The City School Liaquat Campus Class:08 Reinforcement worksheet

Size: px
Start display at page:

Download "The City School Liaquat Campus Class:08 Reinforcement worksheet"

Transcription

1 The City School Liaquat Campus Class:8 Reinforcement worksheet To begin with A computer understands only two digits: and. With these single digits it is possible to communicate with other computers on the Internet and to store text, images, video, and control peripherals. When the speedometer of a car shows "85 mph" its computer understands the mph! Let's investigate questions The s we understand are decimals while a computer understands binary s. How can we convert a from one format to another? The binary consists of 8 digits (bits). To convert that to a decimal we write the digits in a row and calculate the place value of each digit. Then add only the nonzero place value. The resulting sum is the equivalent decimal. Binary digits Place value 2 7 = = = = = = 4 2 = 2 2 = Decimal = 85 Can you calculate the decimal equivalent of the binary by filling in the blanks in the table below? Binary digits Place value 2 7 = = = = = = 4 2 = 2 2 = Add this decimal to 85. What decimal is obtained? Can you convert this decimal to binary? It may help you to complete the table below. Binary digits Place value 2 7 = = = = = = 4 2 = 2 2 = Decimal = Decimal = How many positive integers can be represented by a binary 'word' of 8-bit? If it seems difficult to convert a positive integer to binary then you can follow the method of successive remainders. According to this: We divide the decimal by 2. The result shall be divided by 2 again, the new quotient again by 2, etc., until we find the quotient. We write the remainders of these divisions in reverse order

2 For example, let's calculate the binary of 43. The rightmost digit in the row of the binary The binary of 43 is. It includes only six digits. If we want 8 digits then we must addzeroes to the left (i.e. = ). Now can you calculate the binary of 85 using this method? Let s discover Hexadecimal s are used to limit the area over which a series of binary digits can exist. The following table shows the correlation between hexadecimal digits and decimal s. Hexadecimal digits Decimal assignment A B C D E F Converting a hexadecimal to a decimal is the same process by which we convert a binary to decimal. Thus for example, the hexadecimal 3AD is equal to the decimal 94. Hexadecimal digits 3 A D Decimal assignment 3 3 Place value 6 2 = = 6 6 = 3*256 *6 3* Decimal = 94 Now, convert the hexadecimal 2A3 to a decimal by filling in the table below. Hexadecimal digits 2 Α 3 Decimal assignment Place value 6 3 = = = 6 6 = Decimal = The rightmost digit in the row of the hexadecimal

3 To convert a decimal to hexadecimal, follow the method of successive balance. So, can you find which hexadecimal corresponds to the decimal 234? What hexadecimal did you find? Let s develop and implement All data types (text, images, etc.) are stored in the form of binary s. The ASCII character set was one of the first to be applied for assigning a character to a. The RGB model assigns a color to a. Consult the table in your book (p. 9) that maps the position of each character in the ASCII and find the 8-bit binary s and the hexadecimal equivalent to the capital letters S and O. ASCII character S O 8-bit binary Hexadecimal Open Windows Calculator and determine whether you have found the correct s above (see p. 8). Let s develop and implement The computer makes calculations using proper connection of gates (p. ). Three of them (AND, OR and XOR) are with two signal inputs, while the NOT gate has one input. What acts can they do and how? Let's take two binary s A and B of -bit each. Input A will take the values or, like B. To add them, we know that; Decimal system Binary system Α Β C + = + = + = + = + = + = + = 2 + = Note that the binary sum C is a 2-bit. Therefore, if we have two inputs (A and B), we will need two outputs for C; the C (right figure C) and C2 (left figure C). The adjacent truth table defines the above addition. Α Β C2 C C In the figure below in each rectangle, draw the appropriate gate so that the circuit implements the truth table. Α Β C C2

4 Match each sentence on the left column with the correct component on the right The ALU performs arithmetic and logical operations on all required data. It carries out instructions and also performs the operations on various registers. If it is necessary to get more data for a specific instruction, then they are transferred from the main memory to the registers. Executing of instructions The results of executing instructions are placed in the main memory. Decoding of instructions The instructions are transferred from the main memory and stored temporarily in small memories within the CPU called registers. The control unit interprets the instruction stored in the instruction register, turning it into a signal that can be understood by the ALU. Storing of results Fetching of instructions How is packet switching implemented?fill in the blanks with the correct word or phrase in the table. are divided into Destination individually to their Messages Packets reassembled in their transferred through the How do computers identify web pages on the Internet? Fill the blanks with the correct word or phrase in the table. computer DNS Hostname is a for a IP address URL web page

5 Without protocols there would not be communication Network Protocol is a set of rules that defines how data is formatted and processed on a network in order to exchange messages among the devices of the network. Protocol stack is a set of network protocol layers that work together. Each protocol layer consists of one or more protocol modules that communicate with two others; the higher and the lower of its layer. The lowest layer handles the hardware while the highest handles user applications. The following figure shows the layers hierarchy and structure TCP/IP Suite Application Layer HTTPS HTTP FTP SMPT DNS Audio Codecs RTP/RTCP Video Codecs Transport Layer Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet Layer Internet Protocol (IP) Network Interface Layer Ethernet, Wireless, Cable, Fiberglass Consult your book on the functioning of the various protocols. Match each text with the correct layer. This layer splits data in order to be sent in packets and reorders and reassembles the packets at their destination. It deals with any errors that occur, such as if a packet never arrives at the destination or the contents of a packet are corrupted. This layer provides the user a way to access any information in the network through an application. This layer is responsible for routing data packets between different networks, regardless of their infrastructure. Let's investigate Personal data is any piece of information relating to you. If you have control of your personal data then you have control your personal life, too.but what is personal data and how could it be used against you? The table below shows different types of personal data. Evaluate these types of data on a scale from A to C: Information that should not be published should be graded A. Information you choose for some people to know should be graded B. Information you do not mind the whole world knowing should be graded C. Personal data. Your name 2. Your address 3. Your musical tastes 4. Your 5. Your phone s 6. Your favorite movies 7. Your various passwords 8. Your credit card s 9. Your school. Photos of You Grade

6 . Videos of You 2. Your school grades 3. Your age 4. Your nickname Module 2 Relationships between tables Your team has taken over the management of the school library. Your responsibility is to record the books that students borrow and to make sure they are returned. A basic database table (Students) is that which contains the main information about students, such as their First name, Last name, Phone, Home address and address. In this table have inserted the following records: First name Last name Phone Home address address Tom Smith Greenville tom@digital-kids.com George Smith Greenville tom@digital-kids.com Stella Williams Newton Ave. stella@digital-kids.com Alex Johnson Central Ave. alex@digital-kids.com Tom Brown CastleCourt tbrown@digital-kids.com The first row of the table contains the field names. The rest of the rows are the records of the table. We consider as Primary Key the field whose value uniquely identifies the record. Namely, it is impossible for this value to appear in two or more records. Which field of this table could be Primary Key? Justify your answer. Observe the following table. Student_ID First name Last name Phone Home address address Tom Smith Greenville tom@digital-kids.com 2 George Smith Greenville tom@digital-kids.com 3 Stella Williams Newton Ave. stella@digital-kids.com 4 Alex Johnson Central Ave. alex@digital-kids.com 5 Tom Brown CastleCourt tbrown@digital-kids.com Which field of this table could be Primary Key? Justify your answer. The structure of the table Students, namely the fields names of each record, is depicted to the adjoining picture. Now, let s divide this table into two separate tables. The first (Students_Names) contains only the students names. The second (Students_Info) contains the rest contact information. Fill in the empty cells so that each record of the first table is matched with one record of the other table (and even the correct one). Students_Names Student_ID First name Last name Smith 2 George 3 4 Alex Johnson 5 Tom Students_Info Student_ID Phone Home address address Greenville tom@digital-kids.com 567 Central Ave tom@digital-kids.com CastleCourt

7 These twotablesare relatedas shown in thefollowing picture. Now, let s create a table (Books_Authors) with the available book titles of the school library and their authors. In this table we inserted some records. Author name Book Title Charles Dickens Great Expectations Fyodor Dostoevsky Crime and Punishment Fyodor Dostoevsky The Idiot Hans Christian Andersen Fairy tales Charles Dickens The Battle of Life Ernest Hemingway The Old Man and the Sea Observe the table above and answer the following questions. Put a if the sentence is correct There is a book title written by two (or more) authors. There are authors who have written only one book title. There are authors who have written two (or more) book titles. Only one book title corresponds with each author. Only one author corresponds with each book title. For each author there could be many corresponding book titles. Now, let s divide this table into two separate tables. The first table (Authors) contains the authors (4 records) and the second table (Books) contains the book titles (6 records). In each table we add a Primary key. More specifically, in the table Authors we add the Author_ID, as in the Book_ID in the table Books. As the table Books contains more records than the table Authors does, we add one more field (the Author_ID) in the table Books, which shows the book s author. We name this field as Secondary key. Fill in the empty cells of the following tables. Authors Author_ID Author name Books Book_ID Book title Author_ID These two tables are related as shown in the following picture.

8 Now, we create a table that contains information about the library books. This table should contain the name of the student, the book title, the date borrowed and the date returned. We insert some records about some students: First name Last name Book title Date borrowed Date returned Stella Williams The Battle of Life 4/3/23 George Smith The Idiot 4/25/23 5/3/23 Alex Johnson Fairy tales 4/28/23 5/3/23 Tom Brown The Idiot 5/6/23 George Smith Crime and Punishment 5/2/23 6/4/23 Observe the table above and answer the following questions. But in this table there is information that has already been inserted into tables that have been created. Find this information and answer the following questions. Select the correct answer The fields Firstname and Lastname of each student are in the table The field Booktitle is in the table The fields Date borrowed and Datereturned are in the table Students_Names Students_Info Books Authors None Students_Names Students_Info Books Authors None Students_Names Students_Info Books Authors None Now, we create a new table again for lending books (Books_Lending) and fill it with information. This table has its own primary key, so each lending will have a certain code. Then fill the empty cells of the following table. Keep in mind that when you add a book or a student id the database will retrieve all the necessary information through the related tables (relationships). Books_Lending Lend_ID Student_ID Book_ID Date borrowed Date returned 4/3/23 2 4/25/23 5/3/23 3 4/28/23 5/3/23 4 5/6/23 5 5/2/23 6/4/23 All the tables you created are shown in the figure below.

The City School. PAF Chapter. Nov 2018 Class 8. ICTech. Revision Worksheet

The City School. PAF Chapter. Nov 2018 Class 8. ICTech. Revision Worksheet The City School PAF Chapter Nov 2018 Class 8 ICTech Revision Worksheet Binary Logic SA 2018. PHOTOCOPIABLE. Last update: 11/28/2018 - Page 1 of 41 Numbers and colors To begin with A computer understands

More information

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two 26 February 2014

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two 26 February 2014 Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate

More information

(a) What is the denary equivalent of the hexadecimal number A7?

(a) What is the denary equivalent of the hexadecimal number A7? 1 What is the denary equivalent of the hexadecimal number A7? You may use the space below for rough working. You may get some marks for your working, even if your answer is incorrect. Represent the denary

More information

Business Data Networks and Security 10th Edition by Panko Test Bank

Business Data Networks and Security 10th Edition by Panko Test Bank Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:

More information

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two Solutions 26 February 2014

ECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two Solutions 26 February 2014 Problem 1 (4 parts, 21 points) Encoders and Pass Gates Part A (8 points) Suppose the circuit below has the following input priority: I 1 > I 3 > I 0 > I 2. Complete the truth table by filling in the input

More information

MRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17. Year 9 Computing Time: 1hr 30mins

MRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17. Year 9 Computing Time: 1hr 30mins MRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17 Year 9 Computing Time: 1hr 30mins Name: Class: Please read the following instructions carefully: 1. Answer ALL the questions in the space provided

More information

Dec Hex Bin ORG ; ZERO. Introduction To Computing

Dec Hex Bin ORG ; ZERO. Introduction To Computing Dec Hex Bin 0 0 00000000 ORG ; ZERO Introduction To Computing OBJECTIVES this chapter enables the student to: Convert any number from base 2, base 10, or base 16 to any of the other two bases. Add and

More information

Final Examination Semester 2 / Year 2011

Final Examination Semester 2 / Year 2011 Southern College Kolej Selatan 南方学院 Final Examination Semester 2 / Year 2011 COURSE : COMPUTER SYSTEM COURSE CODE : CSIS 1003 TIME : 2 HOURS 30 MINUTES DEPARTMENT : COMPUTER SCIENCE LECTURER : DR. LEE

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

CSIBridge: Computer Science for Digital Forensics and Cyber Security

CSIBridge: Computer Science for Digital Forensics and Cyber Security M.S. in Forensic Computing Program John Jay College of Criminal Justice The City University of New York CSIBridge: Computer Science for Digital Forensics and Cyber Security Foundations for Digital Forensics

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

CC411: Introduction To Microprocessors

CC411: Introduction To Microprocessors CC411: Introduction To Microprocessors OBJECTIVES this chapter enables the student to: Use number { base 2, base 10, or base 16 }. Add and subtract binary/hex numbers. Represent any binary number in 2

More information

MRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17. Year 9 Computing Time: 1hr 30mins MARKING SCHEME. a) CPU : b) MSB : c) GUI :

MRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17. Year 9 Computing Time: 1hr 30mins MARKING SCHEME. a) CPU : b) MSB : c) GUI : MRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17 Year 9 Computing Time: 1hr 30mins MARKING SCHEME 1. What do the following abbreviations stand for? Central Processing Unit a) CPU : Most Significant

More information

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets. Team Project 1 Due: Beijing 00:01, Friday Nov 7 Language: English Turn-in (via email) a.pdf file. Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and

More information

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1 CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1 Due 11:59pm Friday October 6 Instructions: 1. Please submit your homework using the on-line electronic submission system (via

More information

UNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations

UNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations UNIT 1 USING LOGIC Create a working example of a full adder logic gate circuit and test its operation with a series of bytes that need to be added. Report on the findings and limitations found Write a

More information

Lecture 2: Number Systems

Lecture 2: Number Systems Lecture 2: Number Systems Syed M. Mahmud, Ph.D ECE Department Wayne State University Original Source: Prof. Russell Tessier of University of Massachusetts Aby George of Wayne State University Contents

More information

EE 610 Part 2: Encapsulation and network utilities

EE 610 Part 2: Encapsulation and network utilities EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Chapter 11: Wide-Area Networks and the Internet

Chapter 11: Wide-Area Networks and the Internet Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet

More information

2nd Paragraph should make a point (could be an advantage or disadvantage) and explain the point fully giving an example where necessary.

2nd Paragraph should make a point (could be an advantage or disadvantage) and explain the point fully giving an example where necessary. STUDENT TEACHER WORKING AT GRADE TERM TARGET CLASS YEAR TARGET The long answer questions in this booklet are designed to stretch and challenge you. It is important that you understand how they should be

More information

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101

More information

The x86 Microprocessors. Introduction. The 80x86 Microprocessors. 1.1 Assembly Language

The x86 Microprocessors. Introduction. The 80x86 Microprocessors. 1.1 Assembly Language The x86 Microprocessors Introduction 1.1 Assembly Language Numbering and Coding Systems Human beings use the decimal system (base 10) Decimal digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Computer systems use the

More information

New York University Computer Science Department Courant Institute of Mathematical Sciences

New York University Computer Science Department Courant Institute of Mathematical Sciences New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:

More information

Division. Reverse Box Method

Division. Reverse Box Method Division Reverse Box Method Why do we use the reverse box method? The box method of multiplication is used because it develops a strong conceptual understanding of multiplication! If you have not read

More information

GCSE Computer Science for OCR Overview Scheme of Work

GCSE Computer Science for OCR Overview Scheme of Work GCSE Computer Science for OCR Overview Scheme of Work The following assumes a two-year model. During the course, the final challenges can be used for practice in computational thinking, algorithm design

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

ECE 2030B 1:00pm Computer Engineering Spring problems, 5 pages Exam Two 10 March 2010

ECE 2030B 1:00pm Computer Engineering Spring problems, 5 pages Exam Two 10 March 2010 Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate

More information

Objectives. Connecting with Computer Science 2

Objectives. Connecting with Computer Science 2 Objectives Learn why numbering systems are important to understand Refresh your knowledge of powers of numbers Learn how numbering systems are used to count Understand the significance of positional value

More information

Stonelaw High School. Computing Science. BGE - Computer Systems

Stonelaw High School. Computing Science. BGE - Computer Systems Stonelaw High School Computing Science BGE - Computer Systems Contents Computer Systems... 3 Computer Systems... 3 Hardware & Software... 3 Data Representation... 3 Representing Positive Integers... 3

More information

Project points. CSE422 Computer Networking Spring 2018

Project points. CSE422 Computer Networking Spring 2018 Project 1 100 points Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

User. Application program. Interfaces. Operating system. Hardware

User. Application program. Interfaces. Operating system. Hardware Operating Systems Introduction to Operating Systems and Computer Hardware Introduction and Overview The operating system is a set of system software routines that interface between an application program

More information

CCNA 1: Chapter 2 Exam Answer v %

CCNA 1: Chapter 2 Exam Answer v % 1. Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

Introduction to Computer Science. Homework 1

Introduction to Computer Science. Homework 1 Introduction to Computer Science Homework. In each circuit below, the rectangles represent the same type of gate. Based on the input and output information given, identify whether the gate involved is

More information

Vanavani Mat. Hr. Sec. School. Subject : Computer Science Std: XI. Quarterly Exam Key

Vanavani Mat. Hr. Sec. School. Subject : Computer Science Std: XI. Quarterly Exam Key Vanavani Mat. Hr. Sec. School Subject : Computer Science Std: XI Quarterly Exam Key Part I (15 X 1 = 15) 1. d 2. A 3. C 4. D 5. D 6. c 7. B 8. A 9. D 10. B 11. d 12. C 13. D 14. A 15. A Part B -Any Six

More information

AQA GCSE Computer Science PLC

AQA GCSE Computer Science PLC 1 - Fundamentals of Algorithms Useful Websites BBC Bite Size Cambridge GCSE Exam Dates https://www.bbc.co.uk/education/subjects/z34k7ty Paper 1 14/05/2018 am https://www.cambridgegcsecomputing.org/ Paper

More information

Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level. Published

Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level. Published Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level COMPUTER SCIENCE 9608/1 Paper Written Paper MARK SCHEME Maximum Mark: 75 Published This mark

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

ST.FRANCIS SECONDARY SCHOOL SLIEMA HALF YEARLY EXAMINATIONS SPECIMEN PAPER. SENIOR 3 COMPUTER STUDIES TIME: 2 hours

ST.FRANCIS SECONDARY SCHOOL SLIEMA HALF YEARLY EXAMINATIONS SPECIMEN PAPER. SENIOR 3 COMPUTER STUDIES TIME: 2 hours Name: Index: Class: ST.FRANCIS SECONDARY SCHOOL SLIEMA HALF YEARLY EXAMINATIONS SENIOR 3 COMPUTER STUDIES TIME: 2 hours The use of CALCULATORS is NOT ALLOWED!! Answer ALL questions!! 1: The following diagrams

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2

15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2 15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2 Name Section Directions: Answer each question neatly in the space provided. Please read each question carefully. You have 50 minutes for this exam. No electronic

More information

Von Neumann Architecture

Von Neumann Architecture Von Neumann Architecture Assist lecturer Donya A. Khalid Lecture 2 2/29/27 Computer Organization Introduction In 945, just after the World War, Jon Von Neumann proposed to build a more flexible computer.

More information

Level ISA3: Information Representation

Level ISA3: Information Representation Level ISA3: Information Representation 1 Information as electrical current At the lowest level, each storage unit in a computer s memory is equipped to contain either a high or low voltage signal Each

More information

Business Data Communications and Networking

Business Data Communications and Networking Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP

More information

UNCA CSCI 255 Exam 1 Spring February, This is a closed book and closed notes exam. It is to be turned in by 1:45 PM.

UNCA CSCI 255 Exam 1 Spring February, This is a closed book and closed notes exam. It is to be turned in by 1:45 PM. UNCA CSCI 255 Exam 1 Spring 2017 27 February, 2017 This is a closed book and closed notes exam. It is to be turned in by 1:45 PM. Communication with anyone other than the instructor is not allowed during

More information

Introduction to Computer Science (I1100) Networks. Chapter 6

Introduction to Computer Science (I1100) Networks. Chapter 6 Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and

More information

INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT

INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT INFORMATION TECHNOLOGY CONCEPTS-OPEN- REGIONAL 2017 Page 1 of 10 INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT REGIONAL 2017 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS (100 points) Failure to adhere

More information

in this web service Cambridge University Press

in this web service Cambridge University Press 978-0-51-85748- - Switching and Finite Automata Theory, Third Edition Part 1 Preliminaries 978-0-51-85748- - Switching and Finite Automata Theory, Third Edition CHAPTER 1 Number systems and codes This

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

Basics of datacommunication

Basics of datacommunication Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CMPS Introduction to Computer Science Lecture Notes Binary Numbers Until now we have considered the Computing Agent that executes algorithms to be an abstract entity. Now we will be concerned with techniques

More information

Lab Exercise Protocol Layers

Lab Exercise Protocol Layers Lab Exercise Protocol Layers Objective To learn how protocols and layering are represented in packets. They are key concepts for structuring networks that are covered in 1.3 and 1.4 of your text. Review

More information

Assembly Language for Intel-Based Computers, 4 th Edition. Chapter 1: Basic Concepts. Chapter Overview. Welcome to Assembly Language

Assembly Language for Intel-Based Computers, 4 th Edition. Chapter 1: Basic Concepts. Chapter Overview. Welcome to Assembly Language Assembly Language for Intel-Based Computers, 4 th Edition Kip R. Irvine Chapter 1: Basic Concepts Slides prepared by Kip R. Irvine Revision date: 09/15/2002 Chapter corrections (Web) Printing a slide show

More information

HASTINGS HIGH SCHOOL

HASTINGS HIGH SCHOOL HASTINGS HIGH SCHOOL EXAMINATION GUIDE 2017-19 Subject Course code Website address Provisional examination dates Computer Science Computer Science (9-1) - J276 https://www.ocr.org.uk/qualifications/gcse/computerscience-j276-from-2016/

More information

CS3516 B10 Computer Networks Final Exam December 14, 2010

CS3516 B10 Computer Networks Final Exam December 14, 2010 Name CS3516 B10 Computer Networks Final Exam December 14, 2010 Question Points Score 0 1 1 27 2 8 3 12 4 7 5 2 6 6 7 3 8 6 9 3 10 9 11 3 12 2 13 8 14 2 15 2 Total 100 Trivia Question (1 extra credit point)

More information

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v6.0 Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,

More information

BINARY SYSTEM. Binary system is used in digital systems because it is:

BINARY SYSTEM. Binary system is used in digital systems because it is: CHAPTER 2 CHAPTER CONTENTS 2.1 Binary System 2.2 Binary Arithmetic Operation 2.3 Signed & Unsigned Numbers 2.4 Arithmetic Operations of Signed Numbers 2.5 Hexadecimal Number System 2.6 Octal Number System

More information

COE 202- Digital Logic. Number Systems II. Dr. Abdulaziz Y. Barnawi COE Department KFUPM. January 23, Abdulaziz Barnawi. COE 202 Logic Design

COE 202- Digital Logic. Number Systems II. Dr. Abdulaziz Y. Barnawi COE Department KFUPM. January 23, Abdulaziz Barnawi. COE 202 Logic Design 1 COE 0- Digital Logic Number Systems II Dr. Abdulaziz Y. Barnawi COE Department KFUPM COE 0 Logic Design January 3, 016 Objectives Base Conversion Decimal to other bases Binary to Octal and Hexadecimal

More information

CNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks

CNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks Lab Book: Data Transmission Over Digital Networks Contents Data Transmission Over Digital Networks... 3 Lab Objectives... 3 Lab Resources... 3 Task 1 Build the Home Network... 3 Task 2 Configure IP Addresses...

More information

Refer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J

Refer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J 1. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation the division of segments into packets network media control 2. Which characteristic

More information

Reti di Calcolatori I

Reti di Calcolatori I Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria

More information

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level

Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level *0276230714* COMPUTER SCIENCE 9608/13 Paper 1 Theory Fundamentals May/June 2016 1 hour 30 minutes Candidates

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:

More information

Midterm Exam 2A Principles of Computing Fall November 10, 2014

Midterm Exam 2A Principles of Computing Fall November 10, 2014 Midterm Exam 2A 15110 Principles of Computing Fall 2014 November 10, 2014 Name: Andrew ID: Lab section: Instructions Answer each question neatly in the space provided. There are 6 questions totaling 28

More information

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

TCP /IP Fundamentals Mr. Cantu

TCP /IP Fundamentals Mr. Cantu TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:

More information

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark

More information

THE UNIVERSITY OF NEW SOUTH WALES

THE UNIVERSITY OF NEW SOUTH WALES Name of Candidate: Student ID: Signature: THE UNIVERSITY OF NEW SOUTH WALES COMP3331/93331 Computer Networks and Applications Sample Mid-session Examination INSTRUCTIONS TO CANDIDATES: (1) Time allowed:

More information

Network Architecture I

Network Architecture I Network Architecture I Degree in: Communications Electronic Engineering Telecommunication Systems Engineering Telecommunication Technologies Engineering Telematics Engineering Universidad de Alcalá 2016/17

More information

ECE 461 Internetworking Fall Quiz 1

ECE 461 Internetworking Fall Quiz 1 ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators

More information

SFPL Reference Manual

SFPL Reference Manual 1 SFPL Reference Manual By: Huang-Hsu Chen (hc2237) Xiao Song Lu(xl2144) Natasha Nezhdanova(nin2001) Ling Zhu(lz2153) 2 1. Lexical Conventions 1.1 Tokens There are six classes of tokes: identifiers, keywords,

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Read this before starting!

Read this before starting! Points missed: Student's Name: Total score: /1 points East Tennessee State University Department of Computer and Information Sciences CSCI 215 (Tarnoff) Computer Organization Section 1 TEST 1 for Fall

More information

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Game100 Networking Lab 4 Name: Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Objectives Switch between the two Windows Calculator modes. Use Windows Calculator to convert between decimal,

More information

Lab: 2. Wireshark Getting Started

Lab: 2. Wireshark Getting Started Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages

More information

COMP2 (JUN15COMP201) General Certificate of Education Advanced Subsidiary Examination June 2015

COMP2 (JUN15COMP201) General Certificate of Education Advanced Subsidiary Examination June 2015 Centre Number Surname Candidate Number For Examiner s Use Other Names Candidate Signature Examiner s Initials Question Mark Computing General Certificate of Education Advanced Subsidiary Examination June

More information

Wireshark HTTP. Introduction. The Basic HTTP GET/response interaction

Wireshark HTTP. Introduction. The Basic HTTP GET/response interaction Wireshark HTTP Introduction Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we re now ready to use Wireshark to investigate protocols in operation. In this lab, we

More information

6. Correspondence relationship between Educational goals and Course goals

6. Correspondence relationship between Educational goals and Course goals 1. Course Title (Course Code) Fundamentals of Information Networks (2201) 2. Instructor Teruaki YOKOYAMA 3. Term Fall 2 4. Outline and Objectives In this course the students study the technologies for

More information

N.B. These pastpapers may rely on the knowledge gained from the previous chapters.

N.B. These pastpapers may rely on the knowledge gained from the previous chapters. N.B. These pastpapers may rely on the knowledge gained from the previous chapters. 1 SEC 94-PAPER 1-Q3B Briefly explain the purpose of the PROGRAM COUNTER 2 SEC 94-PAPER 2A-Q4 (a) Why is a 16-bit 60 MHz

More information

Read this before starting!

Read this before starting! Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 2150 (Tarnoff) Computer Organization TEST 1 for Spring Semester,

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the

More information

COSC 6377 Mid-Term #2 Fall 2000

COSC 6377 Mid-Term #2 Fall 2000 Name: SSN: Signature: Open book, open notes. Your work must be your own. Assigned seating. Test time: 7:05pm to 8:05pm. You may not use a calculator or PalmPilot to calculate subnetting/host/netid information.

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Analogue vs. Discrete data

Analogue vs. Discrete data CL 1 Analogue vs. Discrete data analogue data Analogue vs. Discrete data Data is the raw information that is input into the computer. In other words, data is information that is not yet processed by the

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

M3-R3: INTERNET AND WEB DESIGN

M3-R3: INTERNET AND WEB DESIGN M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

More information

Scribe Notes -- October 31st, 2017

Scribe Notes -- October 31st, 2017 Scribe Notes -- October 31st, 2017 TCP/IP Protocol Suite Most popular protocol but was designed with fault tolerance in mind, not security. Consequences of this: People realized that errors in transmission

More information

ECE 358 Project 3 Encapsulation and Network Utilities

ECE 358 Project 3 Encapsulation and Network Utilities ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 01, SPRING 2013

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 01, SPRING 2013 CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 01, SPRING 2013 TOPICS TODAY Course overview Levels of machines Machine models: von Neumann & System Bus Fetch-Execute Cycle Base

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

Wireshark Lab: Getting Started v7.0

Wireshark Lab: Getting Started v7.0 Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

ENGG1015: Homework 3

ENGG1015: Homework 3 ENGG1015: Homework 3 Dr. Kenneth Wong / Dr. Hayden So Due: 5pm, Nov 24, 2010 Turn in your homework at boxes outside Rm712, CYC Building Question 1 Digital Logic 1 Simplify the following Boolean expressions

More information

CS 43: Computer Networks The Link Layer. Kevin Webb Swarthmore College November 28, 2017

CS 43: Computer Networks The Link Layer. Kevin Webb Swarthmore College November 28, 2017 CS 43: Computer Networks The Link Layer Kevin Webb Swarthmore College November 28, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network Layer

More information

COE 202: Digital Logic Design Number Systems Part 2. Dr. Ahmad Almulhem ahmadsm AT kfupm Phone: Office:

COE 202: Digital Logic Design Number Systems Part 2. Dr. Ahmad Almulhem   ahmadsm AT kfupm Phone: Office: COE 0: Digital Logic Design Number Systems Part Dr. Ahmad Almulhem Email: ahmadsm AT kfupm Phone: 860-7554 Office: -34 Objectives Arithmetic operations: Binary number system Other number systems Base Conversion

More information