Data Packets
Data Transmission
Error Checking
Encryption
100

Define data packets

It is the smallest unit of information

100

Give the three factors of the method of data transmission. 

The direction of data transmission, the method of data transmission, the method of data synchronization

100

In an echo check, who checks the data if it is correct? 

The sender is the one who will check the data, not the receiver, thus, getting the name 'echo' check.

100
Define plain text and cipher text.
Plain text is unformatted text or text with no encryption (human-readable text), whereas, cipher text is an unreadable text that is encrypted to protect information.
200
What is inside a packet header?
Packet Header, Payload, Packet Trailer
200

Describe the different directions of data transmission

Simplex is one direction only, Half-duplex is both directions but not at the same time, Full-duplex is both directions at the same time.

200

List down all the error checking discussed in the book. The group who can list it all will have the points.

Parity Check (Byte and Block), Echo Check, Checksum, Check Digit ISBN-13, Check Digit Modulo 11, ARQ

200

Describe what is Symmetric Encryption

This type of encryption uses the same key to encrypt and decrypt texts.

300

Why do some data packets get lost during transmission? How do we solve it? State how this solution works.

Lost packets happened because of faulty connections between different routers. We can solve this using hopping wherein a max hop number is added in the header and get deducted by 1 when it leaves the router. It gets deleted once the hop number turns 0.

300

Describe the two methods of data transmission

Serial sends one bit at a time in a single wire. Parallel sends multiple bits at a time in several wires.

300

How does Modulo 11 works?

Modulo 11 works by multiplying each digit with its weight. Then add it all up and divide by 11. If the remainder is not 0 or 1, then it gets subtracted from 11.

300

How is asymmetric encryption different with symmetric encryption?

Asymmetric Encryption uses two different keys to encrypt and decrypt files called the public and private keys.

400

Describe packet switching

Packet switching is the transfer of small pieces of data across various networks. These data chunks or “packets” allow for faster, more efficient data transfer. 

400

Give two advantages of USB-C compared to the older versions of USB

It carries data at 1- gigabits per second, thus, supports 4k video delivery. It can fit on the port either way around. It is smaller and thinner. It offers 20 volt power connectivity.
400

How does echo check work? Who checks the data if it is correct?

Echo check works by sending back the original data from the receiver to the sender. The original sender is the one who checks the data if it is correct.

400

True or false. Is it possible to get the original private key from a public key of that person?

No. It is impossible because the algorithms used in making a key-pair value is a trapdoor function, wherein, it is NOT easy to reverse the value back to its previous state.

500

Why is packet switching important?

It reduces interference, faster transmission of data, scalable, adaptive in terms of rerouting due to faulty connections, 

500

Why does parallel transmission cause skewing?

It causes skewing because data does not arrive in order or data arrives unsynchronized

500

How does ISBN 13 works? State the steps.

1. Add all odd position numbers. 

2. Then add all even positioned numbers and then multiply by three.

3. Add steps 1 and 2

4. Divide the sum from step 3 by 10.

5. If the remainder is not 0, then subtract the remainder from 10. That will be the check digit.

If the remainder is 0, then that is the check digit.

500

State the process of Asymmetric Encryption.

Answer varies.

M
e
n
u