
2 Explain each of the following computer terms:
packet switching
i) Packet switching is a method of data transmission in which a message is broken up into a
number of packets, allowing them to be sent independently and at the destination
reassembling into their correct order with nodes at each stage of the transmission
containing a router which determines the route the packet needs to take in order to reach its
destination.
2/2 marks.
cyclic redundancy check
ii) An error checking method which involves the sending computer adding up all the 1-bits in
the payload and storing this as a hex value in the trailer before it is sent. Once the packet
arrives the receiving computer recalculates the number of 1-bits in the payload. If there are
no differences when the computer compares the two values, then no transmission errors
have occurred, otherwise the packet needs to be re-sent.
2/2 marks.
For a 2-mark question, keep it short
data skewing
iii) Data skewing is when bits arrive out of synchronization when they reach their destination.
2/2 marks.
iv) universal serial bus
0/2 marks.
parity bit.
v) A parity bit is one of the bits in the byte, usually the most significant bit which is set
according to the parity being used.
1/2 marks.
Needs to mention why it’s used. To ensure even/odd parity protocol is followed (i.e. error
detection).
3. Checksum/Parity/CRC = error detection. • 4.parity checks only work at the byte level (too
3) 1. Parity check weak for an entire packet).
ARQ = error correction (by requesting re-
• Checksum/CRC = checks whole packet.
2. ARQ transmission when detection fails).
• ARQ = fixes it by requesting resend.
if an error is found, the data is re-sent”
3. ARQ, Checksum, Parity • ARQ is indirectly relevant → because once an
belongs to ARQ,
error is detected (packet changed), ARQ
4. Checksum, ARQ, Parity 5. The “additional data value” here can be the ensures the packet gets resent until correct.
parity bit. Or Additional data value is the 6. Error detection is applied to each block
5. Checksum, parity check checksum appended at the end of the block. (checksum or parity).
If it’s 1 extra bit → think parity. Error recovery (ARQ) deals with whole packets
6. Checksum,parity check, ARQ If it’s a whole extra number → think checksum.
if errors are found
7. None, parity check
7. two-dimensional parity can locate which bit
8. Checksum
3/8 marks
4 a) iii, i, ii, iv
3/3 marks
b) v,ii,iii,iv,i
4/4 marks
c) ii,iii,i,iv,v
4/4 marks
d) v, ii, vi, iv, iii, I vi, v, ii, iv, iii, i
Check digit is attached first → then humans type the whole code → then the computer checks.
0/5 marks
5 a) Symmetric encryption is another way used to prevent data from being read by hackers and uses
an encryption key; the same key is used to encrypt and decrypt the encoded message, but there is
difficulty in keeping the encryption key a secret as it needs to be sent in an email or text message which
can be intercepted.
2/2 marks
b) Asymmetric encryption was developed to overcome the security issue associated with symmetric
encryption and makes use of two keys: private (only known to computer user) and public (available to
everyone).
2/3 marks
To get full marks, you need to explain the actual process: the sender encrypts using the recipient’s public
key, and the recipient decrypts with their private key.
c) When data is transmitted over any public network (wired or wireless) there is always a risk of it being
intercepted by for example, a hacker. Encryption alters data into a form that is unreadable by anybody
for whom the data is not intended which is particularly useful when sending card/bank details, medical
history or legal documents.
2/2 marks
Question 6????
0/6 marks
Question 7(i)????
0/2 marks
7a ii) Full-duplex serial data transmission is the most suitable data transmission as serial data
transmission is a reliable transmission method over long distances and full-duplex transmission mode
allows data to be sent in both directions at the same time.
2/4 marks
For full explanation marks, you needed two more points about serial transmission:
• less interference/more reliable than parallel
• avoids data skew/synchronisation problems
Good mention of full-duplex, but remember examiners love when you contrast with why the other
options are less suitable (e.g. simplex can’t send both ways, half-duplex only one at a time).
b) Parity checking is an error-checking method used to check whether data has been changed or
corrupted following data transmission. It is based on the number of 1-bits in a byte of data. The parity
can be either called even or odd and one of the bits in the byte, usually the most significant bit is
reserved for a parity bit which is set according to the parity being used. With echo checks, when data is
sent to another device, this data is sent back again to the sender. The sender’s computer compares the
two sets of data to check if any errors occurred during the data transmission.
6/6 marks
could have chosen checksum or ARQ instead of echo check (these tend to be seen as stronger in
real applications)
8 a)
0/5 marks
8 b) parallel
1/1 marks
c) It is the new industry standard, which means considerable support is available. More USB ports can
be added if necessary using USB hubs.
2/4 marks
Second point about hubs is not a direct benefit of USB , you lost 2 marks here. It’s a feature not a
benefit. To get 4/4, you could have mentioned:
• High speed data transfer
• No need for separate power supply (USB provides power)
• Easy to connect (only goes in one way)
• Less chance of data skew (serial transmission)
Feedback:
Contrast where possible: Saying “serial avoids skew, unlike parallel” or “full-duplex allows both
directions, unlike simplex/half-duplex” can earn you the last mark.
Follow the sequence when processes are involved (ARQ, check digit, checksum). Examiners love
when you use step-by-step structure.
Think: definition + detail. Always add 1 extra detail/example after the basic definition.
• Symmetric encryption = one key (definition) → same key used both ways (detail).