CSIT Nepal: Information Technology (1st Batch)
CSIT Nepal: Information Technology (1st Batch)
Long Question:
To function properly, the computer needs both hardware and software. Hardware consists of the
mechanical and electronic devices, which we can see and touch. The different parts of the
computer are Processor (CPU), Input devices, Output devices, Storage devices and Memory
devices. The software consists of programs, the operating systems and the data that reside in the
memory and storage devices.
Any of a number of devices is used to enter data and program instructions into a computer and to
gain access to the results of the processing operation. Common input devices include keyboards
and optical scanners; output devices include printers and cathode-ray tube and liquid-crystal
display monitors. The information received by a computer from its input unit is stored in the
main memory or, if not for immediate use, in an auxiliary storage device. The control unit selects
and calls up instructions from the memory in appropriate sequence and relays the proper
commands to the appropriate unit. It also synchronizes the varied operating speeds of the input
and output devices to that of the arithmetic-logic unit (ALU) so as to ensure the proper
movement of data through the entire computer system. The ALU performs the arithmetic and
logic algorithms selected to process the incoming data at extremely high speeds-in many cases in
nanoseconds (billionths of a second). The main memory, control unit, and ALU together make
up the central processing unit (CPU) of most digital computer systems, while the input-output
devices and auxiliary storage units constitute peripheral equipment.
2. Explain the first, second and third normal form and compare it.
Normalization is the process of building database structures to store data. Normalization is a
a l
formal process of developing data structures in a manner that eliminates redundancy and
e
promotes integrity. Data normalization is a corner stone of the relational theory. In relational p
T
Normalization usually involves dividing a database into two or more tables and defining N
database design, the process of organizing data to minimize redundancy is called normalization.
I
relationships between the tables. The objective is to isolate data so that additions, deletions, and
S
Source: www.csitnepal.com
C Page 1
Information Technology (1st Batch)
modifications of a field can be made in just one table and then propagated through the rest of the
database via the defined relationships.
There are three main normal forms, each with increasing levels of normalization:
First Normal Form (1NF): Each field in a table contains different information. For example,
in an employee list, each table would contain only one birth date field. First normal form
deals with the "shape" of a record type. Under first normal form, all occurrences of a record
type must contain the same number of fields. First normal form excludes variable repeating
fields and groups. This is not so much a design guideline as a matter of definition. Relational
database theory doesn't deal with records having a variable number of fields.
Second Normal Form (2NF): Each field in a table that is not a determiner of the contents of
another field must itself be a function of the other fields in the table. Second normal form is
violated when a non-key field is a fact about a subset of a key. It is only relevant when the
key is composite, i.e., consists of several fields.
Third Normal Form (3NF): No duplicate information is permitted. So, for example, if two
tables both require a birthdate field, the birthdate information would be separated into a
separate table, and the two other tables would then access the birthdate information via an
index field in the birthdate table. Any change to a birthdate would automatically be reflecting
in all tables that link to the birthdate table. Third normal form is violated when a non-key
field is a fact about another non-key field.
There are additional normalization levels, such as Boyce Codd Normal Form (BCNF), fourth
normal form (4NF) and fifth normal form (5NF). While normalization makes databases more
efficient to maintain, they can also make them more complex because data is separated into so
many different tables.
3. What do you mean by Intranet? Explain the advantages and disadvantages of Intranet.
Commonly used in different types of organizations, an intranet is very similar to an Internet, but
the difference is that an intranet is local, while the Internet is global. In other words, an intranet
(a secure information-sharing system) uses data stored on an internal corporate network, while
the Internet uses data stored on the servers all around the world. The purpose of an intranet
differs according to the type of organization where it is implemented. An intranet implements
many technologies known from the Internet, such as file transfer protocols, chat rooms, browser
interfaces, and many others. Furthermore, not all users have access to all the data stored on a
central server; this depends on the privileges and rank of each employee within the organization.
It's also relevant that many organizations have a number of computers and routers already
implemented. Therefore, an intranet can be considered as an extension to a network
infrastructure that already exists within the organization.
Advantages of an Intranet: There are numerous benefits of an intranet. One of the most
a l
important benefits concerns the security of the information. If maintained and administered well,
e
an intranet can provide encrypted access to highly sensitive information. This information is not p
T N
transferred through the open networks but is available only to people inside the organization that
have the required privileges. An intranet also provides a quality and secure communication
I
between employees, it uses well known e-mail clients and Internet browsers, and it can be
S
Source: www.csitnepal.com
C Page 2
Information Technology (1st Batch)
implemented easily on an existing infrastructure. Some other advantages are its flexibility and
scalability as well as the access it provides to accurate information. It also provides new business
opportunities, since a company can create an extranet (a network of intranets of different
organizations) and share sensitive information easily with its clients.
Disadvantages of an Intranet: Every network concept has disadvantages. Naturally, the security
risks come first. This does not concern only the software security issues, but also the way
employees handle their user names and passwords. Sometimes, these passwords are left on a
place where anyone can see them, while users also tend to choose simple passwords that are easy
to guess (for example, date of birth, initials, children's names, etc). Some companies are not
comfortable with this method of file and information sharing, and this technology brings
additional costs as well. Although one purpose of an intranet is to ease the process of
communication and file sharing within the organization, some employees who are not
comfortable with computer technology might be frustrated and confused with this method.
Short Questions:
Auxiliary storage units behave in a manner similar to other I/O devices, but users do not interact
directly with them. If you were to place yourself inside the computer, in many ways you would
not be able to distinguish among the various kinds of I/O equipment. Auxiliary storage
equipment has data transmission rates that may be significantly higher than other I/O devices but
are still much slower than the internal speeds of the processor. Auxiliary storage serves two main
purposes: it serves as an extension of the main memory or as a medium to permanently archive
information. The computer can use it as a memory extension for its own purposes outside the
control of the user. On the other hand, the user can employ the extra storage to maintain almost
limitless information. Some of the auxiliary storage devices are: Hard Disk, Optical Disk,
Magnetic Tape, and Floppy Disk.
S
Source: www.csitnepal.com
C Page 4
Information Technology (1st Batch)
executing all of the programs at the same time. There are two basic types of multitasking:
preemptive and cooperative. In preemptive multitasking, the operating system parcels out CPU
time slices to each program. In cooperative multitasking, each program can control the CPU for
as long as it needs it. If a program is not using the CPU, however, it can allow another program
to use it temporarily. OS/2, Windows 95, Windows NT, the Amiga operating system and UNIX
use preemptive multitasking, whereas Microsoft Windows 3.x and the MultiFinder (for
Macintosh computers) use cooperative multitasking.
T N
S I
Source: www.csitnepal.com
C Page 5
Information Technology (1st Batch)