The City School Liaquat Campus Class:08 Reinforcement worksheet
|
|
- Flora Chapman
- 5 years ago
- Views:
Transcription
1 The City School Liaquat Campus Class:8 Reinforcement worksheet To begin with A computer understands only two digits: and. With these single digits it is possible to communicate with other computers on the Internet and to store text, images, video, and control peripherals. When the speedometer of a car shows "85 mph" its computer understands the mph! Let's investigate questions The s we understand are decimals while a computer understands binary s. How can we convert a from one format to another? The binary consists of 8 digits (bits). To convert that to a decimal we write the digits in a row and calculate the place value of each digit. Then add only the nonzero place value. The resulting sum is the equivalent decimal. Binary digits Place value 2 7 = = = = = = 4 2 = 2 2 = Decimal = 85 Can you calculate the decimal equivalent of the binary by filling in the blanks in the table below? Binary digits Place value 2 7 = = = = = = 4 2 = 2 2 = Add this decimal to 85. What decimal is obtained? Can you convert this decimal to binary? It may help you to complete the table below. Binary digits Place value 2 7 = = = = = = 4 2 = 2 2 = Decimal = Decimal = How many positive integers can be represented by a binary 'word' of 8-bit? If it seems difficult to convert a positive integer to binary then you can follow the method of successive remainders. According to this: We divide the decimal by 2. The result shall be divided by 2 again, the new quotient again by 2, etc., until we find the quotient. We write the remainders of these divisions in reverse order
2 For example, let's calculate the binary of 43. The rightmost digit in the row of the binary The binary of 43 is. It includes only six digits. If we want 8 digits then we must addzeroes to the left (i.e. = ). Now can you calculate the binary of 85 using this method? Let s discover Hexadecimal s are used to limit the area over which a series of binary digits can exist. The following table shows the correlation between hexadecimal digits and decimal s. Hexadecimal digits Decimal assignment A B C D E F Converting a hexadecimal to a decimal is the same process by which we convert a binary to decimal. Thus for example, the hexadecimal 3AD is equal to the decimal 94. Hexadecimal digits 3 A D Decimal assignment 3 3 Place value 6 2 = = 6 6 = 3*256 *6 3* Decimal = 94 Now, convert the hexadecimal 2A3 to a decimal by filling in the table below. Hexadecimal digits 2 Α 3 Decimal assignment Place value 6 3 = = = 6 6 = Decimal = The rightmost digit in the row of the hexadecimal
3 To convert a decimal to hexadecimal, follow the method of successive balance. So, can you find which hexadecimal corresponds to the decimal 234? What hexadecimal did you find? Let s develop and implement All data types (text, images, etc.) are stored in the form of binary s. The ASCII character set was one of the first to be applied for assigning a character to a. The RGB model assigns a color to a. Consult the table in your book (p. 9) that maps the position of each character in the ASCII and find the 8-bit binary s and the hexadecimal equivalent to the capital letters S and O. ASCII character S O 8-bit binary Hexadecimal Open Windows Calculator and determine whether you have found the correct s above (see p. 8). Let s develop and implement The computer makes calculations using proper connection of gates (p. ). Three of them (AND, OR and XOR) are with two signal inputs, while the NOT gate has one input. What acts can they do and how? Let's take two binary s A and B of -bit each. Input A will take the values or, like B. To add them, we know that; Decimal system Binary system Α Β C + = + = + = + = + = + = + = 2 + = Note that the binary sum C is a 2-bit. Therefore, if we have two inputs (A and B), we will need two outputs for C; the C (right figure C) and C2 (left figure C). The adjacent truth table defines the above addition. Α Β C2 C C In the figure below in each rectangle, draw the appropriate gate so that the circuit implements the truth table. Α Β C C2
4 Match each sentence on the left column with the correct component on the right The ALU performs arithmetic and logical operations on all required data. It carries out instructions and also performs the operations on various registers. If it is necessary to get more data for a specific instruction, then they are transferred from the main memory to the registers. Executing of instructions The results of executing instructions are placed in the main memory. Decoding of instructions The instructions are transferred from the main memory and stored temporarily in small memories within the CPU called registers. The control unit interprets the instruction stored in the instruction register, turning it into a signal that can be understood by the ALU. Storing of results Fetching of instructions How is packet switching implemented?fill in the blanks with the correct word or phrase in the table. are divided into Destination individually to their Messages Packets reassembled in their transferred through the How do computers identify web pages on the Internet? Fill the blanks with the correct word or phrase in the table. computer DNS Hostname is a for a IP address URL web page
5 Without protocols there would not be communication Network Protocol is a set of rules that defines how data is formatted and processed on a network in order to exchange messages among the devices of the network. Protocol stack is a set of network protocol layers that work together. Each protocol layer consists of one or more protocol modules that communicate with two others; the higher and the lower of its layer. The lowest layer handles the hardware while the highest handles user applications. The following figure shows the layers hierarchy and structure TCP/IP Suite Application Layer HTTPS HTTP FTP SMPT DNS Audio Codecs RTP/RTCP Video Codecs Transport Layer Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet Layer Internet Protocol (IP) Network Interface Layer Ethernet, Wireless, Cable, Fiberglass Consult your book on the functioning of the various protocols. Match each text with the correct layer. This layer splits data in order to be sent in packets and reorders and reassembles the packets at their destination. It deals with any errors that occur, such as if a packet never arrives at the destination or the contents of a packet are corrupted. This layer provides the user a way to access any information in the network through an application. This layer is responsible for routing data packets between different networks, regardless of their infrastructure. Let's investigate Personal data is any piece of information relating to you. If you have control of your personal data then you have control your personal life, too.but what is personal data and how could it be used against you? The table below shows different types of personal data. Evaluate these types of data on a scale from A to C: Information that should not be published should be graded A. Information you choose for some people to know should be graded B. Information you do not mind the whole world knowing should be graded C. Personal data. Your name 2. Your address 3. Your musical tastes 4. Your 5. Your phone s 6. Your favorite movies 7. Your various passwords 8. Your credit card s 9. Your school. Photos of You Grade
6 . Videos of You 2. Your school grades 3. Your age 4. Your nickname Module 2 Relationships between tables Your team has taken over the management of the school library. Your responsibility is to record the books that students borrow and to make sure they are returned. A basic database table (Students) is that which contains the main information about students, such as their First name, Last name, Phone, Home address and address. In this table have inserted the following records: First name Last name Phone Home address address Tom Smith Greenville tom@digital-kids.com George Smith Greenville tom@digital-kids.com Stella Williams Newton Ave. stella@digital-kids.com Alex Johnson Central Ave. alex@digital-kids.com Tom Brown CastleCourt tbrown@digital-kids.com The first row of the table contains the field names. The rest of the rows are the records of the table. We consider as Primary Key the field whose value uniquely identifies the record. Namely, it is impossible for this value to appear in two or more records. Which field of this table could be Primary Key? Justify your answer. Observe the following table. Student_ID First name Last name Phone Home address address Tom Smith Greenville tom@digital-kids.com 2 George Smith Greenville tom@digital-kids.com 3 Stella Williams Newton Ave. stella@digital-kids.com 4 Alex Johnson Central Ave. alex@digital-kids.com 5 Tom Brown CastleCourt tbrown@digital-kids.com Which field of this table could be Primary Key? Justify your answer. The structure of the table Students, namely the fields names of each record, is depicted to the adjoining picture. Now, let s divide this table into two separate tables. The first (Students_Names) contains only the students names. The second (Students_Info) contains the rest contact information. Fill in the empty cells so that each record of the first table is matched with one record of the other table (and even the correct one). Students_Names Student_ID First name Last name Smith 2 George 3 4 Alex Johnson 5 Tom Students_Info Student_ID Phone Home address address Greenville tom@digital-kids.com 567 Central Ave tom@digital-kids.com CastleCourt
7 These twotablesare relatedas shown in thefollowing picture. Now, let s create a table (Books_Authors) with the available book titles of the school library and their authors. In this table we inserted some records. Author name Book Title Charles Dickens Great Expectations Fyodor Dostoevsky Crime and Punishment Fyodor Dostoevsky The Idiot Hans Christian Andersen Fairy tales Charles Dickens The Battle of Life Ernest Hemingway The Old Man and the Sea Observe the table above and answer the following questions. Put a if the sentence is correct There is a book title written by two (or more) authors. There are authors who have written only one book title. There are authors who have written two (or more) book titles. Only one book title corresponds with each author. Only one author corresponds with each book title. For each author there could be many corresponding book titles. Now, let s divide this table into two separate tables. The first table (Authors) contains the authors (4 records) and the second table (Books) contains the book titles (6 records). In each table we add a Primary key. More specifically, in the table Authors we add the Author_ID, as in the Book_ID in the table Books. As the table Books contains more records than the table Authors does, we add one more field (the Author_ID) in the table Books, which shows the book s author. We name this field as Secondary key. Fill in the empty cells of the following tables. Authors Author_ID Author name Books Book_ID Book title Author_ID These two tables are related as shown in the following picture.
8 Now, we create a table that contains information about the library books. This table should contain the name of the student, the book title, the date borrowed and the date returned. We insert some records about some students: First name Last name Book title Date borrowed Date returned Stella Williams The Battle of Life 4/3/23 George Smith The Idiot 4/25/23 5/3/23 Alex Johnson Fairy tales 4/28/23 5/3/23 Tom Brown The Idiot 5/6/23 George Smith Crime and Punishment 5/2/23 6/4/23 Observe the table above and answer the following questions. But in this table there is information that has already been inserted into tables that have been created. Find this information and answer the following questions. Select the correct answer The fields Firstname and Lastname of each student are in the table The field Booktitle is in the table The fields Date borrowed and Datereturned are in the table Students_Names Students_Info Books Authors None Students_Names Students_Info Books Authors None Students_Names Students_Info Books Authors None Now, we create a new table again for lending books (Books_Lending) and fill it with information. This table has its own primary key, so each lending will have a certain code. Then fill the empty cells of the following table. Keep in mind that when you add a book or a student id the database will retrieve all the necessary information through the related tables (relationships). Books_Lending Lend_ID Student_ID Book_ID Date borrowed Date returned 4/3/23 2 4/25/23 5/3/23 3 4/28/23 5/3/23 4 5/6/23 5 5/2/23 6/4/23 All the tables you created are shown in the figure below.
The City School. PAF Chapter. Nov 2018 Class 8. ICTech. Revision Worksheet
The City School PAF Chapter Nov 2018 Class 8 ICTech Revision Worksheet Binary Logic SA 2018. PHOTOCOPIABLE. Last update: 11/28/2018 - Page 1 of 41 Numbers and colors To begin with A computer understands
More informationECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two 26 February 2014
Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate
More information(a) What is the denary equivalent of the hexadecimal number A7?
1 What is the denary equivalent of the hexadecimal number A7? You may use the space below for rough working. You may get some marks for your working, even if your answer is incorrect. Represent the denary
More informationBusiness Data Networks and Security 10th Edition by Panko Test Bank
Business Data Networks and Security 10th Edition by Panko Test Bank Chapter 2 Network Standards 1) Internet standards are published as. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Question: 1a Objective:
More informationECE 2020B Fundamentals of Digital Design Spring problems, 6 pages Exam Two Solutions 26 February 2014
Problem 1 (4 parts, 21 points) Encoders and Pass Gates Part A (8 points) Suppose the circuit below has the following input priority: I 1 > I 3 > I 0 > I 2. Complete the truth table by filling in the input
More informationMRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17. Year 9 Computing Time: 1hr 30mins
MRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17 Year 9 Computing Time: 1hr 30mins Name: Class: Please read the following instructions carefully: 1. Answer ALL the questions in the space provided
More informationDec Hex Bin ORG ; ZERO. Introduction To Computing
Dec Hex Bin 0 0 00000000 ORG ; ZERO Introduction To Computing OBJECTIVES this chapter enables the student to: Convert any number from base 2, base 10, or base 16 to any of the other two bases. Add and
More informationFinal Examination Semester 2 / Year 2011
Southern College Kolej Selatan 南方学院 Final Examination Semester 2 / Year 2011 COURSE : COMPUTER SYSTEM COURSE CODE : CSIS 1003 TIME : 2 HOURS 30 MINUTES DEPARTMENT : COMPUTER SCIENCE LECTURER : DR. LEE
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationCSIBridge: Computer Science for Digital Forensics and Cyber Security
M.S. in Forensic Computing Program John Jay College of Criminal Justice The City University of New York CSIBridge: Computer Science for Digital Forensics and Cyber Security Foundations for Digital Forensics
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationCC411: Introduction To Microprocessors
CC411: Introduction To Microprocessors OBJECTIVES this chapter enables the student to: Use number { base 2, base 10, or base 16 }. Add and subtract binary/hex numbers. Represent any binary number in 2
More informationMRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17. Year 9 Computing Time: 1hr 30mins MARKING SCHEME. a) CPU : b) MSB : c) GUI :
MRIEHEL SECONDARY SCHOOL HALF-YEARLY EXAMINATIONS 2016~17 Year 9 Computing Time: 1hr 30mins MARKING SCHEME 1. What do the following abbreviations stand for? Central Processing Unit a) CPU : Most Significant
More informationObjectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.
Team Project 1 Due: Beijing 00:01, Friday Nov 7 Language: English Turn-in (via email) a.pdf file. Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and
More informationCSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1
CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1 Due 11:59pm Friday October 6 Instructions: 1. Please submit your homework using the on-line electronic submission system (via
More informationUNIT 1 USING LOGIC. UPGRADE 8 Write a detailed report on how logic gates would be used to add up two nibbles using examples and explanations
UNIT 1 USING LOGIC Create a working example of a full adder logic gate circuit and test its operation with a series of bytes that need to be added. Report on the findings and limitations found Write a
More informationLecture 2: Number Systems
Lecture 2: Number Systems Syed M. Mahmud, Ph.D ECE Department Wayne State University Original Source: Prof. Russell Tessier of University of Massachusetts Aby George of Wayne State University Contents
More informationEE 610 Part 2: Encapsulation and network utilities
EE 610 Part 2: Encapsulation and network utilities Objective: After this experiment, the students should be able to: i. Understand the format of standard frames and packet headers. Overview: The Open Systems
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationChapter 11: Wide-Area Networks and the Internet
Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet
More information2nd Paragraph should make a point (could be an advantage or disadvantage) and explain the point fully giving an example where necessary.
STUDENT TEACHER WORKING AT GRADE TERM TARGET CLASS YEAR TARGET The long answer questions in this booklet are designed to stretch and challenge you. It is important that you understand how they should be
More informationMiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.
CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101
More informationThe x86 Microprocessors. Introduction. The 80x86 Microprocessors. 1.1 Assembly Language
The x86 Microprocessors Introduction 1.1 Assembly Language Numbering and Coding Systems Human beings use the decimal system (base 10) Decimal digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 Computer systems use the
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
More informationDivision. Reverse Box Method
Division Reverse Box Method Why do we use the reverse box method? The box method of multiplication is used because it develops a strong conceptual understanding of multiplication! If you have not read
More informationGCSE Computer Science for OCR Overview Scheme of Work
GCSE Computer Science for OCR Overview Scheme of Work The following assumes a two-year model. During the course, the final challenges can be used for practice in computational thinking, algorithm design
More informationAPPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE
APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer
More informationECE 2030B 1:00pm Computer Engineering Spring problems, 5 pages Exam Two 10 March 2010
Instructions: This is a closed book, closed note exam. Calculators are not permitted. If you have a question, raise your hand and I will come to you. Please work the exam in pencil and do not separate
More informationObjectives. Connecting with Computer Science 2
Objectives Learn why numbering systems are important to understand Refresh your knowledge of powers of numbers Learn how numbering systems are used to count Understand the significance of positional value
More informationStonelaw High School. Computing Science. BGE - Computer Systems
Stonelaw High School Computing Science BGE - Computer Systems Contents Computer Systems... 3 Computer Systems... 3 Hardware & Software... 3 Data Representation... 3 Representing Positive Integers... 3
More informationProject points. CSE422 Computer Networking Spring 2018
Project 1 100 points Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationUser. Application program. Interfaces. Operating system. Hardware
Operating Systems Introduction to Operating Systems and Computer Hardware Introduction and Overview The operating system is a set of system software routines that interface between an application program
More informationCCNA 1: Chapter 2 Exam Answer v %
1. Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function
More informationM2-R4: INTERNET TECHNOLOGY AND WEB DESIGN
M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the
More informationIntroduction to Computer Science. Homework 1
Introduction to Computer Science Homework. In each circuit below, the rectangles represent the same type of gate. Based on the input and output information given, identify whether the gate involved is
More informationVanavani Mat. Hr. Sec. School. Subject : Computer Science Std: XI. Quarterly Exam Key
Vanavani Mat. Hr. Sec. School Subject : Computer Science Std: XI Quarterly Exam Key Part I (15 X 1 = 15) 1. d 2. A 3. C 4. D 5. D 6. c 7. B 8. A 9. D 10. B 11. d 12. C 13. D 14. A 15. A Part B -Any Six
More informationAQA GCSE Computer Science PLC
1 - Fundamentals of Algorithms Useful Websites BBC Bite Size Cambridge GCSE Exam Dates https://www.bbc.co.uk/education/subjects/z34k7ty Paper 1 14/05/2018 am https://www.cambridgegcsecomputing.org/ Paper
More informationCambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level. Published
Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level COMPUTER SCIENCE 9608/1 Paper Written Paper MARK SCHEME Maximum Mark: 75 Published This mark
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationST.FRANCIS SECONDARY SCHOOL SLIEMA HALF YEARLY EXAMINATIONS SPECIMEN PAPER. SENIOR 3 COMPUTER STUDIES TIME: 2 hours
Name: Index: Class: ST.FRANCIS SECONDARY SCHOOL SLIEMA HALF YEARLY EXAMINATIONS SENIOR 3 COMPUTER STUDIES TIME: 2 hours The use of CALCULATORS is NOT ALLOWED!! Answer ALL questions!! 1: The following diagrams
More informationOperating Systems CS 571
Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5
More information15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2
15110 PRINCIPLES OF COMPUTING SAMPLE EXAM 2 Name Section Directions: Answer each question neatly in the space provided. Please read each question carefully. You have 50 minutes for this exam. No electronic
More informationVon Neumann Architecture
Von Neumann Architecture Assist lecturer Donya A. Khalid Lecture 2 2/29/27 Computer Organization Introduction In 945, just after the World War, Jon Von Neumann proposed to build a more flexible computer.
More informationLevel ISA3: Information Representation
Level ISA3: Information Representation 1 Information as electrical current At the lowest level, each storage unit in a computer s memory is equipped to contain either a high or low voltage signal Each
More informationBusiness Data Communications and Networking
Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc http://alainmaterials.webs.com/ Copyright 2010 John Wiley & Sons, Inc 5-1 Chapter 5 TCP/IP
More informationUNCA CSCI 255 Exam 1 Spring February, This is a closed book and closed notes exam. It is to be turned in by 1:45 PM.
UNCA CSCI 255 Exam 1 Spring 2017 27 February, 2017 This is a closed book and closed notes exam. It is to be turned in by 1:45 PM. Communication with anyone other than the instructor is not allowed during
More informationIntroduction to Computer Science (I1100) Networks. Chapter 6
Networks Chapter 6 501 Outline How does Networks and Internet Work? Networking devices Physical Network topology Types of Network Intranets - extranets Copper Media IP Address 502 How does Networks and
More informationINFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT
INFORMATION TECHNOLOGY CONCEPTS-OPEN- REGIONAL 2017 Page 1 of 10 INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT REGIONAL 2017 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS (100 points) Failure to adhere
More informationin this web service Cambridge University Press
978-0-51-85748- - Switching and Finite Automata Theory, Third Edition Part 1 Preliminaries 978-0-51-85748- - Switching and Finite Automata Theory, Third Edition CHAPTER 1 Number systems and codes This
More informationprecise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)
Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets
More informationBasics of datacommunication
Data communication I Lecture 1 Course Introduction About the course Basics of datacommunication How is information transported between digital devices? Essential data communication protocols Insight into
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CMPS Introduction to Computer Science Lecture Notes Binary Numbers Until now we have considered the Computing Agent that executes algorithms to be an abstract entity. Now we will be concerned with techniques
More informationLab Exercise Protocol Layers
Lab Exercise Protocol Layers Objective To learn how protocols and layering are represented in packets. They are key concepts for structuring networks that are covered in 1.3 and 1.4 of your text. Review
More informationAssembly Language for Intel-Based Computers, 4 th Edition. Chapter 1: Basic Concepts. Chapter Overview. Welcome to Assembly Language
Assembly Language for Intel-Based Computers, 4 th Edition Kip R. Irvine Chapter 1: Basic Concepts Slides prepared by Kip R. Irvine Revision date: 09/15/2002 Chapter corrections (Web) Printing a slide show
More informationHASTINGS HIGH SCHOOL
HASTINGS HIGH SCHOOL EXAMINATION GUIDE 2017-19 Subject Course code Website address Provisional examination dates Computer Science Computer Science (9-1) - J276 https://www.ocr.org.uk/qualifications/gcse/computerscience-j276-from-2016/
More informationCS3516 B10 Computer Networks Final Exam December 14, 2010
Name CS3516 B10 Computer Networks Final Exam December 14, 2010 Question Points Score 0 1 1 27 2 8 3 12 4 7 5 2 6 6 7 3 8 6 9 3 10 9 11 3 12 2 13 8 14 2 15 2 Total 100 Trivia Question (1 extra credit point)
More informationWireshark Lab: Getting Started v6.0
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationSchool of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks
School of Engineering Department of Computer and Communication Engineering Semester: Fall 2012 2013 Course: CENG415 Communication Networks Instructors: Mr Houssam Ramlaoui, Dr Majd Ghareeb, Dr Michel Nahas,
More informationBINARY SYSTEM. Binary system is used in digital systems because it is:
CHAPTER 2 CHAPTER CONTENTS 2.1 Binary System 2.2 Binary Arithmetic Operation 2.3 Signed & Unsigned Numbers 2.4 Arithmetic Operations of Signed Numbers 2.5 Hexadecimal Number System 2.6 Octal Number System
More informationCOE 202- Digital Logic. Number Systems II. Dr. Abdulaziz Y. Barnawi COE Department KFUPM. January 23, Abdulaziz Barnawi. COE 202 Logic Design
1 COE 0- Digital Logic Number Systems II Dr. Abdulaziz Y. Barnawi COE Department KFUPM COE 0 Logic Design January 3, 016 Objectives Base Conversion Decimal to other bases Binary to Octal and Hexadecimal
More informationCNPE Communications and Networks Lab Book: Data Transmission Over Digital Networks
Lab Book: Data Transmission Over Digital Networks Contents Data Transmission Over Digital Networks... 3 Lab Objectives... 3 Lab Resources... 3 Task 1 Build the Home Network... 3 Task 2 Configure IP Addresses...
More informationRefer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J
1. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation the division of segments into packets network media control 2. Which characteristic
More informationReti di Calcolatori I
Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria
More informationCambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level
Cambridge International Examinations Cambridge International Advanced Subsidiary and Advanced Level *0276230714* COMPUTER SCIENCE 9608/13 Paper 1 Theory Fundamentals May/June 2016 1 hour 30 minutes Candidates
More informationUNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 09, 2016, 6:15PM DURATION: 75 minutes Calculator Type: 2 (non-programmable calculators) Examiner:
More informationMidterm Exam 2A Principles of Computing Fall November 10, 2014
Midterm Exam 2A 15110 Principles of Computing Fall 2014 November 10, 2014 Name: Andrew ID: Lab section: Instructions Answer each question neatly in the space provided. There are 6 questions totaling 28
More informationLecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn
Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationTCP /IP Fundamentals Mr. Cantu
TCP /IP Fundamentals Mr. Cantu OSI Model and TCP/IP Model Comparison TCP / IP Protocols (Application Layer) The TCP/IP subprotocols listed in this layer are services that support a number of network functions:
More informationWireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark
More informationTHE UNIVERSITY OF NEW SOUTH WALES
Name of Candidate: Student ID: Signature: THE UNIVERSITY OF NEW SOUTH WALES COMP3331/93331 Computer Networks and Applications Sample Mid-session Examination INSTRUCTIONS TO CANDIDATES: (1) Time allowed:
More informationNetwork Architecture I
Network Architecture I Degree in: Communications Electronic Engineering Telecommunication Systems Engineering Telecommunication Technologies Engineering Telematics Engineering Universidad de Alcalá 2016/17
More informationECE 461 Internetworking Fall Quiz 1
ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators
More informationSFPL Reference Manual
1 SFPL Reference Manual By: Huang-Hsu Chen (hc2237) Xiao Song Lu(xl2144) Natasha Nezhdanova(nin2001) Ling Zhu(lz2153) 2 1. Lexical Conventions 1.1 Tokens There are six classes of tokes: identifiers, keywords,
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationRead this before starting!
Points missed: Student's Name: Total score: /1 points East Tennessee State University Department of Computer and Information Sciences CSCI 215 (Tarnoff) Computer Organization Section 1 TEST 1 for Fall
More informationGame100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses
Game100 Networking Lab 4 Name: Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Objectives Switch between the two Windows Calculator modes. Use Windows Calculator to convert between decimal,
More informationLab: 2. Wireshark Getting Started
Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationCOMP2 (JUN15COMP201) General Certificate of Education Advanced Subsidiary Examination June 2015
Centre Number Surname Candidate Number For Examiner s Use Other Names Candidate Signature Examiner s Initials Question Mark Computing General Certificate of Education Advanced Subsidiary Examination June
More informationWireshark HTTP. Introduction. The Basic HTTP GET/response interaction
Wireshark HTTP Introduction Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we re now ready to use Wireshark to investigate protocols in operation. In this lab, we
More information6. Correspondence relationship between Educational goals and Course goals
1. Course Title (Course Code) Fundamentals of Information Networks (2201) 2. Instructor Teruaki YOKOYAMA 3. Term Fall 2 4. Outline and Objectives In this course the students study the technologies for
More informationN.B. These pastpapers may rely on the knowledge gained from the previous chapters.
N.B. These pastpapers may rely on the knowledge gained from the previous chapters. 1 SEC 94-PAPER 1-Q3B Briefly explain the purpose of the PROGRAM COUNTER 2 SEC 94-PAPER 2A-Q4 (a) Why is a 16-bit 60 MHz
More informationRead this before starting!
Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 2150 (Tarnoff) Computer Organization TEST 1 for Spring Semester,
More informationSystem Programming. Introduction to computer networks
Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer
More informationHands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified 1-11-17 Objectives Describe the TCP/IP protocol stack Explain the basic concepts of IP addressing Explain the
More informationCOSC 6377 Mid-Term #2 Fall 2000
Name: SSN: Signature: Open book, open notes. Your work must be your own. Assigned seating. Test time: 7:05pm to 8:05pm. You may not use a calculator or PalmPilot to calculate subnetting/host/netid information.
More informationChapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network
Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain
More informationAnalogue vs. Discrete data
CL 1 Analogue vs. Discrete data analogue data Analogue vs. Discrete data Data is the raw information that is input into the computer. In other words, data is information that is not yet processed by the
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More informationScribe Notes -- October 31st, 2017
Scribe Notes -- October 31st, 2017 TCP/IP Protocol Suite Most popular protocol but was designed with fault tolerance in mind, not security. Consequences of this: People realized that errors in transmission
More informationECE 358 Project 3 Encapsulation and Network Utilities
ECE 358 Project 3 Encapsulation and Network Utilities Objective: After this project, students are expected to: i. Understand the format of standard frames and packet headers. ii. Use basic network utilities
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationCMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 01, SPRING 2013
CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 01, SPRING 2013 TOPICS TODAY Course overview Levels of machines Machine models: von Neumann & System Bus Fetch-Execute Cycle Base
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationCPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
More informationENGG1015: Homework 3
ENGG1015: Homework 3 Dr. Kenneth Wong / Dr. Hayden So Due: 5pm, Nov 24, 2010 Turn in your homework at boxes outside Rm712, CYC Building Question 1 Digital Logic 1 Simplify the following Boolean expressions
More informationCS 43: Computer Networks The Link Layer. Kevin Webb Swarthmore College November 28, 2017
CS 43: Computer Networks The Link Layer Kevin Webb Swarthmore College November 28, 2017 TCP/IP Protocol Stack host host HTTP Application Layer HTTP TCP Transport Layer TCP router router IP IP Network Layer
More informationCOE 202: Digital Logic Design Number Systems Part 2. Dr. Ahmad Almulhem ahmadsm AT kfupm Phone: Office:
COE 0: Digital Logic Design Number Systems Part Dr. Ahmad Almulhem Email: ahmadsm AT kfupm Phone: 860-7554 Office: -34 Objectives Arithmetic operations: Binary number system Other number systems Base Conversion
More information