Computer System
Computer System
Deleting digitally stored data means changing the details of data at bit level.
Security concerns
This can be avoided by limiting access to the computer system and using passwords for user
accounts and files.There is also an option of encrypting files to protect them from unwanted
modification.
Q1. Name the software required to make a computer functional. Write down its two primary
services.
Ans. The software required to make a computer functional is Operating System (OS). It’s two
primary services are :
Device Management : It interacts with the device driver and the related software for a
particular device.
Q2. What is the need of RAM? How does it differ from ROM?
Ans. RAM is used to store data temporarily while the computer is working. Whenever the
computer is started or a software application is launched, the required program and data are
loaded into RAM for processing.
Ans. The secondary memory (also called storage device) is required to store data, instructions
and results permanently for future use.
Q4. Draw the block diagram of a computer system. Briefly write about the functionality of each
component.
Ans. A computer system primarily comprises a Central Processing Unit (CPU), memory,
input/output devices and storage devices.
1.CPU : The CPU has two main components — Arithmetic Logic Unit (ALU) and Control Unit
(CU). ALU performs all the arithmetic and logical operations. The control unit controls the
sequence in which computer programs and instructions are executed.
2. Input Device : The devices through which data/signals are sent to a computer are termed as
input devices. for example : keyboard, mouse, scanner etc.
3. Output Devices : The device that receives data from a computer system for display is called
output device. It converts digital information into human understandable form. For example,
monitor, projector, headphone, speaker, printer, etc.
4. Storage Devices : A computer system needs memory to store the data and instructions for
processing. Those devices which stores data for processing are called storage devices like Hard
Disk, SSD etc
Q5.Differentiate between proprietary software and freeware software. Name two software for
each type.
Q8. Identify the category (system, application, programming tool) of the following software:
a) Compiler
b) Assembler
c) Ubuntu
d) Text editor
a) 2 MB
b) 3.7 GB
c) 1.2 TB
Q10. What is the security threats involved when we throw away electronic gadgets that are non-
functional?
Ans. security threat can increase if the electronic gadgets and the magnetic strip inside the
devices are not disposed properly. Personal detail, bank detail, important documents can be
fetched through broken hard disk or memory card which can be used by hackers.
Ans a) Secondary Storage like Hard Disk, Pen Drive, CD, DVD, SD Card, SSD etc