Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

B3 Issues relating to transmission of data GapFill

Target Level
C
Running Total
0
0%
Attempt
1 of 3

You must fill all the gaps before clicking ‘Check Answers!’

A  typeIP addressprotocolLAN are the rules for a type of communication between two devices. Each type of transmission has different rules. For example, data is broken down onto small pieces called  papersbitsbytespackets – and the size, format and addressing has to be defined and consistent. Sometimes the data might not be fully received as it travels across the Internet through different routes. Sometimes, this doesn’t matter – for example in a video live stream it is acceptable to lose a few frames.

But when sending webpages and  VIOPparcelsbytesfiles, it is important that every bit is correctly received, so at the start of the transmission, a  POPHTMLwallhandshake between your device and the server is established, which checks the type of transmission, that the device is ready to receive data, and that the data arrives as expected – i.e. it is not corrupted.

One set of protocols is email. There are several different ways that email is received. Perhaps the simplest form of email is  routedwebmailpacketsPOP3 where the user just reads, sends and receives the email through a browser from anywhere in the world – all of the mail is still stored on the central server. The mail server is owned by a large company such as Google, Microsoft, and ISPs, etc.

Sometimes you will access your email in a desktop or mobile application such as Outlook or the Gmail app on your phone. In most cases, the emails are still stored on the central server and are just copied to your device. This is the  POPHTTPSIPIMAP protocol. But if the emails are downloaded to the device and deleted from the central server, the protocol is  IMAPVOIPPOPHTTPS, with version 3 being the most widely used. Another protocol is used to send email – this is the  SMTPHTTPSVOIPPOP3 protocol.

Nowadays, we can use the Internet as a replacement for the old analogue  faxTeletypetelephonestelegraphs that we’ve used for voice calls for well over a hundred years. We use dedicated Internet phones, or can use laptops, desktops and smartphones and tablets to make the calls over Wi-Fi or the mobile data network. The protocol is called  HTTPSHTTPIPVOIP. These services can also stream video using a webcam.

The Web is transmitted over the Internet (the Internet uses the  HTTPJavaTCP/IPFlash protocols. The Web protocol is  TCP/IPTCPHTTPVOIP, however not many websites use the secure (encrypted) version that means that the content of the web traffic cannot be read if intercepted. You will use the secure version when accessing webmail, and doing online banking. When the webpage is delivered to your  browsertext editorpaint-tooldatabase and its code (e.g. HTML with CSS styling) tells the software how to render (display) the page.

Over the past couple of decades, the growth in online shopping has exploded. With the increase, criminals have become more sophisticated and secure payment systems have been set up. As a result, all payment sites should use the  HTTPSMTPPOPHTTPS protocol. Banks are also using  POPtwo-factor authenticationsingle-factorfour-factor authentication to check that you made the purchase – e.g. sending a code by text to your mobile phone that must be entered into the site for the payment to go through.

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
72%