Solved_Questions_Computer_Hardware (1)
Solved_Questions_Computer_Hardware (1)
(a) Complete the binary register for these two pairs of digits.
97: 10010111
5C: 01011100
A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for
communications at the data link layer of a network segment. It is used to ensure that data packets
2. Hexadecimal is used in defining colors in web design (e.g., #FFFFFF for white).
(i) Complete the binary register to show its contents after this logical left shift.
Original: 01010010
Shifted: 10100100
(ii) State one effect this logical shift has on the binary value.
A logical left shift multiplies the binary number by 2 for each position it is shifted.
(e) Negative denary numbers can also be represented as binary using two's complement.
Denary: -54
Binary: 11001010
A data packet consists of three main parts: the header, the payload, and the footer. The header
contains control information such as source and destination addresses. The payload is the actual
data being transmitted. The footer includes error-checking data.
(b) The website hosts videos that users can stream. The company uploads new videos to the
website.
(i) The videos are compressed before they are uploaded to the website.
(ii) Give two methods of compression that could be used to compress the videos.
1. Lossy compression
2. Lossless compression
(iii) The company uses parallel half-duplex data transmission to transmit the data for the new videos
Explain why parallel half-duplex data transmission is the most appropriate method.
increasing the data transfer rate. It is suitable for large file uploads like videos because it can handle
(c) The company is concerned about a distributed denial of service (DDoS) attack.
A DDoS (Distributed Denial of Service) attack is an attempt to make an online service unavailable by
overwhelming it with a flood of internet traffic from multiple sources, causing disruption or shutdown
of the service.
(ii) Suggest one security device that can be used to help prevent a DDoS attack.
A firewall can be used to help prevent a DDoS attack by filtering out malicious traffic and blocking
unauthorized access.
2. It consists of four sets of numbers separated by periods (IPv4) or eight groups of four
hexadecimal digits (IPv6).
(ii) Identify the network component that uses the IP address to send data only to its correct
destination.
(b) The website has a uniform resource locator (URL). An example of a URL is given.
Complete the table to identify the name of each section of the URL.
https Protocol
/index.html Path
(a) Circle three components that are part of the central processing unit (CPU) in this computer.