28
Heinemann Information Processes and Technology: HSC Course Heinemann Information Processes and Technology: HSC Course The answers below are, in many cases, only a brief guide to a full answer. Some of the answers in the learning activities have not been provided as they involve the student investigating, forming opinions, working in a group or completing practical tasks on the computer. Chapter 3: Communication systems Exercise 3.1 1 The five basic components of all communication systems are: Data source―produces the data to be sent. Transmitter―encodes the data into a signal suitable for a transmission medium. Transmission medium―a channel in which the signal is transmitted to the destination. Receiver―decodes the signal back into the original data or an approximation of the data. Destination―the receiver of the information. 2 A protocol is a set of rules that governs the transfer of data between computers. It defines how the information is transmitted and how the errors are detected. Handshaking is an agreement about which Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd) 1 Chapter 3 Answers

 · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Embed Size (px)

Citation preview

Page 1:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

Heinemann Information Processes and Technology: HSC Course

The answers below are, in many cases, only a brief guide to a full answer. Some of

the answers in the learning activities have not been provided as they involve the

student investigating, forming opinions, working in a group or completing practical

tasks on the computer.

Chapter 3: Communication systems

Exercise 3.1

1 The five basic components of all communication systems are:

Data source―produces the data to be sent.

Transmitter―encodes the data into a signal suitable for a transmission

medium.

Transmission medium―a channel in which the signal is transmitted to

the destination.

Receiver―decodes the signal back into the original data or an

approximation of the data.

Destination―the receiver of the information.

2 A protocol is a set of rules that governs the transfer of data between computers. It

defines how the information is transmitted and how the errors are detected.

Handshaking is an agreement about which protocol to use, that results in the

exchange of information. It is a series of signals that flow between devices during

data transmission.

3 The OSI reference model is an internationally accepted standard for protocols. It

divides data communication into seven layers. Each layer expresses the standard

using a protocol.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

1 Chapter 3 Answers

Page 2:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

4 Handshaking involves sending signals to indicate the type of protocol to be used.

The transmitting device will send a signal and wait for an appropriate response.

When two devices successfully handshake, then a connection is made.

5 Software flow control uses a special code sent with the data. It is used for long

distance communication.

6 The bandwidth is the capacity of the channel or transmission medium.

7 Baud rate is the maximum number of data symbols or electrical signals that can

transmitted in one second. Bits per second (bps) is the number of bits that can be

transmitted in one second. Baud rate is different from bps as a data symbol can

contain more than one bit of data.

8 Parity checking is a method of checking for errors in data transmission using an

additional bit called a parity bit. This bit is used only for the purpose of

identifying whether the bits being moved have arrived successfully. When an odd

parity is chosen, the number of 1s in the nine bits must be odd. This means that if

the number of 1s in the first eight bits is even, then the parity bit must be 1 to

make it odd. If the number of 1s in the first eight bits is odd, the parity bit must be

0 to keep it odd. The sender and receiver can also decide to send an even parity;

then the number of 1s in the nine bits must be even.

9 Cyclic redundancy check (CRC) is a method of checking for errors in data

transmission using a division process. The data is divided into predetermined

lengths and divided by a fixed divisor (prime number). The remainder of the

calculation is attached and sent with data. When the data is received, the

remainder is recalculated.

10 Five common parameters are bps, data bits, parity, stop/start bits and flow control.

LEARNING ACTIVITIES1. a Sending a letter:

Data source―William writing the letter.

Transmitter―inserting the letter into an envelope and putting it into a post

office box.

Transmission medium―road system (rail/air transport?).

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

2 Chapter 3 Answers

Page 3:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

Receiver―receiving the envelope in the letter box and opening the letter.

Destination―friend reading the letter.

b Using a fax machine:

Data source―Julia drawing a diagram.

Transmitter―sending the diagram using the fax machine.

Transmission medium―telephone line.

Receiver―receiving the diagram from their fax machine.

Destination―partner reading the directions to the conference venue.

2 The parity bit would be 1 for an even parity. Parity checking would not have

detected the error as there are two errors in the received character, and this results

in the expected even parity.

3 Cyclic redundancy check (CRC) is a method of checking for errors in data

transmission using a division process. The data is divided into predetermined

lengths and divided by a fixed divisor (prime number). The remainder of the

calculation is attached and sent with data. When the data is received the remainder

is recalculated. Another method of error checking is checksum. Checksum is a

method of checking for errors in data transmission by counting the number of bits

in a data packet. A data packet is created by dividing the data into smaller groups.

The count of the bits in a data packet is attached to the data packet. It is used by

the receiver to check whether all the bits have arrived successfully. If the count

matches, it is assumed that a complete transmission was received. CRC is a more

accurate method of detecting errors than checksum.

4 Time = (400 000 000 x 8)/28 800 = 111 111 seconds.

Characters per second = 28 800/10 = 2880 (start/stop bits are added to the 8-bit

ASCII).

5 The school needs to investigate the parameters used to establish the

communication link such as the bps, data bits, parity, stop/start bits and flow

control. The data could be secured using parity checking, checksum or CRC.

6 Student investigation.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

3 Chapter 3 Answers

Page 4:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

Exercise 3.2

1 Teleconferencing is the use of an electronic transmission to allow a meeting to

occur at the same time in different locations.

2 Advantages―teleconferencing simulates a face-to-face meeting and reduces costs.

Money is saved by not buying airfares, hotel rooms and meals. Teleconferencing

also saves people time and energy involved in travelling to attend a face-to-face

meeting.

Disadvantages―teleconferencing does remove the inter-personal relationship

achieved through a face-to-face meeting. The physical contact and informal

discussions are often needed to clarify ideas and develop partnerships.

3 Messaging systems are used to send messages to people in different locations who

can receive the message at a different time.

4 Voice mail works by the sender dialling a voice mail number and recording a

message. The message is digitally stored on a computer system and can only be

retrieved by the intended receiver of the message. To retrieve a message, you dial

into the voice mail system and enter an account number and password. The

receiver of the message can use any telephone to enter the voice mail system.

After the receiver enters the voice mail system, he or she can listen to the

message, delete it, save it or send it to another person.

5 The first part of an email address is the name of the account. It is often a person’s

username and is chosen when a user signs up with an ISP. The second part of an

email address is the domain name. It is the location of the person’s account on the

Internet. The domain name identifies the specific computer, or server, where the

email messages are stored.

6 The header contains four main parts: email address, carbon copy, blind carbon

copy and the subject.

7 Messages are written off-line to save money if the ISP charges by the hour.

8 A mailing list is a group of people who may want to receive the same messages. It

may be people working on the same project or a group of people with the same

interests.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

4 Chapter 3 Answers

Page 5:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

9 E-commerce provides 24-hour availability, global reach, the ability to interact and

to provide customer information, and a multimedia environment.

10 Electronic banking allows customers to view their account balances and

transaction histories, transfer money between accounts and pay bills using Bpay. It

provides banking services 24 hours a day but cannot cater for cash or cheque

withdrawals.

LEARNING ACTIVITIES1. a Teleconferencing. Participants―people involved in the meeting, IT personnel.

Data/information―video data of meeting. Information technology―computer

system, video camera, communication software, telephone line or leased line.

The purpose of teleconferencing is to allow a meeting to occur at the same

time in different locations using an electronic transmission.

b Messaging systems. Participants―sender and receiver of the message.

Data/information―message (either voice, fax, or email). Information

technology―telephone, computer system, fax machine, email software,

telephone line. The purpose of a messaging system is to send messages to

people in different locations who may receive the message at a later time.

c Electronic commerce. Participants―people who are buying and selling the

goods, IT personnel. Data/information―Web site, credit card number.

Information technology―computer system, Web browser, authoring software.

The purpose of electronic commerce is the buying and selling of goods and

services via the Internet.

2 This table compares the advantages and disadvantages of three messaging

systems:

Advantages DisadvantagesTraditional system

Convenient―telephone, fast, express feelings more clearly using the spoken word

Receiver needs to be at the telephone to accept the message

Voice mail Convenient―telephone, express feelings more clearly using the spoken word

People need to check voice mail box regularly, insecurity of messages in the voice mail system

Electronic mail Communicates complex information, such as different data types, relatively cheaply,

Access to a computer system, junk email, people need to check mail box regularly, security of

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

5 Chapter 3 Answers

Page 6:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

fast, person does not have to be present to receive the message, sending the same message to groups of people

ISP for storing messages

3 Teachers need to assess students’ skills when completing each practical task.

4 Teachers need to assess students’ skills when completing each practical task.

5 Information published on the Internet is protected by copyright. Text obtained

from a Web site should not be reproduced without acknowledgment. Images

should not be downloaded and used for other purposes without permission.

6 Downloading is the action of receiving a file from another computer. Data from a

Web page is usually downloaded using the browser’s ‘Save As’ command. Many

files are downloaded in a compressed format, such as zip or hqx. These files

require the user to decompress, or expand, them. Factors that affect the speed of

transmission are the bandwidth, modem speed and processing speed of the

computer.

Exercise 3.3

1 Simplex mode allows transmission in one direction only, from the sender to the

receiver. Half-duplex mode allows transmission in both directions but not at the

same time. Full-duplex mode allows transmission in both directions at the same

time.

2 Protocols define how a link is established, how data is transmitted and how errors

are detected and corrected.

3 Ymodem is a file transfer protocol whose data is transferred in blocks 1024 bytes

long. It includes such features as transfer of file names, increased reliability of

error checking and increased data transfer. ZModem is a file transfer protocol

developed to rectify the limitations associated with YModem. It uses a variable

block size and supports CRC. It provides for high speed, packet and network

communication environments.

4 An X.25 protocol is a standard packet switching protocol. It is used for low-speed

applications, such as credit card verifications and ATM transactions.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

6 Chapter 3 Answers

Page 7:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

5 LANs connect computers within a building or group of buildings on one site.

They are in a small geographical area, and the computers are linked together by

coaxial cable or fibre optic cables. WANs connect computers over hundreds or

thousands of kilometres. They often consist of a mainframe computer called the

host and a number of terminals.

6 A private leased line offers higher transmission speeds and more accurate transfer

of data than those available through the public switched telephone network

(PSTN).

7 Packet switching is a technique that divides messages into small data packets,

transmits the packets and later rejoins the packets to form the original message.

8 A bus topology is an arrangement where all the devices are attached to a direct

line called the bus. Each device has a unique identity and can only recognise those

signals intended for it. A ring topology is an arrangement where all devices are

attached so that the path is in the shape of a continuous circle. Each device in the

ring has a unique address.

9 An Ethernet allows data to be transmitted simultaneously to all nodes on the

network in both directions. Addressing information allows each node to recognise

and receive individual data packets. A token ring operates by continually passing

special data packets called tokens between nodes on the network. Workstations

with data to send capture a free token and attach data along with addressing

information.

10 In CSMA/CD, all nodes have the ability to sense signals on the network. When a

node wishes to transmit, it ‘listens’ to the bus for signals. When there is no signal

on the bus, it transmits. However, occasionally a collision will occur if two nodes

sense a clear bus at the same time. When a collision is detected, each device stops

transmitting and retransmits at another time.

11 Four different types of servers are:

A file server is a controlling computer in a network that stores the

programs and data shared by users.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

7 Chapter 3 Answers

Page 8:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

A print server is a computer in a network that controls one or more

printers and stores data to be printed.

A mail server is a computer in a network that provides email facilities.

It stores incoming mail for distribution to users and forwards outgoing mail to

appropriate devices.

A Web server is a computer that provides a connection to the Internet.

All the Internet traffic is directed through this server.

12 A router determines where to send a data packet based on its current

understanding of the networks. A router maintains a table of the available routes

and their conditions. It uses this table, together with distance and cost algorithms,

to determine the best route for a given data packet.

13 A bridge is a combination of hardware and software to link two similar networks.

A gateway is a combination of hardware and software to link two different types

of networks.

14 A hub is a central connecting device in a network. Data arrives at the hub from

one or more devices and is forwarded out using just one cable.

15 Three methods of wire transmission are:

Twisted-pair cable consists of two thin insulated copper wires, twisted

to form a spiral. Twisting reduces the amount of interference from other

cabling.

Coaxial cable has a single copper wire surrounded by an insulator,

grounded shielding and an outer insulator. The shielding allows data to be

transmitted with little distortion.

Fibre-optic cable uses a laser of light to carry data in small glass fibres

about the diameter of a human hair. Fibre-optic cable is free from

electromagnetic and radio interference, very secure and can transmit data at

high speeds without errors.

16 Baseband networks use the entire capacity of the cable to transmit only one signal

at a time. Broadband networks divide the cable so that several signals can be

transmitted at the same time.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

8 Chapter 3 Answers

Page 9:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

17 Microwave is a high-frequency radio signal sent through space in a straight line

from one antenna to another.

18 A network administrator’s responsibilities include network security, installing new

applications, distributing software upgrades, monitoring daily activity, enforcing

licensing agreements, developing a storage system and providing routine backups.

19 The tasks performed by a network operating system include:

Administration―adds, removes and organises users; installs hardware

devices and applications; and carries out maintenance operations, such as

backup.

File management ―gives users access to the remote hard disks on the

server and provides a file system and the ability to manage a network

directory.

Applications―handles request from uses to share data and

applications.

Resource management―allows network devices, such as printers and

modems, to be shared; assigns users to printers; and orders print jobs.

Security―monitors and restricts access to network resources.

20 Logon procedure involves the user being identified by means of a user ID and a

password. The user ID usually conforms to a limited length, such as eight

characters; and the password often contain at least one digit.

21 The main purpose of an intranet is to share information and computing resources

among the employees of an organisation.

LEARNING ACTIVITIES1 The type of transmission is asynchronous. The type of error detection is parity

checking. It uses an additional bit called a parity bit. Gloria is sending data using

an odd parity. Therefore the parity bit will be a 0 or 1 to make the total number of

bits an odd number. One major deficiency in parity checking is that, if the 7-bit

ASCII contains two errors, the errors will not be detected. An alternative method

that would provide better results would be CRC. It is a method of checking for

errors in data transmission using a division process. The data is divided into

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

9 Chapter 3 Answers

Page 10:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

predetermined lengths and divided by a fixed divisor (prime number). The

remainder of the calculation is attached and sent with data. When the data is

received, the remainder is recalculated.

2 A LAN with seven nodes in a ring topology will have each node in the shape of a

continuous circle. Data transfer is in one direction, moving from node to node

until it arrives at its destination. The problem of multiple users is overcome using

a token ring. The token ring operates by continually passing special data packets

called tokens between nodes on the network. Workstations with data to send

capture a free token and attach data along with addressing information. A busy

token with data cannot be used by other nodes.

3 The benefits of connecting two LANs are the ability to transfer data, improved

communication, and the ability to share hardware devices and application

software. A gateway is a device that is able to link the Ethernet and token ring

protocols. It converts data between these protocols.

4 The diagram should show all the devices in each LAN attached to a direct line

called a bus. Data is transferred in each LAN by assigning each device a unique

identity. Each device only recognises those signals intended for it. Devices check

the bus periodically and retrieve their messages as data travels along the bus. The

problem of multiple users is overcome using the CSMA/CD. When a node wishes

to transmit, it ‘listens’ to the bus for signals. When there is no signals on the bus,

it transmits. A bridge is used to connect these LANs. A bridge examines each data

packet on a LAN and forwards any data packets addressed to the connected LAN.

5 The sketch should show all the devices attached to a direct line called a bus. The

print server and the printer should be attached. The file server is often located at

the end of the bus. The print server is a computer in a network that controls one or

more printers and stores data to be printed. The mail server is a computer in a

network that provides email facilities. It stores incoming mail for distribution to

users and forwards outgoing mail to appropriate devices. Security involves using

passwords, firewalls, backup and data encryption.

6 Student investigation.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

10 Chapter 3 Answers

Page 11:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

7 An intranet is a private network that often uses a leased line or its own cabling

whereas the Internet uses the PSTN. This dedicated line makes the intranet faster.

Both the intranet and the Internet share a similar interface. An intranet often

provides access to the Internet through firewalls.

Exercise 3.4

1 Five collection devices are ATM terminals for electronic banking, EFTPOS

terminals for a retail store, telephone for voice mail, keyboard for electronic mail

and video cameras for a surveillance system.

2 Encoding involves converting data from its original form into another form for

transmission. Decoding is the reverse process. It converts data from the form used

for transmission back into the original form.

3 Most natural events in the real world, such as temperature, light and pressure, are

in analog form.

4 Digital data is represented in the form of digits, or numbers.

5 A series of 0s and 1s (digital data) is encoded into a continuous wave (analog

signal).

6 The wave shape of the data (analog data) is encoded into a series of 0s and 1s

(digital signal).

7 Client-server architecture works by the client sending a request to a server

according to some protocol and the server responding.

8 The Web browser is a client program that requests services from a Web server to

complete the request. Ideally, a server should provide a user-friendly interface so

that clients are not aware of the information technology that is providing the

service.

9 An EFTPOS terminal displays information about EFTPOS transactions. It

contains a screen to display the name and price of the product being purchased.

When the customer’s bank has been contacted, then the EFTPOS terminal

displays the approval if funds are available.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

11 Chapter 3 Answers

Page 12:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

LEARNING ACTIVITIES1 Analog signals are pulses, usually electrical or optical, in the form of a continuous

wave. Digital signals are represented as a series of 0s and 1s. A scanner converts

analog data into a digital data/digital signal. A modem converts digital data to

analog signals and analog signals back to digital data.

2 In the client-server method, the client sends a request for all customers who have a

balance of over $500 to a server according to some protocol and the server

responds by sending the result of the request back to the client. In the file-server

method, the request for data is made directly to the file server without making any

changes to the request.

3 Some of the information processes when using an EFTPOS terminal are:

Collecting―scanning the plastic card for customer details and product

barcode.

Organising―ensuring the data is in the correct format to be used by

the database.

Analysing―searching the bank’s database for the customer’s account

and searching the store’s database for the product.

Storing and retrieving―retaining information about the transaction.

Processing―updating the customer’s account and the store’s account.

Transmitting and receiving―transferring information between the POS

terminal and the customer’s bank.

Displaying―showing the name of the product being purchased and the

approval of funds and providing a receipt for the customer.

4 Teachers need to assess students’ skills when completing each practical task.

Exercise 3.5

1 There is a danger of misinterpretation with messaging systems as communication

often depends on the context and inflection in the speakers’ voices and their body

language.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

12 Chapter 3 Answers

Page 13:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

2 Privacy and confidentiality are a concern with messaging systems as messages

need to be stored. Email and voice mail both store messages on servers, and these

can be accessed by the people who are providing the service. Hackers may also

break the security of these servers. Telephone conversations can be intercepted,

and fax messages can be read by anybody near the machine.

3 Electronic junk mail is unwanted email. It is a problem as people can send an

email message to one person or thousands of people very easily. If a person

receives hundreds of junk mail each day it takes up their valuable time.

4 Businesses are establishing a Web site to promote their goods and services.

Internet provides significant advantages for consumers, such as more information

about products and services, shopping globally and increased competition that has

resulted in lower prices.

5 The increase in Internet business requires more people to be employed in the

information technology industry. It may result in fewer shop fronts and fewer

people employed to provide service at these locations.

6 The developments in communication technology have made trade barriers

between countries irrelevant. People are buying and selling goods on the Internet

from other countries with little thought about trade barriers.

7 IIA has released a code of conduct that deals with censorship of online content.

The code requires ISPs to remove offensive content from their servers and to

block access to classified material hosted on overseas sites. The government has

passed a law requiring ISPs to subscribe to the IIA’s code.

8 Issues arising from Internet banking include:

Security―all banks are determined to make their online banking

services safe from inference and secure customer details.

Changing nature of work―people working for the bank are not

carrying out the services provided by Internet banking.

Branch closure and job loss―with customers using Internet banking,

EFTPOS and ATMs, there is no need to access the facilities provided by a

bank branch. This has resulted in branch closures and job losses.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

13 Chapter 3 Answers

Page 14:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

9 Video on the Internet is providing time and cost savings and the ability to view the

video globally.

10 The main advantages of telecommuting are greater flexibility in work hours and

saving money on transport, clothing, food and time. In particular, it benefits

people who are physically impaired or required to look after small children. The

employer saves on overheads, such as office space and furniture. Disadvantages

include people missing the social and professional contacts offered by an external

place of work. They experience feelings of loneliness and isolation.

Telecommuting can also blur the distinction between work and home life. The

home is no longer a place where the pressures of work can be forgotten, and work

may be interrupted by domestic chores.

LEARNING ACTIVITIES1 Banking has changed drastically with the use of plastic cards, ATMs and

EFTPOS. Internet banking and bill paying are further transforming the way we

use money. Most people agree that society has benefited from these changes;

however, there are some negative issues. The nature of jobs in the banking

industry has changed with fewer people required in the branches and more people

required with IT skills.

2 Security is a problem when Alanna pays for goods and services on the Internet.

Her account details need to be safe from interference. Data encryption is used to

secure data during transmission, and reliable backup procedures are used to ensure

the transaction has been accurately stored.

3 Student opinion. Communication systems are reducing the need for people to

leave their houses. For example, people can complete their shopping at home. On

the other hand, if communication systems are saving time, then people have more

time to explore the world.

4 Some of the changes to society caused by communication systems include ATMs,

EFTPOS, Bpay, voice mail, mobile phones, email, video conferencing,

telecommuting and accessing information from the Internet. Some of the concerns

include privacy, security, accuracy of data, changing nature of work, offensive

material on the Internet, information overload and electronic junk mail.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

14 Chapter 3 Answers

Page 15:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

5 Student opinion. There is a large amount of offensive material on the Internet that

is inappropriate for children. Banning offensive material compromises our free

society.

Chapter review 3

PART A1 A

2 D

3 C

4 C

5 C

6 A

7 B

8 A

9 A

10 B

PART B1 (e) CRC

2 (k) protocol

3 (m) star

4 (c) bps

5 (f) digital

6 (i) handshaking

7 (d) checksum

8 (j) hub

9 (o) v-mail

10 (h) ethernet

11 (g) email

12 (b) baud rate

13 (l) ring

14 (n) switch

15 (a) analog

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

15 Chapter 3 Answers

Page 16:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

PART C1 A communication system enables people to send and receive data and

information. The five basic components of a communication system, are the data

source, transmitter, transmission medium, receiver and destination.

The components of a communication system for email are:

Data source―writing the email message.

Transmitter―sending the email using a modem.

Transmission medium―telephone line.

Receiver―opening the email using a modem.

Destination―reading the email message.

2 Parity checking is a method of checking for errors in data transmission using an

additional bit called a parity bit. When an odd parity is chosen, the number of 1s

in the nine bits must be odd. This means that if the number of 1s in the first eight

bits is even, then the parity bit must be 1 to make it odd. If the number of 1s in the

first eight bits is odd, the parity bit must be 0 to keep it odd. The sender and

receiver can also decide to send an even parity; then the number of 1s in the nine

bits must be even. One major deficiency in parity checking is that, if the data

contains two errors, they will not be detected.

3 a Coaxial cable has a single copper wire surrounded by an insulator, grounded

shielding and an outer insulator. It is commonly used in LANs and over

distances less than a few kilometres. The bandwidth for a coaxial cable is 10

MBps. Fibre-optic cable uses a laser of light to carry data in small glass fibres

about the diameter of a human hair. They are replacing the conventional

copper wires. The bandwidth for fibre-optic cables is in excess of 400 MBps.

b A host computer is a computer on a network that carries out functions for

other computers. They serve terminals on the network. A terminal is a device

used to send data to a computer system or to receive data from a computer

system. Terminals often consist of a keyboard for input and a screen for

output.

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

16 Chapter 3 Answers

Page 17:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

c Asynchronous transmission is the sending of data by identifying each byte

with special start and stop bits. Synchronous transmission requires all the data

to be sent at the same rate. The same number of bytes is sent each second. This

is synchronised by each device using a clock. Synchronous transmission is

faster and more efficient than asynchronous transmission as there are no extra

bits.

d Error detection is a method of finding errors in transmission. Three common

methods for error detection are parity checking, check sum and cyclic

redundancy check. Error correction is a method of fixing the errors. The most

common form of correction is to retransmit the data.

4 There are many possible network topologies, such as star, bus and ring:

Star topology has a central computer with each device connected

directly to it. The central computer serves as a switch. It receives messages

and sends them to the destination device.

Bus topology is an arrangement in which all the devices are attached to

a direct line called a bus. Each device has a unique identity and can only

recognise those signals intended for it. Devices check the bus periodically and

retrieve their messages as data travels along the bus.

Ring topology is an arrangement in which all devices are attached so

that the path is in the shape of a continuous circle. Each device in the ring has

a unique address. Data flow is in one direction, moving from device to device

until it arrives at its destination.

5 The diagram consists of one computer with digital data entering a modem with

analog signal leaving the modem and travelling to another modem that transfers

the analog signal back into digital data for a second computer.

6 Students identify a social or ethical issue involved in a communication system,

such as privacy, security, accuracy of data, changing nature of work, offensive

material on the Internet, information overload and electronic junk mail. They need

to outline the negative aspects of an issue (such as the security of financial data)

compared to the positive aspects (such as the benefits of Internet banking).

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

17 Chapter 3 Answers

Page 18:  · Web view3 Cyclic redundancy check (CRC) is a method of checking for errors in data transmission using a division process. The data is divided into predetermined lengths and divided

Heinemann Information Processes and Technology: HSC Course

Copyright © Pearson Australia (a division of Pearson Australia Group Pty Ltd)

18 Chapter 3 Answers