CIS 103 – Applied Computer Technology Data Communications page 2
Chapter 5
Personal Computer Data Communications
Review Question Answers
Section Review questions are labeled according to the sections where their answers can be found. For example, the three questions labeled 4.1a all appear in section 4.1, part a.
Section 5.1 – Serial Data Communications
5.1 Section Review
CIS 103 – Applied Computer Technology Data Communications page 2
a. How is digital data stored inside a computer?
Digital data is stored as a series of bits.
Why are the terms byte and word length both important in modern computing?
A byte is an 8-bit word. The size of a computer’s memory is measured in bytes. The number of bits that a particular computer works with at one time is called the computer’s word length. Word length affects a computer’s speed and sophistication.
b. What is the difference between parallel and serial data communications?
Parallel data communication is the movement of the bits of data in a word at the same time over several parallel wires. Serial data communication is the movement of bits of data one at a time over a single wire. Parallel communication is faster than serial communication, but the equipment is more expensive.
Where are each used and why?
Parallel data communication is primarily found inside a computer, using data busses. Serial communication is normally used between computers, or between a computer and a device such as a printer, to save money.
c. What are data communication protocols and standards, and why are they important?
A communications protocol is a set of rules defining a data communications method, including the electronic signals to be used, how fast the data should be sent, and so on. All data communication needs to follow a communications protocol to ensure that the receiver of a message can understand the sender. Data communication standards include the communications protocol, along with equipment specifications, such as the type of connectors and cables to be used. It is important for computer companies to follow data communications standards so that equipment from different manufacturers can work with each other.
Who makes up such standards?
There are several organizations that define different data communications standards. Generally, they fall into four categories –Government agencies (FCC), Government affiliated agencies (ITU) Professional groups (IEEE) and Trade associations EIA).
d. What is the RS232c standard and why was it important?
The RS-232c standard was created by the EIA in 1969 for terminals connected to old mainframe computers. It became the standard for connecting devices like printers and telephone modems to the first personal computers in the 1970’s and 80’s. The RS232c standard was important because it was one of the first communications standards that many different manufacturers adopted, making is easier to connect one brand of equipment to another
.
e. What is the USB standard and why is it important?
The USB (Universal Serial Bus) standard is now the most widely used data communication standard for connecting devices to personal computers. Commonly used flash ROM drives, sometimes called memory sticks or thumb drives, are USB devices, as are most newer printers, digital cameras, and cell phones.
What are the three different versions of USB?
The three different versions of the USB standard are standard USB (USB 1.0 or 1.1), Hi-Speed USB (USB 2.0), and SuperSpeed USB (USB 3.0).
Who is responsible for the USB standard?
The Universal Serial Bus Implementers Forum (USB-IF) is responsible for the USB standard.
f. What is the Firewire standard and where is it used?
Firewire is a serial communication standard first developed by Apple Computers and approved as IEEE standard 1394 in 1995. The High Definition Audio-Video Network Alliance (HANA) has chosen Firewire as the standard for the audio visual industry, so most professional video equipment, such as high end video cameras, have Firewire connections. The automobile industry and the military also use Firewire. The new F22 Raptor and F-35 Lightning II aircraft are equipped with Firewire data communication connections, as is the NASA Space Shuttle.
How does it compare with USB?
Firewire is more sophisticated than USB – it is more reliable at higher speeds and the cables can be much longer – but the equipment is more expensive and it can be a little harder to use.
Who is responsible for the Firewire standard?
Firewire is an IEEE standard.
CIS 103 Applied Computer Technology Using Database Management Systems page 4
Section 5.2 – Connecting USB Devices to Personal Computers
a. What is a driver?
A driver is a computer program that manages a device or a connection between devices.
Do USB peripheral devices need drivers?
USB connections are simple and do not need drivers, but sometimes the device connected to the computer needs a driver so that it will work properly.
b. Briefly describe how to connect a camera that doesn't need a driver to a computer and move pictures from the camera to the computer.
Step 1 - Make sure you have the correct cable.
Step 2 – Make sure the camera is turned off and that the computer is turned on and ready to use.
Step 3 – Connect the cable.
Step 4 – Turn on the camera.
Step 5 – Open the picture folder.
Step 6 – Copy the data to the desired location.
What alternative method can sometimes be used, and why doesn’t it always work?
An alternate way to move pictures from a camera to a computer is to take the memory chip out of the camera and plug it into the computer. This method will only work if your computer has a slot for the type of chip your camera uses, or you have a suitable adapter.
What three steps should someone always follow when connecting a device that needs driver software, such as a printer, to a computer?
· Find the instructions.
· Read the instructions.
· Follow the instructions.
How can you tell if a device needs a driver?
The manual will tell you if a device needs a driver. Also, if you try to establish a connection with a device that requires a driver, but no driver is present, the operating system will tell you that the necessary driver is missing.
Where can you find replacement manuals and driver software?
Manuals and software and for almost all computer peripheral devices can be downloaded free of charge directly from the manufacturer.
Section 5.3 – A Wireless Home Network with Internet Service
a. What are wireless home networks and why are they popular?
Wireless home networks allow users to connect computers to the Internet, to peripheral devices such as printers, and to other computers from almost any place in the home without installing wires or cables throughout the home. Wireless home networks are also popular because they are less expensive than wired networks, and easier to setup.
b. Briefly describe the hardware needed for a wireless home network.
The hardware needed for a wireless home network includes a broadband modem, a wireless router, and wireless network adapters for each computer or device connected to the network. You will also need at least two Ethernet cables, even though it’s called a wireless home network.
c. What are the 802.11 standards?
The 802.11 standards are the IEEE’s standards for wireless telecommunication. They are the most important standards for wireless home networks are
What versions of the standard should be used for a wireless home network?
Three different standards are commonly used today for wireless home networks – IEEE 802.11b, 802.11g, and 802.11n. All three will work, but the g and n standards work better over longer distances.
d. Briefly describe how to set up a wireless home network.
To set up a wireless home network, you need to make sure that you have the right equipment, that it is connected properly, and that it is properly initialized. Your Internet Service Provider should install and set up a broadband modem for you. You need to install and setup a wireless router, and make sure each device on the network has a properly initialized network adapter.
What can you do about computers that don't have a built-in wireless adapter?
Computers that do not have built-in wireless adapters will require a wireless adapter that can be plugged into the computer. Today the easiest and most common way to do this is by using an adapter that connects to the computer’s USB port, and which looks very similar to a USB thumb drive.
Section 5.4 – Securing a Wireless Home Network
a. What are some of the things that a person who is able to connect to your wireless network might do?
A person who is able to connect to your wireless network might be able to:
· Slow down your Internet connection.
· Steal data and files from your computer, including passwords, bank account information, credit card details, photographs, and other personal private data.
· Steal your identity.
· Change the software on your computer.
· Install viruses on your computer.
· Send email, spam or viruses to other computers from your computer.
· Use your computer as part of a denial of service attack on other computers.
b. List five things you can do to improve the security of your wireless home network.
· Use data encryption
· Don’t broadcast your network SSID
· Use your network adapters’ MAC addresses
· Disable remote router administration
· Change the password on your wireless router
c. Briefly describe how to reconfigure a wireless router to secure a home network.
- Access the router’s control panel using a Web browser.
2. Set up data encryption
3. Turn off SSID Broadcasting
- Turn on MAC filtering
5. Disable remote router administration