6 5 4 3 2 1
4 2 1 9 2 3
24 10 4 27 4 3
24+10+4+27+4+3=
72/11 = 6.54
Not Valid
6 5 4 3 2 1
8 2 0 1 5 6
48 10 0 3 10 6
48+10+0+3+10+6=
77/11 = 7
Valid
6 5 4 3 2 1
5 0 2 4 1 _
30 0 8 12 2
52 + 3 = 55
Check digit = 3
1. Transposition error
2. Simply type in the wrong digit/letter
1. DVD-RAM can hold data for longer periods of time
2. DVD-RAM is more compatible than DVD+RW
3.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2GTKtO4qwkCQbwKFif_Rcichp_vYD4WQOFY8A-815xT96_ZbxEvuVlNaHiPUWlfGP0MroFamqTjs-K3fSXmGR_75_EROEZ1PhqTiVTvh_V6qzhMSUdIZj2Z4rcxEbeW6RgVv7LnKfm8Q/s1600/TestThing.png)
4a. 16:49
b. 0001
0111
0010
1001
c. If the present time and the binary number match up to the time set (08:00) the alarm will be set to trigger.
5a. Yes
b. No
c. Errors were corrected by resending the byte back to the sender of the data
6a. Temperature and oxygen content monitor
b. The micro-processor is used to monitor the temperature and the oxygen content and if the micro-processor detects that either the temperature sensor or the oxygen content monitor detects that they do not meet the requirements then the valve will work and increase the temperature and the oxygen content of the water and once it meets the requirements preset then the valve will shut off and stop increasing the temperature and oxygen content.
c. The safeguards used by the micro-processor to stop the temperature rising to high will use the temperature sensor to monitor that once it reaches the preset time the valve will shut off and stop increasing the temperature.
7. HTML: 1
Browser: 2
MAC address: 6
IP address: 4
http: 3
Internet Server: 5
7b. Some websites make the request to enable cookies because it stores the data of the users previous information entered into the website.
8ai. A byte is a unit of digital information in computing and telecommunications that most commonly consists of 8 bytes
ii. A gigabyte is 1,000,000 bytes and does the same job but on a much larger scale
b. 1. Flash memories can store large amounts of data while CD's can only store under a gigabyte
2. On flash memories you can add, erase and modify the data stored by it and on a CD-RW you can only write over the data 3 or 4 times.
9a. A buffer
b. Interrupt
10ai. Hello World
ii. Vmilozgu Pnwgyng
b. So if the data is hacked, the hacker cannot access the key and then access all the data that has been hidden and sent privately.
11. Anti-spyware software - E
Anti-virus software - C
Back-up files - A
Encryption - D
Passwords and a firewall - B
12a. B is a high level language
b. It takes shorter time to code, more systems understand it and we can see what we're doing.
c. It is simpler to learn
d. 1. A compiler program runs the program and then gives an error report at the end
2. An interpreter program runs the program until an error is found, if an error is found the program stops until the error is fixed.
13ai.Location 1: 01000001
Location 2: 01000011
ii. Location 1: 41
Location 2: 43
b. 64147 = FA97
No comments:
Post a Comment