12. - acehsc.net · in october 2006, the rock band wolfmother streamed the first live show to...

11
Communication systems multiple choice questions 1. If communication traffic can travel in both directions, but only one way at a time, the communication system is said to be A. half duplex B. full duplex C. nil duplex D. less duplex 2. Morgan sends a video file to a web-based video hosting site. What best describes Morgan’s action? A. Uploading B. Handshaking C. Downloading D. Videoconferencing 3. A device that interconnects two networks that use similar protocols is known as a A. Router B. Bridge C. Gateway D. Nibble 4. A protocol A. is an agreed procedure for establishing and maintaining communication between two computer devices B. is something that happens when a handshake occurs C. takes the place of a handshake D. has nothing to do with communications 5. Which error detection method is the most accurate? A. cyclical redundancy check B. check sum C. block character check D. parity bit 6. A modem that can operate at 28000 baud can A. Throughput data at a maximum speed of 28000 bps B. Throughput data at a maximum speed of 56000 bps C. Operate 28000 signal changes per second D. Operate 56000 signal changes per second

Upload: others

Post on 24-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

Communication systems multiple choice questions 1. If communication traffic can travel in both directions, but only one way at a time, the communication system is

said to be A. half duplex B. full duplex C. nil duplex D. less duplex

2. Morgan sends a video file to a web-based video hosting site. What best describes Morgan’s action?

A. Uploading B. Handshaking C. Downloading D. Videoconferencing

3. A device that interconnects two networks that use similar protocols is known as a

A. Router B. Bridge C. Gateway D. Nibble

4. A protocol

A. is an agreed procedure for establishing and maintaining communication between two computer devices B. is something that happens when a handshake occurs C. takes the place of a handshake D. has nothing to do with communications

5. Which error detection method is the most accurate?

A. cyclical redundancy check B. check sum C. block character check D. parity bit

6. A modem that can operate at 28000 baud can

A. Throughput data at a maximum speed of 28000 bps B. Throughput data at a maximum speed of 56000 bps C. Operate 28000 signal changes per second D. Operate 56000 signal changes per second

Page 2: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

7. The Internet is a

A. large supercomputer controlling all information B. handful of supercomputers controlling all the information C. global network of communication links to which any user with a computer, and ISP account can link D. network within a local area

8. 9. What is ‘smtp’?

a. communications protocol used for receiving files sent from one computer to another over a network b. an internet standard for sending email messages from one computer to a server over a network c. an internet standard for securing email messages from one computer to a server over a network d. a protocol used for sending secure webpages and webpage components over the internet

10. A network configuration that has four nodes connected to a central server via a single linear cable whose two

ends to not meet is called a a. bus network b. star network c. ring topology d. hybrid topology

Page 3: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

11. 12.

Page 4: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

15. In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A journalist reported that during fast sections of the guitar, the audio was distorted and broken. What would most likely have caused this distortion?

A. the speed of the server B. electromagnetic interference C. limitations of mobile bandwidth D. limitations of the speakers in mobile phones

Page 5: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

16.

Page 6: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

 

!"#$%&%'(%&)!

!"#$%&'()(&'(&*$+,-./$01.2$%&34,2.*-4&$5,46(77(7$.&'$+(68&4/49:$;"<$+,-./$01.2-&.*-4&$=>>?$

!"#$$%"&%'!()"*%+"!()'!,(+-.)$!/+.&%+.(!

!!'012!.3&!&0145026!.7!89:!51;0!1<8!49==0<>?!92!@:0?>A9<?!1B9:>!>5A?!0C1=!92!?9D:>A9<?!ED01?0!F9<G>!50?A>1>0!>9!0=1AD!=0!FA204>D8!H?1=IF1;A?JE0F4I49=I1:KI!(DD!700FB14L!A?!M201>D8!1EE204A1>0FI!+0M12F?6!"1=!!"(6*-4&$%$@$AB/*-)/($684-6($!C$ =$ D$ E$ F$ G$ H$ ?$ I$ C>$N! (! '! /! '! (! (! '! '! /!CC$ C=$ CD$ CE$ CF$ CG$ CH$ C?$ CI$ =>$N! (! (! N! /! (! '! '! N! N!

"(6*-4&$%%$@$<4,($

JB(7*-4&$=C$H1K!A.,K-&9$<,-*(,-.$ A.,K7$

/92204>!FA1M21=!?59OA<M!1DD!49=E9<0<>?!1<F!DA<L?! P!

(D=9?>!492204>!B:>!OA>5!=A<92!02292?!92!9=A??A9<?! Q!

!!!!!!!!!!

JB(7*-4&$=C$HBK!A.,K-&9$<,-*(,-.$ A.,K7$

'0=9<?>21>0?!M99F!:<F02?>1<FA<M!97!>50!E:2E9?0!97!1!5:B! P!

'0=9<?>21>0?!DA=A>0F!:<F02?>1<FA<M!97!>50!E:2E9?0!97!1!5:B! Q!

&50!5:B!E29;AF0?!1!=0>59F!792!49<<04>A<M!>50!7A;0!<9F0?!>9M0>502I!':2A<M!9E021>A9<!1DD!<9F0?!49==:<A41>0!9;02!1!?A<MD0!%>502<0>!?0M=0<>I!&5A?!=01<?!>51>!O50<!1!<9F0!>21<?=A>?!1!721=0!>50!5:B!20E01>?!>50!AF0<>A41D!721=0!F9O<!0;028!41BD0!>9!1DD!1>>1450F!<9F0?I!(DD!<9F0?!?5120!>50!?1=0!49==:<A41>A9<!451<<0DI!.<!1FFA>A9<6!>50!5:B!=1L0?!A>!E9??ABD0!>9!49<<04>!>50!49=E:>02?!>51>!120!QRS!=0>20?!1E12>!HQSS=!A?!>50!=1CA=:=!2049==0<F0F!D0<M>5!792!1!/1>!R!41BD0KI!.<!>5A?!0C1=ED0!>50!FA?>1<40!729=!>50!5:B!>9!0145!97!>50?0!49=E:>02?!A?!1EE29CA=1>0D8!TR=6!O5A45!A?!O0DD!OA>5A<!>50!21<M0!97!/1>!RI!

/9=E:>02!Q! /9=E:>02!PU:B!

('"V!=9F0=

/9=E:>02!W /9=E:>02!X

.<>02<0>!

Answer  1  

Page 7: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

   

!"#$#%&'($)*+$,--.$*/0012314$56271%2$'64$8'%9&60$+%&31%&'$

"'01$,$:;$<=$

!"#$%&'()*+)!"#$,-./&(0)1.&%#.&-) ,-./$)

%&'()*+,-+&*$&."&//&)+$0)1&,*+-)12)3$(4$+5&$60,6(*&$(4$+5&$7%89$'(1&'$-)1$5(:$2+$:(,;*$ <$

%&'()*+,-+&*$3((1$0)1&,*+-)12)3$(4$+5&$60,6(*&$(4$+5&$7%89$'(1&'$ =$

>1&)+242&*$+5&$,(/&$(4$+5&$7%89$'(1&'$-*$-//(:2)3$"())&"+2()$+($+5&$>)+&,)&+$ ?$

@+5&,)&+$4,-'&*$-,&$'(10/-+&1$2)+($7%89$4,-'&*$()$+5&$:-A$(0+$-)1$1&'(10/-+&1$2)+($@+5&,)&+$4,-'&*$()$+5&$:-A$2)B$C5&)$-)$2)+&,)-/$97D$D>E$*&)1*$-$4,-'&$1&*+2)&1$4(,$+5&$>)+&,)&+$2+$"()+-2)*$+5&$F7E$-11,&**$(4$+5&$7%89$'(1&'B$G5&$7%89$'(1&'$,&"&2H&*$+5&*&$4,-'&*I$'(10/-+&*$+5&'$0*2)3$J7F$2)+($+5&$7%89$*23)-/$:52"5$2*$+,-)*'2++&1$+($+5&$%897F$-+$+5&$/("-/$+&/&65()&$&."5-)3&B$G5&$'(10/-+&1$7%89$*23)-/$(""062&*$-$4,&K0&)"A$L-)1$-L(H&$+5(*&$0*&1$4(,$(,12)-,A$+&/&65()&$"-//*B$8('&$=MN$"5-))&/*$(4$&K0-/$L-)1:21+5$-,&$-H-2/-L/&$-)1$+5&$'(1&'$"5((*&*$"5-))&/*$1A)-'2"-//A$L-*&1$()$+5&$-'(0)+$(4$2)+&,4&,&)"&$6,&*&)+B$J7F$-/+&,*$+5&$-'6/2+01&$-)1$65-*&$(4$+5&$"-,,2&,$2)$1244&,&)+$"('L2)-+2()*$+($,&6,&*&)+$1244&,&)+$6-++&,)*$(4$L2+*B$G5&$,&H&,*&$6,("&**$(""0,*$+($1&'(10/-+&$+5&$7%89$*23)-/$-)1$"()H&,+$2+$2)+($@+5&,)&+$4,-'&*B$

!7)*:&,*$"(0/1$-/*($2)"/01&$12*"0**2()$(4$3-+&:-A*$(,$,(0+&,*$-*$+5&*&$40)"+2()*$-,&$-/'(*+$-/:-A*$2)"/01&1$:2+52)$1&H2"&*$;)(:)$-*$7%89$'(1&'*#B$

!"#$%&'()*+)!1#$,-./&(0)1.&%#.&-) ,-./$)

%&'()*+,-+&*$3((1$0)1&,*+-)12)3$(4$+5&$-1H-)+-3&*$(4$-$*:2+"5$(H&,$-$50L$ =$

%&'()*+,-+&*$/2'2+&1$0)1&,*+-)12)3$(4$+5&$,(/&$(4$+5&$*:2+"5$$ ?$

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

!"#$%&'()**)!-#$,-./&(0)1.&%#.&-) ,-./$)

E(,,&"+$-)*:&,$ =$

7/'(*+$"(,,&"+$-)*:&,I$L0+$'2**2)3$*('&$'&**-3&*$$ ?$

?I$=I$<I$QI$R$

!"#$%&'()**)!L#$,-./&(0)1.&%#.&-) ,-./$)

8A)+-"+2"-//A$"(,,&"+$8J9$*+-+&'&)+$:2+5$-//$6-,+*$2)"/01&1$ <$

S((1$-++&'6+$-+$+5&$,&K02,&1$8J9$*+-+&'&)+$L0+$:2+5$('2**2()*$(,$'2)(,$&,,(,*$ =$

92'2+&1$-++&'6+$-+$-)$8J9$*+-+&'&)+$ ?$

8@9@EG$F&**-3&*BF&**-3&I$O*&,*BO*&,D-'&$PTUF$F&**-3&*I$O*&,*$CV@T@$F&**-3&*BO*&,>%$W$O*&,*BO*&,>%$7D%$F&**-3&*BX,2(,F&**-3&>%$2*$DO99$UT%@T$YZ$F&**-3&>%$%@8E$

Page 8: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

 

IPT Trial HSC 2010 Suggested Answers and Marking Criteria

Page 4 of 18

Question 23 (a)

Marking C riter ia Marks

Outlines at least THREE different relevant functions 3

Outlines TWO different relevant functions 2

Outlines ONE relevant function OR identifies THREE functions 1

ADSL router includes the functions of an ADSL modem, a router and an Ethernet switch (or possibly hub). The ADSL modem function modulates data packets travelling out so they comply with the protocols used by ADSL and performs the reverse operation to demodulate data packets as they arrive over the ADSL line into digital signals. ADSL uses standard copper phone lines, however it utilises frequencies above those used for voice. Secondly the router function uses IP to direct network packets to both LAN nodes and more critically to nodes on the Internet. Most routers also provide a variety of other functions, including firewalls and other security features. The Ethernet switch (or possibly hub) connects nodes using the transmission level Ethernet protocol. In this case the switch has 4 ports therefore up to four nodes can be directly connected. The switch and the connected nodes form a LAN where the switch directs data packets to their destination node based on

-in MAC address. If it is a hub then all packets are sent to all nodes.

Question 23 (b)

Marking C riter ia Marks

Demonstrates good understanding of the new hardware required 2

Demonstrates limited understanding of the function of new hardware required 1

To enable wireless connections a wireless access point (WAP) is required. The WAP converts Ethernet to wireless 802.11g so the laptops can connect. However, for home use it is often more cost effective to purchase a wireless router (which includes a built-model that includes a WAP. If a wireless router is purchased then all additional functions should be turned off (refer to user manual) so the device acts just as a WAP would. The WAP should be connected to one of the spare Ethernet ports . This will enable wireless devices (the laptops) to join the Ethernet network via the 802.11g wireless link, and then connect to the Internet via the ADSL link. If a new

In all cases security should be setup for the 802.11g network to prevent others from accessing the network.

Question 23 (c)

Marking C riter ia Marks

Demonstrates excellent understanding of the network including all hardware devices and links required, with a correctly labelled diagram including correct transmission level protocols

3

Demonstrates sound understanding of the network including most hardware devices and links 2

Demonstrates some limited understanding of the network 1

!"#$

$%&'()'$

$%&'()'$

*+,-../$$

0(12342($54(2342($

"67%$

$0(12342($

6289()'$:);'<(23$

#3=4(23$>7?$

Answer  2  

Page 9: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

   

   

IPT Trial HSC 2010 Suggested Answers and Marking Criteria

Page 5 of 18

Question 23 (d)

Marking C riter ia Marks

Identifies HTTP and TCP/IP protocols AND demonstrates excellent understanding of the essential processes each performs.

3

Identifies HTTP and TCP/IP protocols AND demonstrates general understanding of the essential processes each performs.

2

Identifies HTTP and TCP/IP protocols OR demonstrates general understanding of the role of the application level, and the communication, control and addressing level protocols

1

HTTP GET command with the URL of the webpage. When the HTTP command reaches the web server the web server responds by

r, which makes sense of the file and displays it within the browser. At the communication, control and addressing level TCP/IP operates to manage the delivery of the data packets involved in the transfer of the HTTP GET command and the transfer of the web page document back to the browser. TCP ensures messages reach their destination correctly, while IP manages the actual delivery through the network. Although TCP and IP operate together, each performs distinct functions. A TCP communication session is initiated between sender and receiver. All TCP segments are sent

acknowledges receipt of each segment as they are received. If an acknowledgement is not received within a reasonable amount of time then the sender will retransmit that segment. The IP manages the movement of data packets (datagrams) from sender to receiver. The IP address is used by routers to determine the most efficient route each datagram should follow. IP does not guarantee delivery of datagrams - in fact, datagrams found to have an error or other problem are simply discarded.

Question 24 (a)

Marking C riter ia Marks

All entities and processes are identified 1

External Entities: Sending User, Receiving User Processes: Encrypt message, Generate keys, Decrypt message

Question 24 (b)

Marking C riter ia Marks

Demonstrates excellent understanding of the encryption, transfer and decryption process shown in the diagram, including the generation and use of the two keys

3

Demonstrates excellent understanding of at least two significant processes comprising the encryption, transfer and decryption process shown in the diagram

2

Demonstrates limited understanding of at least one process shown in the diagram 1

1. Sending user constructs the message 2. Sender requests public key 3. Receiver generates a public/private key pair and sends the public key to the sender. 4. Sender uses the public key to encrypt the message to be sent 5. Encrypted message is transmitted from sender to receiver 6. The receiver uses the private key to decrypt the message 7. Message is viewed by receiving user

Answer  3  

Page 10: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A

   

 

Answer  4  

Page 11: 12. - acehsc.net · In October 2006, the rock band Wolfmother streamed the first live show to mobile phones. The show was encoded and compressed, then uploaded to a web server. A