1 Sem CFA Question Solving, Objective Question and Dos Command PDF
1 Sem CFA Question Solving, Objective Question and Dos Command PDF
1 Sem CFA Question Solving, Objective Question and Dos Command PDF
Ans:- The term computer is derived from the word compute. The word compute means to calculate. A computer is
an electronic machine that accepts data from the user, processes the data by performing calculations and operations
on it, and generates the desired output results. Computer performs both simple and complex operations, with speed
and accuracy.
The Feature of Computer are as following;-
Speed, accuracy, diligence, storage capability and versatility are some of the key characteristics of a computer. A
brief overview of these characteristics are—
Speed The computer can process data very fast, at the rate of millions of instructions per second. Some
calculations that would have taken hours and days to complete otherwise, can be completed in a few seconds using
the computer. For example, calculation and generation of salary slips of thousands of employees of an organization,
weather forecasting that requires analysis of a large amount of data related to temperature, pressure and humidity
of various places, etc.
Accuracy Computer provides a high degree of accuracy. For example, the computer can accurately give the result
of division of any two numbers up to 10 decimal places.
Diligence When used for a longer period of time, the computer does not get tired or fatigued. It can perform long
and complex calculations with the same speed and accuracy from the start till the end.
Storage Capability Large volumes of data and information can be stored in the computer and also retrieved
whenever required. A limited amount of data can be stored, temporarily, in the primary memory. Secondary storage
devices like floppy disk and compact disk can store a large amount of data permanently.
Versatility Computer is versatile in nature. It can perform different types of tasks with the same ease. At one
moment you can use the computer to prepare a letter document and in the next moment you may play music or
print a document.
Low cost and portable Cost is high and not easily portable
a. IBM PC: IBM PC is the largest computer manufacturing company establishing USA. The computer
manufactures by IBM PC or branded computer. Personal Computer (PC) is the most important type of micro
computer system. The micro computer manufactures by IBM Company are called IBM PC. These computers are
reliable, durable and have better quality but they are costly.
b. IBM Compatibles: The computers that have some functional characteristics and principles of IBM computer
are called IBM compatibles. In other word, all the computer are manufactured by the another companies rather
than IBM company are Known as IBM compatibles. All the software and hardware of IBM compatibles. These
are cheaper and Their Parts are easily available in Market. They are also duplicate or assemble computer.
c. Apple/Macintosh Computer: All the computers manufacture by apple cooperation, a leading computers
manufacturing computer of USA are known as Apple/Macintosh computers. These computers use their own
software and hardware. They are totally different than that of IBM computers, In terms of both hardware and
software. For e.g software developed for apple computer can't run or IBM computers and vice-versa. Similarly,
floppy disk formatting in IBM computer can't be recognized by apple Macintosh computer and vice-versa. It are
popularly used in desktop publishing (DTP) houses as they provide better quality of graphic output.
a. Flexibility: We no longer need to stay plugged in to a specific location for working on your computer. Mobile
computing allows us unprecedented flexibility to move about and perform our activities at the same time
b. Saves Time: This technology is just the thing to use such transit time more effectively. It also allows to instantly
connecting with our family anywhere and anytime. We can connect with them over Internet using portable
computing devices such as Internet phones and share the fun.
c. Enhanced Productivity: Increased work flexibility is directly proportionate to enhanced work productivity - the
fact that you can do your work from any place you want, without waiting for, and making efforts to, get access to
computing facility translates into people being able to do more work with greater flexibility.
d. Ease of Research: Motile computing and the flexibility offered by it enable students as well as professionals to
conduct in-depth research on just about any topic or subject even when on the go!
e. Entertainment: Getting bored is so last-decade now what with zillions of entertainment options available on
mobile communication and computing devices these days. For example: games, movies, music, videos, etc.
The advantage of Mobile completion are as following :-
7. Explain the anatomy of digital computer and write the block diagram?
Ans:- The anatomy of digital Computer are as:-
Input:- It accepts the data or instructions given by the user and it converts the data and instructions from man
readable to machine readable code. Some common input devices are keyboard, mouse, scanner punched cards etc.
Processor/CPU: CPU is the portion of a computer system that carries out the instructions of a computer program,
and is the primary element carrying out the computer's functions.
Output Unit: When the computer its processing task, the results must be conveyed back to the user. Information
from the CPU is converted into an understandable form through output devices.
a. Input unit: It accepts the data or instructions given by the user and it converts the data and instructions from man
readable to machine readable code. Some common input devices are keyboard, mouse, scanner punched cards etc.
b. Processor/CPU: CPU is the portion of a computer system that carries out the instructions of a computer program,
and is the primary element carrying out the computer's functions. Some of the primary components of a CPU are:
i. Registers: These are the primary memory of computer system. They are mainly used to store data during the time
of processing inside ALU. The registers within CPU are special purpose temporary storage locations.
ii. Control unit: The control unit is the brain of the CPU itself. It controls overall operations and devices of computer.
iii. Arithmetic Logic Unit: ALU carries out the arithmetic and logical operations on the data made available to it.
c. Main Memory: It is a volatile memory of computer. As soon as a computer starts, primary memory stores all
running applications, operating system, user interface and any others. Its storage capacity is smaller but faster.
d. Auxiliary storage: It is the secondary memory of computer. They have slower access rates but greater storage
capacity and data stability. Auxiliary memory holds programs and data for future use because it is non-volatile.
e. Output Unit: When the computer its processing task, the results must be conveyed back to the user. Information
from the CPU is converted into an understandable form through output devices.
12. Classify the Primary memory and Secondary memory with their use
Ans:- Memory
Cache memory
RAM ROM
Buffer
Hard Disk
Programmable ROM
Static RAM Floppy Disk
Erasable Programmable. CD-ROM
ROM
Dynamic RAM Electrically Erasable Prog. ROM DVD-ROM
BRD-Disk
Memory: Magnetic tape
There are two types of memory that is primary memory and secondary memory.
I ) Primary Memory
It is also called the main memory or internal memory. RAM and ROM are called primary memory storage
area built into computer hardware. This memory consists of small integrated circuit (IC) either on the motherboard
attached to the mother board of a computer. This memory allows CPU to store and retrieve data very quickly. The rate
of fetching data from the memory is 50 nanosecond per byte.
a) RAM (Random Access Memory): RAM is a volatile memory. It is also called temporary memory. It is the most
commonly used memory but it is a volatile memory. So it needs regular power supply to hold its data and instructions.
RAM chips are of two types S-RAM and D-RAM.
S-RAM
It stands for static - RAM. Static memory allows the current flow continue on its way. It alters the path taken
by the power using one of two possible courses of travel to mark the state being remembered.
D-RAM
It stands for dynamic-RAM. Dynamic RAM uses external circuit to periodically regenerate or refresh the
stored charge to retain the stored data. It does not retain information for very long time. PCs periodically refresh
memory automatically. During the refresh period the memory is not available for normal operation.
b) ROM (Read Only Memory): It stands for read only memory. ROM is a computer memory on which data are
prerecorded. The programming code or data on a ROM chip is written by manufacturer during the manufacturing time
which cannot be erased or removed by the user. It is permanent in nature. ROM retains its data even when the computer
is turned off whereas RAM doses not retain data when the computer is turned off. ROM chips are used in all kind of
electronic devices from calculation to video games.
Most PCs have a small amount of ROM that stores code that starts off or boots the computer. Early computers
also use ROM to store basic input, output system which acts as a translator between PCs hardware and the operating
system.
Types of ROM:
I) Programmable ROM: It is a programmable ROM but not only once. Once the program is written in the PROM it
cannot be erased but can only be read. P-ROMs are programmed to record information using a special device known
as P-ROM programmer. The information recorded in the P-ROM can only be read but can't be changed.
II) Erasable Programmable-ROM: EP-ROM is a special kind of chip that can be reprogrammed to store the new
information. Its information is stored as electric charges deposited on a chip and EP-ROM can be erased by removing
it from the circuit. It can then be reprogrammed by using EP burner. There are two types of EP-ROM. i.e. EEP-ROM
and UVEP-ROM.
a) Electrically Erasable Programmable ROM: It is a kind of EP-ROM chip which doesn't have to be removed and
send back to the company and manufacturer for re-programming. It can be electrically re-programmed while in circuit
by using special software.
b) Ultra-Violent Erasable Programmable ROM: It is a kind of EP-ROM in which the stored information is erased
by exposing the chip to the ultra-Violet light.
Secondary Memory:
Primary memory is of limited capacity and volatile in nature. So to overcome this limitation secondary storage
devices are used. Secondary memory is non-volatile in nature and has larger storage capacity. It is used to store large
I) Cache Memory: Cache memory contains a copy of main memory data when the processor requests for data. It is
used to reduce the average access time for instructions or data which are normally stored in the main memory.
Main Memory
Cache Memory
Processor
Cache memory is placed at two three labels that is L1, L2, and L3. The first level is called primary cache memory or
level 1 cache. L1 is placed in the microprocessor chip. It is smaller than level 2 cache and uses the high speeds-RAM.
L2 is included on separate printed circuit board. It has higher capacity than L1.
Basic L1 L2 L3
Buffer Memory: Buffer Memory is a small amount of highest speed memory which is a reserved section of RAM or
input output devices. Many other devices have their own buffer memory.
Storage devices:
Storage devices can store large amount of data and instructions for future use. They are used to store data such
as text, audio, video, animation and graphical images. E.g. hard disk, floppy disk, optical disk etc. These storage
devices are permanent in nature.
I) Hard disk: It is an online magnetic storage device. It is permanently connected to the computer system. When the
computer is on, hard disk is always available to store or give information. It is a permanent secondary storage device.
Hard disk can store all types of information such as operating system, text, audio, video, graphical images and
animation.
Hard disk is made up of collection of disk known as platters. These platters are made up of aluminum with
thin coating of magnetic material known as ferric oxide (iron). Each Platter has two read and write heads and is
connected with the help of arm. A hard disk drive rotates at the speed of 2400-7200 rpm (revolution per minute). Each
sector of hard disk con store 128-2048 bytes of information. Each platters surface may contain 400-800 tracks which
are divided into 26 sectors. Each platter stores 360000 bytes to 10000000 bytes of information. Thus different sizes of
hard disk are available in the market that is 2 GB-500 GB or even in Tera bytes.
II) Floppy disk: A floppy disk is a flat circular piece of plastic coated with magnetic materials known as iron oxide.
A floppy disk is also called as diskette. A floppy disk is a removable drive which is easy to handle and use. A floppy
disk is cheaper than hard disk which is used for backup. The size of floppy disk is 3×1/2 in diameter. A floppy disk in
covered with a square, hard plastic jacket. The jacket has a cut out for read and writes head to make contact with the
disk surface. The cut out space is covered with a metallic piece which sides when the floppy is inserted in the floppy
disk drive.
The rotational speed of floppy disk is 300-400 PRM. The disk contains concentric circles know as tracks which
is divided into equal parts known as sectors. The storage capacity of floppy disk is multiple of number of recording
a. Address Bus: It is a group of wires or lines that are used to transfer the addresses of memory or I/O devices. It is
unidirectional.
b. Data Bus: It is used to transfer data within microprocessor and memory/input or output devices. It is bidirectional
as microprocessor requires sending or receiving data.
c. Control Bus: A control bus is a computer bus used by the CPU to communicate with devices that are contained
within the computer. This occurs through physical connections such as cables or printed circuits.
16. Classify the softcopy devices (Display device) with their advantage?
Ans:- A soft copy of a document is a digital copy, one that doesn't exist in physical form or on paper, but is instead
stored as binary or machine language in any device or hardware setup. Soft copies of documents are managed
much differently than the traditional hard copies that predated the rapid advance of digital media.
OR
Any type of human readable computer output device that creates non-permanent (i.e. hardcopy) record of that
output. For example the computer monitor screen you are probably looking at now.
Advantage of Softcopy device
It is Flexible,
sensible,
powerful,
light weight,
cheap in price and
durable.
Impact printers tend to be cheaper to run than non- Non-impact printers typically cost more to run, especially
impact models. They use less complex if you print pages that are heavy in color, graphics,
consumables and have fewer mechanical parts, so images and photos.
may be less prone to breaking down.
This port can transmit single or 1 bit at a time It can transmit 8 or more bit at a time.
Data transmissions is slow Data transmission is fact as compare to serial port.
Serial ports can deliver a single streams of data at a Parallel port can deliver several streams of data at a
time. time.
The wires used for transmission less as compare to Transmission wires are more than serial port.
parallel port.
20. Define generation of computer. Explain the feature of difference generation of computer?
Ans:- The evolution of computer to the current state is defined in terms of the generations of computer. Each
generation of computer is designed based on a new technological development, resulting in better, cheaper and
smaller computers that are more powerful, faster and efficient than their predecessors.
Features of first generation computers:
Technology used: vacuum tube
Machines languages were used to instruct the computer.
Magnetic core memory was used as primary memory.
Electrostatic tubes, Parer tape, punch card, magnetic tape
Punched card, printing devices were used for input/output operations and store the result.
It occupies very large space, slow processing, inefficient and unreliable due to low accuracy.
Power consumption was very high and it generated much heat.
It could only perform straight forward simple numerical calculation.
Computer used to be much expensive.
For Example ENIAC, UNIVAC,EDVAC, and EDSAC.
Ans:- The term 'software' refers to the set of electronic program instructions or data a computer processor reads in
order to perform a task or operation. In contrast, the term 'hardware' refers to the physical components that you
can see and touch, such as the computer hard drive, mouse, and keyboard.
Software can be categorized according to what it is designed to accomplish. There are two main types of software:
systems software and application software.
Systems Software:- Systems software includes the programs that are dedicated to managing the computer itself,
such as the operating system, file management utilities, and disk operating system (or DOS). The operating system
manages the computer hardware resources in addition to applications and data. Without systems software installed
in our computers we would have to type the instructions for everything we wanted the computer to do!
Applications Software:- Application software, or simply applications, are often called productivity programs or
end-user programs because they enable the user to complete tasks, such as creating documents, spreadsheets,
databases and publications, doing online research, sending email, designing graphics, running businesses, and even
playing games! Application software is specific to the task it is designed for and can be as simple as a calculator
application or as complex as a word processing application.
Memory management :- Memory management function of an operating system takes care of allocation and de-
allocation of memory space to the programs, data or information.
ii) File management :- The file management of function of operating system takes care of files such organization.
Storage, retrieval, naming, sharing and protection of files from unauthorized excess.
iii) process management :- An operating system takes care of creation and deletion of processes, scheduling of system
resources to different processes requesting them and providing mechanism for communicating bet n the processes.
iv) Input/Output management :- An operating system keeps track of I/O devices connected to the computers system.
v) Security management :- An operating system that protects the resources and information of computer against
distraction and unauthorized excess.
When a computer (or network) has multiple users, the need for managing and protecting the memory, input/output
devices, and other resources is even greater, since the users might otherwise interface with one another. In
addition, users often need to share not only hardware, but information (files, databases, etc.) as well. In short, this
view of the operating system holds that its primary task is to keep track of which programs are using which
resources, to grant resource requests, to account for usage, and to mediate conflicting requests from different
programs and users.
Ans:- Here we are classifying operating system on the basis of processing method, user interface and mode of user.
i) Batch Operating System :- In the type of operating system data and program is not processed until all the data are
fully input. The jobs are stored in a disk in a batch in a queue an run one or more at one time under the control of
operating System. A job may wait in a batch queue for minutes or even for hours depending upon the load on the
system. e.g. MS-Dos, IBM-Dos, Apple-Dos etc.
iii) Multi-processing operating system :- A multiprocessing operating system is the one in which more than one
processors operate in a coordinated way. They share the main memory and I/O devices. The see processors can
execute different programs independently and simultaneously. They can also execute portion of the same program.
e.g. UNIX and MVS.
iv) Time Sharing Operating System :- In this operating system several user work on the computer through the
terminals, which are connected to a single CPU and operates as a time period to each user and serves them it in time.
If work is not completed at the end of its time, then it is interrupted and placed on a waiting queue. e.g. UNIX,
Windows-NT, CTSS(Compatible Time Sharing System.)
v) Real-Time Operating System :- In real time operating system the key parameter in time. They are not dedicated to
some well-defined jobs which require very fast response time. They must be quick and predictable in responding to
different events. They are mainly used in industries and are designed to operate in a time. In industrial system real
time computers have to collect data about the production process and user to control machines in factory. Consider
an e.g. of a car assembly line where certain actions must take place of specific time. If a welding robot welds too
early or too late the manufacturing process is disturbed. e.g. RLLINUX, QNX, OS,-98
i) Single User operating system :- A single user operating system allows one user to work at a time. The resources of
the computer system namely the CPU time and printing facilities are idle till the user logs off. e.g. MS-Dos, PC-Dos.
ii) Multi-User operating system :- A multi-User operating system allows more than one user excess the computer
system at a time. Access the computer system at time. Access to the computer is normally provided through network
so that users access the computers remote so that users access the computers. e.g. UNIX, LINUX, NETWARE etc.
i) It is known as command user interface. This type of operating system provides the user facility of giving
commands either from keyboard or from a script. In this type of operating system and syntax. e.g. MS-DOS.
ii) GUI (Graphical User Interface) :- Graphical User Interlace allows the user to interact with the system using
window, icons, menus, menus and a pointer to control the operating system. Mouse is the key input device used in
this type of operating system. One of the most important advantage of GUI is it is easy to learn, begin and use. e.g.
Window-2000, Windows-XP, Windows-Vista.
.
25. Define Language Processor. Different between compiler, Interpreter and Assembler?
Ans:- A language processor is a special type of a computer software that has the capacity of translator the source
code or program codes into machine codes.
A computer virus is one type of malware that inserts its virus code to multiply itself by altering the programs and
applications. The computer gets infected through the replication of malicious code.
Computer viruses come in different forms to infect the system in different ways. Some of the most common
viruses are
Boot Sector Virus – This type of virus infects the master boot record and it is challenging and a complex task to
remove this virus and often requires the system to be formatted. Mostly it spreads through removable media.
Direct Action Virus – This is also called non-resident virus, it gets installed or stays hidden in the computer
memory. It stays attached to the specific type of files that it infect. It does not affect the user experience and
system’s performance.
Resident Virus – Unlike direct action viruses, resident viruses get installed on the computer. It is difficult to
identify the virus and it is even difficult to remove a resident virus.
Multipartite Virus – This type of virus spreads through multiple ways. It infects both the boot sector and
executable files at the same time.
Polymorphic Virus – These type of viruses are difficult to identify with a traditional anti-virus program. This is
because the polymorphic viruses alters its signature pattern whenever it replicates.
27. Define open source Software . Explain the advantage of Open Source Software?
Ans:- Open-source software (OSS) is any sort of computer software that's distributed with its source code available
for modification. That means it usually includes a license for programmers to change the software in any way they
choose: They can fix bugs, improve functions, or adapt the software to suit their own needs.
Following characteristics –
Concurrency: concurrent access (meaning 'at the same time') to the same database by multiple users
Security: security rules to determine access rights of users
Backup and recovery: processes to back-up the data regularly and recover data if a problem occurs
Integrity: database structure and rules improve the integrity of the data
Data descriptions: a data dictionary provides a description of the data
32. Explain the different types of database models with there merits and Demerits?
Advantages:- Disadvantages:-
It accepts many-to-many relationship. Needs long programs to handle relationship.
Searching is fast because of multi-directional pointer. Pointer needed in the database increases overhead of
The network model is simple and easy to design. storage.
It reduces data redundancy. Less security because it is opens to all
.
Relational Database Model:-
For example:- It we have relationship between student and student 1 table then we get the following.
Advantage Disadvantages:
Normalization of the database is possible. It is complex than other models.
Easy to use. Too many rules makes database non-user friendly.
Very less redundancy. It needs more powerful hardware computer and data
Integrity rule can be easily implemented. storage devices.
2. Star Topology:- Computers in the network, are connected to each other with the help of central connecting device
known as switch or hub. It is based on client is done through the central server with the help of switch or hub in
the entire network. The hub controls the traffic and widely used topology.
Advantages Disadvantages
It is simple, reliable and easy to install It requires very large amount of cable.
It is flexible to connect and remove nodes in the It is expensive because of cables and networking
network. devices.
It is very easy to find in the network. If there is any problem in the central device then
If any computers in the network goes down, then entire network goes down.
other computer can continue their functions. The data traffic is high in central device so there may
be chance of data collsion.
3. Ring Topology:- Computers are interconnected to each other be making a closed circular structure. That means
each computer is connected to other two adjacent computers in either side. It is based on peer-to peer network
architecture .Communication is done in single direction only. When one computer receives the message, then it
compares the destination address of the message and its own address, it matches it accepts the message otherwise
the message is retransmitted to the next computer in the network.
Advantages Disadvantages
If is simple and inexpensive topology. It is flexible topology because it is difficult to add
There is less chances of data collision because of and remove nodes.
one directional data transfer. It is not suitable for large organization.
There is no server so each computer has equal If there is any problem in any nodes then the entire
access facility to all the resources. network goes down.
4. Mesh Topology:- Every computer in the network point to point connection to all other computers by using multi-
port connector. There multi-port connection between two computers which provide the alternate path of data
transfer. The communication is done in ho direction. It is based on peer –to-peer architecture.
Advantages Disadvantages
It is the fastest and robust type topology. It is the most complex and expensive topology.
It is the most reliable topology because of multiple It is difficult to find errors in the network.
connection. It requires maximum amount of cable and
Failure in any node or transmission media does not multi-port connector.
effect the network. It is difficult to add or remove any node in the
Less chances of data traffic because of multiple network.
path.
5. Tree Topology:- The topology is the extension of or star topology. So it extends the branch of bus or star topology
allowing more stations to access the bus. The computers arranged in a distinct hierarchical structure. Data can flow
up-to down and vice versa.
Advantages Disadvantages
It is easy to manage network because many sub- The failure of root node will cause the failure of entire
networks. network.
It is very flexible so we can add and remove any It is expensive because of large amount of cables and
node. networking devices.
It is easier to find fault in the networks. The data traffic is high at the root network so there may
be chances of data connection.
6. Hybrid Topology:- If two or more topologies are computer topology. So, it is very difficult to design and to
implement the hybrid topology. It is expensive too.
DOS Command:
1.) DIR command (For looking)
Use: It is display contains of folder.
Syntax: C :\> Dir enter
4.) MD Command:
Use command for make a new directory.
Syntax: C:\>MD_ Directory name enter
e.g. C:\>md_Ghanashyam Dhungana enter
5.) CD Command:
Use command for changing directory.
Syntax: C:\>cd_directory name enter
e.g. C:\>CD_ Ghanashyam Dhungana
7) RD Command:
Use: Command for delete empty directory.
22.) EXIT
Use: To exit from DOS.
Syntax: EXIT
e.g.: C:\> EXIT
External Commands
23.) MOVE
Use: To move the files from one location to another.
Syntax: MOVE [drive:] [path] source file [drive:] [path]
e.g.: C:\> MOVE C:\> MY doc\*.doc A:
24). XCOPY
Use: To copy files and subdirectories from one location to another.
Syntax: XCOPY [drive:] [path] file [drive:] [path]
e.g.: C:\>XCOPT C:\ my doc\ *.* A:
25.) DELTREE
Use: To delete directory and its subdirectory and files at a time.
Syntax: DELTREE [drive:] [path] directory name
e.g.: C:\>deltree TT
26.) LABEL
Use: To display the disk drive volume label.
Syntax: LABEL [drive:]
e.g.: C:\> LABEL A:
(Also allows changing the volume label of the disk drive.)
27.) SYS
Function: to transfer system file.
Syntax: SYS [Source drive:] [Destination drive:]
Example: C:\> SYS A:
28.) FORMAT
Use: To prepare a disk for use with DOS.
Syntax: FORMAT [drive:] [/s] [/q]
Example: C:\> FORMAT A:
29.) ATTRIB
Use: to change the attributes of files.
Attributes Meaning
H Hidden files
R Read only files
S System files
+ Set the attributes
- Clear
Syntax: ATTRIB [+/-] [H/R/S] [Filename]
Example: C:\> ATTRIB +H PCI.TXT
C:\> ATTRIB +R TT.EXE
C:\> ATTRIB -H PCI.TXT
C:\> ATTRIB
30.) CHKDSK
Use: To check the drives for errors and provides a disk and memory status report.
Syntax: CHKDSK Drive
Example: c:/> CHKDSK /f /v
32.) MORE
Use: To display the output page by page instead of continuous scrolling.
Syntax: DOS-Command І MORE
Example: C:\> DIR І MORE
33.) DOSKEY
Use: To record all DOS commands into the memory that you have previously used in DOS prompt.
Syntax: DOSKEY [new DOS command =DOS command]
Example: C:\> DOSKEY
34.) /? (Help)
Use: To get any types of help about DOC commands.
Syntax: DOS command /?
Example: C:\> DIR /?
NOTE: DOS has more that 110 commands but we study only most usable command which can run by windows
(DOS).
Candidates are required to answer the questions in their own words as far as possible.
Group B
Attempt any SIX questions. [6*5 = 30]
11. Define Computer. Explain the anatomy of digital computer with block diagram.
12. Define Operating System. Explain the functions of Operating System.
13. Define DBMS. Explain the different database models with their merits and demerits.
14. Explain the different types of LAN topologies with their advantages and disadvantages.
15. What is WWW? Differentiate between intranet, extranet and internet with example.
16. What are contemporary technologies? Explain any two contemporary technologies with roles.
17. Write the DOS commands to complete following tasks.
a) Create sub directory theory and practical inside d:\exam\
b) Create the file name marks.txt inside theory writing the content, "Theory marks in CFA".
c) Rename the file name marks.txt with CFAmarks.txt.
d) Make hidden the file CFAmarks.txt.
e) Search the all files with .pdf extension.
Group C
Attempt any TWO questions. [2*10 = 20]
18. i) You are provided following data:
Bageswori Secondary School
Surkhet
Mark - Ledger
D E F G H I J K L M
11 Name Eng. Nep. Eco. Sociology Computer Total Percentage Result Division
12 Gautam 56 56 76 75 68
13 Saru 67 54 64 64 76
14 Binod 87 65 54 59 66
15 Ritu 45 67 56 72 85
16 Kabindra 89 34 63 59 52
Write the formula in spread sheet package to calculate following on basis on given conditions:
1. Calculate Total marks. [1]
2. Calculate Percentage. [1]
3. Mark the student with either "PASS" or "FAIL" [Pass Marks 35]. [1.5]
4. Calculate the division [if percentage >=60 then First, if percentage >=45 and percentage <60 then Second, if
percentage >=35 and percentage <45 then Third otherwise "xxx"] [1.5]
ii) Explain the features of Font control tools in word processing package. [5]
19. i) Define computer peripherals. Differentiate between impact and non-impact printers. [1 + 4]
ii) Define Presentation. Write the features of good presentation package. [5]
20. Define CMYK color model. Explain the basic tools and transforms available in Photoshop. [2 + 5 + 3]