Professional Documents
Culture Documents
Page 1 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
O LEVELS 2210
STUDENTS NAME:
_____________________________________________
_____________________________________________
_____________________________________________
Follow On Facebook :
https://www.facebook.com/shahza
CONTACT NUMBER: dah.ashraf
_____________________________________________
Page 2 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 3 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 4 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Data transmission can be either over a short distance (for example, from computer to printer) or
over longer distances (for example, over a telephone network). Essentially, three factors need to be
considered when transmitting data (each factor has to be agreed by both sender and receiver for
this to work without error):
• The direction of the data transmission (i.e. in one direction only or in both directions)
• The method of transmission (how many bits are sent at the same time)
In digital data transmission these things are considered since each one of them contributes to the
correct transfer of data. Each of the above mentioned question can be tackled in a different way and
have its advantages and disadvantages
Data Transfer
Information flows through the computer in many ways. The CPU is the central point for most
information. When you start a program, the CPU instructs the storage device to load the program
into RAM. When you create data and print it, the CPU instructs the printer to output the data.
Because of the different types of devices that send and receive information, two major types of data
transfers take place within a computer: parallel and serial.
Page 5 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Half-Duplex: is in both directions but not at the same time (i.e. data can be sent from ‘A’ to ‘B’ or
from ‘B’ to ‘A’ along the same line, but not at the same time). Example: a walkie-talkie conversation
between two people where only one person speaks at a time.
Full-Duplex: is in both directions simultaneously (i.e. data can be sent from ‘A’ to ‘B’ and from ‘B’ to
‘A’ along the same line, both at the same time). Example: broadband connection on a phone line.
Ethernet net cable.
Data is transferred in the form of bits between two or more digital devices. There are two methods
used to transmit data between digital devices: serial transmission and parallel transmission. Serial
data transmission sends data bits one after another over a single channel. Parallel data transmission
sends multiple data bits at the same time over multiple channels.
Page 6 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Advantages:
Low cost due to less wires.
Fast since no syncing is required1.
Can be used over long distances.
Disadvantages:
Speed is slower as compare to parallel (if used over short distances)
Data needs to be broken down and then reassembled after transmission which creates an
overhead.
Application
Serial data transfer is mostly used for computer-to-computer transfer or from a computer to an
external device located some distance away. Other devices that use serial transfers are:
USB (Universal Serial Bus) port and devices (USB printers, scanner, webcams etc.)
Modems
SATA (Serial ATA) hard disks, CD/DVD drives etc.
Page 7 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Two examples of parallel interfaces can be seen below. In the first parallel interface, the data is sent
and received in the correct order. In the second parallel interface, the data is sent in the correct
order, but some bits were received faster than others.
Advantages:
Fast over short distances as multiple bits are transferred
Data does not need to be broken and reassembled during transmission which saves time.
Page 8 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Disadvantages:
It uses a special start signal. The signal is transmitted at the beginning of each message. The start
signal is sent when the character is about to be transmitted.
A start bit has a value of 0. It is called space state. The value of 0 indicates that a character is about
to be transferred. It alerts the receiver and it gets ready to receive the character. If start bit has a
value 1, it indicates that the line is idle. It is also called mark state.
Synchronous transmission
In the synchronous mode, the saved data is transmitted block. Each block may consist of many
characters. It uses a clock to control the timing of bits being sent. A large amount of information can
be transmitted at a single time with this type of transmission.
Synchronous transmission is much faster than asynchronous because there is no gap between
characters. This transmission is suited for remote communication between a computer and related
devices like printers etc.
Page 9 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Internet security relies on specific resources and standards for protecting data that gets sent through
the Internet. This includes various kinds of encryption.
Other aspects of a secure Web setup includes firewalls, which block unwanted traffic, and anti-
malware, anti-spyware and anti-virus programs that work from specific networks or devices to
monitor Internet traffic for dangerous attachments.
Internet security is generally becoming a top priority for both businesses and governments. Good
Internet security protects financial details and much more of what is handled by a business or
agency’s servers and network hardware. Insufficient Internet security can threaten to collapse an e-
commerce business like amazon, eBay, Ali Baba and many more, or any other operation where data
gets routed over the Web.
Internet Risks
Cyberbullying: Bit of the topic and syllabus but worth mentioning here for youth, On the Internet,
cyberbullying takes various forms, an online resource that educates parents about Internet safety.
Cyberbullying includes sending hateful messages or even death threats to children, spreading lies
about them online, making nasty comments on their social networking profiles, or creating a website
to bash their looks or reputation. Cyberbullying differs from schoolyard bullying, Teachers can't
intervene on the Internet. And cyberbullies don't witness their victims' reactions, the way they might
if they insulted others to their faces. "They don't see you crying," which may make it easier for them
to continue. Often, kids don't tell parents they're being cyberbullied; they're afraid their parents will
overreact or yank Internet privileges.
Malwares and its types: "Malware" is a term for any software that gets installed on your machine
and performs unwanted tasks, often for some third party's benefit. Malware programs can range
from being simple annoyances (pop-up advertising) to causing serious computer invasion and
damage (e.g., stealing passwords and data or infecting other machines on the network). Additionally,
some malware programs are designed to transmit information about your web browsing habits to
advertisers or other third party interests without you knowing.
Page 10 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Types of Malwares:
Virus: Software that can replicate itself and spread to other computers or that are
programmed to damage a computer by deleting files, reformatting the hard disk, or
using up computer memory.
Adware: Software that is financially supported (or financially supports another program)
by displaying ads when you're connected to the internet.
Spyware: Software that surreptitiously gathers information and transmits it to
interested parties. Information gathered includes visited websites, browser/system
information, and your computer's IP address.
Hacking: Hacking is identifying weakness in computer systems or networks to exploit its
weaknesses to gain access. Example of Hacking: Using password cracking algorithm to
gain access to a system
Cracking is where someone edits a program source code (i.e. looks for a ‘back door’ in the software
so that the code can be exploited or changed for a specific purpose). This is usually done for a
malicious purpose (e.g. legitimate software could be altered by a cracker to perform a different task
e.g. send a user to a specific website).
Essentially, hacking isn’t necessarily harmful whilst cracking is ALWAYS totally illegal and is
potentially very damaging.
Page 11 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Internet Service Provider (ISP): An Internet service provider (ISP) is an organization that provides
services accessing and using the Internet. Internet service providers may be organized in various
forms, such as commercial, community-owned, non-profit, or otherwise privately owned. A monthly
fee is usually charged for this service. The ISP will set up a user account which will contain a
username and a password.
Internet Protocol (IP) Address: Each device on the internet is given a unique address known as the IP
address, this is a 32-bit number which is usually written in the form:
109.108.158.1
A home computer is given an IP address when it connects to the internet. This is assigned by the ISP
and is unique for that particular internet session. The only IP addresses that remain fairly unchanged
are web servers. An IP address can be used instead of typing in the full URL. For example:
http:// 91.198.174.192
MAC address: Mac address is your machine address. This address will never change. It is the unique
machine address given to your device.
Difference b/w IP addresses and MAC addresses: The IP address gives the location of a device on
the internet, whereas the MAC address identifies the device connected to the internet. You can
think of the IP address as the address of the house you live in (it will have some unique way of
identifying it, such as a post or zip code). Using this example, the MAC address can be thought of as a
way of uniquely identifying each person living in that house. It is possible to move house (so your IP
address will change) but the same people will be living in the new house (so their MAC addresses will
remain unchanged).
Page 12 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
When writing HTML code, it is very important to realise that there is a difference between the
structure and the presentation.
STRUCTURE: is the essential part of the HTML document; it includes the semantics (meaning) and
structural mark-up of the document.
PRESENTATION: is the style of the document; i.e. how the document will look (or even sound if it
includes multimedia elements). These two features must be kept separate throughout the designing
of a web page. At the end of the design process, the author should have an HTML document (which
contains the structure and the actual content) and a separate CSS (CASCADING STYLE SHEET) file.
The CSS file will contain everything to control the actual presentation of the web page.
Page 13 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Web Browsers
A WEB BROWSER is software which allows a user to display a web page on their computer screen.
Web browsers interpret or translate the HTML code from website and show the result of the
translation. This can often be in the form of videos, images or sound. Most web browsers share the
following features:
The web browser will break up the URL into three parts:
The web browser translates the web server name into an IP address which is part of the URL. The
HTML code is returned and is shown as a correctly formatted page on the computer screen. It is also
possible that cookies may be sent from the web browser to the web server when the code is
executed.
Page 14 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 15 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
Benefit .......................................................................................................................................
...................................................................................................................................................
Benefit .......................................................................................................................................
...................................................................................................................................................
[2]
(c) Give one application of each type of data transmission. Each application must be different.
Application ................................................................................................................................
...................................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[2]
2210/11/M/J/15
Page 16 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
...................................................................................................................................................
...................................................................................................................................................
[1]
(b) Describe two benefits of using USB connections between a computer and a device.
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
2210/11/M/J/15
Page 17 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
4 (a) Nikita wishes to print out some documents and connects her printer to the computer using
one of the USB ports.
.......................................................................................................................................[1]
1 .......................................................................................................................................
...........................................................................................................................................
2 .......................................................................................................................................
...........................................................................................................................................
3 .......................................................................................................................................
...........................................................................................................................................
[3]
(iii) The printer runs out of paper while it is printing the documents. A signal is sent to the
processor to request that the problem is dealt with.
.......................................................................................................................................[1]
(b) State one suitable application for each printer below. A different application must be given for
each printer.
...................................................................................................................................................
3D printer ..................................................................................................................................
...................................................................................................................................................
[2]
[Turn over
2210/11/M/J/16
Page 18 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
(c) Name another type of printer and describe one way in which it is different from the printers
named in part (b).
Description ................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Application ................................................................................................................................
...................................................................................................................................................
[3]
2210/11/M/J/16
Page 19 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
• type of transmission
• method of transmission
Description 1:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted several bits at
a time down several wires in both simplex serial
directions simultaneously.
half-duplex parallel
full-duplex
Description 2:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted in one direction
only, one bit at a time, down a simplex serial
single wire.
half-duplex parallel
full-duplex
Description 3:
Tick Tick
Type Method
(✓) (✓)
Data is transmitted one bit at a
time down a single wire; the data simplex serial
is transmitted in both directions
but not at the same time.
half-duplex parallel
full-duplex
[6]
(b) Give two reasons why serial transmission, rather than parallel transmission, is used to
connect devices to a computer.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
2210/12/M/J/16
Page 20 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
......................................................................................................................................................[4]
2210/12/M/J/16
Page 21 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
4 Five statements about serial half-duplex data transmission are shown in the table below.
true false
Statement
(3) (3)
2210/11/M/J/17
Page 22 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
(a)
Draw an arrow or arrows to show simplex, duplex and half-duplex data transmission. The
direction of the data transmission must be fully labelled.
Computer A Computer B
Computer A Computer B
Computer B Computer A
[6]
(b)
State a use for the following data transmission methods. The use must be different for each
data transmission method.
Simplex �������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
Duplex ��������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
[2]
[Turn over
2210/12/M/J/17
Page 23 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
(c)
A computer includes an Integrated Circuit (IC) and a Universal Serial Bus (USB) for data
transmission.
Describe how the computer uses these for data transmission, including the type of data
transmission used.
IC ����������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
USB ������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
���������������������������������������������������������������������������������������������������������������������������������������������������
[4]
2210/12/M/J/17
Page 24 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Explain how the information stored on the company’s website is requested by the customer, sent
to the customer’s computer and displayed on the screen.
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
����������������������������������������������������������������������������������������������������������������������������������������������������������
������������������������������������������������������������������������������������������������������������������������������������������������������[7]
2210/12/M/J/17
Page 25 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
10
10 RockICT is a music business that has a website to allow customers to view and buy the products
it sells.
(a) Describe what is meant by HTML structure and presentation for a web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
https://www.rockict.net/index.htm
Part 1 Part 2
Part 1 ................................................................................................................................
Part 2 ................................................................................................................................
[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
“RockICT makes use of cookies. By continuing to browse you are agreeing to our use of
cookies.”
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [3]
Structure ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Presentation ..............................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
2210/12/O/N/15
Page 28 of 60
3 (a) Explain what is meant by:
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) A computer in a factory is connected to a printer. The printer is located in an office 1 km away
from the factory.
Identify which data transmission method would be most suitable for this connection.
...................................................................................................................................................
1 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[3]
Page 30 of 61
10 (a) Describe what is meant by HTML.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
http://www.cie.org.uk/ComputerSciencePapers
Protocol ....................................................................................................................................
Page 31 of 61
10(c) At the end of the flight, all of the data are sent to the aeroplane engine manufacturer using
the Internet.
...................................................................................................................................................
...................................................................................................................................................
IP address .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
(d) When sending this data, security is very important. Data are sent over the Internet using
Transport Layer Security (TLS) protocol.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
2210/13/O/N/16
Page 32 of 61
O LEVELS 2210 TOPICAL BOOK 1.2
4
Rory sends data from his computer to a file server that is approximately 100 metres away.
It is important that the data is transmitted accurately. Rory needs to be able to read data from and
write data to the file server at the same time.
(a) (i) Use ticks (3) to identify the most suitable data transmission methods for this application.
(ii) Explain why your answer to part (a)(i) is the most suitable data transmission.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[4]
5 Raj is using the Internet to do some online shopping. He visits a website that tells him that it uses
cookies.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Example 1 .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Example 2 .................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[2]
http://www.cie.org.uk/index.htm
Part 1 Part 2 Part 3
Part 1 ........................................................................................................................................
...
.....................................................................................................................................
Part 2 ........................................................................................................................................
Part 3 ........................................................................................................................................
...
[3]
.....................................................................................................................................
...
.....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
......
.............................................................................................................................................
...............................................................................................................................................[4]
......
.............................................................................................................................................
Hyper Text Transfer Protocol The website address that is typed into the
(HTTP) address bar
[5]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
...................................................................................................................................................
......
.............................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
......
.........................................................................................................................................
[2]
...................................................................................................................................................
...............................................................................................................................................[1]
.............................................................................................................................................
...................................................................................................................................................
....................................
......
.........................................................................................................
...................................................................................................................................................
...................................................................................................................................................
......
.........................................................................................................................................
[2]
Describe three methods that she could use to avoid loss of stored data.
Method 1 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Method 2 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
Method 3 ..........................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
[6]
(b) Explain how the web browser uses the URL to access the webpage.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
Page 40 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 2 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 11
1 (a) parallel
serial
(b) parallel
serial
(c) parallel
serial
Page 41 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 3 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2015 2210 11
Page 42 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 4 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 11
(c) 1 mark for naming printer + 1 mark for description + 1 mark for application
Laser printer
Page 43 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 5 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 12
6 (a)
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
Tick Tick
Type Method
() ()
simplex serial
half-duplex parallel
full-duplex
[6]
Page 44 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 10 Mark Scheme Syllabus Paper
Cambridge O Level – May/June 2016 2210 12
Page 45 of 60
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.2
2210/11 PUBLISHED May/June 2017
Page 46 of 60
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.2
2210/12 PUBLISHED May/June 2017
7(a) 1 mark for correct arrow(s), one mark for correct description 6
OR
AND
(Direction of data is both ways) but at different times / not at the same time /
not simultaneously / not concurrently
Page 47 of 60
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.2
2210/12 PUBLISHED May/June 2017
Simplex e.g.:
Microphone to computer
Sensor to computer
Computer to printer
Computer to speaker
Computer to monitor
Webcam to computer
Sending data to a device // sending data from a device
Duplex e.g.:
Telephone call
Voice over IP
Computer to printer (only award once)
Instant messaging
Broadband connections
Video conferencing
Sending data to and from devices e.g wireless technology
Computer to modem
IC
• parallel transmission // description of parallel
• for sending data internally
USB
• serial transmission // description of serial
• for sending data externally (to and from peripherals / between
devices)
Page 48 of 60
O LEVELS 2210 Cambridge O Level – Mark Scheme TOPICAL BOOK 1.2
2210/12 PUBLISHED May/June 2017
11 Seven from: 7
Requested
• a web browser is used
• user enters the URL / web address (into the address bar) // clicks a
link containing the web address // clicks an element of the webpage
• the URL / web address specifies the protocol
• protocols used are Hyper Text Transfer Protocol (HTTP) / Hyper Text
Transfer Protocol Secure (HTTPS)
Sent
• the URL / web address contains the domain name
• the Internet Service Provider (ISP) looks up the IP address of the
company
• the domain name is used to look up the IP address of the company
• the domain name server (DNS) stores an index of domain names and
IP addresses
• web browser sends a request to the web server / IP address
Received
• Data for the website is stored on the company’s web server
• webserver sends the data for the website back to the web browser
• web server uses the customer’s IP address to return the data
• the data is transferred into Hyper Text Mark-up Language (HTML)
• HTML is interpreted by the web browser (to display the website)
Page 49 of 60
2210/11
O LEVELS 2210 Cambridge O Level – Mark Scheme May/June
TOPICAL 2018
BOOK 1.2
PUBLISHED
Question Answer Marks
− domain (name)
− file name/webpage name
(b) Structure:
– instructs how the layout of the content is displayed
Presentation:
– instructs how the content will be formatted e.g. colour/style/CSS [2]
Page 51 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 3 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 12
serial
parallel
(b) – serial
(b)
Protocol: http(://)
Page 52 of 60
O LEVELS 2210 TOPICAL BOOK 1.2
Page 8 Mark Scheme Syllabus Paper
Cambridge O Level – October/November 2016 2210 13
MAC address
IP address
Page 53 of 60
2210/12
O LEVELS 2210 Cambridge O Level – Mark Scheme October/November
TOPICAL BOOK 1.2
PUBLISHED 2017
Question Answer Marks
Serial 9 Simplex
Parallel Half-duplex
Duplex 9
8 Four from: 4
• Used to attend to certain tasks/issues
• Used to make sure that vital tasks are dealt with immediately
• The interrupt/signal tells the CPU/processor (that its attention is required)
• A signal that can be sent from a device (attached to the computer)
• A signal that can be sent from software (installed on the computer)
• The interrupt will cause the OS/current process to pause
• The OS/CPU/ISR will service/handle the interrupt
• They have different levels of priority
• After the interrupt is serviced, the (previous) process is continued
• It enables multi-tasking to be carried out on a computer
• A valid example of an interrupt e.g. ‘out of paper’ message for a printer
5(b) USB / SATA / Wifi /PCI Express / Any appropriate serial device 1