6101 Fundamentals Ofcomputer and IT MCQ
6101 Fundamentals Ofcomputer and IT MCQ
6101 Fundamentals Ofcomputer and IT MCQ
3. IPV4 Address is
A. 8 bit
B. 16 bit
C. 32 bit
D. 64 bit
Ans: C
5. Computer is small general purpose microcomputer, but larger than portable computer
pg. 1
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
a. Hybrid
b. Digital
c. Desktop
d. Laptop
Ans: c
a. Keyboard
b. Mouse
c. Monitor
d. Mother board
Ans: c
7. Trackball is a...........
a. Input device
b. Output device
c. Programming language
d. Software
Ans: a
a. Micro
b. Mainframe
c. Super
d. Mini
Ans: d
a.Micro
pg. 2
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
b. Mainframe
c. Super
d. Mini
Ans: b
10. Note book, laptop, palm, hand-held computers are coming under the category of.........
Computer.
a. Digital computer
b. Mainframe computer
c. Portable computer
d. Hybrid computer
Ans: c
a. Algorithm
b. Input devices
c. Output devices
d. Portals
Ans: b
a. Input device
b. Output device
d. None of these
Ans:c
a. Inkjet
pg. 3
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
b. Laser
c. Thermal
d. Dot matrix
Ans: a
a. Inkjet
b. Laser
c. Thermal
d. Dot matrix
Ans: b
a. Windows
b. Unix
c. DOS
d. All of these
Ans:d
16. _____________ is a device that accepts information (in the form of digitalized data) and
manipulates it for some result based on a program or sequence of instructions on how the data is to
be processed.
Ans: Computer
Ans: Programmable
18. Invention of the _______________ made smaller and less expensive computers possible.
Ans: Transistor
pg. 4
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
21. Different arithmetic operations are _______________
22. Device is designed to assist in the entry of data into a computer is known as
____________________.
Ans: Input Device
23. _________________ device is categorized as a pointing device because it is used to point and
select an option on the monitor.
Ans: Mouse
26. ____________ unit coordinates the activities of all the other units in the system.
Ans: Control
27. The UNIVAC and ENIAC computers are examples of __________computing devices.
Ans: First Generation
Ans: 200
29. __________ replaced vacuum tubes and ushered in the second generation computer.
Ans: Transistor
31. The development of _________ was the hallmark of the third generation of computers.
Ans: IC( integrated circuit)
32. _______ is the basic material used to make computer chips, transistors, silicon diodes and other
electronic circuits and switching devices.
Ans: Silicon
pg. 5
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Games Playing, Expert System, Natural Language, Neural Networks & Robotics
36. ____________________ is the branch of computer science concerned with making computers
behave like humans.
Ans: Artificial Intelligence
38. Personal computers are available in two models _______ & ______.
Ans: Desktop PCs & Tower PCs
Ans: Personal Digital Assistance, Cellular telephones & H/PC Pro devices
44. The unique number that names a memory cell is called ________.
Ans: Address
45. Computers use a memory cell whose contents are limited to a number between _________ &
__________.
Ans: 0 and 255.
46. For example, the nine digit number 123456789 is stored as the number_________ and
________ in the next cell.
Ans: 1234 in one cell & 56789
pg. 6
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
48. OSI model means:
49. Twisted pair wires, coaxial cable, optical fiber cables are the examples of:
A. Wired Media
B. Wireless Media
C. Both A & B
D. None of these
Ans: A
50. Communication between a computer and a keyboard involves ______________
transmission
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
Answer: d
pg. 7
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans : a
Ans a
a) iexplore
b) iexpress
c)internet
d)ipksetup
Ans: a
59. ____________ is the main memory of a computer system used for storing programs and data.
Ans: Random Access Memory
60. Volatile random access memory devices may be further divided into _______________.
Ans: Static random access memory & Dynamic random access memory
pg. 8
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
61. _________ is a memory device for reading and writing information wherein multi-layer
ferromagnetic thin films.
Ans: MRAM
63. ___________ Memory is a type of EEPROM device that can be erased and reprogrammed in
blocks instead of one byte at a time.
Ans: Flash memory
64. External memory is for the long term storage of information. (True/False)
Ans: True
65. External memory which is sometimes called backing store or secondary memory. (True/False)
Ans: True
66. The first floppy drives used an 8-inch disk which later got smaller into 5.25-inch and was called
diskette. (True/False)
Ans: True
67. The 5.25-inch disk held 360 kilobytes compared to the 1.44 megabyte capacity of today's 3.5-
inch diskette. (True/False)
Ans: True
69. The CD-ROM standards, also created by Sony and Phillips, use the same disk and scanning
technology. (True/False)
Ans: True
70. One of the common aspects of modern computer hardware technology is known as
__________________.
Ans: Magnetic storage device.
71. Magnetic storage was first used for audio recording, and is generally referred to as magnetic
recording. (True/False)
Ans: True
72. A capacitance can be in two states: a state in which it is fully charged, and another in which it is
fully discharged. (True/False)
Ans: True
73. What TCP/IP protocol is used for transferring electronic mail messages from one machine to
another?
A. FTP
pg. 9
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
B. SNMP
C. SMTP
D.RPC
Answer: C
A. modem
B. protocols
C. gateway
D.multiplexer
Answer: A
Ans: A
78. A physical media which is good for voice, data and video for fast and long distance is:
(a) Twisted Pair (b) Fiber
Answer: B
pg. 10
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
79. Physical or logical arrangement of network is
a) Topology
b) Routing
c) Networking
d) None of the mentioned
Answer: A
82. ________ is a storage device which uses four semiconductors switches to store either a 0 or a 1.
Ans: flip-flop
83. ______ is technically a set of instructions written in a computer language that solves a
computational task.
Ans: Computer software
85. __________ usually provides tools to assist a programmer in writing computer programs and
software using different programming languages.
Ans: Programming software
86. _______ allows end users to accomplish one or more specific tasks.
87. An operating system (OS) is a computer program that manages the hardware and software
resources of a computer. (True/False)
Ans: True
Ans: True
B. 8
C. 255
D. 10
Answer: B
A. 127.0.0.1
B. 255.0.0.0
pg. 12
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
C. 255.255.255.0.0
D. 255.255.255.0
Answer: B
A. 1 - 126
B. 192 - 255
C. 192 - 223
D. 1 - 127
Answer: A
96. _________ is the computer software designed to help the user to perform a singular or multiple
related specific tasks.
Ans: Application software
97. Microsoft Access gives you powerful new tools for managing your databases. (True/False)
Ans: True
98. __________software is that has restrictions on using and copying it, usually enforced by a
proprietor.
Ans: Proprietary
99. Some proprietary software comes with source code or provides offers to the source code.
(True/False)
Ans: True
100. _________ is computer software whose source code is available under a copyright license that
permits users to study, change, and improve the software, and to redistribute it in modified or
unmodified form.
Ans: Open-source software
101. Open-source software generally allows anybody to make a new version of the software, port it
to new operating systems and processor architectures, share it with others or market it. (True/False)
Ans:True
102. Is computer software designed to operate the computer hardware and to provide
a. Application software
pg. 13
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
b. System software
c. Software
d. Operating system
Ans: b
a. RAM
b. ROM
c. CPU
d. PC
Ans: c
a. Secondary memory
b. Primary memory
c. Main memory
Ans: b
a. Secondary memory
b. Primary memory
c. Main memory
Ans: a
a. MS-Excel
b. BASIC
pg. 14
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
c.COBOL
d. C++
Ans: a
107. A process can be divided into small, interacting phases called ________.
Ans: Sub Process
108. ________ measures the consistency of the product requirements with respect to the design
specification.
Ans: Correctness
109. ________ measures how well the delivered system matches the needs of the operational
environment, as described in the original requirements statement.
Ans: Correspondence
110. ________ is a series of processes that, if followed, can lead to the development of an
application.
Ans: Software Development Methodology
Ans: Programs
Ans: c
a.Screen
b. Monitor
c. Both 1 & 2
d. printer
Ans: c
pg. 15
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
115. The instructions that tell a computer how to carry out the processing tasks are referred to as
computer.........
a. programs
b. processors
c. input devices
d. memory modules
Ans: a
116. An area of a computer that temporarily holds data waiting to be processed is..........
a. CPU
b. Memory
c. Storage
d. File
Ans: b
117. In which model system is modeled using the data transformations, which take place as it, is
processed?
Ans: Data-flow Model
118. Which model is used to describe the logical data, structures being used?
Ans: Entity-relation model
119. A software design is a model system that has many participating entities and ___________
Ans: Relationships
121. _________ begins at the vortex of the spiral and concentrates on each unit (i.e., component) of
the software as implemented in source code.
Ans: Unit testing
121. _____________ addresses the issues associated with the dual problems of verification and
program construction.
Ans: Integration testing
pg. 16
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
122. ___________ provides final assurance that software meets all functional, behavioral, and
performance requirements.
Ans: Validation testing
128. ________ is software that hides lower level details and provides a set of higher-level functions.
Ans: Abstraction
129. ________ transforms the computer hardware into multiple virtual computers, each belonging to
a different program.
Ans: Operating System
130. Multiprogramming (MP) increases CPU utilization by organizing jobs such that the CPU always
has a job to execute. (True/False)
Ans: True
131. Real-time (RT) operating systems were developed to meet the response requirements of such
applications. (True/False)
Ans: True
133. ________ System is a collection of processors that do not share memory, peripheral devices,
or a clock.
Ans: Distributed
134. The main function of a command interpreter is to get and execute the next user specified
command. (True/False)
Ans: True
pg. 17
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
135. Which of the following IP address class is Multicast
A. Class A
B. Class B
C. Class C
D. Class D
Answer: D
Answer: B
138. How many bits internet address is assigned to each host on a TCP/IP internet which is used in
all communications with the host?
A. 16 - bits
B. 32 - bits
C. 48 - bits
D. 64 - bits
Ans: B
139. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
Answer: C
pg. 18
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
A. 15.
B. 9
C. 25
D. 32
Answer: A
141. The standard VGA display has _____ pixels in its native graphics mode?
A. 648 x 320
B. 640 x 480
C. 680 x 440
D. 1024 x 786
Answer: B
142. An error in one part of the system may cause malfunctioning of the complete system.
(True/False)
Ans: True
143. ________involves the allocating and de-allocating memory, CPU scheduling in case of multi-
process.
Ans:Running a program
144. __________ are computers or groups of computers that provides services to other computers,
connected via network.
Ans: Server
Ans: Workstation
145. __________systems are combinations of processors and special software that are inside of
another device, such as the electronic ignition system on cars.
Ans:Embedded
146. _____________ is used to convert the information into another signal which is capable of
passing on to a suitable medium.
pg. 19
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Transmitter
147. The device which converts the suitable information into original message is called
____________.
Ans:Receiver
148. Which type of network connects computers and resources together in a building or buildings
close together?
Ans: LAN
150. Which type of Networks connects LANs together between cities or across a country?
Ans: WAN
a. Mosaic
b. Netscape
c. Internet explorer
d. Collabra
Ans: a
Ans: c
153. are set of rules and procedures to control the data transmission over the internet
a. IP address
b. Domains
c.Protocol
d. Gateway
pg. 20
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: c
b. Non-open software
d. Non-operating software
Ans: c
a. Analog
b. Digital
c. Hybrid
d. All of these
Ans: c
a. Digital
b. Hybrid
c. Analog
d. Complex
Ans: a
a. Software
b. Hardware
c. Human ware
d. All of these
Ans: b
pg. 21
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
158. Super Computer are mainly used for:
a) Weather forecasting
d) All of these
Ans: d
159. Star topology requires less cable length than a linear topology. (True/ False).
Ans: False
160. In bus topology it is difficult to identify the problem if the entire network shuts down.
(True/False).
Ans:True
161. ___________ layer coordinates the functions required to carry a bit stream over a physical
medium.
Ans: Physical
162. __________ layer is responsible for the source-to-destination delivery of a packet, possibly
across multiple networks.
Ans:Network
163. __________ layer is responsible for process-to-process delivery of the entire message.
Ans:Transport
165. ___________ is responsible for servicing requests for information from Web browsers.
Ans: Web Server
167. The HTTP communication is initiated by the ____________ requestinga resource on the origin
server.
Ans:User agent
169. State true or false: Each page may contain links to other pages any where in the world.
Ans: True
170. The idea of having one page point to another is now called _________.
pg. 22
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Hypertext
pg. 23
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: a
176. ALU is
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. None of above
Ans: a
177. VGA is
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
Ans: a
178. IBM 1401 is
a. First Generation Computer
b. Second Generation Computer
c. Third Generation Computer
d . Fourth Generation Computer
Ans: b
a. Tape
b. Hard Disk
c. Floppy Disk
Ans: d
Ans: b
189. BCD is
Ans: b
pg. 26
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
c. American Standard Code for Information Interchange
Ans: c
a. EDSAC
b. IBM-701
c. CDC-1604
d. ICL-2900
Ans: b
a. Transistors
c. Integrated Circuits
d. None of above
Ans: b
a.1940 to 1956
b. 1956 to 1965
c. 1965 to 1971
d. 1971 to present
Ans: b
a. First Generation
b. Second Generation
c. Third Generation
pg. 27
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
d. Fourth Generation
Ans: a
a. First Generation
b. Second Generation
c. Third Generation
d. Fourth Generation
Ans: d
196. A computer program that converts an entire program into machine language is called a/an
a. Interpreter
b. Simulator
c. Compiler
d. Commander
Ans: c
197. A computer program that translates one program instructions at a time into machine language
is called a/an
a. Interpreter
b. CPU
c. Compiler
d. Simulator
Ans: c
a. Computer
b. Microcomputer
c. Programmable
d. Sensor
pg. 28
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: d
199. A fault in a computer program which prevents it from working correctly is known as
a. Boot
b. Bug
c. Biff
d. Strap
Ans: b
Ans: a
a. Babbage
b. Bill Gates
c. Bill Clinton
d. none of these
Ans: b
a. Keyboard
b. Mouse
c. Card reader
d. Any of these
Ans: d
pg. 29
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
203. Examples of output devices are
a. Screen
b. Printer
c. Speaker
d. All of these
Ans: d
a. Control unit
d. Monitor
Ans: b
a. RAM
b. ROM
c. BIOS
d. CACHE
Ans: b
b. Long Memory
c. Permanent Memory
d. Primary Memory
Ans: a
207. The process of transferring files from a computer on the Internet to your computer is called
pg. 30
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
a. Downloading
b. uploading
c. FTP
d. JPEG
Ans: a
a. 001
b. 101
c. 202
d. 110
Ans: c
a. ROM
b. RAM
c. Floppy Disk
d. Hard Disk
Ans: b
a. Megabyte
b. Gigabyte
c. Terabyte
d. None of these
Ans: d
211. Which of the following contains permanent data and gets updated during the processing of
transactions?
c. Software File
d. Master file
Ans:d
a. Key Block
b. Kernel Boot
c. Kilo Byte
d. Kit Bit
Ans: c
Ans: d
a. LAN
b. WAN
c. MAN
d. BUS
Ans: d
a. Ring
b. Bus
pg. 32
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
c. Star
d. PAN
Ans: d
a. Voice over IP
b. Video over IP
c. Viruses over IP
d. Virtual over IP
Ans: a
pg. 33
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
226. OSS stands for_________________
pg. 34
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Static random access memory (SRAM)
Ans: True
pg. 35
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
a) CRAY-1, CRAY-2,
a. Windows 7
b. WordPad
c. Photoshop
d. MS-excel
Ans: a
Ans: 10
Ans. 255
Ans: 0 to 255
Ans:228
Ans: (144)8
pg. 36
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
256. The decimal equivalent of (0.265)10 is _______.
Ans: (0.0100)2
Ans: (BA3.2)16
Ans: 0100
Ans: -4
Ans: 0101
Ans: -2
Ans: 1
Ans: Commutative
pg. 37
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Dominance
Ans: 0
Ans: 1
268. A combinatorial circuit is a system containing basic _____________ operations (AND, OR,
NOT), some inputs, and a set of outputs.
Ans: Boolean
269. A half adder adds three one-bit inputs (two bits plus a carry from a previous addition) and
produces two outputs: the sum and the carry(True/False).
Ans: False
270. A digital logic circuit or system is usually made up of combinational elements such as NAND
and NOR gates and elements.
Ans: memory
271. The flip-flop is said to be either leading edge or trailing edge triggered. (True/False).
Ans: True
272.A flip flop is a circuit which is capable of __________________ the value which is given as
input.
pg. 38
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Remembering
273.Master slave D flip flop responds on the ____________ edge of the enable input.
Ans: negative
Ans: false
275. The D flip-flop can be interpreted as a primitive memory cell, zero-order hold, or delay line
(True/False).
Ans: True
277. Shift registers can have co-parallel inputs and outputs, including serialin, parallel-out (SIPO)
and parallel-in, serial-out (PISO) types. (True/False)
Ans: True
279. To shift the data in parallel in serial out , the W/S control line is brought and _________ the
registers are clocked.
Ans: HIGH
pg. 39
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
280. The PIPO configuration allows conversion from parallel to serial format. (True/False)
Ans: False
281. ____________ is a device which stores the number of times a particular event or process has
occurred.
Ans: Counters
Ans: Control
Ans: Protected
286. RISC chips have faster CPU performance than CISC. (True or False)
Ans: True
Ans: Multiprocessing
Ans: Multimedia
289. 8088 use ______________ bit BUS while the 8086 uses ________ bit BUS for data transfer.
Ans: 8,16
290. The speed specification of clock multiplier of the 8088/86 processor is __________.
Ans: 1.0
pg. 40
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
291. The motherboard interface of 8088/86 packaging is __________.
292. The two types of Intel 386 are ___________ & ________.
Ans: DX, SX
Ans: True
b) The use of speculative executive will not reduce pipeline stall time in the RISC core in sixth
generation processor
Ans: False
Ans: Change in BUS speed, Change the multiplier, Change the voltage supply
297. ____________ is the electric wire that is used to answer the question of linking and
communication between different components.
Ans: Buses
a. Control Bus is the one which carries data between the different components of the computer.
Ans: false
Ans: True
pg. 41
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: CLOCK speed and MHz
Ans: Expansion
301. The three major types of Buses are ___________, _______ and ______________
Ans: ISA
304. 8-bit ISA was used by __________ Bus. 8-bit ISA consists of _________ pins out of which of
________ and ___________ are address and data liens respectively.
Ans: PC/XT
305. 16-bit Bus consists of extra _________ bits, ________interrupts and _____________ DMA
channels.
Ans: 8, 5, 4
Ans: False
b. PCI gave automatic configuration property to switch and jumper less peripherals.
Ans: True
309. Linear bursts helps in increasing the performance rate of PCI when compare to Bus which do
not have linear burst capability by almost double the time.
pg. 42
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: PCI
310. ___________ is the time taken by the CPU to permit the request access by peripheral for its
control.
311. ___________ is the technique which holds the signal dynamically and wherever there is a
requirement it can be reassigned.
Ans: FSB
Ans: AGP
Ans: True
Ans: true
c. RBF# indicates the pre-requested low priority read data can be readily accepted by the master.
Ans: True
d. GNT# indicates that the Whenever there is data keying from the core program to ensure that
whether master is ready to accept the data
Ans: False
pg. 43
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Processor Bus
318. The chipset consists of two processors namely ___________ and ____________.
319. The state of CPU that it performs faster than FSB for the activity and waits for FSB to send the
new instructions is called ___________.
Ans: false
Ans: 0 Hz to 33 MH
326. The two devices that are configured as master and save shares a single channel that called by
a _________________.
Ans: Specification
327. ____________________ is an adapter of the CD that is designed to store computer data in the
form of text, graphics and stereo sound.
Ans: CD-ROM
328. ___________ is a complex decoding process that convert sequence of pits and land into
meaningful binary information.
Ans: EFM
pg. 44
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
329. __________ Driver allows programs to access the CD-ROM as the hardware level.
331. __________ is the time recorded by the drive to locate required information on the disk.
Ans: True
b) Analog output is used for mixing in an auxiliary audio signal to the decoder card.
Ans: False
Ans: True
333. The data layer in the Blu-ray disk is closer to the surface of the disk (true/false).
Ans: True
334. The two types of Blu-ray optical disk recorder are ____________.
Ans: True
pg. 45
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
339. ___________ in the mouse are very difficult to resolve.
Ans: Scanning
Ans: 8042
342. One of the best ways to maintain a keyboard in top condition is __________.
Ans: Microphone
344. The number of measurements per second, called the_____________ is measured in kHz.
346. __________, __________, and __________ should not conflict with other devices while
installing a sound card.
347. __________ is the way to move information directly to PC's memory, bypassing PC's
processor.
348. The___________ box should contain information about the type of compression that was used
to compress the file, the sound quality of the file, and whether or not the file is in stereo.
349. The TCP/IP protocol suite is so named for two of its most important protocols _________ and
___________ .
pg. 46
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
350. The highest-level protocols within the TCP/IP protocol stack are __________.
Ans: False
353. The Grid is a ___________ network linking a collection of public and private research centres.
Ans: Supercomputer
354. Internet2 is a low-performance network linking more than 200 universalities by fiber optic links.
(True/False)
Ans: False
355. The computers that supply this information are referred to as _______.
Ans: Server
356. A _________ is a computer networking device that forwards data packets toward their
destinations through a process known as routing.
Ans: Router
357. Modems are data communication devices that convert digital signals to analog signals, and vice
versa.(True/False)
Ans: True
358. The light transmitted through the fiber is confined due to _________ within the material.
Ans: Packet
361. The _________ of the network sends the mail to the concerned address
pg. 47
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: The email system
362. In India Airtel, BSNL\ and VSNL are the Internet Service Providers. (True/False).
Ans: True
Ans: True
365. With _________ program, you can connect to another computer and use it as if you were sitting
at its keyboard.
Ans: Telnet
Ans: Explorer
367. _________ tells the exact HTTP/URL location of the page we are currently viewing.
368. Several institutions grant degrees solely on the basis of Internet coursework.(True/False)
Ans: True
369. For students, Internet classes not only save time and money, but they can fit into difficult work
schedules.(True/false).
Ans: True
pg. 48
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Accelerated Graphic Port
pg. 49
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Q1 Characteristics or feature of a computer? Explain any five features.
Ans: Computers of all sizes have common characteristics - speed, arithmetical and logical
operations, accuracy, reliability, storage, retrieving data and programs, automation, versatility,
communications, diligence, feelings, consistency and precision. Computers are the foundation of
business, travel, and leisure life today.
1. Speed
The computer is a very high speed electronic device. The operations on the data inside the
computer are performed through electronic circuits according to the given instructions.
2. Arithmetical and Logical Operations
A computer can perform arithmetical and logical operations. In arithmetic operations, it performs the
addition, subtraction, multiplication and division on the numeric data. In logical operation it compares
the numerical data as well as alphabetical data.
3. Accuracy
In addition to being very fast, computer is also very accurate device. It gives accurate output result
provided that the correct input data and set of instructions are given to the computer.
4. Reliability
The electronic components in modern computer have very low failure rate. The modern computer
can perform very complicated calculations without creating any problem and produces consistent
(reliable) results.
5. Storage
A computer has internal storage (memory) as well as external or secondary storage. In secondary
storage, a large amount of data and programs (set of instructions) can be stored for future use.
6. Retrieving data and programs
The data and program stored on the storage media can be retrieved very quickly for further
processing. It is also very important feature of a computer.
7. Automation
A computer can automatically perform operations without interfering the user during the operations.
It controls automatically different devices attached with the computer.
8. Versatility
Versatile means flexible. Modern computer can perform different kind of tasks one by one of
simultaneously.
9. Communications
Today computer is mostly used to exchange messages or data through computer networks all over
the world.
10. Diligence
A computer can continually work for hours without creating any error. It does not get tired while
working after hours of work it performs the operations with the same accuracy as well as speed as
the first one.
pg. 50
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans:
Any device designed to assist in the entry of data into a computer is known as Input device. Input
devices convert data from any convenient external format into binary codes that a computer can
store and manipulate internally. Some of the most common, most popularly used devices are:
1. Mouse:
This Input device is categorized as a pointing device because it is used to point and select an option
on the monitor. It is small boxlike object that is connected to the computer by a cable and can be
rolled around on the table.
2. Light Pen:
This is also categorized into a pointing device, which can be used only with video displays. It can be
used to select an option by simply pointing at it, or drawing figures directly on the screen. An
electron beam that repeatedly scans the display screen from left to right and from top to bottom
produce a video display. Because of this scanning action, each point on the display is
illuminated at a slightly different time.
3. Touch Screen:
A type of display screen that has a touch-sensitive transparent panel covering the screen. Instead of
using a pointing device such as a mouse or light pen, you can use your finger to point directly to
objects on the screen.
4. Joy Stick:
A lever that moves in all directions and controls the movement of a pointer or some other display
symbol. A joystick is similar to a mouse, except that with a mouse the cursor stops moving as soon
as you stop moving the mouse. With a joystick, the pointer continues moving in the direction the
joystick is pointing.
5. Keyboard:
Keyboards are the most widely used input devices. The most popular keyboards are those that look,
feel, and possibly sound like an ordinary typewriter keyboard. Alternatives are Membrane keyboards,
whose keys are merely printed on a plastic membrane.
6. Scanners:
These are the eyes of your computer. They can see images or printed text and translate them into
binary code. Most scanners collect data from a page by recording, which areas are light and which
areas are dark.
7. Optical Character Readers (OCR):
These are another kind of input devices that are used to read any printed text. They can interpret
handmade marks, handwritten characters, machine printed characters and special symbols and
codes. Optical character readers scan text character-by-character converts them into machine
readable codes and store it
8. Magnetic Ink Character Reader (MICR):
A magnetic character reader system for reading and identifying magnetized characters printed on a
document such as a check, in which analog waveforms derived from scanning the characters are
analyzed by rectifying and integrating the waveform to generate a value representing the gain of a
programmable gain amplifier for use in amplifying the waveform to compensate for variations in ink
intensity.
9. Bar Code Reader:
This is used to read different kind of vertical lines known as bars which signify some information.
10. Touch Pad
pg. 51
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Most laptop computers today have a touch pad pointing device. You move the on-screen cursor by
sliding your finger along the surface of the touch pad. The buttons are located below the pad, but
most touch pads allow you to perform “mouse clicks” by tapping on the pad itself.
Ans:
Central Processing Unit:
The central processing unit (CPU) is the electronic brain of the computer. The CPU in a personal
computer is usually a single chip. It organizes and carries out instructions that come from either the
user or from the software. The processor is made up of many components, but two of them are
worth mentioning at this point. These are the arithmetic and logic unit and the control unit. The
control unit controls the electronic flow of information around the computer. The arithmetic logic unit,
ALU, is responsible for mathematical calculations and logical comparisons. The CPU has three
important sub units.
1) Arithmetic-Logic unit
2) Control Unit
3) Memory Unit
Arithmetic-Logic Unit (ALU): The ALU is an electronic circuit used to carry out the arithmetic
operations like addition, subtraction, multiplication and division. This unit carries out logical
operations like greater than, less than, equal to etc. It performs the operation on the data provided
by the input devices. A comparison operation allows a program to make decisions based
on its data input and results of the previous calculations. Logical operations can be used to
determine whether particular statement is TRUE or FALSE.
Control Unit: The control unit coordinates the activities of all the other units in the system. Its main
functions are to control the transfer of data and information between various units and to initiate
appropriate actions by the arithmetic-logic unit. Conceptually, the control unit fetches instructions
from the memory, decodes them, and directs them to various units to perform the specified tasks.
Memory Unit: The main memory is also called primary memory, is used to store data temporarily.
Although, the CPU is the brain behind all the operations in the computer, it needs to be supplied with
the data to be processed and the instructions to tell it what to do. Once the CPU has carried out an
instruction, it needs the result to be stored. This storage space is provided by the computer’s
memory.
Ans:
Any peripheral device that converts the stored binary coded data into convenient external forms as
text and pictures are known as Output devices. Some of the most popularly used Output devices are
1. Monitor:
Monitors are the most crucial output devices of a computer. Without it, the computer is incomplete.
The monitor is a versatile device of the computer for the visual display of all types of information.
2. Printer
pg. 52
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
A printer is an electronic external output device of the computer used to print digital information on
paper as a hard copy. Since the main task of printers is to convert the data from soft copy to hard
copy on the computer.
3. Plotter
A plotter is an output device that prints graphics with high-quality images in many color formats. It is
analogous to a printer but has more advanced features.
4. Speaker
A speaker is a hardware output device connected with a computer to produce the audio. The sound
produced by computer speakers is made by a hardware component whose name is a sound
card that is pre-installed with the computer.
5. Head Phone
Headphones are also known as earphones. Headphones are output devices with which you can
listen to any sound signals transmitted by an electronic device. These are hardware devices that
produce audio privately after being connected to smartphones or computers through a wireless
connection.
6. Projector
The multimedia screen projector is also an output device. A multimedia projector is a miracle of
technology, and it is a beneficial and multi-functional device.
Q5. What is memory? Difference between Primary memory and secondary memory?
Ans:
Memory is very much like our brain as it is used to store data and instructions. Computer memory is
the storage space where data is to be processed, and instructions needed for processing are stored.
The memory is divided into a large number of smaller portions called the cell. Every cell/ location has
a unique address and a size.
Primary Memory is the main memory of the computer system. Accessing data from primary
memory is faster because it is an internal memory of the computer. The primary memory is most
volatile, meaning data in primary memory does not exist if it is not saved when a power failure
occurs.
The primary memory is a semiconductor memory. It is costlier compared with secondary memory.
The capacity of primary memory is very much limited and is always smaller compares to secondary
memory.
RAM
pg. 53
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
ROM
Secondary Memory:
All secondary storage devices which are capable of storing high volume data is referred to
secondary memory. It’s slower than primary memory. However, it can save a substantial amount of
data, in the range of gigabytes to terabytes. This memory is also called backup storage or mass
storage media.
Ans:
RAM, which stands for random access memory, and ROM, which stands for read-only memory, are
both present in your computer. RAM is volatile memory that temporarily stores the files you are
working on. ROM is non-volatile memory that permanently stores instructions for your computer.
Find out more about RAM.
Ans:
Every generation of computers is considered by major technological development that
fundamentally changed the way computers operate, resulting in increasingly smaller, cheaper, and
more powerful and more efficient and reliable devices.
The microprocessor brought the fourth generation of computers, as thousands of integrated circuits
we rebuilt onto a single silicon chip and this will contains a Central Processing Unit. In the world of
personal computers, the terms microprocessor and CPU are used interchangeably.
pg. 54
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
5 Fifth Generation Computer Fifth generation computing devices, based on artificial intelligence, are
still in development, though there are some applications, such as voice recognition, that are being
used today.
Ans:
Computers are classified according to their data processing speed, amount of data that they can
hold and price. Generally, a computer with high processing speed and large internal storage is called
a big computer Depending upon their speed and memory size, computers are classified into
following four main groups.
1. Supercomputer
2. Mainframe computer
3. Mini computer
4. Microcomputer
1. Supercomputer
Supercomputer is the most powerful and fastest, and also very expensive. It was developed in
1980s. It is used to process large amount of data and to solve the complicated scientific problems. It
can perform more than one trillions calculations per second.
2. Mainframe Computers
Mainframe computers are also large-scale computers but supercomputers are larger than
mainframe. These are also very expensive. The mainframe computer specially requires a very large
clean room with air-conditioner. This makes it very expensive to buy and operate. It can support a
large number of various equipment’s. It also has multiple processors.
3. Minicomputers
These are smaller in size, have lower processing speed and also have lower cost than mainframe.
These computers are known as minicomputers because of their small size as compared to other
computers at that time. The capabilities of a minicomputer are between mainframe and personal
computer.
4. Microcomputer
The microcomputers are also known as personal computers or simply PCs. Microprocessor is used
in this type of computer. These are very small in size and cost. The IBM’s first microcomputer was
designed in 1981 and was named as IBM-PC. After this many computer hardware companies copied
the design of IBM-PC. The term “PC-compatible” refers any personal computer based on the original
IBM personal computer design.
Ans:
A cache memory and a main memory are used for a large scale integration circuit having a central
processing unit. Memory caching is a widespread technique used to improve data access speed in
computers and other digital systems. The speed at which processors can execute instructions has
typically outpaced the speed at which memory systems can supply the instructions and data to the
processors.
pg. 55
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Due to this discrepancy in the operating speeds of the processors and system memory, the system
memory architecture plays a major role in determining the actual performance of the system. Most
current memory hierarchies utilize cache memory in an attempt to minimize memory access
latencies. A cache is a small, fast memory that acts as a buffer between a device that uses a large
amount of memory and a large, slower main memory. The cache's purpose is to reduce average
memory-access time.
Ans:
Computer Software is a general term for organized collections of computer data and instructions,
often broken into two major categories:
1.System Software
2. Application software
3.Programming Software
1. System Software:
System software is used to run the computer hardware. It includes mainly the Operating system and
device drivers. System software refers to the files and programs that make up your computer's
operating system. System files include libraries of functions, system services, drivers for printers and
other hardware, system preferences, and other configuration files. The programs that are part of the
system software include assemblers, compilers, file management tools, system utilities, and
debuggers.
2. Application Software
It allows end users to accomplish one or more specific tasks. Typical applications include industrial
automation, business software, educational software, medical software, databases, and computer
games.
3. Programming Software
Programming software usually provides tools to assist a programmer in
writing computer programs and software using different programming
languages. Computer programmers are accountable for teaching computers
how to perform tasks and solve computational problems. They develop the
software that runs on computers using special software called a compiler. A
compiler is a computer program that decodes text written in a computer
language into another computer language.
Ans:
An operating system is a computer program that accomplishes the hardware and software
resources of a computer. At the foundation of all system software, the OS performs basic tasks such
as controlling and allocating memory, prioritizing system requests, controlling input and output
devices, facilitating networking, and managing files. It may also provide a graphical
user interface for higher level functions.
Examples of operating system are Windows Vista, WindowsXP, Windows98, WindowsME,
Windows95 etc, Linux family of operating systems such as, Obuntu, RedHat, Mandrake, SuSE,
Solaris, and UNIX.
pg. 56
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Q12. What is software Development?
Ans:
Software is a logical rather than a physical system element. Therefore software has characteristics
that are considerably different than those of hardware:
Ans:
Software applications can be neatly compartmentalized into different categories.
System software:
System software is a collection of programs written to service other programs. Some system
software processes complex information structures. Other systems applications process largely
indeterminate data. It is characterized by heavy interaction with hardware, heavy usage by multiple
users, concurrent operation that requires scheduling, resource sharing, and sophisticated process
management, complex data structures and multiple external interfaces.
Real time software:
Software that monitors / analyzes / controls real-world events as they occur is called real time.
Business Software: Business information processing is the largest single software application area.
Discrete systems like payroll, accounts receivable/payable have evolved into management
information systems (MIS) software that accesses one or more large databases containing
business information. Applications in this area restructure existing data in a way that facilitates
business operations or management decision making.
pg. 57
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Engineering and scientific software: Engineering and scientific software has been characterized
by “number crunching” algorithms. Applications range from astronomy to volcano logy, from
automotive stress analysis to space shuttle orbital dynamics and from molecular biology to
automated manufacturing.
Embedded software: Embedded software resides only in read-only memory and is used to control
products and systems for the consumer and industrial markets. Embedded software can provide
very limited and esoteric functions or provide significant function and control capability.
Personal computer software: Day to day useful applications like word processing, spreadsheets,
multimedia, database management, personal and business financial applications are some of the
common examples for personal computer software.
Web-based software: The web pages retrieved by a browser are software that incorporates
executable instructions and data. In essence, the network becomes a massive computer providing
an almost unlimited software resource that can be accessed by anyone with a modem.
Artificial Intelligence software: Artificial Intelligence software makes use of non numerical
algorithms to solve complex problems that are not amenable to computation or straightforward
analysis. Expert systems, also called knowledge based systems, pattern recognition, game playing
are representative examples of applications within this category.
Software crisis: The set of problems that are encountered in the development of computer software
is not limited to software that does not function properly rather the affliction encompasses problems
associated with how we develop software, how we support a growing volume of existing
software, and how we can expect to keep pace with a growing demand for more software.
Q14. Difference between simple batch system and multi-programmed batch system?
Ans:
In this system, processes are processed one In this system, multiple processes can be
after another. executed at a time.
As one process gets processed at a time, it Processes are executed in a parallel fashion,
performs low. thus it is faster.
CPU remains in idle states for long times. CPU do not need to remain in idle state.
Example: CP/M, MS DOS, PC DOS etc. Example: Windows 95, MaxOS etc.
Ans:
pg. 58
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
A real-time operating system (RTOS) is a special-purpose operating system used in computers that
has strict time constraints for any job to be performed. It is employed mostly in those systems in
which the results of the computations are used to influence a process while it is executing.
Whenever an event external to the computer occurs, it is communicated to the computer with the
help of some sensor used to monitor the event. The sensor produces the signal that is interpreted by
the operating system as an interrupt. On receiving an interrupt, the operating system invokes a
specific process or a set of processes to serve the interrupt.
Ans.
An operating system is a program that acts as a user-computer GUI (Graphical user interface). It
controls the execution of all types of applications.
Input/output Management: What output will come from the input given by the user, the operating
system runs this program. This management involves coordinating various input and output devices.
It assigns the functions of those devices where one or more applications are executed.
Memory Management: The operating system handles the responsibility of storing any data, system
programs, and user programs in memory. This function of the operating system is called memory
management.
File Management: The operating system is helpful in making changes in the stored files and in
replacing them. It also plays an important role in transferring various files to a device.
Job Priority: The work of job priority is creation and promotion. It determines what action should be
done first in a computer system.
Special Control Program: The operating systems make automatic changes to the task through
specific control programs. These programs are called Special Control Program.
Scheduling of resources and jobs: The operating system prepares the list of tasks to be
performed for the device of the computer system. The operating system decides which device to use
for which task. This action becomes complicated when multiple tasks are to be performed
simultaneously in a computer system. The scheduling programs of the operating system determine
the order in which tasks are completed. It performs these tasks based on the priority of performing
the tasks given by the user. It makes the tasks available based on the priority of the device.
pg. 59
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Security: Computer security is a very important aspect of any operating system. The reliability of an
operating system is determined by how much better security it provides us. Modern operating
systems use a firewall for security. A firewall is a security system that monitors every activity
happening in the computer and blocks that activity in case of any threat.
Monitoring activities: The operating system takes care of the activities of the computer system
during various processes. This aborts the program if there are errors. The operating system sends
instant messages to the user for any unexpected error in the input/output device. It also provides
security to the system when the operating system is used in systems operated by multiple users. So
that illegal users cannot get data from the system.
Ans:
The resource management function of an operating system allocates computer resources such as
CPU time, main memory, secondary storage, and input and output devices for use. One can view
Operating Systems from two points of views: Resource manager and extended machines. Form
Resource manager point of view Operating Systems manage the different parts of the system
efficiently and from extended machines point of view Operating Systems provide a virtual machine to
users that is more convenient to use. The structurally Operating Systems can be design as a
monolithic system, a hierarchy of layers, a virtual machine system, a microkernel, or using the client-
server model. The basic concepts of Operating Systems are processes, memory management, I/O
management, the file systems, and security.
Ans:
Distributed operating system is an operating system which manages a number of computers and
hardware devices which make up a Distributed System. Such an operating system has a number of
functions: it manages the communication between entities on the system, it imposes a security
policy on the users of the system, it manages a Distributed File System, it monitors problems with
hardware and software, it manages the connections between application programs and itself, and it
allocates resources such as file storage to the individual users of the system. A good distributed
operating system should give the user the impression that they are interacting with a single
computer. The major reasons for building distributed systems are:
Resource sharing: If a number of different sites are connected to one another, then a user at one
site may be able to use the resources available at the other.
Computation speed up: If a particular computation can be partitioned into a number of sub
computations that can run concurrently, then a distributed system may allow a user to distribute
computation among the various sites to run them concurrently.
Reliability: If one site fails in a distributed system, the remaining sites can potentially continue
operations.
Communication: There are many instances in which programs need to exchange data with one
another. Distributed data base system is an example of this.
pg. 60
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Q19. Difference between Work station OS and Server Operating System?
Ans:
Servers Operating Systems:
Servers are computers or groups of computers that provides services to other computers, connected
via network. Based on the requirements, there are various versions of server operating systems from
different vendors, starting with Microsoft’s Servers from Windows NT to Windows 2003, OS/2
servers, UNIX servers, Mac OS servers, and various flavors of Linux.
Ans: There are three methods of data transfer. These methods are discussed below:
Simplex communication: In this type, data transfer occurs in only one direction, i.e., either from
source to destination or destination to source machines.
Half-duplex communication: In this type, data transfer occurs in either directions, but not
simultaneously.
Full-duplex communication: In this type, data transfer occurs in either direction simultaneously.
The protocol must also determine the number of logical channels per connection along with their
individual priorities. Many networks provide at least two logical connections per channel, one
for normal data, and one for urgent data.
Ans:
Topology is a term used to define the way in which computers are connected in network. The
physical topology of a network denotes to the configuration of cables, computers, and other
peripherals. Physical topology should not be confused with logical topology which is the method
used to pass information between workstations. Each topology is suited to specific tasks and has its
own advantages and disadvantages. Many topologies do exist but most commonly there are 4 types
of basic topologies used for networking computers which are discussed below.
1) Bus topology
The type of network topology in which all of the nodes of the network are connected to a common
transmission medium which has exactly two endpoints is called the 'bus'. That is transmitted
between nodes in the network is transmitted over this common transmission medium and is able
to be received by all nodes in the network virtually simultaneously. It consists a single main cable
connects each node.
2) Ring topology
pg. 61
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
The type of network topology in which each of the nodes of the network is connected to two other
nodes in the network and with the first and last nodes being connected to each other, forming a ring.
3) Star topology
A star topology is designed with each node connected directly to a central network hub or
concentrator. Data on a star network passes through the hub or concentrator before continuing to its
destination. The hub or concentrator manages and controls all functions of the network.
4) Tree topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of
star-configured workstations connected to a linear bus .Tree topologies allow for the expansion of an
existing network, and enable schools to configure a network to meet their needs.
Ans:
A computer network is a collection of computers and a device interconnected by communications
channels that facilitate communications among users and allows users to share resources. Networks
may be classified according to a wide variety of characteristics. A computer network allows sharing
of resources and information among interconnected devices.
1) LAN (Local Area Network)
These are the networks that connect computers and resources together in a building or buildings
close together. The computers share resources such as hard-drives, printers, data, CPU power,
fax/modem, applications, etc.
2) MAN (Metropolitan Area Network)
These types of networks connect LANs together within a city. we see that telecommunication
services provide the connection (storm clouds) between networks. Local telecommunication services
provide the external connection for joining networks across cities. The main criteria for a MAN are
that the connection between the LANs is through a local exchange carrier (the local phone
company).
3) WAN (Wide Area Networks)
This communication system links LANs between cities, countries and continents. The main
difference between a MAN and a WAN is that the WAN uses Long Distance Carriers rather than
Local Exchange carriers.
Ans:
The Open Systems Interconnection (OSI) model describes how data is sent and received over a
network There are the seven OSI layers. Each layer has different functions. A list of seven layers are
given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
pg. 62
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer: This layer manages the functions required to carry a bit stream over a physical
medium. It deals with the electrical and mechanical specifications of the interface and transmission
medium. It defines the procedures and functions that physical devices and interfaces have to
perform for transmission to occur.
2) Data link layer: This layer transforms the physical layer, a raw transmission facility, to a reliable
link. It makes the physical layer appear error-free to the upper layer (to the Network layer). It is also
responsible for other functions such as framing, error control, flow control, physical addressing, and
access control mechanisms.
3) Network layer: This layer is responsible for the source-to-destination delivery of a packet,
possibly across multiple networks (links). The Data Link Layer oversees the delivery of the packet
between two systems on the same network (links);
4) Transport layer: This layer is accountable for process-to-process delivery of the entire message.
A process is an application program running on the host. The Network layer oversees the source-
todestination delivery of individual packets; it does not recognize the relationship between those
packets. It treats each packet independently, as though each piece belonged to a separate
message, whether or not it does, The Transport layer, also ensures that the whole message arrives
intact and in order, overseeing both error and flow control at the source to-destination level.
5) Session layer: This layer acts as the network dialog controller. It establishes, maintains, and
synchronizes the interaction among communicating systems.
6) Presentation layer: This layer is anxious with the syntax and semantics of the information
exchanged between two systems. The specific responsibilities of this layer include Translation,
Encryption, and Compression.
7) Application layer: This layer enables the user, whether human or software to access the
network. It provides user interfaces and support for services such as electronic mail, remote file
access and transfer, shared database management, and other types of distributed information
services. Specific services offered by the Application layer include: Provision of Network Virtual
terminals, File transfer, access, and management, mail services, and Directory Services.
Ans:
TCP/IP (Transmission Control Protocol/Internet Protocol) is the simple communication language or
protocol of the Internet. It can also be used as a communications protocol in a private network (either
an intranet or an extranet). When you are set up with direct access to the Internet, your computer is
provided with a copy of the TCP/IP program just as every other computer that you may send
messages to or get information from also has a copy of TCP/IP. Most of the networking software,
pg. 63
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
TCP/IP is modeled in layers. This layered representation leads to the term protocol stack, which
denotes to the stack of layers in the protocol suite.
Ans:
A Web browser is referred as an application that provides access to a Web server. Depending on
the implementation, browser capabilities and thus structures vary. A Web browser, at a minimum,
consists of a Hypertext Markup Language (HTML) interpreter and HTTP client that are used to
retrieve HTML Web pages. Besides this basic requirement, many browsers also support FTP, NNTP
(Network News Transfer Protocol), e-mail (POP and SMTP clients), among other features, with an
easy-to-manage graphical interface. The Web browser is the client component. Examples of
Web browsers include Mozilla Firefox, Netscape Navigator, and Microsoft Internet Explorer.
Ans:
Web servers are responsible for servicing requests for information from Web browsers. The
information can be a file retrieved from the server's local disk, or it can be generated by a program
called by the server to perform a specific application function. There are a number of public-domain
Web
servers available for a variety of platforms, including most UNIX variants, as well as personal
computer environments such as Microsoft Windows. Some well-known public domain servers are
CERN, NCSA httpd, and Apache servers.
Ans: The Hypertext Transfer Protocol is a protocol designed to allow the transfer of Hypertext
Markup Language (HTML) documents. HTML is a tag language used to create hypertext documents.
Hypertext documents include links to other documents that contain additional information about the
highlighted term or subject. Such documents can contain other elements apart from text, such as
graphic images, audio and video clips, Java applets, and even virtual reality worlds (which are
described in VRML, a scripting language for that kind of elements).
Ans: The World Wide Web is an architectural frame work for accessing linked documents spread out
over millions of machines all over the internet. Its popularity stems from the fact that:
It has colorful graphical interface that is easy to users to use.
It provides an enormous wealth of information on almost every conceivable subject.
Ans:
DNS:
pg. 64
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
An application layer protocol defines how the application processes running on different systems,
pass the messages to each other.
Ans:
FTP
o FTP stands for File transfer protocol.
o FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from
one host to another.
o It is mainly used for transferring the web page files from their creator to the computer that
acts as a server for other computers on the internet.
o It is also used for downloading the files to computer from other servers.
Ans: An IP stands for internet protocol. An IP address is assigned to each device connected to a
network. Each device uses an IP address for communication. It also behaves as an identifier as this
address is used to identify the device on a network. It defines the technical format of the packets.
Mainly, both the networks, i.e., IP and TCP, are combined together, so together, they are referred to
as a TCP/IP. It creates a virtual connection between the source and the destination.
pg. 65
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
We can also define an IP address as a numeric address assigned to each device on a network. An
IP address is assigned to each device so that the device on a network can be identified uniquely. To
facilitate the routing of packets, TCP/IP protocol uses a 32-bit logical address known as
IPv4(Internet Protocol version 4).
What is IPv4?
IPv4 is a version 4 of IP. It is a current version and the most commonly used IP address. It is a 32-bit
address written in four numbers separated by 'dot', i.e., periods. This address is unique for each
device.
For example, 66.94.29.13
The above example represents the IP address in which each group of numbers separated by
periods is called an Octet. Each number in an octet is in the range from 0-255. This address can
produce 4,294,967,296 possible unique addresses.
What is IPv6?
IPv4 produces 4 billion addresses, and the developers think that these addresses are enough, but
they were wrong. IPv6 is the next generation of IP addresses. The main difference between IPv4
and IPv6 is the address size of IP addresses. The IPv4 is a 32-bit address, whereas IPv6 is a 128-bit
hexadecimal address. IPv6 provides a large address space, and it contains a simple header as
compared to IPv4.
It provides transition strategies that convert IPv4 into IPv6, and these strategies are as follows:
o Dual stacking: It allows us to have both the versions, i.e., IPv4 and IPv6, on the same device.
o Tunneling: In this approach, all the users have IPv6 communicates with an IPv4 network to
reach IPv6.
o Network Address Translation: The translation allows the communication between the hosts
having a different version of IP.
Ans:
Full form It stands for Transmission Control Protocol. It stands for User Datagram Protocol.
Type of It is a connection-oriented protocol, which It is a connectionless protocol, which
connection means that the connection needs to be means that it sends the data without
established before the data is transmitted over checking whether the system is ready
the network. to receive or not.
pg. 66
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Reliable TCP is a reliable protocol as it provides UDP is an unreliable protocol as it does
assurance for the delivery of data packets. not take the guarantee for the delivery
of packets.
Speed TCP is slower than UDP as it performs error UDP is faster than TCP as it does not
checking, flow control, and provides assurance guarantee the delivery of data packets.
for the delivery of
Header size The size of TCP is 20 bytes. The size of the UDP is 8 bytes.
Acknowledgment TCP uses the three-way-handshake concept. In UDP does not wait for any
this concept, if the sender receives the ACK, acknowledgment; it just sends the data.
then the sender will send the data. TCP also
has the ability to resend the lost data.
Flow control It follows the flow control mechanism in which This protocol follows no such
mechanism too many packets cannot be sent to the receiver mechanism.
at the same time.
Ans:
NOS, or Network Operating System, is specialized software whose main task is to provide network
connectivity to a computer in order for it to be able to communicate with other computers and
connected devices.
Ans:
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all Internal mail, and
provides the necessary mail delivery services on the TCP/IP protocol stack.
Hub is least expensive, least Switches work The router is smartest and most
intelligent and least complicated of similarly like Hubs complicated out of these three. It
the three. but in a more comes in all shapes and sizes.
It broadcast all data to every port efficient manner. Routers are similar like little computers
which may cause serious security It creates dedicated for routing network traffic
and reliability concern connections
dynamically and
provides
information only to
the requesting port
pg. 67
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Hub Switch Router
In a Network, Hub is a common Switch is a device Routers are located at gateway and
connection point for devices in a network which forwards data packets
connected to the network. Hub forwards packets
contains multiple ports and is used in a network
to connect segments of LAN
Q38. What are IP classes and how can you identify the IP class of given a IP address?
Ans:
An IP address has 4 sets (octets) of numbers each with a value up to 255.
For Example, the range of the home or commercial connection started primarily between 190 x or 10
x. IP classes are differentiated based on the number of hosts it supports on a single network. If IP
classes support more networks then very few IP addresses are available for each network.
There are three types of IP classes and are based on the first octet of IP addresses which are
classified as Class A, B or C. If the first octet begins with 0 bit then it is of type Class A.
Class A type has a range up to 127.x.x.x (except 127.0.0.1). If it starts with bits 10 then it belongs to
Class B. Class B having a range from 128.x to 191.x. IP class belongs to Class C if octet starts with
bits 110. Class C has a range from 192.x to 223.x.
pg. 68
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Q40. What is Flash Memory?
Ans:
Flash Memory
Flash memory devices are different from EEPROM devices in that electrical erasure involves huge
sections of, or the whole contents of, a flash memory device. A flash memory cell includes a field
effect transistor (FET) having a selection gate, a floating gate, a source and a drain. Data is stored in
the flash memory cell by variations in the amount of charge stored in the floating gate, which causes
a variation in a threshold voltage (Vt) of the flash memory cell. The data stored in the flash memory
cell is read out by applying a selection voltage to a word line connected to the selection gate.
The flash memory electrically deletes the data using a same method as that of an electrically
erasable and programmable ROM (EEPROM), and the memory may be entirely deleted in one
second or several seconds. The data stored in the flash memory is deleted throughout the chip in a
block unit, but it is impossible to delete the data in a byte unit. The flash memory stores a correctable
control program, which is used instead of an auxiliary memory.
The flash memory is distributed into a NAND flash memory and a NOR type flash memory. The NOR
type flash memory uses an interface method as an SRAM or a ROM to easily construct a circuit with
a processor. The NOR flash memory employs memory cell arrays that suppress the parasitic
resistance. The NOR flash memory lowers the resistance by providing one through-hole to bit line for
two cells connected in parallel.
pg. 69
Solve Assignment Mob No. 7290886986 Email Id - [email protected]