0% found this document useful (0 votes)
105 views32 pages

CS1202-FOC Question Bank

The document provides information about computer basics and fundamentals of computing from a question bank. It defines computers and their basic operations. It describes different types of computer systems based on size and performance. It discusses input and output units and their functions. It defines concepts like instructions, memory, volatile and non-volatile memory, primary and secondary memory. It explains number systems like binary, decimal, octal and hexadecimal. It provides examples of converting between different number systems. It defines algorithms, decision tables, flowcharts and their advantages. It describes computer architecture, processor to memory communication, interrupt structures and bus architecture of personal computers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views32 pages

CS1202-FOC Question Bank

The document provides information about computer basics and fundamentals of computing from a question bank. It defines computers and their basic operations. It describes different types of computer systems based on size and performance. It discusses input and output units and their functions. It defines concepts like instructions, memory, volatile and non-volatile memory, primary and secondary memory. It explains number systems like binary, decimal, octal and hexadecimal. It provides examples of converting between different number systems. It defines algorithms, decision tables, flowcharts and their advantages. It describes computer architecture, processor to memory communication, interrupt structures and bus architecture of personal computers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

CS1202-FUNDAMENTALS OF COMPUTING

QUESTION BANK

UNIT I
COMPUTER BASICS

1.Define computers?
A computer is a programmable machine or device that performs pre-defined or programmed
computations or controls operations that are expressible in numerical or logical terms at high
speed and with great accuracy.

2. What are the basic ope rations of Computer?


1) It accepts data or instructions by way of input.
2) It stores data.
3) It can process data as required by the user.
4) It gives results in the form of output.
5) It controls all operations inside a computer.

3. How will you classify computer systems?


Based on physical size, performance and application areas, we can generally divide computers
into four major categories:
1. Micro compute r
2. Mini Computer
3. Mainframe computer and
4. Super Computer

4. What are the functions in the input unit?


An input device is a device that is used to input data or information into a computer. Some
examples of input devices include:
· Keyboards.
· Computer mice.
· Light Pen.
· Digitizer.
· Touchpad.
· Trackball.
· Image scanner.
· Webcam.

5. What are the functions in the output unit?


In computers, a unit which delivers information from the computer to an external device or from
internal storage to external storage.
· Speakers.
· Printer.
· Headphone.
· Monitor (or) Visual Display Unit (VDU).
· Plotter.
6. What is an instruction?
An instruction is a basic command. The term instruction is often used to describe the most
rudimentary programming commands. For example, a computer's instruction set is the list of all
the basic commands in the computer's machine language.

7. Define memory?
Computer memory refers to devices that are used to store data or programs (sequences of
instructions) on a temporary or permanent basis for use in an electronic digital computer.

8. What is a volatile and non-volatile memory?


Volatile memory: also known as volatile storage is computer memory that requires power to
maintain the stored information, unlike non- volatile memory which does not require a
maintained power supply. It has been less popularly known as temporary memory.
Non-volatile memory: nonvolatile memory, NVM or non-volatile storage, is computer memory
that can retain the stored information even when not powered.
Examples of non-volatile me mory
· read-only memory
· flash memory
· most types of magnetic computer storage devices (e.g.hard / floppy disks & magnetic tape)
· optical discs
· Early computer storage methods such as paper tape and punch cards.
Non-volatile memory is for long-term persistent storage. The most widely used form o f primary
storage today is a volatile form of random access memory (RAM), meaning that when the
computer is shut down, anything contained in RAM is lost.

9. What is a primary me mory?


The primary memory or the main memory is part of the main computer syste m. The processor or
the CPU directly stores and retrieves information from it. This memory is accessed by CPU, in
random fashion. That means any location of this memory can be accessed by the CPU to either
read information from it, or to store information in it.
Types of Primary Memory:
· RAM is RWM (Read Write Memory), the CPU can write and read information from any
primary memory location implemented using RAM.
· ROM stands for Read Only Memory.

10. What is a secondary me mory?


The secondary memory is much slower and also less costly. It stores the data permanently unless
it is erased.
Examples:
Floppy disk storage media
Hard disk CD / DVD Pen drive
Memory chips etc.,

11.Define (1) Nibble (2) Bit (3) Byte?


(1) In computers and digital technology, a nibble (pronounced NIHB-uhl; sometimes spelled
nybble) is four binary digits or half of an eight-bit byte. A nibble can be conveniently
represented by one hexadecimal digit.

12. What is meant by conversion in numbe r system?


Conversion is the process of converting from one number system to another number system.
Example:
· Decimal to Octal.
· Hexadecimal to Decimal

13. What is a binary numbe r system?


The binary numeral system or base-2 number system represents numeric values using two
symbols, 0 and 1. More specifically, the usual base-2 system is a positional notation with a radix
of 2.
14. What is a decimal numbe r system?
The decimal numeral system (also called base ten or occasionally denary) has ten as its base. It is
the most widely used numeral base.
15. What is an octal number system?
The octal numeral system, or oct for short, is the base-8 number system, and uses the
digits 0 to 7. Numerals can be made from binary numerals by grouping consecutive binary digits
into groups of three (starting from the right).
For example:

112 in octal is equal to 64+8+2 = 74 in decimal. Octal is sometimes used in computing


instead of hexadecimal.

16. What is a hexadecimal numbe r system?


In mathematics and computer science, hexadecimal (also base-16, hexa, or hex) is a numeral
system with a radix, or base, of 16. It uses sixteen distinct symbols, most often the symbols 0–9
to represent values zero to nine, and A, B, C, D, E, F (or a through f) to represent values ten to
fifteen.
Its primary use is as a human-friendly representation of binary coded values, so it is often used in
digital electronics and computer engineering. Since each hexadecimal digit represents four
binary digits (bits)—also called a nibble—it is a compact and easily translated shorthand to
express values in base two.

17. Write the binary and octal equivalent of hexadecimal numbe r 7BD?
Binary Equivalent of 7BD = (0111 1011 1101)2
Octal Equivalent of 7BD = (011 110 111 101) = (3675)8

18. Conve rt binary numbe r 100110 into its octal equivalent?


Octal equivalent of 100110 = (100 110) = (46)8

19. Find the decimal equivalent of hexadecimal numbe r 4D.C8


4D.C8 = 4 X 161 + 13 X 162 + 12 X 16-1 + 8 X 16-2
= 64 + 13 +0.75 + 0.03125
= (77.78)2
20. Conve rt hexadecimal numbe r into binary equivalent of EBC
Binary equivalent of EBC = (1110 1011 1100)2

21. What is Algorithm?


Algorithm means the logic of a program. It is a step by step description of a program.

22. What is a decision table?


A decision table is a table containing the selection of condition to be tested and how those
conditions should be nested to arrive at the proper action.

23. Define flow chart.


Flow chart is the pictorial representation of a program.

24. List out the any three advantages of flowchart.


· Better communication
· Effective synthesis
· Effective analysis
25. List out the characteristics of a program.
· Clarity
· Integrity
· Simplicity
· Efficiency
· Generality
26.Define computer architecture.
Computer architecture can be defined as a set of rules and methods that describe the
functionality, management and implementation of computers. To be precise, it is nothing but
rules by which a system performs and operates.

27.What is the interconnection of units?


A bus is a common pathway through which information flows from one computer
component to another. This pathway is used for communication purpose and it is established
between two or more computer components.
A computer bus can be divided into two types: Internal Bus and External Bus.
Internal Bus: Internal bus is used to connect the internal components of computer system such as
processor, RAM, chipset, hard disk. It is also called the System Bus.
External Bus: External bus is used to connect the external components of computer system such
as monitor, keyword, printer. The external bus allows various devices to be attached to the
computer. It allows for the expansion of computer’s capabilities. It is generally slower than the
system bus. It is also referred to as the Expansion Bus.
A system bus or expansion bus comprise of three kinds of buses: data bus, address bus and
control bus.
28.Define processor to memory communication.

The Central Processing Unit(CPU) has a Memory Data Register (MDR) and a Memory
Address Register (MAR). The Memory Data Register (MDR) keeps the data which is transferred
between the Memoryand the CPU. The Program Counter (PC) is a special register in the CPU
which always keeps the address of the next instruction to be executed. The Arithmetic and Logic
unit of CPU places the address of the memory to be fetched, into the Memory Address Register.
29. Define interrupt structures.
Interrupt structure refers to the precedence of interrupts. Hardware events that cause
interrupts are assigned CPU interrupt levels. The CPU can disable interrupts of a certain level
and below, thus allowing an important interrupt to preempt an interrupt of lower priority, but not
vice-versa.
30.Define bus architecture of pe rsonal computers.
In computer architecture, a bus (shortened form of the Latin omnibus, and historically also called
data highway or databus) is a communication system that transfers data between
components inside a computer, or between computers. This expression covers all related
hardware components (wire, optical fiber, etc.)

PART-B (UNIT-I)
1.Explain about Data representation?
2.Explain about representation of numbe rs?
3.Explain about decimal to binary conversion with example?
4.Discuss about error detecting codes?
5.briefly explain about interconnectio of units?
6.explain about processor to me mory communication?
7.Explain about interrupt structures?
8.Explain about bus architecture of pe rsonal computers?
9.Explain about multi programming?
UNIT-2
DATABASE

PART A
1. Define database
A database is an organized collection of data, generally stored and accessed electronically
from a computer system. It supports the storage and manipulation of data.In other words,
databases are used by an organization as a method of storing, managing and retrieving
information.
2. What are the two characteristics of database?
● Provides security and removes redundancy
● Self-describing nature of a database system
● Insulation between programs and data abstraction
● Support of multiple views of the data
3. What are the types of database?
● Centralized database
● Distributed database
● Personal database
● End-user database
● Commercial database
● NoSQL database etc.,
4. What are advantages of databse?
● Reduced data redundancy
● Reduced updating errors and increased consistency
● Greater data integrity and independence from application programs
● Improved data access to users through the use of host and query languages
5. What are the disadvantages of database?
● Although databases allow businesses to store and access data efficiently, they also have
certain disadvantages
● Complexity
● Cost and complexity
6. Give some examples for database
1. Oracle Database
2. Sybase
3. MySQL
7. Define Conceptual Data model
A Conceptual Data Model is an organized view of database concepts and their relationships.
This model describes the database at a very high level and is useful to understand the needs or
requirements of the database. The purpose of creating a conceptual data model is to establish
entities, their attributes, and relationships.
8.What are the components of conceptual data model
● Entity
● Attributes
● Relationship.
9. Name some datamodels in dbms
1. Hierarchical Model
2. Network Model
3. Entity-Relationship Model
4. Relational Model
5. Object-Oriented Data Model
6. Object-Relational Data Model
10. Define ER model
Entity-Relationship Model or simply ER Model is a high- level data model diagram. In this
model, we represent the real- world problem in the pictorial form to make it easy for the
stakeholders to understand. We use the ER diagram as a visual tool to represent an ER Model.
11. Define Relational model
Relational Model is the most widely used model. In this model, the data is maintained in the
form of a two-dimensional table. All the information is stored in the form of row and columns.
The basic structure of a relational model is tables. So, the tables are also called relations in the
relational model
12. Define DBMS
A database management system (DBMS) is a software package designed to define, manipulate,
retrieve and manage data in a database. A DBMS generally manipulates the data itself, the data
format, field names, record structure, and file structure. It also defines rules to validate and
manipulate this data.In other words, a database management system is a combination of
hardware and software that can be used to set up and monitor a database and can manage the
updation and retrieval of the database that has been stored in it.
13. What is the purpose of DBMS
The purpose of DBMS is to transform the following −
● Data into information.
● Information into knowledge.
● Knowledge to the action.
14. What are the different types of DBMS languages
● Data Definition Language (DDL) − Create, Drop, Truncate, Rename.
● Data Manipulation language (DML) − Select, Insert, Delete, Update.
● Data Control Language (DCL) − Revoke, Grant.
● Transaction Control Language (TCL) − Rollback, Commit.
15. Define DDL
o DDL stands for Data Definition Language. It is used to define database structure or
pattern.
o It is used to create schema, tables, indexes, constraints, etc. in the database.
o Using the DDL statements, you can create the skeleton of the database.
o Data definition language is used to store the information of metadata like the number of
tables and schemas, their names, indexes, columns in each table, constraints, e tc.
16. What are the types of DBMS architecture
There are three types of DBMS Architecture. They are
1-Tier Architecture 2-Tier Architecture 3-Tier Architecture

17. Define DCL


o DCL stands for Data Control Language. It is used to retrieve the stored or saved data.
o The DCL execution is transactional. It also has rollback parameters.
Here are some tasks that come under DCL:
o Grant: It is used to give user access privileges to a database.
o Revoke: It is used to take back permissions from the user.
18. Define TCL
Transmission Control Language is used to run the changes made by the DML statement.
TCL can be grouped into a logical transaction.
Here are some tasks that come under TCL:
o Commit: It is used to save the transaction on the database.
o Rollback: It is used to restore the database to original since the last Commit.
19. Define Relational DBMS
Relational DBMSdefines database relationships in the form of tables, also known as relations.
Unlike network DBMS, RDBMS does not support many to many relationships. Relational
DBMS usually have pre-defined data types that they can support. This is the most popular
DBMS type in the market. Examples of relational database management systems include
MySQL, Oracle, and Microsoft SQL Server database.
20. What are the advantages of ER model
● Simple: Conceptually ER Model is very easy to build. If we know the relationship
between the attributes and the entities we can easily build the ER Diagram for the model.
● Effective Communication Tool: This model is used widely by the database designers for
communicating their ideas.
● Easy Conve rsion to any Model: This model maps well to the relational model and can
be easily converted relational model by converting the ER model to the table. This model can
also be converted to any other model like network model, hierarchical model etc.
21. What are the disadvantages of ER model
● No industry standard for notation: There is no industry standard for developing an ER
model. So one developer might use notations which are not understood by other developers.
● Hidden information: Some information might be lost or hidden in the ER model. As it is
a high- level view so there are chances that some details of information might be hidden.
22. What are the Characteristics of Conceptual data model
● Offers Organization-wide coverage of the business concepts.
● This type of Data Models are designed and developed for a business audience.
● The conceptual model is developed independently of hardware specifications like data
storage capacity, location or software specifications like DBMS vendor and technology. The
focus is to represent data as a user will see it in the ―real world.‖
23. How pointers are used in hierarchial model
Pointers are used to link the parent node with the child node and are used to navigate between the
stored data. Example: In the above example the 'shoes' node points to the two other nodes
'women shoes' node and 'men's shoes' node.
24. What are ACID properties
Atomicity(accuracy),Consistency( Completeness), Isolation, and Durability

25. What are the applications of DBMS

PART B(UNIT II)


1. What are the Characteristics of DBMS?
2. Explain Conceptual data model
3. Explain E-R model
4. Explain the different types of DBMS language
5. Explain DBMS Architecture
6. State briefly about database applications
7. Explain DDL commands
8. Explain DML commands
9. Explain the properties of DBMS
10. Explain representation of data model
UNIT III
PROGRAMMING LANGUAGES AND OPERATING SYSTEMS

1.What is a Programming Language?


A programming language is a computer language that is used by programmers
(developers) to communicate with compute rs. It is a set of instructions written in any specific
language ( C, C++, Java, Python) to perform a specific task.
2.What are all the types of programming language?
1.Low- level programming language
i. Machine Language
ii. Assembly Language
2. High- level programming language
3. Middle-level programming language
3.What is High-level programming language?
High- level programming language (HLL) is designed for developing user-friendly
software programs and we bsites. This programming language requires a compiler or
interpreter to translate the program into machine language (e xecute the program).
4. What are all the types of High level programming language?
i. Procedural Oriented programming language
ii.Object-Oriented Programming (OOP) language
iii. Natural language
5.What is meant by compiler?
A compiler is a special program that processes statements written in a particular
programming language and turns them into machine language or "code" that a
computer's processor uses.

6.What is meant by an ope rating system?


Operating System is a program that acts as an Interface between the system hardware and the
user making the tasks easier. It is important software which runs on a computer and controls the
set of instructions and wisely utilizes each part of the Co mputer.
7.What is need for an operating system?
1. Interface between the user and the computer
2. Booting
3. Managing the input/output devices
4. Multitasking
5. Platform for other application software
6. Manages the memory
7. Manages the system files8. Provides Security
8.What are all the Types of Ope rating System?

9.Define Batch Operating System.


● Firstly, user prepares his job using punch cards.
● Then, he submits the job to the computer operator.
● Operator collects the jobs from different users and sort the jobs into batches with similar
needs.
● Then, operator submits the batches to the processor one by one.
● All the jobs of one batch are executed together.

10.What are all the Advantages of Batch Ope rating System.


● It saves the time that was being wasted earlier for each individual process in context
switching from one environment to another environment.
● No manual intervention is needed.

11.What are all the Disadvantages of Batch Operating System.

● All the jobs of a batch are executed sequentially one after the other.
● The output is obtained only after all the jobs are executed.
● Thus, priority can not be implemented if a certain job has to be executed on an urgent
basis.
● The jobs of a particular batch might take long time for their execution.
● This might lead to starvation to other jobs in other batches.

12.Define Multiprogramming OS :.
The OS could pick and start the execution of one of the jobs in memory, whenever the jobs does
not need CPU that means the job is working with I/O at that time the CPU is idle at that time the
OS switches to another job in memory and CPU executes a portion of it till the job issues a
request for I/O and so on.

13.What are all the advantages of multiprogramming operating system?


The advantages of multiprogramming operating system are as follows −
● CPU utilization is high because the CPU is never goes to idle state.
● Memory utilization is efficient.
● CPU throughput is high and also supports multiple interactive user terminals.
14.What are all the dis advantages of multiprogramming operating system?
The disadvantages of multiprogramming operating system are as follows −
● CPU scheduling is compulsory because lots of jobs are ready to run on CPU
simultaneously.
● User is not able to interact with jobs when it is executing.
● Programmers also cannot modify a program that is being executed.

15.Define Time-Sharing Operating Systems.


It is one of the important type of operating system.
Time-sharing enables many people, located at various terminals, to use a particular computer
system at the same time. Multitasking or Time-Sharing Systems is a logical extension of
multiprogramming. Processor’s time is shared among multiple users simultaneously is termed as
time-sharing.
16.What are all the Advantages of Time Sharing operating systems are ?
● It provides the advantage of quick response.
● This type of operating system avoids duplication of software.
● It reduces CPU idle time.
17.What are all the Disadvantages of Time-sharing operating systems are ?
● Time sharing has problem of reliability.
● Question of security and integrity of user programs and data can be raised.
● Problem of data communication occurs.
18.What do you mean by Real-Time Operating System?
A real-time operating system (RTOS) is a special-purpose operating system used in computers
that has strict time constraints for any job to be performed. It is employed mostly in those
systems in which the results of the computations are used to influence a process while it is
executing.
19.What are all the Applications of Real-time operating system (RTOS)?
o Real-time running structures are used inside the Radar gadget.
o Real-time running structures are utilized in Missile guidance.
o Real-time running structures are utilized in on line inventory trading.
o Real-time running structures are used inside the cell phone switching gadget.
o Real-time running structures are utilized by Air site visitors to manipulate structures.
o Real-time running structures are used in Medical Imaging Systems.

20.What are all the Advantages of Real-time operating system:?


The benefits of real- time operating system are as follows- :
o Easy to layout, develop and execute real-time applications under the real- time operating
system.
o The real-time working structures are extra compact, so those structures require much less
memory space.
o In a Real- time operating system, the maximum utilization of devices and systems.
o Focus on running applications and less importance to applications that are in the queue.
o Since the size of programs is small, RTOS can also be embedded systems like in
transport and others.
o These types of systems are error-free.
o Memory allocation is best managed in these types of systems.

21.What are all the Disadvantages of Real-time ope rating system?


The disadvantages of real-time operating systems are as follows-
o Real-time operating systems have complicated layout principles and are very costly to
develop.
o Real-time operating systems are very complex and can consume critical CPU cycles.

22.Define UNIX Operating system.


The Unix operating system is a set of programs that act as a link between the computer and the
user.
The computer programs that allocate the system resources and coordinate all the details of the
computer's internals is called the operating system or the kernel.
Users communicate with the kernel through a program known as the shell. The shell is a
command line interpreter; it translates commands entered by the user and converts them into a
language that is understood by the kernel.
23.Draw block diagram of a Unix system?

24.Define Kernel.
The kernel is the heart of the operating system. It interacts with the hardware and most of the
tasks like memory management, task scheduling and file management.

25.Define Shell.
The shell is the utility that processes your requests. When you type in a command at your
terminal, the shell interprets the command and calls the program that you want. The shell uses
standard syntax for all commands. C Shell, Bourne Shell and Korn Shell are the most famous
shells which are available with most of the Unix variants.

26.Define Commands and Utilities .


There are various commands and utilities which you can make use of in your day to day
activities. cp, mv, cat and grep, etc. are few examples of commands and utilities. There are over
250 standard commands plus numerous others provided through 3rd party software. All the
commands come along with various options.

27.Define Files and Directories.


All the data of Unix is organized into files. All files are then organized into directories.
These directories are further organized into a tree- like structure called the filesystem.
PART-B(UNIT-III)

1.Expalin about programming languages?


2.Explain about assembly language?
3.Briefly explain about highe r level programming languages?
4.Discuss about Operating systems and its types?
5.Explain about multi programming operating systems?
6.Explain about time sharing operating system?
7. Explain about online and real time operating system?
8.Explain about a pe rsonal computer operating system?
9.Expalin about the Unix operating system?
UNIT IV
WEB AND SCRIPTING ESSENTIALS
1.Define A communication protocol.
It is a system of rules that allows two or more entities of a communications system to
transmit information via any kind of variation of a physical quantity. The protocol defines the
rules, syntax, semantics and synchronization of communication and possible error recovery
methods. Protocols may be implemented by hardware, software, or a combination of both.[1]
2. List out the types of protocols in communication.
1. Transmission Control Protocol (TCP)
2. Internet Protocol (IP)
3. User Datagram Protocol (UDP)
4. Post office Protocol (POP)
5. Simple mail transport Protocol (SMTP)
6. File Transfer Protocol (FTP)
7. Hyper Text Transfer Protocol (HTTP)
8. Hyper Text Transfer Protocol Secure (HTTPS)
9. Telnet
10. Gopher
3.Define Trans mission Control Protocol (TCP).
TCP is a popular communication protocol which is used for communicating over a network. It
divides any message into series of packets that are sent from source to destination and there it
gets reassembled at the destination.
4.Define Internet Protocol (IP) .
IP is designed explicitly as addressing protocol. It is mostly used with TCP. The IP
addresses in packets help in routing them through different nodes in a network until it reaches the
destination system. TCP/IP is the most popular protocol connecting the networks.
5.Define User Datagram Protocol (UDP).
UDP is a substitute communication protocol to Transmission Control Protocol implemented
primarily for creating loss-tolerating and low-latency linking between different applications.
Define Post office Protocol (POP): POP3 is designed for receiving incoming E- mails.

6.Define Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute
outgoing E-Mail.

7.Define File Transfer Protocol (FTP).


FTP allows users to transfer files from one machine to another. Types of files may include
program files, multimedia files, text files, and documents, etc.
8.Define Hyper Text Transfer Protocol (HTTP).
HTTP is designed for transferring a hypertext among two or more systems. HTML tags are
used for creating links. These links may be in any form like text or images. HTTP is designed on
Client-server principles which allow a client system for establishing a connection with the server
machine for making a request. The server acknowledges the request initiated by the client and
responds accordingly.

9.Define Hyper Text Transfer Protocol Secure (HTTPS).


HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to
secure the communication among two computers one using the browser and other fetching data
from web server. HTTP is used for transferring data between the client browser (request) and the
web server (response) in the hypertext format, same in case of HTTPS except that the
transferring of data is done in an encrypted format. So it can be said that https thwart hackers
from interpretation or modification of data throughout the transfer of packets.
10.Define Telnet.
Telnet is a set of rules designed for connecting one system with another. The connecting
process here is termed as remote login. The system which requests for connection is the local
computer, and the system which accepts the connection is the remote computer.
11. Define local area network.
Local Area Network is a group of computer and peripheral devices that are connected in a
limited area such as school, laboratory, home, or office building. The full form of LAN is Local
Area Network, which is a widely useful network for sharing resources like files, printers, games,
and other applications. The simplest type of LAN network is to connect computers and a printer
in someone’s home or office. In general, LAN will be used as one type of transmission medium.
12. What are all the Applications of LAN?
● One of the computers in a network can be assigned as a server, which allows managing
all other computers.
● LAN allows software to be stored on the server and which can be used by all the users of
the network.
● It helps you to connect all the workstations in a building to let them communicate with
each other locally without the need of internet access.
● Helps to share resource like printers and scanners
● Software developers can also use LAN network for sharing development/testing tools
within an office or within a factory with the help of the client-server model of the networking
system.
13. Define wide area network.
WAN (Wide Area Network) is an important computer network that is spread across a large
geographical area. WAN network systems could be a connection of a LAN that connects with
other LAN’s using telephone lines and radio waves. It is mostly limited to an enterprise or an
organization. Wide area networks are mostly established with high-end telecommunication
circuits.
14.What are all the Applications of WAN?
● The head of the department of corporate office wants to share some data with their
regional office associates, and then they can share data by saving it on the centralized node.
● Military operations need a highly secured network for communication. WAN is used for
this scenario.
● Railways reservation and airlines use WAN networks.
● Dean and the lecturer of the university can easily share data or resources with each other
as they share one common network.
● WAN allows workstations to be connected locally, which helps eac h node to
communicate with one another without having any internet connection.
● The resources like printers, scanners, hard-disk, and fax machines allow you to share all
the nodes publicly.
15.Difference between LAN and WAN
LAN WAN
Tend to use specific connectivity
WANs uses technologies like Frame Relay and X.25 for connectivity for
technologies, like ethernet and
the longer distances
token.
LAN is a computer network that
WAN is a computer network that covers a broad area.
covers a small geographic area,
For example, any network whose communications
like a home, office, or group of
cross-regional and metropolitan boundaries over a long distance.
buildings.
There is a need to set up a couple
In WAN networks as remote areas have to be connected,
of extra devices on the network,
hence the set-up costs are higher.
so it is not very expensive.
LAN has a higher data transfer
WAN has a lower data transfer rate as compares to LAN.
rate.
Ownership of LAN is private. WAN’s ownership can be private or public.
The speed of LAN is high. The speed of WAN is slower than LAN.
The propagation delay time is
The propagation delay in WAN is long(longer than LAN).
short in LAN.
It offers more fault tolerance. It offers less fault tolerance in WAN.
Its design and maintenance is
Its design and maintenance is difficult.
easy.
16.What is the internet?
The Internet is a worldwide telecommunications system that provides connectivity for millions
of other, smaller networks; therefore, the Internet is often referred to as a network of networks. It
allows computer users to communicate with each other across distance and computer platforms.
17.What is a Browser?
A browser is a software program that is used to explore, retrieve, and display the
information available on the World Wide Web. This information may be in the form of
pictures, web pages, videos, and other files that all are connected via hyperlinks and
categorized with the help of URLs (Uniform Resource Identifiers). For example, you
are viewing this page by using a browser.
18.What is the URL (Uniform Resource Locator)?
A uniform resource locator is the address of a resource on the internet or
the World Wide Web
. It is also known as a web address or uniform resource identifier (URI). For example, https:
www.javatpoint.com, which is the URL or web address for the javatpoint
website. A URL
represents the address of a resource, including the protocol used to access it.
20.Define Authoring tools:
An authoring tool is a piece of software that enables the creation of digita l content. This could be
as simple as creating a Microsoft Word document, or as complex as a graphic design tool.
Elearning authoring software allows the user to generate and manipulate multimedia objects for
the content’s intended purpose.
21.Why do you need an authoring tool?
Unsure whether you need an authoring software to meet your elearning objectives. Here are our
top five reasons to use an authoring tool:
1. Allows you to personalize your content and adopt a people-centered approach to learning;
2. Enables you to collaborate with your team effectively, allowing authors, SMEs and
stakeholders to work together seamlessly;
3. Makes it easy to roll out elearning courses in different locations and update content to
comply with new regulations quickly and with ease;
4. Allows you to continually improve your elearning by analyzing data and collating feedback
on how your content performs;
5. Enables you to adapt to new demands and produce supporting elearning content quickly.
22.What is HTML?
HTML stands for Hyper Text Markup Language, which is the most widely used language on
Web to develop web pages. HTML was created by Berners-Lee in late 1991 but "HTML 2.0"
was the first standard HTML specification which was published in 1995. HTML 4.01 was a
major version of HTML and it was published in late 1999. Though HTML 4.01 version is widely
used but currently we are having HTML-5 version which is an extension to HTML 4.01, and this
version was published in 2012.
23.Write basic structure of Html.
<!DOCTYPE html>
<html>
<head>
<title></title>
</head>
<body>
</body>
</html>

24.What are all the applications of HTML?


As mentioned before, HTML is one of the most widely used language over the web. I'm going to
list few of them here:
● Web pages development - HTML is used to create pages which are rendered over
the web. Almost every page of web is having html tags in it to render its details in browser.
● Internet Navigation - HTML provides tags which are used to navigate from one
page to another and is heavily used in internet navigation.
● Responsive UI - HTML pages now-a-days works well on all platform, mobile, tabs,
desktop or laptops owing to responsive design strategy.

● Offline support HTML pages once loaded can be made available offline on the
machine without any need of internet.
● Game development- HTML5 has native support for rich experience and is now
useful in gaming developent arena as well.

25.What are all the basic tags in HTML?


Heading Tags
Any document starts with a heading. You can use different sizes for your headings. HTML also
has six levels of headings, which use the elements <h1>, <h2>, <h3>, <h4>, <h5>, and <h6>.
While displaying any heading, browser adds one line before and one line after that heading.
Paragraph Tag:
The <p> tag offers a way to structure your text into different paragraphs. Each paragraph of text
should go in between an opening <p> and a closing </p> tag as shown below in the
IMAGE:
Images are very important to beautify as well as to depict many complex concepts in simple way
on your web page. This tutorial will take you through simple steps to use images in your web
pages.
TABLES:
The HTML tables allow web authors to arrange data like text, images, links, other tables, etc.
into rows and columns of cells.
The HTML tables are created using the <table> tag in which the <tr> tag is used to create table
rows and <td> tag is used to create data cells. The elements under <td> are regular and left
aligned by default

Line Break Tag


Whenever you use the <br /> element, anything following it starts from the next line. This tag is
an example of an empty element, where you do not need opening and closing tags, as there is
nothing to go in between them.
DEfine Html Forms.
HTML Forms are required, when you want to collect some data from the site visitor. For
example, during user registration you would like to collect information such as name, email
address, credit card, etc.
26.List out the HTML Form Controls.
There are different types of form controls that you can use to collect data using HTML form −
● Text Input Controls
● Checkboxes Controls
● Radio Box Controls
● Select Box Controls
● File Select boxes
● Hidden Controls
● Clickable Buttons
● Submit and Reset Button

27.Define CSS.
Cascading Style Sheets (CSS) describe how documents are presented on screens, in print, or
perhaps how they are pronounced. W3C has actively promoted the use of style sheets on the
Web since the consortium was founded in 1994.
Cascading Style Sheets (CSS) provide easy and effective alternatives to specify various attributes
for the HTML tags. Using CSS, you can specify a number of style properties for a given HTML
element. Each property has a name and a value, separated by a colon (:). Each property
declaration is separated by a semi-colon (;).
28. List out the types of css.
● External Style Sheet − Define style sheet rules in a separate .css file and then
include that file in your HTML document using HTML <link> tag.
● Internal Style Sheet − Define style sheet rules in header section of the HTML
document using <style> tag.
● Inline Style Sheet − Define style sheet rules directly along-with the HTML elements
using style attribute.

29.Define External Style Sheet


If you need to use your style sheet to various pages, then its always recommended to define a
common style sheet in a separate file. A cascading style sheet file will have extension as .css and
it will be included in HTML files using <link> tag.
30.Inte rnal Style Sheet
If you want to apply Style Sheet rules to a single document only, then you can include those
rules in header section of the HTML document using <style> tag.
31.Define Inline Style Sheetz
You can apply style sheet rules directly to any HTML element using style attribute of the
relevant tag. This should be done only when you are interested to make a particular change in
any HTML element only.
Rules defined inline with the element overrides the rules defined in an external CSS file as well
as the rules defined in <style> element.
32.What is scripting Language?
scripting languages are programming languages. The scripting language is basically a language
where instructions are written for a run time environment. They do not require the compilation
step and are rather interpreted. It brings new functions to applications and glue complex system
together. A scripting language is a programming language designed for integrating and
communicating with other programming languages.
33.Define Angular JS.
AngularJS is a very powerful JavaScript Framework. It is used in Single Page Application (SPA)
projects. It extends HTML DOM with additional attributes and makes it more responsive to user
actions. AngularJS is open source, completely free, and used by thousands of developers around
the world. It is licensed under the Apache license version 2.0.
34. List out the Advantages of AngularJS
The advantages of AngularJS are −
● It provides the capability to create Single Page Application in a very clean and
maintainable way.
● It provides data binding capability to HTML. Thus, it gives user a rich and
responsive experience.
● AngularJS code is unit testable.
● AngularJS uses dependency injection and make use of separation of concerns.
● AngularJS provides reusable components.
● With AngularJS, the developers can achieve more functionality with short code.
● In AngularJS, views are pure html pages, and controllers written in JavaScript do
the business processing.
35.list out the Disadvantages of AngularJS:
Though AngularJS comes with a lot of merits, here are some points of concern −
● Not Secure − Being JavaScript only framework, application written in AngularJS
are not safe. Server side authentication and authorization is must to keep an application secure.
● Not degradable − If the user of your application disables JavaScript, then nothing
would be visible, except the basic page.

PART-B(UNIT-IV)
1.Explain about communication protocol and its types?
2.Define LAN/WAN/WWW?
3.Write a html program by using basic html tags?
4.Discribing Authoring tools?
5.Create form using Html form Tags.
6.Explain CSS and its types?
7.What are scripting languages and its needs?
8.write program for inline style sheet?
9. write program for external style sheet?
10 .write program for inlernal style sheet?
11. Describe about Angular js?
UNIT V
NETWORKING
1.Define Internet Security and its types.
Internet security refers to securing communication over the internet. It includes specific security
protocols such as:
Internet Security Protocol (IPSec)
Secure Socket Layer (SSL)
Internet Security Protocol (IPSec)

2. What are all the security issue)s in SSL?


Privacy
Integrity
Authentication
Threats

3.Name some of the internet security threats?


Mobile worms
Malware
PC and Mobile ransomware
Large scale attacks like Stuxnet that attempts to destroy infrastructure.
Hacking as a Service
Spam
Phishing

4.Define Email Phishing.


Email phishing is an activity of sending emails to a user claiming to be a legitimate enterprise. Its
main purpose is to steal sensitive information such as usernames, passwords, and credit card
details.
Such emails contains link to websites that are infected with malware and direct the user to enter
details at a fake website whose look and feels are same to legitimate one.

5.What a phishing email may contain?


Following are the symptoms of a phishing email:
Spelling and bad grammar
Most often such emails contain grammatically incorrect text. Ignore such e mails, since it can be
a spam.
Beware of links in email
Don’t click on any links in suspicious emails.
Threats
Such emails contain threat like ―your account will be closed if you didn’t respond to an email
message‖.
Spoofing popular websites or companies
These emails contain graphics that appear to be connected to legitimate website but they actually
are connected to fake websites.
6.DefineMobile technology.
It is a type of technology in which a user utilizes a mobile phone to perform communications-
related tasks, such as communicating with friends, relatives, and others. It is used to send data
from one system to another. Portable two-way communications systems, computing devices, and
accompanying networking equipment make up mobile technology.
Mobile technology is largely employed in cellular communication systems and other related
areas. It employs a network architecture that allows multiple transmitters to deliver data on a
single channel at the same time. Because it reduces the potential of frequency interference from
two or more sources, this platform allows multiple users to use single frequencies. The channel
has evolved over time.
7. Name theTypes of Mobile Technologies.
Followings are the few famous mobile technologies:
● SMS
● MMS
● 4G
● 3G
● GSM
● CDMA
● Wi-Fi
8. Draw the GSM Architecture.
The architecture of GSM comes in hierarchy, consisting of many entities, interfaces and
subsystems.
The GSM system consist of three subsystems namely,
✔ The Radio Subsystems(RSS)
✔ Network and Switching Subsystems(NSS)
✔ Operation Subsystem(OSS)
The customer is able to notice few components of the network viz. Mobile Station and Antenna
of the Base Transceiver Station(BTS). Remaining entities are not visible.
9.Define MOBILE STATION (MS).
MS has all user equipment and software needed for mobile communications. It has user
independent hardware and software. Subscriber Identity Module (SIM) stores all user specific
data. Mobile Station can be identified as International Mobile equipment identity (IMEI). The
sim card constitutes of Personal Identity number(PIN), PIN unlocking key(PUK),
Authentication key k, International Mobile subscriber identity (IMSI). It also has Identifiers and
tables. The current location of MS is found using Temporary Mobile Subscriber Identity(TMSI) .
With TMSI and Location Area Identification (LAI) the current location can be identified.

10.Define BASE TRNSCEIVER STATION (BTS).


BTS contains the equipment for transmitting and receiving of radio signals,antennas and
equipment for encrypting and decrypting communications with the Base station controller(BSC).
A BTS is controlled by ap parent BSC via the base station control function(BSCF). The BCF is
implemented as a discrete unit or even incorporated in a TRX in compact base stations. The BCF
provides an operations and maintenance (O&M) connection to the Network Management
System(NMS)and manage operational state of each TRX as well as soft handling and alarm
collection.
The function of BTS vary depending on the cellular technology used and cellula telephone
provider. There are vendors in which the BTS is a plain transceiver which receives information
from MS through Um(Air Interface) and then it converts into TDM based interface, the Abis and
it sends it towards the BSC. A GSM cell can measure between some 100m a nd 35km depending
on the environment.
11. DefineBASE STATION SUBSYSTEM (BSS).
The base station subsystem is the section of traditional cellular telephone network which is
responsible for handling traffic and signaling between a mobile phone and the network switching
subsystem. The BSS carries out transcoding of speech channels, allocation of radio channels to
mobile phones, paging, quality management of transmission and reception over the Air interface
and many other tasks related to the radio network.

12.Define BASE STATION CONTROLLER (BSC).


The BSC basically manages the BTSs. It reverses radio frequencies and handles the
handover from one BTS to another within BSS, and performs paging of the MS. The BSC also
multiplexes the radio channels onto the fixed network connections at A interface.

13. Define VISITOR LOCATION REGISTER (VLR).


The VLR is associated to each MSC. It is a dynamic database. It stores all the information
needed for the MS currently in LA. If new MS comes to LA then the VLR is responsible for
copying the information needed from HLR.

14. Define Wireless LAN.


Wireless LANs (WLANs) are wireless computer networks that use high- frequency radio
waves instead of cables for connecting the devices within a limited area forming LAN ( Local
Area Network). Users connected by wireless LANs can move around within this limited area
such as home, school, campus, office building, railway platform, etc.
Most WLANs are based upon the standard IEEE 802.11 standard or WiFi.
15.Define Personal Area Network (PAN) .
Personal Area Network (PAN) is a the computer network that connects computers/devices
within the range of an individual person. As PAN provides a network range within a person’s
range typically within a range of 10 meters(33 feet) it is called as Personal Area Network. A
Personal Area Network typically involves a computer, phone, tablet, printer, PDA (Personal
Digital Assistant) and other and other entertainment devices like speakers, video game consoles
etc.

16.What are all the types of Personal Area Network (PAN) .


Personal Area Network can be of 2 types depending upon its connection i.e., Wireless PAN, and
Wired PAN.
17.What are all the advantages and disadvantages of PAN.
These are some of the Advantages of PAN :

● PAN is relatively flexible and provides high efficiency for short network range.
● It needs easy setup and relatively low cost.
● It does not require frequent installations and maintenance
● It is easy portable.
● Needs less technical skill to use.
These are some of the disadvantages of PAN :

● Low network coverage area/range.


● Limited to relatively low data rates.
● Devices are not compatible with each other.
● Inbuilt WPAN devices are little bit costly.

18.What are all the Applications of PAN ?

● Home and Offices


● Organizations and Business sector
● Medical and Hospital
● School and College Education
● Military and Defense

19.Define BLUETOOTH.
Bluetooth is a wireless technology standard for exchanging data over short distances (using
short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and
mobile devices, creating personal areanetworks (PANs) with high levels of security. Different
type of network is needed to connect different small devices in close proximity (about 10 m)
without expensive wiring or the need for a wireless infrastructure .

20.List out the features of BLUETOOTH?

• It is Wireless and automatic


• Bluetooth is inexpensive (< $5 per unit)
• It Handles both data and voice
• Signals are omni-directional and can pass through walls and briefcases
• Bluetooth uses frequency hopping at rate of 1600 Lops/sec
• It operates on 79 channels in 2.4GHZ band with 1MHZ carrier spacing
• Pi-conet is the important terminology

21.Define wire d PAN.


1. Wired PAN is connected through cables/wires such as Firwire or USB (Universal Serial
Bus)

22.DefineWireless PAN.
Wireless Personal Area Network (WPAN) is connected through signals such as
infrared, ZigBee, Bluetooth and ultrawideband etc.

23. Define piconet.


A set of bluetooth devices sharing a common channel is called piconet. A piconet is a
collection of devices connected via Bluetooth technology in an ad hoc fashion. A piconet starts
with two connected devices, and may grow to eight connected devices. All Bluetooth devices are
peer units and have identical implementations. However, when establishing a piconet, one unit
will act as a Master and the other(s) as slave(s) for the duration of the piconet connection. Master
is a Bluetooth device that sets the frequency hopping sequence. The Slave synchronizes to the
Masters in time and frequency by following the Master’s frequency hoping sequence. Every
Bluetooth device has a unique

24.Define Scatternet .
Bluetooth defines a structure called scatternet to facilitate inter piconet communication. A
scatternet is formed by interconnecting multiple piconet. A group of piconet is called scatternet.

25.Define WI-MAX.

Wi-MAX (Worldwide Inte roperability for Microwave Access) unites the technologies of
wireless and broadband to provide high-speed internet access across long distances. The name
was christened by WiMAX Forum that promotes interoperability and conformity of the standard.
The forum defines the technology as "a standards-based technology enabling the delivery of last
mile wireless broadband access as an alternative to cable and DSL".
26.Draw the architecture diagram for WI_MAX.

27.Define Mobile Computing.


Mobile Computing refers a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device. It is free from having a connection with a fixed
physical link. It facilitates the users to move from one physical location to another during
communication.

28. Types of Mobile communication?


Itcan be divided in the following four types:
1. Fixed and Wired
2. Fixed and Wireless
3. Mobile and Wired
4. Mobile and Wireless
29.List out the Applications of Mobile Computing?
Following is a list of some significant fields in which mobile computing is generally applied:
● Web or Internet access.
● Global Position System (GPS).
● Emergency services.
● Entertainment services.
● Educational services.
30. Network computing
it is a generic term in computing which refers to computers or nodes working together over a
network.
The two basic models of computing are:
1- centralized computing:- where computing is done at a central location, using terminals that are
attached to a central computer.
2- decentralized computing:- where computing is done at various individual station or location
and each system have power to run independently.
31.Define Peer to peer communication
The peer to peer computing architecture contains nodes that are equal participants in data
sharing. All the tasks are equally divided between all the nodes. The nodes interact with each
other as required as share resources.

32. What are all the advantages and disadvantages of peer to peer computing?

Advantages of Peer to Peer Computing


Some advantages of peer to peer computing are as follows −
● Each computer in the peer to peer network manages itself. So, the network is quite easy
to set up and maintain.
● In the client server network, the server handles all the requests of the clients. This
provision is not required in peer to peer computing and the cost of the server is saved.
● It is easy to scale the peer to peer network and add more nodes. This only increases the
data sharing capacity of the system.
● None of the nodes in the peer to peer network are dependent on the others for their
functioning.
Disadvantages of Peer to Peer Computing
Some disadvantages of peer to peer computing are as follows −
● It is difficult to backup the data as it is stored in different computer systems and there is
no central server.
● It is difficult to provide overall security in the peer to peer network as each system is
independent and contains its own data.

33.Define Grid Computing.


It can be defined as a network of computers working together to perform a task that
would rather be difficult for a single machine. All machines on that network work under the
same protocol to act as a virtual supercomputer. The task that they work on may include
analyzing huge datasets or simulating situations that require high computing power. Computers
on the network contribute resources like processing power and storage capacity to the network.

34. What are all the advantages and disadvantages of Grid computing?
Advantages of Grid Computing:
1. It is not centralized, as there are no servers required, except the control node which is just
used for controlling and not for processing.
2. Multiple heterogeneous machines i.e. machines with different Operating Systems can use
a single grid computing network.
3. Tasks can be performed parallelly across various physical locations and the users don’t
have to pay for them (with money).
35.What is cloud computing?
Cloud computing is a general term for anything that involves delivering hosted services
over the internet. These services are divided into three main categories or types of cloud
computing: infrastructure as a service (IaaS), platform as a service (PaaS) and software as a
service (SaaS).

36.Define IaaS.
IaaS providers, such as Amazon Web Services (AWS), supply a virtual server instance and
storage, as well as application programming interfaces (APIs) that let users migrate workloads to
a virtual machine (VM). Users have an allocated storage capacity and can start, stop, access and
configure the VM and storage as desired. IaaS providers offer small, medium, large, extra- large,
and memory- or compute-optimized instances,
37.Define PaaS.
In the PaaS model, cloud providers host development tools on their infrastructures. Users access
these tools over the internet using APIs, web portals or gateway software. PaaS is used for
general software development, and many PaaS providers host the software after it's developed.
Common PaaS products include Salesforce's Lightning Platform, AWS Elastic Beanstalk and
Google App Engine.
38.Define SaaS.saaS is a distribution model that delivers software applications over the internet;
these applications are often called web services. Users can access SaaS applications and services
from any location using a computer or mobile device that has internetaccess. In the SaaS model,
users gain access to application software and databases. One common example of a
SaaSapplication is Microsoft 365 for productivity and email services.

PART-B(UNIT V)
1.Explain about Internet security and its types.
2.Explain about mobile technology?
3.Broiefly explain about architecture of GSM cellular mobile phone system?
4.Expalin about Wireless lan?
5.Explain about PAN?
6.Explain about Bluetooth?
7.Explain about Wi-MAX.
8.Explain about peer to peer computing?
9.Expalin about grid computing?

You might also like