You are on page 1of 19

Q-Bank in

lecture “5”

Dr. Fayza Ahmed


-- Computer Law --
True or False:

1) Data integrity is the ability to detect when data has been corrupted. - True
2) The goal of data integrity is to ensure that the data received is the same as
the data sent. -True
3) Data integrity and data security are the same thing. - False
4) Error detection and error correction are the two concepts of data security. -
False
5) Error detection is the ability to correct erroneous data. - False
6) Resending data is always a good solution to fix errors. - False
7) The probability of signals being corrupted is high over long distances. -
True
8) Error correction techniques require additional bits to be sent with the data.
- True
9) Even parity involves adding an extra bit to the data. - True
10) The goal of data integrity is to ensure that the data received is the same as
the data sent. - True
11) Error correction is one of the two concepts of data integrity. - True
13) Error correction is the process of detecting data errors. - False
12) Parity checking is a simple error detection scheme that involves adding an
extra byte to the data. - False
13) The sender knows when the message has been fixed in error correction. -
False
14) Parity bit is an additional bit added to the data at the receiver before
transmitting the data. (False)

Q-Bank in lecture “5” 2


14) The addition of parity bit to the data will result in the change of data string
size. (True)
15) Even parity is when the parity bit is 1 for an odd number of 1's in the data.
(False)
16) The circuit which adds a parity bit to the data at transmitter is called
"Parity checker". (False)
17) If the parity bits sent at the transmitter and the parity bits received at the
receiver are not equal then an error is detected. (True)
18) There is only one type of parity bit in error detection. (False)
19) The circuit that checks the parity at the receiver is called a "Parity
generator". - False
20) Parity checking is not used in memory systems. - False
21) If one chip in a memory system is bad, it can cause multiple bit errors. -
True
22) Parity checking is a basic error-detection technique and has no practical
value. - False
23) Parity checking is the most sophisticated error-detection and correction
technique. - False
24)CRC can detect errors immediately after a frame is sent. - True
25) CRC is based on polynomial multiplication. - False
26) The generator bit string G is not known to the sender and receiver. - False
27) The number of 0's appended to M to create M' is equal to the degree of the
generator polynomial G. - True
28) In the CRC method, the remainder is subtracted from the original bit
string before sending it. – False

Q-Bank in lecture “5” 3


29) In the CRC method, the bit string M is not modified before transmission. -
False
30) The remainder obtained after dividing M' by G is not sent in the CRC
method. – False
31) There is no difference between error detection and error correction. False
32) The types of errors are 3. – False
33) There are 2 types of detection schemes. - True
34) Do we have the capability of fixing errors without a second transmission. -
True
35) Is data integrity similar to data security. – False
36) Is it possible that the signals are corrupted when resenting. – True
37) Can detect an even number of bit errors. – False
38) The correction of errors is more difficult than the detection – True
39) It's always right to resend our message if there is an error. – False

====Multiple Choice Questions====

1. Which of the following is not a concept of data integrity?


a) Error detection
b) Error correction
c) Data security
d) All of the above
Answer: c

Q-Bank in lecture “5” 4


2. Which of the following is a method of ensuring data integrity?
a) Error detection
b) Error correction
c) Both a and b
d) None of the above
Answer: c

3. What is the main goal of data integrity?


a. To ensure data security.
b. To determine when data has been corrupted.
c. To ensure that the data received is the same as the data sent.
d. To prevent errors in data transmission.
Answer: c

4. What is error detection in the context of data integrity?


a. The ability to correct errors in data transmission.
b. The ability to determine when data has been corrupted.
c. The ability to ensure data security.
d. The ability to prevent errors in data transmission
Answer: b

5. What is error correction in the context of data integrity?


a. The ability to detect errors in data transmission.
b. The ability to determine when data has been corrupted.
c. The ability to ensure data security.

Q-Bank in lecture “5” 5


d. The ability to correct errors in data transmission.
Answer: d

6. Which of the following is not a type of error?


a) One-bit errors
b) Double bit errors
c) Triple bit errors
d) Even number of bit errors
Answer: c

7. What is the simplest error detection scheme?


a) CRC
b) Parity checking
c) Double bit error correction
d) odd parity checking
Answer: b

8. What is the difference between error detection and error correction?


A) Error detection is the ability to determine that data has an error, while
error correction is the ability to correct the erroneous data.
B) Error correction is the ability to determine that data has an error, while
error detection is the ability to correct the erroneous data.
C) Error detection and error correction are the same thing.
D) Error detection and error correction are not related to data integrity.
Answer: A

Q-Bank in lecture “5” 6


9. Which of the following is a disadvantage of resending data as a solution to
correct errors?
A) It is always an effective solution
B) It may not work well in real-time applications
C) It is faster than error correction
D) It always requires additional bits to be sent with the data.
Answer: B

10. What is parity checking?


A) A method of error correction that involves sending additional bits with the
data
B) A simple error detection scheme that involves adding an extra bit to the
data
C) A method of encrypting data to ensure security
D) A method of compressing data to reduce its size.
Answer: B

11. What is the purpose of error detection techniques?


A. To add additional bits to the data.
B. To determine when data has been corrupted.
C. To fix erroneous data.
D. None of the above
Answer: B

Q-Bank in lecture “5” 7


12. Which of the following is a detection scheme?
A. Resending
B. Error correction
C. Parity checking
D. All of the above
Answer: C

13. What is parity checking?


A. A process of correcting errors
B. Adding an extra bit to the data.
C. Removing a bit from the data.
D. None of the above
Answer: B

14. What is the difference between even parity and odd parity?
A. Even parity adds an extra 0 bit, while odd parity adds an extra 1 bit.
B. Even parity adds an extra 1 bit, while odd parity adds an extra 0 bit.
C. Even parity checks for even number of bits, while odd parity checks for odd
number of bits.
D. Even parity checks for odd number of bits, while odd parity checks for even
number of bits.
Answer: B

15. Which of the following is not a reason why resending may not be a good
solution for error correction?

Q-Bank in lecture “5” 8


a) There may not be enough time to resend
b) The probability of signals being corrupted over long distances is very high
c) Resending always solves the problem
d) Both a and b
Answer: c

16. What is the additional bit that is added to the data for parity checking
called?
a. The error bit
b. The check bit
c. The correction bit
d. The extra bit
Answer: D

17. What is the purpose of a parity bit?


A. To change the data string size.
B. To add extra data to the message.
C. To provide error detection and correction.
D. To encrypt the message.
Answer: C

18. Which type of parity bit is used when the data has even number of 1's?
A. Even parity
B. Odd parity

Q-Bank in lecture “5” 9


C. Both
D. None of the above
Answer: A

19. What is the circuit which checks the parity at the receiver called?
A. Parity generator
B. Parity checker
C. Error detector
D. Data transmitter
Answer: B

20. What is the other name for parity check?


A. Vertical Error Check (VEC)
B. Vertical Redundancy Check (VRC)
C. Horizontal Error Check (HEC)
D. Horizontal Redundancy Check (HRC)
Answer: B

21. If the data has odd number of 1's, what will be the parity bit for odd parity?
A. 0
B. 1
C. Depends on the data.
D. None of the above
Answer: B

Q-Bank in lecture “5” 10


22. What is a parity bit?
a) A bit that is deleted from the data string
b) A bit that is added to the data string
c) A bit that is modified in the data string
d) A bit that is transmitted along with the data string
Answer: b

23. How is the parity bit calculated in even parity?


a) If the data has even number of 0's, the parity bit is 0.
b) If the data has odd number of 0's, the parity bit is 0.
c) If the data has even number of 1's, the parity bit is 0.
d) If the data has odd number of 1's, the parity bit is 0.
Answer: c
24. What is odd parity?
a) When the data has even number of 1's and the parity bit is 1.
b) When the data has odd number of 1's, and the parity bit is 1.
c) When the data has even number of 1's and the parity bit is 0.
d) When the data has odd number of 1's, and the parity bit is 0.
Answer: b

25. What is the circuit called that adds a parity bit to the data at the
transmitter?
a) Parity checker.
b) Error detector.
c) Parity generator.

Q-Bank in lecture “5” 11


d) Data encoder.
Answer: c

26. What happens if the parity bits sent at the transmitter and the parity bits
received at the receiver are not equal?
a) An error is detected.
b) The data is corrected automatically.
c) The receiver requests retransmission of the data.
d) The receiver ignores the error and continues processing the data.
Answer: a

27. What is the main limitation of parity checking?


a) Cannot detect an odd number of bit errors.
b) Cannot detect an even number of bit errors.
c) Cannot detect any bit errors.
d) Can only detect errors in certain types of data.
Answer: b

28. Where is parity checking often used?


a) In communication systems only.
b) In memory systems only.
c) In both communication and memory systems.
d) In neither communication nor memory systems.
Answer: c

Q-Bank in lecture “5” 12


29. How does a single bad chip in a memory system affect the data?
a) It causes no errors in the data.
b) It causes a single bit error in only one location.
c) It causes a single bit error in many locations.
d) It causes multiple bit errors in many locations.
Answer: c

30. Is parity checking a basic or sophisticated error-detection technique?


a) Basic.
b) Sophisticated.
c) Neither basic nor sophisticated.
d) Both basic and sophisticated.
Answer: a
31. What is the relationship between parity checking and more sophisticated
error-detection and correction techniques?

a) Parity checking is the most sophisticated technique.


b) Parity checking is not related to more sophisticated techniques.
c) More sophisticated techniques are based on parity checking.
d) More sophisticated techniques do not use parity checking.
Answer: c

32. What is the main advantage of using the CRC method?


a) It can correct errors immediately upon sending a frame.
b) It can detect errors immediately upon sending a frame.

Q-Bank in lecture “5” 13


c) It can detect errors after receiving all the data.
d) It can correct errors after receiving all the data.
Answer: b

33. How is the CRC method based on the bit string?


a) The bit string is interpreted as a list of binary numbers.
b) The bit string is interpreted as a set of parity bits.
c) The bit string is interpreted as a polynomial.
d) The bit string is interpreted as a sequence of ASCII characters.
Answer: c
34. What is the purpose of appending n O's to the end of the bit string in the
CRC method?
a) To make the bit string longer.
b) To make the degree of the generator polynomial the same as the degree of
the bit string.
c) To make the degree of the generator polynomial the same as the number of
0's.
d) To make the degree of the generator polynomial the same as the number of
1's.
Answer: c

35. How is the remainder calculated in the CRC method?


a) By dividing M' by G using polynomial division.
b) By adding M' and G using binary addition.
c) By subtracting M' and G using binary subtraction.

Q-Bank in lecture “5” 14


d) By multiplying M' and G using binary multiplication.
Answer: a

36. What is done with the remainder in the CRC method?


a) It is discarded.
b) It is added to the original bit string.
c) It is used to check for errors in the transmitted data.
d) It is used to correct errors in the transmitted data.
Answer: c
37. What is the main advantage of the CRC method over the previous error
detection method discussed?
a) It is easier to implement.
b) It can detect errors immediately after a frame is sent.
c) It can correct errors in the received data.
d) It is less computationally intensive.
Answer: b

38. How is the polynomial corresponding to a bit string formed in the CRC
method?
a) By adding up all the bits in the string.
b) By multiplying all the bits in the string.
c) By dividing all the bits in the string.
d) By interpreting the bit string as a polynomial in x.
Answer: d

Q-Bank in lecture “5” 15


39. What operation is used to obtain the remainder R in the CRC method?
a) Polynomial division.
b) Multiplication.
c) Addition.
d) Subtraction.
Answer: a

40. What is sent after subtracting the remainder R from M' in the CRC
method?
a) The remainder R.
b) The resulting bit strings.
c) The generator bit string G.
d) The original bit string M.
Answer: b

41. Which of the following is an even parity: ……………


a) 011011010
b) 110101000
c) 100100001
d) 110001110
Answer: b

42. Using even parity checking, which of the following is a correct data?
a)1011 0011 0
b)1100 0110 0

Q-Bank in lecture “5” 16


c)1001 1100 1
d)1111 1000 00
Answer: b
43. What polynomial corresponds to the following bit string: 10011010?
a) x7+x4+x2+x+1
b) x7+x4+x3+x
c) x6+x4+x3+x
d)x6+x3+x2+1
Answer: b

44. Using odd parity checking, which data received is correct?


a) 1001 1001 1
b) 1000 0001 0
c) 1110 1110 0
d) 1010 1011 1
Answer: a

45. Using even parity checking, which data received is correct?


a) 1000 1000 1
b) 1010 1010 0
c) 1111 0001 0
d) 1010 0001 00
Answer: b

46. (1+1=0) what Boolean function does this loke like?


a) XOR
b) NOR
C) AND

Q-Bank in lecture “5” 17


d) OR
Answer: a

47. We can define the data integrity as……...


A) The capability to determine when data have been received.
B) The ability to determine that data has no error.
C) Making sure that data has been received correctly.
D) To send the same message again
Answer: c

48. To add an extra bit of data is considered……


A) Detection schemes.
B) Types of errors.
C) Cyclic redundancy check.
D) Data integrity
Answer: a

Q-Bank in lecture “5” 18


‫االسم‪:‬‬

‫‪ -1‬أحمد فولي أحمد محمد‬


‫‪ -2‬محمود أشرف محمود علي شهيب‬
‫‪ -3‬علي ياسر عبد الجليل عبد الظاهر‬
‫‪ -4‬عمرو خالد صابر ابراهيم‬
‫‪ -5‬اسامه احمد انور محمد‬
‫‪ -6‬فارس احمد محمد عبد هللا‬
‫‪ -7‬عمرو محمد السيد محمود الريس‬
‫‪ -8‬محمود طارق عبد هللا الدياسطي‬
‫‪ -9‬محمد نصر محمد عطية‬
‫‪ -10‬عمر محمد عادل‬
‫‪ -11‬احمد غريب على‬
‫‪ -12‬اكرام عبد المنعم محمد‬
‫‪ -13‬سلمي وائل محمد‬
‫‪ -14‬مروه محمود تمام‬
‫‪ -15‬سنا احمد طه‬
‫‪ -16‬منه هللا محمد مصطفي‬

‫”‪Q-Bank in lecture “5‬‬ ‫‪19‬‬

You might also like