6101 Fundamentals Ofcomputer and IT MCQ

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 69

(MCA)-Model Question Paper (Fundamentals of IT and Programming)

PROGRAM MASTER OF COMPUTER APPLICATION (MCA)


SEMESTER SEMESTER 1
COURSE CODE & NAME DCA6102 – PROGRAMMING IN C

1. Computer Network is.


a. Collection of hardware components and computers
b.  Interconnected by communication channels
c.  Sharing of resources and information
d.  All of the Above
Ans: d

2. How many layers does OSI Reference Model has?


a. 4
b.  5
c.  6
d.  7
Ans: d

3. IPV4 Address is
A.  8 bit
B.  16 bit
C.  32 bit
D.  64 bit
Ans: C

4. Router operates in which layer of OSI Reference Model?


A.  Layer 1 (Physical Layer)
B.  Layer 3 (Network Layer)
C.  Layer 4 (Transport Layer)
D.  Layer 7 (Application Layer)
Ans: B

5. Computer is small general purpose microcomputer, but larger than portable computer

pg. 1
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
a. Hybrid

b. Digital

c. Desktop

d. Laptop

Ans: c

6. Cathode Ray Tube is a form of.......

a. Keyboard

b. Mouse

c. Monitor

d. Mother board

Ans: c

7. Trackball is a...........

a. Input device

b. Output device

c. Programming language

d. Software

Ans: a

8. Computer is a medium sized computer

a. Micro

b. Mainframe

c. Super

d. Mini

Ans: d

9. Computer are of large size

a.Micro

pg. 2
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
b. Mainframe

c. Super

d. Mini

Ans: b

10. Note book, laptop, palm, hand-held computers are coming under the category of.........

Computer.

a. Digital computer

b. Mainframe computer

c. Portable computer

d. Hybrid computer

Ans: c

11. Light pen and joystick are............

a. Algorithm

b. Input devices

c. Output devices

d. Portals

Ans: b

12. Touch Screen is............

a. Input device

b. Output device

c. Both a & b above

d. None of these

Ans:c

13. printer is a non-impact printer and is quite in working

a. Inkjet

pg. 3
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
b. Laser

c. Thermal

d. Dot matrix

Ans: a

14. are high-end printers

a. Inkjet

b. Laser

c. Thermal

d. Dot matrix

Ans: b

15. Which of the following is/ are operating systems

a. Windows

b. Unix

c. DOS

d. All of these

Ans:d

16. _____________ is a device that accepts information (in the form of digitalized data) and
manipulates it for some result based on a program or sequence of instructions on how the data is to
be processed.
Ans: Computer

17. Technically, a computer is a _____________ machine.

Ans: Programmable

18. Invention of the _______________ made smaller and less expensive computers possible.
Ans: Transistor

19. _______________ was an important counting machine in ancient Babylon, China.


Ans: Abacus

20. The speed of computer is usually measure in ______________


Ans: Megahertz or Giga hertz

pg. 4
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
21. Different arithmetic operations are _______________

Ans: Addition,Subtraction, Multiplication and division

22. Device is designed to assist in the entry of data into a computer is known as
____________________.
Ans: Input Device

23. _________________ device is categorized as a pointing device because it is used to point and
select an option on the monitor.
Ans: Mouse

24. CCD stands for __________________________.


Ans: Charge coupled devices

25. _________ is the electronic brain of the computer.


Ans: CPU

26. ____________ unit coordinates the activities of all the other units in the system.
Ans: Control

27. The UNIVAC and ENIAC computers are examples of __________computing devices.
Ans: First Generation

28. A single drum can have up to __________ tracks.

Ans: 200

29. __________ replaced vacuum tubes and ushered in the second generation computer.
Ans: Transistor

30. Languages developed during second generation computers are_______________.


Ans: COBOL and FORTRAN

31. The development of _________ was the hallmark of the third generation of computers.
Ans: IC( integrated circuit)

32. _______ is the basic material used to make computer chips, transistors, silicon diodes and other
electronic circuits and switching devices.
Ans: Silicon

33. What is the technology used in fourth generation computers?


Ans: Microprocessor

34. Three basic characteristics of microprocessors are ________________.

Ans: Instruction Set, Bandwidth and clock speed

35. Artificial intelligence contains _____________________.

pg. 5
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Games Playing, Expert System, Natural Language, Neural Networks & Robotics

36. ____________________ is the branch of computer science concerned with making computers
behave like humans.
Ans: Artificial Intelligence

37. The examples of supercomputers are ________________.


Ans: CRAY-1, CRAY-2, Control Data CYBER 205 and ETA A-10

38. Personal computers are available in two models _______ & ______.
Ans: Desktop PCs & Tower PCs

39. The examples of handheld computers are ____________.

Ans: Personal Digital Assistance, Cellular telephones & H/PC Pro devices

40. Computer memory is used to ________ & __________.


Ans: Execute a program & Store a data

41. If a switch is ON, it is considered as _______.


Ans: 1

42. Each of RAM’s locations stores _________ byte of information.

Ans: One byte (8 bits)

43. Primary computer memory is made up of __________.


Ans: Memory cells

44. The unique number that names a memory cell is called ________.

Ans: Address

45. Computers use a memory cell whose contents are limited to a number between _________ &
__________.
Ans: 0 and 255.

46. For example, the nine digit number 123456789 is stored as the number_________ and
________ in the next cell.
Ans: 1234 in one cell & 56789

47. Which network has connectivity range up to 10 meters?


A. LAN
B. PAN
C. MAN
D. WAN
Ans: b

pg. 6
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
48. OSI model means:

A. Open systems interconnection


B. Operating system interconnection
C. Open source interconnection
D. Operating source interconnection
Ans: A

49. Twisted pair wires, coaxial cable, optical fiber cables are the examples of:

A. Wired Media
B. Wireless Media
C. Both A & B
D. None of these
Ans:  A
50. Communication between a computer and a keyboard involves ______________
transmission
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
Answer: d

51. A set of rules that governs data communication


a) Protocols
b) Standards
c) RFCs
d) None of the mentioned
Answer: a

52. Three or more devices share a link in ________ connection


a) Unipoint
b) Multipoint
c) Point to point
d) None of the mentioned
Answer: b

53. Which one works as an output and input device?


a) Modem
b) Scanner
c) Mouse
d) Monitor

pg. 7
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans : a

54. An operating system is:


a) Integrated software
b) CD-ROM software
c) Application software
d) System software
Ans: d

55. One MB is equal to:


a) The amount of RAM in every computer
b) 1 billion bytes
c) 1024KB
d) 1 thousand bytes
Ans: c

56. The key F12 opens a

a) Save As dialog box


b) Open dialog box
c) Save dialog box
d) Close dialog box

Ans a

57. Temporary memory is called (1 point)


a) RAM
b) CAD
c) DOS
d) ROM
Ans: a

58. the run command for “internet options” is _______________

a) iexplore

b) iexpress

c)internet

d)ipksetup

Ans: a

59. ____________ is the main memory of a computer system used for storing programs and data.
Ans: Random Access Memory

60. Volatile random access memory devices may be further divided into _______________.
Ans: Static random access memory & Dynamic random access memory

pg. 8
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
61. _________ is a memory device for reading and writing information wherein multi-layer
ferromagnetic thin films.
Ans: MRAM

62. EEPROM stands for ___________.


Ans: Electrically erasable programmable read-only memory

63. ___________ Memory is a type of EEPROM device that can be erased and reprogrammed in
blocks instead of one byte at a time.
Ans: Flash memory

64. External memory is for the long term storage of information. (True/False)
Ans: True

65. External memory which is sometimes called backing store or secondary memory. (True/False)
Ans: True

66. The first floppy drives used an 8-inch disk which later got smaller into 5.25-inch and was called
diskette. (True/False)
Ans: True

67. The 5.25-inch disk held 360 kilobytes compared to the 1.44 megabyte capacity of today's 3.5-
inch diskette. (True/False)
Ans: True

68. VLP stands for __________.


Ans: Video Long Play

69. The CD-ROM standards, also created by Sony and Phillips, use the same disk and scanning
technology. (True/False)
Ans: True

70. One of the common aspects of modern computer hardware technology is known as
__________________.
Ans: Magnetic storage device.

71. Magnetic storage was first used for audio recording, and is generally referred to as magnetic
recording. (True/False)
Ans: True

72. A capacitance can be in two states: a state in which it is fully charged, and another in which it is
fully discharged. (True/False)
Ans: True

73. What TCP/IP protocol is used for transferring electronic mail messages from one machine to
another?

A. FTP
pg. 9
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
B. SNMP

C. SMTP

D.RPC

Answer: C

74. Which of the following is used for modulation and demodulation?

A. modem

B. protocols

C. gateway

D.multiplexer

Answer: A

75. Bluetooth is an example of

a) personal area network

b) local area network

c) virtual private network

d) none of the mentioned

Ans: A

76. What is a web browser?


a) a program that can display a web page
b) a program used to view html documents
c) it enables user to access the resources of internet
d) all of the mentioned
Answer: D

77. URL stands for


a) unique reference label
b) uniform reference label
c) uniform resource locator
d) unique resource locator
Answer: C

78. A physical media which is good for voice, data and video for fast and long distance is:
(a) Twisted Pair (b) Fiber
Answer: B

pg. 10
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
79. Physical or logical arrangement of network is
a) Topology
b) Routing
c) Networking
d) None of the mentioned
Answer: A

80. In this topology there is a central controller or hub


a) Star
b) Mesh
c) Ring
d) Bus
Answer: A

81. This topology requires multipoint connection


a) Star
b) Mesh
c) Ring
d) Bus
Answer: D

82. ________ is a storage device which uses four semiconductors switches to store either a 0 or a 1.
Ans: flip-flop

83. ______ is technically a set of instructions written in a computer language that solves a
computational task.
Ans: Computer software

84. ______ is used to run the computer hardware.


Ans: System software

85. __________ usually provides tools to assist a programmer in writing computer programs and
software using different programming languages.
Ans: Programming software

86. _______ allows end users to accomplish one or more specific tasks.

Ans: Application software

87. An operating system (OS) is a computer program that manages the hardware and software
resources of a computer. (True/False)
Ans: True

88. UNIX is an operating system. (True/False)

Ans: True

89. How many bits in a byte?


pg. 11
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
A. 16

B. 8

C. 255

D. 10

Answer: B

90. A Switch uses:


(a) Simplex Transmission
(b) Half Duplex Transmission
(c) Full Duplex Transmission
(d) None of These
Answer: C

91. A fast Ethernet may transfer data at:


(a) 10 Mbps
(b) 100 Mbps
(c) 1000 Mbps
(d) 10000Mbps
Answer: B

92. What is the size of Host bits in Class B of IP address?


A. 04
B. 08
C. 16
D. 32
Answer: C

93. What is the usable size of Network bits in Class B of IP address?


A. 04
B. 08
C. 14
D. 16
Answer: C

94. What is the default subnet mask for a class A network?

A. 127.0.0.1

B. 255.0.0.0
pg. 12
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
C. 255.255.255.0.0

D. 255.255.255.0

Answer: B

95. What is the first octet range for a class A IP address?

A. 1 - 126

B. 192 - 255

C. 192 - 223

D. 1 - 127

Answer: A

96. _________ is the computer software designed to help the user to perform a singular or multiple
related specific tasks.
Ans: Application software

97. Microsoft Access gives you powerful new tools for managing your databases. (True/False)
Ans: True

98. __________software is that has restrictions on using and copying it, usually enforced by a
proprietor.
Ans: Proprietary

99. Some proprietary software comes with source code or provides offers to the source code.
(True/False)
Ans: True

100. _________ is computer software whose source code is available under a copyright license that
permits users to study, change, and improve the software, and to redistribute it in modified or
unmodified form.
Ans: Open-source software

101. Open-source software generally allows anybody to make a new version of the software, port it
to new operating systems and processor architectures, share it with others or market it. (True/False)
Ans:True

102. Is computer software designed to operate the computer hardware and to provide

platform for running application software

a. Application software

pg. 13
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
b. System software

c. Software

d. Operating system

Ans: b

103. ALU and Control Unit jointly known as

a. RAM

b. ROM

c. CPU

d. PC

Ans: c

104. RAM is an example of

a. Secondary memory

b. Primary memory

c. Main memory

d. Both (1) and (2)

Ans: b

105. Magnetic disk is an example of

a. Secondary memory

b. Primary memory

c. Main memory

d. Both (1) and (2)

Ans: a

106.Which one of the following is NOT a computer language

a. MS-Excel

b. BASIC

pg. 14
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
c.COBOL

d. C++

Ans: a

107. A process can be divided into small, interacting phases called ________.
Ans: Sub Process

108. ________ measures the consistency of the product requirements with respect to the design
specification.
Ans: Correctness

109. ________ measures how well the delivered system matches the needs of the operational
environment, as described in the original requirements statement.
Ans: Correspondence

110. ________ is a series of processes that, if followed, can lead to the development of an
application.
Ans: Software Development Methodology

111. Algorithms + Data structures = ________________.

Ans: Programs

113. IBM stands for

a. Internal Business Management

b. International Business Management

c. International Business Machines

d. Internal Business Machines

Ans: c

114. VDU is also called

a.Screen

b. Monitor

c. Both 1 & 2

d. printer

Ans: c

pg. 15
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
115. The instructions that tell a computer how to carry out the processing tasks are referred to as
computer.........

a. programs

b. processors

c. input devices

d. memory modules

Ans: a

116. An area of a computer that temporarily holds data waiting to be processed is..........

a. CPU

b. Memory

c. Storage

d. File

Ans: b

117. In which model system is modeled using the data transformations, which take place as it, is
processed?
Ans: Data-flow Model

118. Which model is used to describe the logical data, structures being used?
Ans: Entity-relation model

119. A software design is a model system that has many participating entities and ___________
Ans: Relationships

120. ___________ is easier to maintain as the objects are

Ans: object-oriented systems

121. _________ begins at the vortex of the spiral and concentrates on each unit (i.e., component) of
the software as implemented in source code.
Ans: Unit testing

121. _____________ addresses the issues associated with the dual problems of verification and
program construction.
Ans: Integration testing

pg. 16
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
122. ___________ provides final assurance that software meets all functional, behavioral, and
performance requirements.
Ans: Validation testing

123. Name few Structured Programming Languages?


Ans: Ada, Pascal, and dBASE

124. What is the first step in object oriented Programming?


Ans: Is to identify all the objects you want to manipulate and how they relate to each other,
an exercise often known as data modeling.

125. In Logic programming paradigms we express computation exclusively in terms of ___________


Ans: Mathematical logic

126. Software that controls real-world events as they occur is called_______________.


Ans: Real time

127. ____________ software is a collection of programs written to service other programs.


Ans: System

128. ________ is software that hides lower level details and provides a set of higher-level functions.
Ans: Abstraction

129. ________ transforms the computer hardware into multiple virtual computers, each belonging to
a different program.
Ans: Operating System

130. Multiprogramming (MP) increases CPU utilization by organizing jobs such that the CPU always
has a job to execute. (True/False)
Ans: True

131. Real-time (RT) operating systems were developed to meet the response requirements of such
applications. (True/False)
Ans: True

132. ______ is a collection of related information defined by its creator.


Ans: File

133. ________ System is a collection of processors that do not share memory, peripheral devices,
or a clock.
Ans: Distributed

134. The main function of a command interpreter is to get and execute the next user specified
command. (True/False)
Ans: True

pg. 17
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
135. Which of the following IP address class is Multicast
A. Class A
B. Class B
C. Class C
D. Class D
Answer: D

136. Which of the following is correct regarding Class B Address of IP address


A. Network bit – 14, Host bit – 16
B. Network bit – 16, Host bit – 14
C. Network bit – 18, Host bit – 16
D. Network bit – 12, Host bit – 14
Answer: A

137. IEEE 802.11 is a LAN Standard for

(a) Ethernet Network

(b) Wireless LAN Technology

(c) Broadband Technology

(d) None of these

Answer: B

138. How many bits internet address is assigned to each host on a TCP/IP internet which is used in
all communications with the host?
A. 16 - bits
B. 32 - bits
C. 48 - bits
D. 64 - bits
Ans: B
139. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
Answer: C

140. How many pins on a VGA?

pg. 18
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
A. 15.

B. 9

C. 25

D. 32

Answer: A

141. The standard VGA display has _____ pixels in its native graphics mode?

A. 648 x 320

B. 640 x 480

C. 680 x 440

D. 1024 x 786

Answer: B

142. An error in one part of the system may cause malfunctioning of the complete system.
(True/False)
Ans: True

143. ________involves the allocating and de-allocating memory, CPU scheduling in case of multi-
process.
Ans:Running a program

144. __________ are computers or groups of computers that provides services to other computers,
connected via network.
Ans: Server

144. __________are more powerful versions of personal computers.

Ans: Workstation

145. __________systems are combinations of processors and special software that are inside of
another device, such as the electronic ignition system on cars.
Ans:Embedded

146. _____________ is used to convert the information into another signal which is capable of
passing on to a suitable medium.

pg. 19
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Transmitter

147. The device which converts the suitable information into original message is called
____________.
Ans:Receiver

148. Which type of network connects computers and resources together in a building or buildings
close together?
Ans: LAN

149. Which type of networks connects LANs together within a city?


Ans: MAN

150. Which type of Networks connects LANs together between cities or across a country?
Ans: WAN

151. The first web browser is

a. Mosaic

b. Netscape

c. Internet explorer

d. Collabra

Ans: a

152. LAN stands for...............

a. Limited Area Network

b. Logical Area Network

c .Local Area Network

d. Large Area Network

Ans: c

153. are set of rules and procedures to control the data transmission over the internet

a. IP address

b. Domains

c.Protocol

d. Gateway

pg. 20
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: c

154. NOS stands for

a.Node operating system

b. Non-open software

c. Network Operating system

d. Non-operating software

Ans: c

155. Computers, combine both measuring and counting, are called :

a. Analog

b. Digital

c. Hybrid

d. All of these

Ans: c

156. In world today, most of the computers are :

a. Digital

b. Hybrid

c. Analog

d. Complex

Ans: a

157. Physical structure of computer is called :

a. Software

b. Hardware

c. Human ware

d. All of these

Ans: b

pg. 21
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
158. Super Computer are mainly used for:

a) Weather forecasting

b) Nuclear energy research


c) Aircraft design

d) All of these

Ans: d

159. Star topology requires less cable length than a linear topology. (True/ False).
Ans: False

160. In bus topology it is difficult to identify the problem if the entire network shuts down.
(True/False).
Ans:True

161. ___________ layer coordinates the functions required to carry a bit stream over a physical
medium.
Ans: Physical

162. __________ layer is responsible for the source-to-destination delivery of a packet, possibly
across multiple networks.
Ans:Network
163. __________ layer is responsible for process-to-process delivery of the entire message.
Ans:Transport

164. A ______________ is referred to as an application that provides access to a Web server.


Ans:Browser

165. ___________ is responsible for servicing requests for information from Web browsers.
Ans: Web Server

166. HTTP is a stateless protocol because __________________.


Ans: It does not keep track of the connections

167. The HTTP communication is initiated by the ____________ requestinga resource on the origin
server.
Ans:User agent

168. What does the Web consists of?


Ans: Web Pages

169. State true or false: Each page may contain links to other pages any where in the world.
Ans: True

170. The idea of having one page point to another is now called _________.

pg. 22
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Hypertext

171. Who is the father of Computer?


a. Allen Turing
b. Charles Babbage
c. Simur Cray
d. Augusta Adaming
Ans: b
172. A CPU contains
a. a card reader and a printing device
b. an analytical engine and a control unit
c. a control unit and an arithmetic logic unit
d. an arithmetic logic unit and a card reader
Ans: c
173. Which device is required for the Internet connection?
a. Joystick
b. Modem
c. CD Drive
d. NIC Card
Ans: b
174. What is a light pen?
a. A Mechanical Input device
b. Optical input device
c. Electronic input device
d. Optical output device
Ans: b

175. CD-ROM stands for


a. Compactable Read Only Memory
b. Compact Data Read Only Memory
c. Compactable Disk Read Only Memory
d. Compact Disk Read Only Memory

pg. 23
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: a
176. ALU is
a. Arithmetic Logic Unit
b. Array Logic Unit
c. Application Logic Unit
d. None of above
Ans: a
177. VGA is
a. Video Graphics Array
b. Visual Graphics Array
c. Volatile Graphics Array
d. Video Graphics Adapter
Ans: a
178. IBM 1401 is
a. First Generation Computer
b. Second Generation Computer
c. Third Generation Computer
d . Fourth Generation Computer
Ans: b

179. The capacity of 3.5 inch floppy disk is


a. 1.40 MB
b. 1.44 GB
c. 1.40 GB
d. 1.44 MB
Ans: d
180. WAN stands for
a. Wap Area Network
b. Wide Area Network
c. Wide Array Net
d. Wireless Area Network
Ans: b
pg. 24
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
181. MICR stands for
a. Magnetic Ink Character Reader
b. Magnetic Ink Code Reader
c. Magnetic Ink Cases Reader
d. None
Ans: a
182. Which of the following is a part of the Central Processing Unit?
a. Printer
b. Key board
c. Mouse
d. Arithmetic & Logic unit
Ans: d
183. CAD stands for
a. Computer aided design
b. Computer algorithm for design
c. Computer application in design
d. Computer analogue design
Ans: a
184. Junk e-mail is also called
a. spam
b. spoof
c. sniffer script
d. spool
Ans: a
185 .Hackers
a. all have the same motive
b.break into other people's computers
c. may legally break into computers as long as they do not do any damage
d. are people who are allergic to computers
Ans: b

186. First page of Website is termed as-


pg. 25
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
a. Homepage
b. Index
c. JAVA script
d. Bookmark
Ans: a

187. Which of the following is a storage device?

a. Tape

b. Hard Disk

c. Floppy Disk

d. All of the above

Ans: d

188. What is a light pen?

a. Mechanical Input device

b. Optical input device

c. Electronic input device

d. Optical output device

Ans: b

189. BCD is

a. Binary Coded Decimal

b. Bit Coded Decimal

c. Binary Coded Digit

d. Bit Coded Digit

Ans: b

190. ASCII stands for

a. American Stable Code for International Interchange

b. American Standard Case for Institutional Interchange

pg. 26
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
c. American Standard Code for Information Interchange

d. American Standard Code for Interchange Information

Ans: c

191. Which of the following is first generation of computer?

a. EDSAC

b. IBM-701

c. CDC-1604

d. ICL-2900

Ans: b

192. Chief component of first generation computer was

a. Transistors

b. Vacuum Tubes and Valves

c. Integrated Circuits

d. None of above

Ans: b

193. Second Generation computers were developed during

a.1940 to 1956

b. 1956 to 1965

c. 1965 to 1971

d. 1971 to present

Ans: b

194.The computer size was very large in

a. First Generation

b. Second Generation

c. Third Generation

pg. 27
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
d. Fourth Generation

Ans: a

195. Microprocessors as switching devices are for which generation computers

a. First Generation

b. Second Generation

c. Third Generation

d. Fourth Generation

Ans: d

196. A computer program that converts an entire program into machine language is called a/an

a. Interpreter

b. Simulator

c. Compiler

d. Commander

Ans: c

197. A computer program that translates one program instructions at a time into machine language
is called a/an

a. Interpreter

b. CPU

c. Compiler

d. Simulator

Ans: c

198. A small or intelligent device is so called because it contains within it a

a. Computer

b. Microcomputer

c. Programmable

d. Sensor
pg. 28
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: d

199. A fault in a computer program which prevents it from working correctly is known as

a. Boot

b. Bug

c. Biff

d. Strap

Ans: b

200. DOS stands for

a. Disk Operating System

b. Disk operating session

c. Digital Operating System

d. Digital Open system

Ans: a

201. Who is the chief of Microsoft

a. Babbage

b. Bill Gates

c. Bill Clinton

d. none of these

Ans: b

202. Which of the following are input devices?

a. Keyboard

b. Mouse

c. Card reader

d. Any of these

Ans: d

pg. 29
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
203. Examples of output devices are

a. Screen

b. Printer

c. Speaker

d. All of these

Ans: d

204. Which of the following is also known as brain of computer

a. Control unit

b. Central Processing unit

c. Arithmetic and language unit

d. Monitor

Ans: b

205. What kind of memory is both static and non -volatile?

a. RAM

b. ROM

c. BIOS

d. CACHE

Ans: b

206. RAM is also called as

a. Read / Write Memory

b. Long Memory

c. Permanent Memory

d. Primary Memory

Ans: a

207. The process of transferring files from a computer on the Internet to your computer is called

pg. 30
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
a. Downloading

b. uploading

c. FTP

d. JPEG

Ans: a

208. Which of the following is not a binary number?

a. 001

b. 101

c. 202

d. 110

Ans: c

209. Which of the following does not store data permanently?

a. ROM

b. RAM

c. Floppy Disk

d. Hard Disk

Ans: b

210. Which of the following is the smallest storage?

a. Megabyte

b. Gigabyte

c. Terabyte

d. None of these

Ans: d

211. Which of the following contains permanent data and gets updated during the processing of
transactions?

a. Operating System File


pg. 31
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
b. Transaction file

c. Software File

d. Master file

Ans:d

212. The computer abbreviation KB usually means

a. Key Block

b. Kernel Boot

c. Kilo Byte

d. Kit Bit

Ans: c

213. “MAN” stands for

a. Maximum Area Network

b. Minimum Area Network

c. Main Area Network

d. Metropolitan Area Network

Ans: d

214. Which of the following is a network topology.

a. LAN

b. WAN

c. MAN

d. BUS

Ans: d

215. Which of the following is a type of network.

a. Ring

b. Bus

pg. 32
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
c. Star

d. PAN

Ans: d

216. VOIP stands for..........

a. Voice over IP

b. Video over IP

c. Viruses over IP

d. Virtual over IP

Ans: a

217: JCL stands for_________________________

Ans: job control language (JCL)

218: OSI stands for_____________________-

Ans: Open Systems Interconnection (OSI)

219: WWW stands for________________-

Ans: World Wide Web (WWW)

220: HTTP stands for_____________________

Ans: Hyper text transfer protocol

221. FTP stands for_______________________

Ans: File Transfer protocol

223. TCP/IP Stands for__________________

Ans: Transmission control protocol/Internet protocol

224: UDP stands for_______________________

Ans: User Datagram Protocol

225. SMTP stands for_______________________

Ans: Simple mail transfer protocol

pg. 33
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
226. OSS stands for_________________

Ans: open-source software

227. JSP stands for______________________

Ans: Jackson Structured Programming (JSP)

228. CAD stands for_________________

Ans: Computer Aided Design (CAD).

229. OOD stands for_____________________

Ans: object-oriented design (OOD)

230. CD-I stands for__________________

Ans: CD-I (compact disk-interactive)

231. CD-ROM stands for________________-


Ans: compact disk-read only memory

232. CD-WORM stands for______________

Ans: compact disk - (write once read many times)

233. CD-MO stands for______________-

Ans: compact disk-(magneto-optical).

234. ECC stands for_________________

Ans: Error correction code (ECC)

235. FET stands for_________________

Ans: field effect transistor (FET)

236. DRAM stands for_________________-

Ans: Dynamic Random Access Memory (DRAM).

237. PROM stands for________________________

Ans: Programmable Read Only Memory (PROM).

238. SRAM stands for________________

pg. 34
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Static random access memory (SRAM)

239. PET stands for_________________

Ans: polyethylene terephthalate (PET)

240. OCR stands for_______________

Ans: Optical Character Readers (OCR)

241. MICR stands for________________

Ans: Magnetic Ink Character Reader (MICR)

242. ALU stands for________________

Ans: Arithmetic-Logic Unit (ALU):

243. TFT stands for_____________________

Ans: thin film transistor (TFT)

244. PDA stands for___________________

Ans: Personal Digital Assistance (PDAs)

245. GUI stands for_____________

Ans: Graphical User Interface

246. The drum rotates at a speed of up to_________


a. 3000 rpm,
b. 2000 rpm
c. 1000 rpm
d. none of these
Ans: a

247. IBM, S/390 mainframe can support _________________ users simultaneously.


a. 50000 users
b.45000 users
c. 40000 users
d. none of these
Ans: a

248. Laptop computer is also known as notebook computer.(True/False)

Ans: True

249 Super Computer Example

pg. 35
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
a) CRAY-1, CRAY-2,

b) Control Data CYBER 205


c) ETA A-10
d) All of these
Ans: d

250. Which of the following is not application software?

a. Windows 7

b. WordPad

c. Photoshop

d. MS-excel

Ans: a

251. Decimal means base __________.

Ans: 10

252. The value of the bit pattern 11111111 is _________.

Ans. 255

253. The range of values represented by an 8-bit binary number is _____.

Ans: 0 to 255

254. The binary equivalent of 228 is _________.

Ans:228

255. The octal equivalent of (100)10 is ________.

Ans: (144)8

pg. 36
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
256. The decimal equivalent of (0.265)10 is _______.

Ans: (0.0100)2

257. The hexadecimal equivalent of (1011 1010 0011 .0010)2 is _______.

Ans: (BA3.2)16

258. The result of 7-2 using 1’s complement notation is ________.

Ans: 0100

259. The bit pattern 1011 in 1’s complement notation is ________.

Ans: -4

260. The result of 7-2 using 2’s complement notation is _______.

Ans: 0101

261. The bit pattern 1110 in 2’s complement notation is _______.

Ans: -2

262. If x,y,z contains values 0,1,1 then (x+z)y is _______.

Ans: 1

263. x+y.0 is ____________ Law.

Ans: Commutative

264. x+1 =1 is __________ Law.

pg. 37
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Dominance

265. Boolean product for 1 and 0 in AND has ____ value.

Ans: 0

266. Boolean product for 1 and 0 in OR has _____ value.

Ans: 1

267. Postulate P3 indicates _________.

Ans: The • and + operators are commutative

268. A combinatorial circuit is a system containing basic _____________ operations (AND, OR,
NOT), some inputs, and a set of outputs.

Ans: Boolean

269. A half adder adds three one-bit inputs (two bits plus a carry from a previous addition) and
produces two outputs: the sum and the carry(True/False).

Ans: False

270. A digital logic circuit or system is usually made up of combinational elements such as NAND
and NOR gates and elements.

Ans: memory

271. The flip-flop is said to be either leading edge or trailing edge triggered. (True/False).

Ans: True

272.A flip flop is a circuit which is capable of __________________ the value which is given as
input.

pg. 38
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Remembering

273.Master slave D flip flop responds on the ____________ edge of the enable input.

Ans: negative

274. The D flip flop is a universal flip flop (True/False).

Ans: false

275. The D flip-flop can be interpreted as a primitive memory cell, zero-order hold, or delay line
(True/False).

Ans: True

276. Shift Register is a group of ___________ set up in a linear fashion.

Ans: Flip Flops

277. Shift registers can have co-parallel inputs and outputs, including serialin, parallel-out (SIPO)
and parallel-in, serial-out (PISO) types. (True/False)

Ans: True

278. SIPO configuration allows conversion from _______ to ______ format.

Ans: Serial to parallel

279. To shift the data in parallel in serial out , the W/S control line is brought and _________ the
registers are clocked.

Ans: HIGH

pg. 39
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
280. The PIPO configuration allows conversion from parallel to serial format. (True/False)

Ans: False

281. ____________ is a device which stores the number of times a particular event or process has
occurred.

Ans: Counters

282. In electronics, counters can be implemented easily using ___________ circuit

Ans: Register Type

283. ______________BUS is used to control and coordinate the CPU Operations.

Ans: Control

284. _____________ Mode is used in multi-tasking machines.

Ans: Protected

285. Control BUS is also called as _____________ BUS.

Ans: Timing and control

286. RISC chips have faster CPU performance than CISC. (True or False)

Ans: True

287. __________ is a technique of running more than one process in a system.

Ans: Multiprocessing

288. MMX is an extension that supports ____________ applications.

Ans: Multimedia

289. 8088 use ______________ bit BUS while the 8086 uses ________ bit BUS for data transfer.

Ans: 8,16

290. The speed specification of clock multiplier of the 8088/86 processor is __________.

Ans: 1.0
pg. 40
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
291. The motherboard interface of 8088/86 packaging is __________.

Ans: DIP socket

292. The two types of Intel 386 are ___________ & ________.

Ans: DX, SX

293. State whether the following statements are true or false.

a) Pentium is the first superscalar processor.

Ans: True

b) The use of speculative executive will not reduce pipeline stall time in the RISC core in sixth
generation processor

Ans: False

294. Which are the three major steps in overclocking?

Ans: Change in BUS speed, Change the multiplier, Change the voltage supply

295. Overclocking the Intel Celeron depends on _____.

Ans: Motherboard Characteristics

296. FSB Stands for _____.

Ans: Front Side BUS

297. ____________ is the electric wire that is used to answer the question of linking and
communication between different components.

Ans: Buses

298. State whether the following statements are true or false:

a. Control Bus is the one which carries data between the different components of the computer.

Ans: false

b. Local Bus is used to directly connect the data transfer to CPU.

Ans: True

299. Buses are measured in terms of _____________ and measured by _____________.

pg. 41
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: CLOCK speed and MHz

300. ____________Buses are used to connect peripherals.

Ans: Expansion

301. The three major types of Buses are ___________, _______ and ______________

Ans: ISA, PCI and AGP

302. ____________ Buses are also called as PC Buses.

Ans: ISA

303. The two versions of ISA are ___________ and ____________.

Ans: 8-bit and 16-bit

304. 8-bit ISA was used by __________ Bus. 8-bit ISA consists of _________ pins out of which of
________ and ___________ are address and data liens respectively.

Ans: PC/XT

305. 16-bit Bus consists of extra _________ bits, ________interrupts and _____________ DMA
channels.

Ans: 62, 20, 8

306. The speed is increased from ____________ to __________ MHz.

Ans: 8, 5, 4

307. ________ is a high speed intelligent Buses

Ans: 4.77 MHz to 8.33 MHz

308. State whether the following statements are true or false.

a. In VL architecture the performance of the Bus is independent of CPU speed.

Ans: False

b. PCI gave automatic configuration property to switch and jumper less peripherals.

Ans: True

309. Linear bursts helps in increasing the performance rate of PCI when compare to Bus which do
not have linear burst capability by almost double the time.

pg. 42
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: PCI

310. ___________ is the time taken by the CPU to permit the request access by peripheral for its
control.

Ans: Access time

311. ___________ is the technique which holds the signal dynamically and wherever there is a
requirement it can be reassigned.

Ans: Interrupt ReQuest (IRQ)

312. ___________ derives the Bus clock of the PCI.

Ans: FSB

313. FSB stands for ____________.

Ans: Front Sided Bus

314. _______________ Port is applicable for 3D applications.

Ans: AGP

315. State whether the following statements are true or false

a. Performance of AGP is directly proportional to the bandwidth.

Ans: True

b. The bandwidth capability of AGP is 4 times greater than PCI

Ans: true

c. RBF# indicates the pre-requested low priority read data can be readily accepted by the master.

Ans: True

d. GNT# indicates that the Whenever there is data keying from the core program to ensure that
whether master is ready to accept the data

Ans: False

316. AGP is used on __________ and _______ machines.

Ans: ATX and NLX

317. FSB is also called as ________________.

pg. 43
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Processor Bus

318. The chipset consists of two processors namely ___________ and ____________.

Ans: Northbridge and Southbridge

319. The state of CPU that it performs faster than FSB for the activity and waits for FSB to send the
new instructions is called ___________.

Ans: Idle state

320. DIB connects ____________ to _________ and ___________.

Ans: Level-2 cache, CPU and Memory

321. DIB allows single sequential method for processing.(true/ false)

Ans: false

322. Troubleshooting of Buses can be done at ____________.

Ans: POST board

323. _________ is used to find the faulty Buses.

Ans: LED lights

324. CLOCK signal can be adjusted between _________and _______.

Ans: 0 Hz to 33 MH

325. IDE standards for _________________________.

Ans: Integrated Drive Electronics

326. The two devices that are configured as master and save shares a single channel that called by
a _________________.

Ans: Specification

327. ____________________ is an adapter of the CD that is designed to store computer data in the
form of text, graphics and stereo sound.

Ans: CD-ROM

328. ___________ is a complex decoding process that convert sequence of pits and land into
meaningful binary information.

Ans: EFM

pg. 44
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
329. __________ Driver allows programs to access the CD-ROM as the hardware level.

Ans: Low level device

330. __________ allows the disk to automatically identify.

Ans: Auto Insert

331. __________ is the time recorded by the drive to locate required information on the disk.

Ans: Access time

332. State whether the following statements are true/false.

a) MPEG-2 decoder is used to compress and decode movie data.

Ans: True

b) Analog output is used for mixing in an auxiliary audio signal to the decoder card.

Ans: False

c) Digital output jack is used to drive an external digital device.

Ans: True

333. The data layer in the Blu-ray disk is closer to the surface of the disk (true/false).

Ans: True

334. The two types of Blu-ray optical disk recorder are ____________.

Ans: BD-R and BD-RE

335. BDMV stands for ____________.

Ans: Blu-ray disk movie

336. ______________________ is used to connect the flash drive to computer.

Ans: Male type-A USB connector

337. The largest manufacturers of mice are ____________and _________ .

Ans: Microsoft, Logitech

338. Trackball is a stationary device. (True or False).

Ans: True

pg. 45
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
339. ___________ in the mouse are very difficult to resolve.

Ans: Hardware problems

340. A standard technique known as _________ is followed by the keyboard electronics.

Ans: Scanning

341. __________ is a keyboard controller chip.

Ans: 8042

342. One of the best ways to maintain a keyboard in top condition is __________.

Ans: Periodic cleaning

343. ____________ is required to record the sound.

Ans: Microphone

344. The number of measurements per second, called the_____________ is measured in kHz.

Ans: Sampling rate

345. MIDI stands for____________

Ans: Musical Instrument Digital Interface

346. __________, __________, and __________ should not conflict with other devices while
installing a sound card.

Ans: IRQ numbers, base I/O address, DMA channels

347. __________ is the way to move information directly to PC's memory, bypassing PC's
processor.

Ans: DMA channels

348. The___________ box should contain information about the type of compression that was used
to compress the file, the sound quality of the file, and whether or not the file is in stereo.

Ans: Audio format

349. The TCP/IP protocol suite is so named for two of its most important protocols _________ and
___________ .

Ans: Transmission Control Protocol and Internet Protocol

pg. 46
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
350. The highest-level protocols within the TCP/IP protocol stack are __________.

Ans: Application protocol

351. IP addresses are represented by a 8-bit unsigned binary value. (True/False).

Ans: False

352. ARPAnet Stands for __________

Ans: Advanced Research project Agency

353. The Grid is a ___________ network linking a collection of public and private research centres.

Ans: Supercomputer

354. Internet2 is a low-performance network linking more than 200 universalities by fiber optic links.
(True/False)

Ans: False

355. The computers that supply this information are referred to as _______.

Ans: Server

356. A _________ is a computer networking device that forwards data packets toward their
destinations through a process known as routing.

Ans: Router

357. Modems are data communication devices that convert digital signals to analog signals, and vice
versa.(True/False)

Ans: True

358. The light transmitted through the fiber is confined due to _________ within the material.

Ans: Total Internal reflection

359. A hub functions as a ________.

Ans: Multiport Repeater

360. _________ are the basic unit of measurement on the Internet.

Ans: Packet

361. The _________ of the network sends the mail to the concerned address

pg. 47
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: The email system

362. In India Airtel, BSNL\ and VSNL are the Internet Service Providers. (True/False).

Ans: True

363. Internet Browser brings the Internet to our system. (True/false)

Ans: True

364. When someone sends an email it is stored in _________.

Ans: Mail box

365. With _________ program, you can connect to another computer and use it as if you were sitting
at its keyboard.

Ans: Telnet

366. A Web browser created by Microsoft is ________.

Ans: Explorer

367. _________ tells the exact HTTP/URL location of the page we are currently viewing.

Ans: Address Bar

368. Several institutions grant degrees solely on the basis of Internet coursework.(True/False)

Ans: True

369. For students, Internet classes not only save time and money, but they can fit into difficult work
schedules.(True/false).

Ans: True

370. SISO stands for____________________

Ans: Serial in serial out

371. PIPO stands for_______________

Ans: Parallel in parallel out

372. ISA stands for___________________

Ans: Industry standard architecture

373. AGP stands for___________________

pg. 48
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans: Accelerated Graphic Port

374. PPL stands for___________________

Ans: Phase Locked Loop (PLL)

375. DAC stands for___________________

Ans: Digital-to-Analog Convertor (DAC)

376. MIDI stands for___________________

Ans: Musical Instrument Digital Interface

377. PCI stands for___________________

Ans: Peripheral Computer Interface

378. DMA stands for___________________

Ans: Direct Memory Access (DMA)

379. SNA stands for___________________

Ans: Systems Network Architecture (SNA)

380. ISP stands for___________________

Ans: Internet Service Providers

381. SLIP stands for___________________

Ans: Serial Line Input Protocol

382. PPP stands for___________________

Ans: Point to Point Protocol

383. VSNL stands for___________________

Ans: Videsh Sanchar Nigam Ltd.

384. NSP stands for___________________

Ans: Network service providers

385. ISDN stands for___________________

Ans: Integrated Services Digital Network

pg. 49
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Q1 Characteristics or feature of a computer? Explain any five features.

Ans: Computers of all sizes have common characteristics - speed, arithmetical and logical
operations, accuracy, reliability, storage, retrieving data and programs, automation, versatility,
communications, diligence, feelings, consistency and precision. Computers are the foundation of
business, travel, and leisure life today.
1. Speed
The computer is a very high speed electronic device. The operations on the data inside the
computer are performed through electronic circuits according to the given instructions.
2. Arithmetical and Logical Operations
A computer can perform arithmetical and logical operations. In arithmetic operations, it performs the
addition, subtraction, multiplication and division on the numeric data. In logical operation it compares
the numerical data as well as alphabetical data.
3. Accuracy
In addition to being very fast, computer is also very accurate device. It gives accurate output result
provided that the correct input data and set of instructions are given to the computer.
4. Reliability
The electronic components in modern computer have very low failure rate. The modern computer
can perform very complicated calculations without creating any problem and produces consistent
(reliable) results.
5. Storage
A computer has internal storage (memory) as well as external or secondary storage. In secondary
storage, a large amount of data and programs (set of instructions) can be stored for future use.
6. Retrieving data and programs
The data and program stored on the storage media can be retrieved very quickly for further
processing. It is also very important feature of a computer.
7. Automation
A computer can automatically perform operations without interfering the user during the operations.
It controls automatically different devices attached with the computer.
8. Versatility
Versatile means flexible. Modern computer can perform different kind of tasks one by one of
simultaneously.
9. Communications
Today computer is mostly used to exchange messages or data through computer networks all over
the world.
10. Diligence
A computer can continually work for hours without creating any error. It does not get tired while
working after hours of work it performs the operations with the same accuracy as well as speed as
the first one.

Q2. What is input device? Explain five input device .

pg. 50
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Ans:
Any device designed to assist in the entry of data into a computer is known as Input device. Input
devices convert data from any convenient external format into binary codes that a computer can
store and manipulate internally. Some of the most common, most popularly used devices are:
1. Mouse:
This Input device is categorized as a pointing device because it is used to point and select an option
on the monitor. It is small boxlike object that is connected to the computer by a cable and can be
rolled around on the table.
2. Light Pen:
This is also categorized into a pointing device, which can be used only with video displays. It can be
used to select an option by simply pointing at it, or drawing figures directly on the screen. An
electron beam that repeatedly scans the display screen from left to right and from top to bottom
produce a video display. Because of this scanning action, each point on the display is
illuminated at a slightly different time.

3. Touch Screen:
A type of display screen that has a touch-sensitive transparent panel covering the screen. Instead of
using a pointing device such as a mouse or light pen, you can use your finger to point directly to
objects on the screen.
4. Joy Stick:

A lever that moves in all directions and controls the movement of a pointer or some other display
symbol. A joystick is similar to a mouse, except that with a mouse the cursor stops moving as soon
as you stop moving the mouse. With a joystick, the pointer continues moving in the direction the
joystick is pointing.

5. Keyboard:
Keyboards are the most widely used input devices. The most popular keyboards are those that look,
feel, and possibly sound like an ordinary typewriter keyboard. Alternatives are Membrane keyboards,
whose keys are merely printed on a plastic membrane.
6. Scanners:
These are the eyes of your computer. They can see images or printed text and translate them into
binary code. Most scanners collect data from a page by recording, which areas are light and which
areas are dark.
7. Optical Character Readers (OCR):
These are another kind of input devices that are used to read any printed text. They can interpret
handmade marks, handwritten characters, machine printed characters and special symbols and
codes. Optical character readers scan text character-by-character converts them into machine
readable codes and store it
8. Magnetic Ink Character Reader (MICR):
A magnetic character reader system for reading and identifying magnetized characters printed on a
document such as a check, in which analog waveforms derived from scanning the characters are
analyzed by rectifying and integrating the waveform to generate a value representing the gain of a
programmable gain amplifier for use in amplifying the waveform to compensate for variations in ink
intensity.
9. Bar Code Reader:
This is used to read different kind of vertical lines known as bars which signify some information.
10. Touch Pad

pg. 51
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Most laptop computers today have a touch pad pointing device. You move the on-screen cursor by
sliding your finger along the surface of the touch pad. The buttons are located below the pad, but
most touch pads allow you to perform “mouse clicks” by tapping on the pad itself.

Q3. What is CPU? Explain the three important sub units.

Ans:
Central Processing Unit:
The central processing unit (CPU) is the electronic brain of the computer. The CPU in a personal
computer is usually a single chip. It organizes and carries out instructions that come from either the
user or from the software. The processor is made up of many components, but two of them are
worth mentioning at this point. These are the arithmetic and logic unit and the control unit. The
control unit controls the electronic flow of information around the computer. The arithmetic logic unit,
ALU, is responsible for mathematical calculations and logical comparisons. The CPU has three
important sub units.
1) Arithmetic-Logic unit
2) Control Unit
3) Memory Unit

Arithmetic-Logic Unit (ALU): The ALU is an electronic circuit used to carry out the arithmetic
operations like addition, subtraction, multiplication and division. This unit carries out logical
operations like greater than, less than, equal to etc. It performs the operation on the data provided
by the input devices. A comparison operation allows a program to make decisions based
on its data input and results of the previous calculations. Logical operations can be used to
determine whether particular statement is TRUE or FALSE.

Control Unit: The control unit coordinates the activities of all the other units in the system. Its main
functions are to control the transfer of data and information between various units and to initiate
appropriate actions by the arithmetic-logic unit. Conceptually, the control unit fetches instructions
from the memory, decodes them, and directs them to various units to perform the specified tasks.

Memory Unit: The main memory is also called primary memory, is used to store data temporarily.
Although, the CPU is the brain behind all the operations in the computer, it needs to be supplied with
the data to be processed and the instructions to tell it what to do. Once the CPU has carried out an
instruction, it needs the result to be stored. This storage space is provided by the computer’s
memory.

Q4 What is output device? Explain any five output.

Ans:
Any peripheral device that converts the stored binary coded data into convenient external forms as
text and pictures are known as Output devices. Some of the most popularly used Output devices are
1. Monitor:

Monitors are the most crucial output devices of a computer. Without it, the computer is incomplete.
The monitor is a versatile device of the computer for the visual display of all types of information.

2. Printer

pg. 52
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
A printer is an electronic external output device of the computer used to print digital information on
paper as a hard copy. Since the main task of printers is to convert the data from soft copy to hard
copy on the computer.

3. Plotter

A plotter is an output device that prints graphics with high-quality images in many color formats. It is
analogous to a printer but has more advanced features.

4. Speaker

A speaker is a hardware output device connected with a computer to produce the audio. The sound
produced by computer speakers is made by a hardware component whose name is a sound
card that is pre-installed with the computer.

5. Head Phone

Headphones are also known as earphones. Headphones are output devices with which you can
listen to any sound signals transmitted by an electronic device. These are hardware devices that
produce audio privately after being connected to smartphones or computers through a wireless
connection.

6. Projector

The multimedia screen projector is also an output device. A multimedia projector is a miracle of
technology, and it is a beneficial and multi-functional device.

Q5. What is memory? Difference between Primary memory and secondary memory?

Ans:

Memory is very much like our brain as it is used to store data and instructions. Computer memory is
the storage space where data is to be processed, and instructions needed for processing are stored.
The memory is divided into a large number of smaller portions called the cell. Every cell/ location has
a unique address and a size.

Primary Memory is the main memory of the computer system. Accessing data from primary
memory is faster because it is an internal memory of the computer. The primary memory is most
volatile, meaning data in primary memory does not exist if it is not saved when a power failure
occurs.
The primary memory is a semiconductor memory. It is costlier compared with secondary memory.
The capacity of primary memory is very much limited and is always smaller compares to secondary
memory.

Two types of Primary Memory are:

 RAM

pg. 53
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
 ROM

Secondary Memory:
All secondary storage devices which are capable of storing high volume data is referred to
secondary memory. It’s slower than primary memory. However, it can save a substantial amount of
data, in the range of gigabytes to terabytes. This memory is also called backup storage or mass
storage media.

Q6. Difference between RAM and ROM?

Ans:

RAM, which stands for random access memory, and ROM, which stands for read-only memory, are
both present in your computer. RAM is volatile memory that temporarily stores the files you are
working on. ROM is non-volatile memory that permanently stores instructions for your computer.
Find out more about RAM.

Q7. Generation of a computer? Explain it.

Ans:
Every generation of computers is considered by major technological development that
fundamentally changed the way computers operate, resulting in increasingly smaller, cheaper, and
more powerful and more efficient and reliable devices.

1. First Generation (1940-1956): Vacuum Tubes


The first generation computers used vacuum tubes for circuitry and magnetic drums for memory,
and were often enormous, taking up entire rooms.

2. Second Generation (1956-1965): Transistors


Transistors replaced vacuum tubes and ushered in the second generation computer. Transistor is a
device composed of semiconductor material that amplifies a signal or opens or closes a circuit.
Invented in 1947 at Bell Labs, transistors have become the key ingredient of all digital circuits,
including computers. Today's latest microprocessor contains tens of millions of microscopic
transistors.

3. Third Generation (1965-1971): Integrated Circuits


The development of the integrated circuit was the hallmark of the third generation of computers.
Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically
increased the speed and efficiency of computers.

4. Fourth Generation (1971- Present): Microprocessors

The microprocessor brought the fourth generation of computers, as thousands of integrated circuits
we rebuilt onto a single silicon chip and this will contains a Central Processing Unit. In the world of
personal computers, the terms microprocessor and CPU are used interchangeably.
pg. 54
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
5 Fifth Generation Computer Fifth generation computing devices, based on artificial intelligence, are
still in development, though there are some applications, such as voice recognition, that are being
used today.

Q8 Classification of a computer? Explain it.

Ans:
Computers are classified according to their data processing speed, amount of data that they can
hold and price. Generally, a computer with high processing speed and large internal storage is called
a big computer Depending upon their speed and memory size, computers are classified into
following four main groups.
1. Supercomputer
2. Mainframe computer
3. Mini computer
4. Microcomputer

1. Supercomputer
Supercomputer is the most powerful and fastest, and also very expensive. It was developed in
1980s. It is used to process large amount of data and to solve the complicated scientific problems. It
can perform more than one trillions calculations per second.
2. Mainframe Computers
Mainframe computers are also large-scale computers but supercomputers are larger than
mainframe. These are also very expensive. The mainframe computer specially requires a very large
clean room with air-conditioner. This makes it very expensive to buy and operate. It can support a
large number of various equipment’s. It also has multiple processors.
3. Minicomputers
These are smaller in size, have lower processing speed and also have lower cost than mainframe.
These computers are known as minicomputers because of their small size as compared to other
computers at that time. The capabilities of a minicomputer are between mainframe and personal
computer.

4. Microcomputer
The microcomputers are also known as personal computers or simply PCs. Microprocessor is used
in this type of computer. These are very small in size and cost. The IBM’s first microcomputer was
designed in 1981 and was named as IBM-PC. After this many computer hardware companies copied
the design of IBM-PC. The term “PC-compatible” refers any personal computer based on the original
IBM personal computer design.

Q9. What is Cache memory?

Ans:

A cache memory and a main memory are used for a large scale integration circuit having a central
processing unit. Memory caching is a widespread technique used to improve data access speed in
computers and other digital systems. The speed at which processors can execute instructions has
typically outpaced the speed at which memory systems can supply the instructions and data to the
processors.

pg. 55
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Due to this discrepancy in the operating speeds of the processors and system memory, the system
memory architecture plays a major role in determining the actual performance of the system. Most
current memory hierarchies utilize cache memory in an attempt to minimize memory access
latencies. A cache is a small, fast memory that acts as a buffer between a device that uses a large
amount of memory and a large, slower main memory. The cache's purpose is to reduce average
memory-access time.

Q10. What is software? Explain types of software.

Ans:
Computer Software is a general term for organized collections of computer data and instructions,
often broken into two major categories:
1.System Software

2. Application software

3.Programming Software

1. System Software:
System software is used to run the computer hardware. It includes mainly the Operating system and
device drivers. System software refers to the files and programs that make up your computer's
operating system. System files include libraries of functions, system services, drivers for printers and
other hardware, system preferences, and other configuration files. The programs that are part of the
system software include assemblers, compilers, file management tools, system utilities, and
debuggers.
2. Application Software
It allows end users to accomplish one or more specific tasks. Typical applications include industrial
automation, business software, educational software, medical software, databases, and computer
games.
3. Programming Software
Programming software usually provides tools to assist a programmer in
writing computer programs and software using different programming
languages. Computer programmers are accountable for teaching computers
how to perform tasks and solve computational problems. They develop the
software that runs on computers using special software called a compiler. A
compiler is a computer program that decodes text written in a computer
language into another computer language.

Q11. What is operating System. Give some example of operating system.

Ans:
An operating system is a computer program that accomplishes the hardware and software
resources of a computer. At the foundation of all system software, the OS performs basic tasks such
as controlling and allocating memory, prioritizing system requests, controlling input and output
devices, facilitating networking, and managing files. It may also provide a graphical
user interface for higher level functions.
Examples of operating system are Windows Vista, WindowsXP, Windows98, WindowsME,
Windows95 etc, Linux family of operating systems such as, Obuntu, RedHat, Mandrake, SuSE,
Solaris, and UNIX.
pg. 56
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Q12. What is software Development?

Ans:
Software is a logical rather than a physical system element. Therefore software has characteristics
that are considerably different than those of hardware:

Analysis and Design


This section describes about software analysis and design. A more methodical approach to software
design is proposed by structured methods, these structured methods are sets of notations and
guidelines for software design. Budgen (1993) describes some of the most commonly used
methods such as structured design and structured systems analysis, he also described the Jackson
System Development and various approaches to object-oriented design.
Coding
Once the design is complete, most of the major decisions about the system have been made. The
goal of the coding phase is to translate the design of the system into code in a given programming
language. For a given design, the aim of this phase is to implement the design in the best possible
manner. The coding phase affects both testing and maintenance profoundly.
A well written code reduces the testing and maintenance effort. Since the testing and maintenance
cost of software are much higher than the coding cost, the goal of coding should be to reduce the
testing and maintenance effort.
Software Testing
Software Testing is the process of executing a program or system with the intent of finding errors.
Testing presents a stimulating variance for the software engineer. During earlier software
engineering activities, the engineer attempts to build software from an abstract concept to a tangible
product. Now comes testing. The engineer creates a series of test cases that are intended to
'demolish' the software that has been built. In fact, Testing is the one step in the software process
that could be viewed (psychologically, at least) as destructive rather than constructive.

Q13. Explain Software Application?

Ans:
Software applications can be neatly compartmentalized into different categories.

System software:
System software is a collection of programs written to service other programs. Some system
software processes complex information structures. Other systems applications process largely
indeterminate data. It is characterized by heavy interaction with hardware, heavy usage by multiple
users, concurrent operation that requires scheduling, resource sharing, and sophisticated process
management, complex data structures and multiple external interfaces.
Real time software:
Software that monitors / analyzes / controls real-world events as they occur is called real time.
Business Software: Business information processing is the largest single software application area.
Discrete systems like payroll, accounts receivable/payable have evolved into management
information systems (MIS) software that accesses one or more large databases containing
business information. Applications in this area restructure existing data in a way that facilitates
business operations or management decision making.

pg. 57
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Engineering and scientific software: Engineering and scientific software has been characterized
by “number crunching” algorithms. Applications range from astronomy to volcano logy, from
automotive stress analysis to space shuttle orbital dynamics and from molecular biology to
automated manufacturing.
Embedded software: Embedded software resides only in read-only memory and is used to control
products and systems for the consumer and industrial markets. Embedded software can provide
very limited and esoteric functions or provide significant function and control capability.
Personal computer software: Day to day useful applications like word processing, spreadsheets,
multimedia, database management, personal and business financial applications are some of the
common examples for personal computer software.
Web-based software: The web pages retrieved by a browser are software that incorporates
executable instructions and data. In essence, the network becomes a massive computer providing
an almost unlimited software resource that can be accessed by anyone with a modem.

Artificial Intelligence software: Artificial Intelligence software makes use of non numerical
algorithms to solve complex problems that are not amenable to computation or straightforward
analysis. Expert systems, also called knowledge based systems, pattern recognition, game playing
are representative examples of applications within this category.
Software crisis: The set of problems that are encountered in the development of computer software
is not limited to software that does not function properly rather the affliction encompasses problems
associated with how we develop software, how we support a growing volume of existing
software, and how we can expect to keep pace with a growing demand for more software.

Q14. Difference between simple batch system and multi-programmed batch system?

Ans:

Simple Batched Systems Multi-programmed Batched Systems

In this system, processes are processed one In this system, multiple processes can be
after another. executed at a time.

As one process gets processed at a time, it Processes are executed in a parallel fashion,
performs low. thus it is faster.

CPU remains in idle states for long times. CPU do not need to remain in idle state.

Example: CP/M, MS DOS, PC DOS etc. Example: Windows 95, MaxOS etc.

Q15.What is real time operating System?

Ans:

pg. 58
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
A real-time operating system (RTOS) is a special-purpose operating system used in computers that
has strict time constraints for any job to be performed. It is employed mostly in those systems in
which the results of the computations are used to influence a process while it is executing.
Whenever an event external to the computer occurs, it is communicated to the computer with the
help of some sensor used to monitor the event. The sensor produces the signal that is interpreted by
the operating system as an interrupt. On receiving an interrupt, the operating system invokes a
specific process or a set of processes to serve the interrupt.

Q16. Function of a operating system? Explain it any two.

Ans.

An operating system is a program that acts as a user-computer GUI (Graphical user interface). It
controls the execution of all types of applications.

The operating system performs the following functions in a device.

Instruction: The operating system establishes a mutual understanding between the various


instructions given by the user.

Input/output Management: What output will come from the input given by the user, the operating
system runs this program. This management involves coordinating various input and output devices.
It assigns the functions of those devices where one or more applications are executed.

Memory Management: The operating system handles the responsibility of storing any data, system
programs, and user programs in memory. This function of the operating system is called memory
management.

File Management: The operating system is helpful in making changes in the stored files and in
replacing them. It also plays an important role in transferring various files to a device.

Processor Management: The processor is the execution of a program that accomplishes the


specified work in that program. It can be defined as an execution unit where a program runs.

Job Priority: The work of job priority is creation and promotion. It determines what action should be
done first in a computer system.

Special Control Program: The operating systems make automatic changes to the task through
specific control programs. These programs are called Special Control Program.

Scheduling of resources and jobs: The operating system prepares the list of tasks to be
performed for the device of the computer system. The operating system decides which device to use
for which task. This action becomes complicated when multiple tasks are to be performed
simultaneously in a computer system. The scheduling programs of the operating system determine
the order in which tasks are completed. It performs these tasks based on the priority of performing
the tasks given by the user. It makes the tasks available based on the priority of the device.

pg. 59
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Security: Computer security is a very important aspect of any operating system. The reliability of an
operating system is determined by how much better security it provides us. Modern operating
systems use a firewall for security. A firewall is a security system that monitors every activity
happening in the computer and blocks that activity in case of any threat.

Monitoring activities: The operating system takes care of the activities of the computer system
during various processes. This aborts the program if there are errors. The operating system sends
instant messages to the user for any unexpected error in the input/output device. It also provides
security to the system when the operating system is used in systems operated by multiple users. So
that illegal users cannot get data from the system.

Q17. What is resource management?

Ans:
The resource management function of an operating system allocates computer resources such as
CPU time, main memory, secondary storage, and input and output devices for use. One can view
Operating Systems from two points of views: Resource manager and extended machines. Form
Resource manager point of view Operating Systems manage the different parts of the system
efficiently and from extended machines point of view Operating Systems provide a virtual machine to
users that is more convenient to use. The structurally Operating Systems can be design as a
monolithic system, a hierarchy of layers, a virtual machine system, a microkernel, or using the client-
server model. The basic concepts of Operating Systems are processes, memory management, I/O
management, the file systems, and security.

Q18 .What is distributed system?

Ans:
Distributed operating system is an operating system which manages a number of computers and
hardware devices which make up a Distributed System. Such an operating system has a number of
functions: it manages the communication between entities on the system, it imposes a security
policy on the users of the system, it manages a Distributed File System, it monitors problems with
hardware and software, it manages the connections between application programs and itself, and it
allocates resources such as file storage to the individual users of the system. A good distributed
operating system should give the user the impression that they are interacting with a single
computer. The major reasons for building distributed systems are:

Resource sharing: If a number of different sites are connected to one another, then a user at one
site may be able to use the resources available at the other.

Computation speed up: If a particular computation can be partitioned into a number of sub
computations that can run concurrently, then a distributed system may allow a user to distribute
computation among the various sites to run them concurrently.

Reliability: If one site fails in a distributed system, the remaining sites can potentially continue
operations.
Communication: There are many instances in which programs need to exchange data with one
another. Distributed data base system is an example of this.

pg. 60
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Q19. Difference between Work station OS and Server Operating System?

Ans:
Servers Operating Systems:
Servers are computers or groups of computers that provides services to other computers, connected
via network. Based on the requirements, there are various versions of server operating systems from
different vendors, starting with Microsoft’s Servers from Windows NT to Windows 2003, OS/2
servers, UNIX servers, Mac OS servers, and various flavors of Linux.

Workstation Operating Systems:


Workstations are more powerful versions of personal computers. Like desktop computers, often only
one person uses a particular workstation, and run a more powerful version of a desktop operating
system. Most of the times workstations are used as clients in a network environment. The popular
workstation operating systems are Windows NT Workstation, Windows 2000 Professional, OS/2
Clients, Mac OS, UNIX, Linux, etc.

Q20. Discuss the Data Transmission method?

Ans: There are three methods of data transfer. These methods are discussed below:

Simplex communication: In this type, data transfer occurs in only one direction, i.e., either from
source to destination or destination to source machines.
Half-duplex communication: In this type, data transfer occurs in either directions, but not
simultaneously.
Full-duplex communication: In this type, data transfer occurs in either direction simultaneously.
The protocol must also determine the number of logical channels per connection along with their
individual priorities. Many networks provide at least two logical connections per channel, one
for normal data, and one for urgent data.

Q21. What is network Topologies? How many types of topologies?

Ans:
Topology is a term used to define the way in which computers are connected in network. The
physical topology of a network denotes to the configuration of cables, computers, and other
peripherals. Physical topology should not be confused with logical topology which is the method
used to pass information between workstations. Each topology is suited to specific tasks and has its
own advantages and disadvantages. Many topologies do exist but most commonly there are 4 types
of basic topologies used for networking computers which are discussed below.
1) Bus topology

The type of network topology in which all of the nodes of the network are connected to a common
transmission medium which has exactly two endpoints is called the 'bus'. That is transmitted
between nodes in the network is transmitted over this common transmission medium and is able
to be received by all nodes in the network virtually simultaneously. It consists a single main cable
connects each node.
2) Ring topology

pg. 61
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
The type of network topology in which each of the nodes of the network is connected to two other
nodes in the network and with the first and last nodes being connected to each other, forming a ring.
3) Star topology
A star topology is designed with each node connected directly to a central network hub or
concentrator. Data on a star network passes through the hub or concentrator before continuing to its
destination. The hub or concentrator manages and controls all functions of the network.
4) Tree topology
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of
star-configured workstations connected to a linear bus .Tree topologies allow for the expansion of an
existing network, and enable schools to configure a network to meet their needs.

Q22. What is Computer network? How many types of Networks.

Ans:
A computer network is a collection of computers and a device interconnected by communications
channels that facilitate communications among users and allows users to share resources. Networks
may be classified according to a wide variety of characteristics. A computer network allows sharing
of resources and information among interconnected devices.
1) LAN (Local Area Network)
These are the networks that connect computers and resources together in a building or buildings
close together. The computers share resources such as hard-drives, printers, data, CPU power,
fax/modem, applications, etc.
2) MAN (Metropolitan Area Network)
These types of networks connect LANs together within a city. we see that telecommunication
services provide the connection (storm clouds) between networks. Local telecommunication services
provide the external connection for joining networks across cities. The main criteria for a MAN are
that the connection between the LANs is through a local exchange carrier (the local phone
company).
3) WAN (Wide Area Networks)
This communication system links LANs between cities, countries and continents. The main
difference between a MAN and a WAN is that the WAN uses Long Distance Carriers rather than
Local Exchange carriers.

Q23. Explain OSI Model?

Ans:

The Open Systems Interconnection (OSI) model describes how data is sent and received over a
network There are the seven OSI layers. Each layer has different functions. A list of seven layers are
given below:

1. Physical Layer
2. Data-Link Layer
3. Network Layer

pg. 62
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

1) Physical layer: This layer manages the functions required to carry a bit stream over a physical
medium. It deals with the electrical and mechanical specifications of the interface and transmission
medium. It defines the procedures and functions that physical devices and interfaces have to
perform for transmission to occur.

2) Data link layer: This layer transforms the physical layer, a raw transmission facility, to a reliable
link. It makes the physical layer appear error-free to the upper layer (to the Network layer). It is also
responsible for other functions such as framing, error control, flow control, physical addressing, and
access control mechanisms.
3) Network layer: This layer is responsible for the source-to-destination delivery of a packet,
possibly across multiple networks (links). The Data Link Layer oversees the delivery of the packet
between two systems on the same network (links);
4) Transport layer: This layer is accountable for process-to-process delivery of the entire message.
A process is an application program running on the host. The Network layer oversees the source-
todestination delivery of individual packets; it does not recognize the relationship between those
packets. It treats each packet independently, as though each piece belonged to a separate
message, whether or not it does, The Transport layer, also ensures that the whole message arrives
intact and in order, overseeing both error and flow control at the source to-destination level.
5) Session layer: This layer acts as the network dialog controller. It establishes, maintains, and
synchronizes the interaction among communicating systems.
6) Presentation layer: This layer is anxious with the syntax and semantics of the information
exchanged between two systems. The specific responsibilities of this layer include Translation,
Encryption, and Compression.
7) Application layer: This layer enables the user, whether human or software to access the
network. It provides user interfaces and support for services such as electronic mail, remote file
access and transfer, shared database management, and other types of distributed information
services. Specific services offered by the Application layer include: Provision of Network Virtual
terminals, File transfer, access, and management, mail services, and Directory Services.

Q24. What is Transmission Control Protocol/Internet Protocol Model?

Ans:
TCP/IP (Transmission Control Protocol/Internet Protocol) is the simple communication language or
protocol of the Internet. It can also be used as a communications protocol in a private network (either
an intranet or an extranet). When you are set up with direct access to the Internet, your computer is
provided with a copy of the TCP/IP program just as every other computer that you may send
messages to or get information from also has a copy of TCP/IP. Most of the networking software,

pg. 63
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
TCP/IP is modeled in layers. This layered representation leads to the term protocol stack, which
denotes to the stack of layers in the protocol suite.

Q25. What is Web browser?

Ans:
A Web browser is referred as an application that provides access to a Web server. Depending on
the implementation, browser capabilities and thus structures vary. A Web browser, at a minimum,
consists of a Hypertext Markup Language (HTML) interpreter and HTTP client that are used to
retrieve HTML Web pages. Besides this basic requirement, many browsers also support FTP, NNTP
(Network News Transfer Protocol), e-mail (POP and SMTP clients), among other features, with an
easy-to-manage graphical interface. The Web browser is the client component. Examples of
Web browsers include Mozilla Firefox, Netscape Navigator, and Microsoft Internet Explorer.

Q26. What is web server?

Ans:
Web servers are responsible for servicing requests for information from Web browsers. The
information can be a file retrieved from the server's local disk, or it can be generated by a program
called by the server to perform a specific application function. There are a number of public-domain
Web
servers available for a variety of platforms, including most UNIX variants, as well as personal
computer environments such as Microsoft Windows. Some well-known public domain servers are
CERN, NCSA httpd, and Apache servers.

Q27. What is Hypertext Transfer Protocol (HTTP)?

Ans: The Hypertext Transfer Protocol is a protocol designed to allow the transfer of Hypertext
Markup Language (HTML) documents. HTML is a tag language used to create hypertext documents.
Hypertext documents include links to other documents that contain additional information about the
highlighted term or subject. Such documents can contain other elements apart from text, such as
graphic images, audio and video clips, Java applets, and even virtual reality worlds (which are
described in VRML, a scripting language for that kind of elements).

Q28 What is WWW.

Ans: The World Wide Web is an architectural frame work for accessing linked documents spread out
over millions of machines all over the internet. Its popularity stems from the fact that:
It has colorful graphical interface that is easy to users to use.
It provides an enormous wealth of information on almost every conceivable subject.

Q29. What is DNS?

Ans:

DNS:

pg. 64
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
An application layer protocol defines how the application processes running on different systems,
pass the messages to each other.

o DNS stands for Domain Name System.


o DNS is a directory service that provides a mapping between the name of a host on the
network and its numerical address.
o DNS is required for the functioning of the internet.
o Each node in a tree has a domain name, and a full domain name is a sequence of symbols
specified by dots.
o DNS is a service that translates the domain name into IP addresses. This allows the users of
networks to utilize user-friendly names when looking for other hosts instead of remembering
the IP addresses.
o For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50, most
people would reach this site by specifying ftp.EduSoft.com. Therefore, the domain name is
more reliable than IP address.

Q30. What is FTP?

Ans:

FTP
o FTP stands for File transfer protocol.
o FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from
one host to another.
o It is mainly used for transferring the web page files from their creator to the computer that
acts as a server for other computers on the internet.
o It is also used for downloading the files to computer from other servers.

Q31. What is IP? Difference between IPv4 vs IPv6.

Ans: An IP stands for internet protocol. An IP address is assigned to each device connected to a
network. Each device uses an IP address for communication. It also behaves as an identifier as this
address is used to identify the device on a network. It defines the technical format of the packets.
Mainly, both the networks, i.e., IP and TCP, are combined together, so together, they are referred to
as a TCP/IP. It creates a virtual connection between the source and the destination.

pg. 65
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
We can also define an IP address as a numeric address assigned to each device on a network. An
IP address is assigned to each device so that the device on a network can be identified uniquely. To
facilitate the routing of packets, TCP/IP protocol uses a 32-bit logical address known as
IPv4(Internet Protocol version 4).

What is IPv4?

IPv4 is a version 4 of IP. It is a current version and the most commonly used IP address. It is a 32-bit
address written in four numbers separated by 'dot', i.e., periods. This address is unique for each
device.

For example, 66.94.29.13

The above example represents the IP address in which each group of numbers separated by
periods is called an Octet. Each number in an octet is in the range from 0-255. This address can
produce 4,294,967,296 possible unique addresses.

What is IPv6?

IPv4 produces 4 billion addresses, and the developers think that these addresses are enough, but
they were wrong. IPv6 is the next generation of IP addresses. The main difference between IPv4
and IPv6 is the address size of IP addresses. The IPv4 is a 32-bit address, whereas IPv6 is a 128-bit
hexadecimal address. IPv6 provides a large address space, and it contains a simple header as
compared to IPv4.

It provides transition strategies that convert IPv4 into IPv6, and these strategies are as follows:

o Dual stacking: It allows us to have both the versions, i.e., IPv4 and IPv6, on the same device.
o Tunneling: In this approach, all the users have IPv6 communicates with an IPv4 network to
reach IPv6.
o Network Address Translation: The translation allows the communication between the hosts
having a different version of IP.

Q32. Difference between TCP and UDP?

Ans:

Full form It stands for Transmission Control Protocol. It stands for User Datagram Protocol.
Type of It is a connection-oriented protocol, which It is a connectionless protocol, which
connection means that the connection needs to be means that it sends the data without
established before the data is transmitted over checking whether the system is ready
the network. to receive or not.

pg. 66
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Reliable TCP is a reliable protocol as it provides UDP is an unreliable protocol as it does
assurance for the delivery of data packets. not take the guarantee for the delivery
of packets.
Speed TCP is slower than UDP as it performs error UDP is faster than TCP as it does not
checking, flow control, and provides assurance guarantee the delivery of data packets.
for the delivery of
Header size The size of TCP is 20 bytes. The size of the UDP is 8 bytes.
Acknowledgment TCP uses the three-way-handshake concept. In UDP does not wait for any
this concept, if the sender receives the ACK, acknowledgment; it just sends the data.
then the sender will send the data. TCP also
has the ability to resend the lost data.
Flow control It follows the flow control mechanism in which This protocol follows no such
mechanism too many packets cannot be sent to the receiver mechanism.
at the same time.

Q33. What is NOS?

Ans:

NOS, or Network Operating System, is specialized software whose main task is to provide network
connectivity to a computer in order for it to be able to communicate with other computers and
connected devices.

Q34. What is SMTP?

Ans:

SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all Internal mail, and
provides the necessary mail delivery services on the TCP/IP protocol stack.

Q35 What is the difference between Hub, Switch, and Router?


Ans:
Hub Switch Router

Hub is least expensive, least Switches work The router is smartest and most
intelligent and least complicated of similarly like Hubs complicated out of these three. It
the three. but in a more comes in all shapes and sizes.
It broadcast all data to every port efficient manner. Routers are similar like little computers
which may cause serious security It creates dedicated for routing network traffic
and reliability concern connections
dynamically and
provides
information only to
the requesting port

pg. 67
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Hub Switch Router

In a Network, Hub is a common Switch is a device Routers are located at gateway and
connection point for devices in a network which forwards data packets
connected to the network. Hub forwards packets
contains multiple ports and is used in a network
to connect segments of LAN

Q36. What is HTTP and what port does it use?


Ans: 
HTTP is HyperText Transfer Protocol and it is responsible for web content. Many web pages are
using HTTP to transmit the web content and allow the display and navigation of HyperText.
It is the primary protocol and port used here is TCP port 80.

Q37. What is HTTPs and what port does it use?


Ans: 
HTTPS is a Secure HTTP. HTTPS is used for secure communication over a computer network.
HTTPS provides authentication of websites which prevents unwanted attacks.
In a bi-directional communication, HTTPS protocol encrypts the communication so that tampering of
the data gets avoided. With the help of a SSL certificate, it verifies if the requested server connection
is a valid connection or not. HTTPS uses TCP with port 443.

Q38. What are IP classes and how can you identify the IP class of given a IP address?
Ans: 
An IP address has 4 sets (octets) of numbers each with a value up to 255.
For Example, the range of the home or commercial connection started primarily between 190 x or 10
x. IP classes are differentiated based on the number of hosts it supports on a single network. If IP
classes support more networks then very few IP addresses are available for each network.
There are three types of IP classes and are based on the first octet of IP addresses which are
classified as Class A, B or C. If the first octet begins with 0 bit then it is of type Class A.

Class A type has a range up to 127.x.x.x (except 127.0.0.1). If it starts with bits 10 then it belongs to
Class B. Class B having a range from 128.x to 191.x.  IP class belongs to Class C if octet starts with
bits 110. Class C has a range from 192.x to 223.x.

Q39. What is the difference between Internet, Intranet, and Extranet?


Ans: 
The terminologies Internet, Intranet, and Extranet are used to define how the applications in the
network can be accessed. They use similar TCP/IP technology but differ in terms of access levels for
each user inside the network and outside the network.
Internet: Applications are accessed by anyone from any location using the web.
Intranet: It allows limited access to the users in the same organization.
Extranet: External users are allowed or provided with access to use the network application of the
organization.

pg. 68
Solve Assignment Mob No. 7290886986 Email Id - [email protected]
Q40. What is Flash Memory?

Ans:
Flash Memory
Flash memory devices are different from EEPROM devices in that electrical erasure involves huge
sections of, or the whole contents of, a flash memory device. A flash memory cell includes a field
effect transistor (FET) having a selection gate, a floating gate, a source and a drain. Data is stored in
the flash memory cell by variations in the amount of charge stored in the floating gate, which causes
a variation in a threshold voltage (Vt) of the flash memory cell. The data stored in the flash memory
cell is read out by applying a selection voltage to a word line connected to the selection gate.
The flash memory electrically deletes the data using a same method as that of an electrically
erasable and programmable ROM (EEPROM), and the memory may be entirely deleted in one
second or several seconds. The data stored in the flash memory is deleted throughout the chip in a
block unit, but it is impossible to delete the data in a byte unit. The flash memory stores a correctable
control program, which is used instead of an auxiliary memory.
The flash memory is distributed into a NAND flash memory and a NOR type flash memory. The NOR
type flash memory uses an interface method as an SRAM or a ROM to easily construct a circuit with
a processor. The NOR flash memory employs memory cell arrays that suppress the parasitic
resistance. The NOR flash memory lowers the resistance by providing one through-hole to bit line for
two cells connected in parallel.

pg. 69
Solve Assignment Mob No. 7290886986 Email Id - [email protected]

You might also like