Q1.List & Explain Various Input & Output Devices of A Computer
Q1.List & Explain Various Input & Output Devices of A Computer
I. Input Devices
Input devices are necessary to convert our information or data into a form
which can be understood by the computer. A good input device should
provide timely, accurate and useful data to the main memory of the
computer for processing followings are the most useful input devices.
1.Keyboard:
This is the standard input device attached to all computers. The layout of the
keyboard is just like the traditional typewriter of the type QWERTY. It also
contains some extra command keys and function keys. It contains a total of
101 to 104 keys. You have to press correct combination of keys to input
data. The computer can recognize the electrical signals corresponding to the
correct key combination and processing is done accordingly.
2.Mouse:
The mouse is an input device which is used with your personal computer. It
rolls on a small ball and has two or three buttons on the top. When you roll
the mouse across a flat surface the screen censors the mouse in the
direction of mouse movement. The cursor moves very fast with mouse
giving you more freedom to work in any direction. It is easier and faster to
move through a mouse.
3. Scanner:
The keyboard can input only text through keys provided in it. If we want to
input a picture the keyboard cannot do that. The Scanner is an optical device
that can input any graphical matter and display it back.
Output devices can adopt different shapes and styles, which are used to give
the output of the processing of data. The output can be in any form i.e.
typed, printed, sketched, visible, nonviable, audio, video etc. Output devices
are those peripheral devices that allow a user to retrieve information from a
computer. Any Output devices can be divided into two basic categories.
1. Hard Copy:
It is that form of output which can be read directly and immediately, stored
to be read later. This output is on paper and which is permanent.
Impact Printers
Non-impact Printers
Impact Printers
These are those types of printers which have direct mechanical contact
between the head of the printers and paper. The impact printers are
These printers print without any direct mechanical contact between the head
of the printer and paper. These printers can be categorized into
a. Thermal Printers:
These Printers uses heat sensitive paper in dot matrix method, on which hot
needles are pressed to form characters. These printers print slow and make
a little noise. The disadvantage is that it is not possible to print multiple
copies simultaneously.
b. Inkjet Printers:
These printers use a mechanism where it sprays the ink from tiny nozzles
through an electric field that arranges charged particles ink into characters.
The paper absorbs the ink and it dries instantaneously. It is capable to print
about 500cps, expensive but faster and we can also have color printing, by
using ink various colors.
The most popular input/output device is the Visual Display Unit (VDU). It is
also called the monitor. A Keyboard is used to input data and Monitor is used
to display the input data and to receive a message from the computer. A
monitor has its own box which is separated from the main computer system
and is connected to the computer by a cable. In some systems, it is compact
with the system unit. It can be color or monochrome.
II. Speakers:
Most computers are sold with the capability to add a pair of speakers to your
system unit. In fact, in some cases, the monitor may have speakers built
directly into the unit. This enhances the value of educational and
presentation products and can now be considered a standard PC component.
2. Explain classification of
computer memory
Memory is major part of computers that categories into several types. Memory is best storage part to
the computer users to save information, programs and etc, The computer memory offer several
kinds of storage media some of them can store data temporarily and some them can store
permanently. Memory consists of instructions and the data saved into computer through Central
Processing Unit (CPU).
Memory is the best essential element of a computer because computer cant perform simple tasks.
The performance of computer mainly based on memory and CPU. Memory is internal storage media
of computer that has several names such as majorly categorized into two types, Main memory and
Secondary memory.
Primary Memory also called as volatile memory because the memory cant store the data
permanently. Primary memory select any part of memory when user want to save the data in
memory but that may not be store permanently on that location. It also has another name i.e. RAM.
The primary storage is referred to as random access memory (RAM) due to the random selection of
memory locations. It performs both read and write operations on memory. If power failures
happened in systems during memory access then you will lose your data permanently. So, RAM is
volatile memory. RAM categorized into following types.
DRAM
SRAM
DRDRAM
Secondary memory is external and permanent memory that is useful to store the external storage
media such as floppy disk, magnetic disks, magnetic tapes and etc cache devices. Secondary
memory deals with following types of components.
ROM is permanent memory location that offer huge types of standards to save data. But it work with
read only operation. No data lose happen whenever power failure occur during the ROM memory
work in computers.
1. PROM: Programmable Read Only Memory (PROM) maintains large storage media but cant offer
the erase features in ROM. This type of RO maintains PROM chips to write data once and read
many. The programs or instructions designed in PROM cant be erased by other programs.
2. EPROM : Erasable Programmable Read Only Memory designed for recover the problems of
PROM and ROM. Users can delete the data of EPROM thorough pass on ultraviolet light and it
erases chip is reprogrammed.
3. EEPROM: Electrically Erasable Programmable Read Only Memory similar to the EPROM but it
uses electrical beam for erase the data of ROM.
Cache Memory: Mina memory less than the access time of CPU so, the performance will decrease
through less access time. Speed mismatch will decrease through maintain cache memory. Main
memory can store huge amount of data but the cache memory normally kept small and low
expensive cost. All types of external media like Magnetic disks, Magnetic drives and etc store in
cache memory to provide quick access tools to the users.
3.Explain disc partition with its
benefits
A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building. By definition, the connections must be high
speed and relatively inexpensive (e.g., token ring orEthernet). Most Indiana University
Bloomington departments are on LANs.
A MAN (metropolitan area network) is a larger network that usually spans several
buildings in the same city or town. The IUB network is an example of a MAN.
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.
1. It is cost effective.
2. Cable required is least compared to other network topology.
4. It is easy to understand.
2. If network traffic is heavy or nodes are more the performance of the network decreases.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbours for each device.
Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then the
data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in
them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node.
Features of Star Topology
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
4. Performance is based on the hub that is it depends on its capacity
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to
each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has
information about the broken links, and it avoids those node etc. We can even have routing logic, to
re-configure the failed nodes.
Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required.
The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over
the network.
Types of Mesh Topology
1. Partial Mesh Topology : In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
1. Fully connected.
2. Robust.
3. Not flexible.
2. It is robust.
Optical fibre
Wireless transmission
Twisted pair copper cable is still widely used, due to its low cost and ease of installation. A twisted
pair consists of two insulated copper cables, twisted together to reduce electrical interference
between adjacent pairs of wires. This type of cable is still used in the subscriber loop of the public
telephone system (the connection between a customer and the local telephone exchange), which
can extend for several kilometres without amplification. The subscriber loop is essentially an
analogue transmission line, although twisted pair cables are also be used in computer networks
to carry digital signals over short distances.
The bandwidth of twisted pair cable depends on the diameter of wire used, and the length of the
transmission line. The type of cable currently used in local area networks has four pairs of wires.
Until recently, category 5 or category 5E cable has been used, but category 6 is now used for
most new installations. The main difference between the various categories is in the data rate
supported - category 6 cable will support gigabit Ethernet. The main disadvantage of UTP cables
in networks is that, due to the relatively high degree of attenuation and a susceptibility to
electromagnetic interference, high speed digital signals can only be reliably transmitted over cable
runs of 100 metres or less.
Shielded Twisted Pair (STP) cable was introduced in the 1980s by IBM as the recommended
cable for their Token Ringnetwork technology. It is similar to unshielded twisted pair cable except
that each pair is individually foil shielded, and the cable has a braided drain wire that is earthed
at one end during installation. The popularity of STP has declined for the following reasons:
Coaxial cable
[Return to top of page]
A coaxial cable has a central copper wire core, surrounded by an insulating (dielectric) material.
Braided metal shielding surrounds the dielectric and helps to absorb unwanted external signals
(noise), preventing it from interfering with the data signal travelling along the core. A plastic sheath
protects the cable from damage. A terminating resistor is used at each end of the cable to prevent
transmitted signals from being reflected back down the cable. The following diagram illustrates
the basic construction of a coaxial cable.
Thicknet cable (also known as 10Base5) is a fairly thick cable (0.5 inches in diameter). The
10Base5 designation refers to the 10 Mbps maximum data rate , baseband signalling and 500
metre maximum segment length . Thicknet was the original transmission medium used in
Ethernet networks, and supported up to 100 nodes per network segment. An ethernet tranceiver
was connected to the cable using a vampire tap , so called because it clamps onto the cable,
forcing a spike through the outer shielding to make contact with the inner conductor, while two
smaller sets of teeth bite into the outer conductor. Transceivers could be connected to the network
cable while the network was live. A separate drop cable with anattachment unit interface (AUI)
connector at each end connected the tranceiver to the network interface card in the workstation
(or other network device). The drop cable was typically a shielded twisted pair cable, and could
be up to 50 metres in length. The minimum cable length between connections ( taps ) on a cable
segment was 2.5 meters.
Thinnet cable (also known as 10Base2) is thinner than Thicknet (approximately 0.25 inches in
diameter) and as a consequence is cheaper and far more flexible. The 10Base2 designation
refers to the 10 Mbps maximum data rate ,baseband signalling and 185 (nearly 200) metre
maximum segment length . A T-connector is used with two BNC connectors to connect the
network segment directly to the network adapter card. The length of cable between stations must
be at least 50 centimetres, and Thinnet can support up to 30 nodes per network segment.
Optical fibre
[Return to top of page]
Optical fibres are thin, solid strands of glass that transmit information as pulses of light. The fibre
has a core of high-purity glass, between 6m and 50m in diameter, down which the light pulses
travel. The core is encased in a covering layer made of a different type of glass, usually about
125 m in diameter, known as the cladding. An outer plastic covering, the primary buffer, provides
some protection, and takes the overall diameter to about 250 m. The structure of an optical fibre
is shown below.
The cladding has a slightly lower refractive index than the core (typical values are 1.47 and 1.5
respectively), so that as the pulses of light travel along the fibre they are reflected back into the
core each time they meet the boundary between the core and the cladding. Optical fibres lose far
less of its signal energy than copper cables, and can be used to transmit signals of a much higher
frequency. More information can be carried over longer distances with fewer repeaters. The
bandwidth achievable using optical fibre is almost unlimited, but current signalling technology
limits the data rate to 1 Gbps due to time required to convert electronic digital signals to light
pulses and vice versa. Digital data is converted to light pulses by either a light emitting diode
(LED) or a laser diode. Although some light is lost at each end of the fibre, most is passed along
the fibre to the receiver, where the light pulses are converted back into electronic signals by a
photo-detector.
7.what is www, what is DNS
The Web, or World Wide Web (W3), is basically a system of Internet servers that support
specially formatted documents. The documents are formatted in a markup language called
HTML (HyperText Markup Language) that supports links to other documents, as well as
graphics, audio, and video files.
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain
names and translate them to Internet Protocol (IP) addresses.
This is necessary because, although domain names are easy for people to remember, computers or machines,
access websites based on IP addresses.
Information from all the domain name servers across the Internet are gathered together and housed at the Central
Registry. Host companies and Internet Service Providers interact with the Central Registry on a regular schedule to
get updated DNS information.
When you type in a web address, e.g., www.jimsbikes.com, your Internet Service Provider views the DNS associated
with the domain name, translates it into a machine friendly IP address (for example 216.168.224.70 is the IP for
jimsbikes.com) and directs your Internet connection to the correct website.
8. Explain the types of websites
Static websites is a simple HTML website. These websites contain static HTML
pages. These websites are good only for representing the information that rarely
changes.
Static Websites are simple HTML Dynamic websites Contain Portal websites Contain
Websites. Don't Contains Server-side Processing Server-side Processing
Server-side Processing Language. Language and use
Language. database to store user
information.
Don't generate any dynamic These websites are These websites are
contents. dynamic in nature. These completely dynamic in
can generate dynamic nature. It also enables
contents, Such as my account features.
Dynamic Searching etc. So that user can login
and register.
11.Mail merge
Mail merge primarily enables automating the process of sending bulk mail to customers,
subscribers or general individuals. Mail merge works when a data file is stored that
includes the information of the recipients to whom the letter will be sent. This file can be
a spreadsheet or database file containing separate fields for each different type of
information to be merged within the letter.
The second file is the word document or the letter template. The recipients information
on the letter template is kept empty. When the mail merge process is initiated, the
recipients data from spreadsheet or database is fetched and placed within the empty
field in the letter, one by one, until all letters are created.
12. Explain how to input
graphics , use spellcheck , cut ,
copy , paste
13.Explain workspace in
coreldraw with toolbox
Just google coreldraw &
write it down.
14.What is scratch
programming
Scratch is a free educational programming language that was developed by the Lifelong
Kindergarten Group at the Massachusetts Institute of Technology (MIT) with over 15 million
registered users and 22 million shared projects.[1] The current version, 2.0, can be downloaded here (the
previous version, 1.4, can be downloaded here) or accessed with the online editor here. It is geared
towards kids ages to 8-16 and grades 3rd grade to high school.
Scratch is designed to be fun, educational, and easy to learn. It has the tools for creating interactive
stories, games, art, simulations, and more, using block-based programming. Scratch even has its
own paint editor and sound editor built-in.
In designing the language, the creators' main priority was to make the language and development
environment intuitive and easily learned by children who had no previous programming experience. There
is a strong contrast between the powerful multimedia functions and multi-threaded programming style and
the rather limited scope of the Scratch programming language.
The user interface for the Scratch development environment divides the screen into several panes: on the
in the middle is the blocks palette, on the right the scripts area, and on the left the stage and sprite list.
The blocks palette has code fragments (called "blocks") that can be dragged onto the scripts area to
make programs. To keep the palette from displaying a lot of blocks and for ease if use, it is organized into
10 groups of blocks: motion, looks, sound, pen, control, events, sensing, operators, variables, and more
blocks.
The main difference between the Client-Server and Peer-to-Peer network model
is that in Client-Server model, the data management is centralised whereas,
in Peer-to-Peer each user has its own data and applications. Further, we will
discuss some more differences between Client-Server and Peer-to-Peer network
model with the help of comparison chart shown below, just have a look.
Comparison Chart
BASIS FOR
CLIENT-SERVER PEER-TO-PEER
COMAPAISON
Basic There is a specific server and specific Clients and server are not distinguished;
clients connected to the server. each node act as client and server.
Service The client request for service and Each node can request for services and can
Data The data is stored in a centralized Each peer has its own data.
server.
Server When several clients request for the As the services are provided by several
implement. implement.
BASIS FOR
CLIENT-SERVER PEER-TO-PEER
COMAPAISON
Stability Client-Server is more stable and Peer-toPeer suffers if the number of peers
Definition of Client-Server
The Client-Server network model is widely used network model. Here, Server is
a powerful system that stores the data or information in it. On the other hands,
the Client is the machine which let the users access the data on the remote
server.
The system
administrator manages the data on the server. The client machines and the
server are connected through a network. It allows the clients to access data
even if the client machine and server are far apart from each other.
As all the services are provided by a centralized server, there may be chances
of server getting bottlenecked, slowing down the efficiency of the system.
Definition of Peer-to-Peer
Unlike Client-Server, the Peer-to-Peer model does not distinguish between client
and server instead each node can either be a client or a server depending on
the whether the node is requesting or providing the services. Each node is
considered as a peer.
Peer-to-Peer network has the advantage over client-server that the server
is not bottlenecked as the services are provided by the several nodes
distributed in a peer-to-peer system.