CA Important Questions & Solution
CA Important Questions & Solution
The transistor was far superior to the vacuum tube, allowing computers to become smaller in
size, cheaper, reliable and more energy efficient. Though transistor still generated a great deal of
heat, it was a substantial improvement over the vacuum tube.
Due to the increase in the cost of expanding programming, these machines were expensive to
purchase and operate. Such computers were, therefore, mostly found in large computer centers
or government/private laboratories with many programmers and support professionals.
Advantages
4. Better portability.
7. Programming became more time-efficient since Assembly or Symbolic language was used.
Disadvantages
Advantages
1. Based on Integrated Circuit(IC).
2. Reduce computational time from microsecond to nanoseconds.
3. Better portable and reliable than 2nd generation computers.
4. Consume less power and generated less heat.In some cases,air conditioning was still required.
5. Maintenance cost was quite low since hardware rarely failed.
Disadvantages
1. Highly sophisticated technology required for the manufacture of IC chips.
The IC technology was not only used to construct the processor, but also for the construction of
memory. The first memory chip was constructed in 1970 and could hold 256 bits.
Advantages
2. Very reliable.
Disadvantage
3 Mainframe Computers
Mainframe computers are multi-user, multi-programming and high performance
computers. They operate at a very high speed, have very large storage capacity and can handle
the workload of many users. Mainframe computers are large and powerful systems generally
used in centralized databases. The user accesses the mainframe computer via a terminal that
may be a dumb terminal, an intelligent terminal or a PC. A dumb terminal cannot store data or
do processing of its own. It has the input and output device only. An intelligent terminal has the
input and output device, can do processing, but, cannot store data of its own. The dumb and the
intelligent terminal use the processing power and the storage facility of the mainframe
computer. Mainframe computers are used in organizations like banks or companies, where
many people require frequent access to the same data. Some examples of mainframes are CDC
6600 and IBM ES000 series.
4 Supercomputers
Supercomputers are the fastest and the most expensive machines. They have high
processing speed compared to other computers. The speed of a supercomputer is generally
measured in FLOPS (FLoating point Operations Per Second). Some of the faster supercomputers
can perform trillions of calculations per second. Supercomputers are built by interconnecting
thousands of processors that can work in parallel.
Supercomputers are used for highly calculation-intensive tasks, such as, weather forecasting,
climate research (global warming), molecular research, biological research, nuclear research and
aircraft design. They are also used in major universities, military agencies and scientific research
laboratories. Some examples of supercomputers are IBM Roadrunner, IBM Blue gene and Intel
ASCI red. PARAM is a series of supercomputer assembled in India by C-DAC (Center for
Development of Advanced Computing), in Pune. PARAM Padma is the latest machine in this
series. The peak computing power of PARAM Padma is 1 Tera FLOP (TFLOP).
Q4. Draw the block diagram of a computer. Also, describe each of the major building blocks of a digital
computer.
Ans.
A typical computer system has an Input Unit, a Central Processing Unit, Memory Unit and
Output Unit. This is also known as Von Neumann Architecture of the computer. Over the years
the technology has changed but basic design/architecture is not changed.
Input Unit:
The input unit links the external environment with the computer system. Data and
instructions inputted to the computer system through this unit. The data can be
inputted to the computer by various means, it can be entered through a keyboard,
through a card reader, through a mouse etc. All the data supplied to the computer is
transformed into the binary codes. Unit called input interface accomplishes this
transformation. Input interface is designed
to match the unique physical or electrical characteristics of input devices with the
requirements of the computer system for example Keyboard, Mouse, Joy stick, Light
Pen, Punched Cards, Optical Mark Reader, Magnetic Tape, Optical Character Reader
etc.
Output Unit:
It links the computer with the external environment. The job of an output unit is just
opposite of an input unit. It supplies information and results of computation to the
outside world. As computers work with binary code, the results produced are also in
the binary form. Hence, before supplying the results to the outside world, it must be
converted to human readable form. Unit called output interface accomplishes this task.
Output interface is
designed to match the unique physical or electrical characteristics of output devices
(e.g. Monitor, Printer, Plotter) with the requirement of the external environment.
1. Control Unit:
The control unit is able to maintain order and direct the operation of the entire system.
By selecting, interpreting, and decoding, it executes the program instructions. This unit
acts as a central nervous system for the computer. It manages and coordinates the entire
computer system. It directs the flow of data through the CPU, and to and from other
devices. Control unit controls the input and output devices and the passing of data to
the Arithmetic/Logical Unit for computation. The control unit stores the CPU's
microcode, which contains the instructions for all the tasks the CPU can perform.
2.Arithmetic Logic Unit:
The Arithmetic Logic Unit (ALU) of a computer system is the place where the actual
execution of the instructions takes place during the processing operation. The data and
instructions, stored in the primary storage (RAM or Cache) prior to processing, are
transferred as and when needed to the ALU. ALU uses various CPU registers to store
intermediate results of computations. The Final result of computations is transferred
back to the primary storage. After the completion of processing, the final results that are
stored in the primary storage unit are released to an output device or to a secondary
storage device.
The ALU is designed to perform all the basic Arithmetic Operations – add, subtract,
multiply, divide, Relational Operations such as comparisons using < , <=, > , >=, == etc
and Logical Operations such as AND, OR, NOT.
1. Primary Storage: Stores and provides very fast. This memory is generally used to
hold the program being currently executed in the computer, the data being received
from the input unit, the intermediate and final results of the program. The primary
memory is temporary in nature. The data is lost, when the computer is switched off. In
order to store the data permanently, the data has to be transferred to the secondary
memory.
The cost of the primary storage is more compared to the secondary storage. Therefore
most computers have limited primary storage capacity.
Ans. a) MICR
Magnetic Ink Character Recognition is a character recognition system that uses special ink and
characters. When a document that contains this ink needs to be read, it passes through a
machine, which magnetizes the ink and then translates the magnetic information into
characters.
MICR technology is used by banks. Numbers and characters found on the bottom of checks
(usually containing the check number, sort number, and account number) are printed using
Magnetic Ink. To print Magnetic Ink need, you need a laser printer that accepts MICR toner.
MICR, is a character recognition technology used primarily by the banking industry to facilitate
the processing of cheques. The technology allows computers to read information (such as
account numbers) off printed documents. Unlike barcodes or similar technologies, however,
MICR codes can be easily read by humans.
MICR characters are printed in special typefaces with a magnetic ink or toner, usually
containing iron oxide. As a machine decodes the MICR text, it first magnetizes the characters in
the plane of the paper. Then the characters are passed over a MICR read head, a device similar
to the playback head of a tape recorder. As each character passes over the head it produces a
unique waveform that can be easily identified by the system.
The use of magnetic printing allows the characters to be read reliably even if they have been
overprinted or obscured by other marks, such as cancellation stamps and signature. The error
rate for the magnetic scanning of a typical check is smaller than with optical character
recognition systems. For well printed MICR documents, the "can't read" rate is usually less than
1% while the substitution rate (misread rate) is in the order of 1 per 100,000 characters.
b)OCR
OCR systems require calibration to read a specific font; early versions needed to be
programmed with images of each character, and worked on one font at a time. "Intelligent"
systems with a high degree of recognition accuracy for most fonts are now common. Some
systems are capable of reproducing formatted output that closely approximates the original
scanned page including images, columns and other non-textual components.
It involves reading text from paper and translating the images into a form that the computer can
manipulate (for example, into ASCII codes).
An OCR system enables you to take a book or a magazine article, feed it directly into an
electronic computer file, and then edit the file using a word processor.
All OCR systems include an optical scanner for reading text, and sophisticated software for
analyzing images. Most OCR systems use a combination of hardware (specialized circuit
boards) and software to recognize characters, although some inexpensive systems do it entirely
through software. Advanced OCR systems can read text in large variety of fonts, but they still
have difficulty with handwritten text.
The potential of OCR systems is enormous because they enable users to harness the power of
computers to access printed documents. OCR is already being used widely in the legal
profession, where searches that once required hours or days can now be accomplished in a few
seconds.
Benefits
● Includes assessment of coursework, the best way to assess the candidate's level of
practical skills in computing.
● Simple, straightforward assessment, with all examination papers externally assessed. For
the AS level, coursework weighting reduced to 20%.
● A2 exam paper cut to two hours in length, with AS one and a half hours.
c) OMR
● Optical Mark Recognition (also called Optical Mark Reading and OMR) is the process
of capturing human-marked data from document forms such as surveys and tests.
● Optical Mark Recognition also called Mark Reading (“mark sensing”). Through the
technology of OMR a simply and reasonable method of entering data by document into
a computer system is enable. Optical Mark Reading (OMR) is one of the fastest and
safest methods for data-entry into a host until today.
● OMR forms are used for collecting data. Preparation of this type of form involves several
critical steps.
● Obviously, one needs to thoughtfully determine the kind of data that needs to be
gathered and layout the questions in a clear, understandable format. These questions are
then sent to the designer to figure out the best way to present these questions in an
attractive layout. The designer needs to understand how the OMR scanner reads this
information and position the questions and related response bubbles in just the right
position on the form to assure that the scanner can accurately read the information.
When the form design or layout is approved by the customer, the electronic form is
moved to the printing phase. It is critical that the printer also understands the
importance of consistent positioning of the printed sheet according to the layout.
● OMR is a great time-saving process in collecting data but can also create a huge
headache if not done correctly. It's important to do some homework and get a good
handle on how OMR works before jumping into an OMR evaluation survey project.
There are many good resources to be found on the internet that can assist you in one or
all of the steps involved. Just google "omr data collection services" for an extensive list.
Ans.
RAM ROM
▪ With RAM, writing data is a fast process. ▪ Writing data to ROM is very slow.
▪ A RAM chip can store quite a lot of data, ▪ ROM chips usually store only a few
up to 16 GB. megabytes of information, around 4 MB per
chip.
▪ There are two main types of RAM: dynamic ▪ ROM types include EPROM, EEPROM,
(DRAM) and static (SRAM). PROM and Mask ROM.
Q7. What is Computer software? Discuss the types of softwares.
Ans. Software is a set of electronic instructions consisting of complex codes (Known as
programs) that make the computer perform tasks. In other words, software tells the computer
what to do, some programs exist primary for the computer’s use & help the computer perform
& manage its own task.
Types of software
A wide variety of computer software is available today. Although the range of software
available is vast and varied, most software can be divided into two major categories:
1. System software,
2. Application software
System Software
System software is a set of one or more programs designed to control the operation and extend
the processing capability of a computer system. It acts as an intermediary between the computer
hardware and application program, it also provides interface between user and computer In
general, a computer's system software performs one or more of the following functions:
1. Supports the development of other application software.
2. Supports the execution of other application software.
3. Monitors the effective use of various hardware resources such as CPU, memory,
peripherals, etc.
4. Communicates with and controls the operation of peripheral devices such as printer,
disk, tape, etc.
5. It helps the hardware components work together and provides support for the
6. Development and execution of application software (programs).
7. The programs included in a system software package are called system programs and
the programmers who prepare system software are referred to as system programmers.
Advantages
1. Good system software allows application packages to be run on the computer with less
time and effort.
2. Without system software, application packages could not be run on the computer
system. A system software is an indispensable part of a total computer system.
3. A computer without some kind of system software would be very ineffective and most
likely impossible to operate.
APPLICATION SOFTWARE
The software that a user uses for accomplishing a specific task is the application software.
Application software may be a single program or a set of programs. A set of programs that are
written for a specific purpose and provide the required functionality is called software package.
Application software is written for different kinds of applications—graphics, word processors,
media players, database applications, telecommunication, accounting purposes etc.
Some examples of application software packages are as follows:
Word Processing Software: For writing letter, reports, documents etc. (e.g. MS-WORD).
Image Processing Software: For assisting in drawing and manipulating graphics (e.g.
Adobe Photoshop).
Accounting Software: For assisting in accounting information, salary, tax returns (Tally
software).
Spreadsheet Software: Used for creating budget, tables etc. (e.g. MS-Excel).
Presentation Software: To make presentations, slide shows (e.g. MS-PowerPoint)
CAD/CAM Software: To assist in architectural design. (e.g. AutoCAD, Autodesk)
Geographic Information Systems: It captures, stores, analyzes, manages, and presents
data, images and maps that are linked to different locations. (e.g. ArcGIS)
Web Browser Software: To access the World Wide Web to search documents, sounds,
images etc. (e.g. Internet Explorer, Netscape Communicator, Chrome).
Ans. Operating system (OS) is the software that provides an interface between the computer
hardware, and the application programs or users. An operating system is a software which
performs all the basic tasks like file management, memory management, process management,
handling input and output, and controlling peripheral devices such as disk drives and printers.
Some popular Operating Systems include Linux, Windows, Macintosh, MS-DOS, etc.
FUNCTIONS OF OS
3) VOLUME:
Volume refers to tape or disk that stores computer data. A volume or logical drive is a single
accessible storage area with a single file system Sometimes large hard disk are divided into
several volumes called partitions, each of which is treated as separate disk.
4) VOLUME LABEL:
Volume label refers to a name for disk or tape. For mass volume storage devices, a label is the
name of a storage volume.
5) DRIVE NAME:
Drive name is name assigned to a storage unit such as a hard disk, floppy disk or CD-ROM
when the disk is first created.
● High-level Language
A program in a high-level language is written in English-like language. Such languages hide the
details of CPU operations and are easily portable across computers. A high-level language
isolates the execution semantics of computer architecture from the specification of the program,
making the process of developing a program simpler and more understandable with respect to
assembly and machine level languages. Some of the features of a program written in high-level
language are as follows:
⮚ Programs are easier to write, read or understand in high-level languages than in
machine
language or assembly language. For example, a program written in C++ is easier to
understand than a machine language program.
⮚ Programs written in high-level languages is the source code which is converted into the
object code (machine code) using translator software like interpreter or compiler.
⮚ A line of code in high-level program may correspond to more than one line of machine
code.
⮚ Programs written in high-level languages are easily portable from one computer to
another.
Q11. Explain the following w.r.t Excel
a) Conditional Formating
d) Pivot table
Greater than
Less than
Between
Equals to
Top/Bottom Rules
Data Bars
Color scale
b) Cell references are an important part of creating formulas in Excel. Using cell references
allows your formulas to update automatically if the value in a particular cell changes and can
also assist you in updating formulas as cells are copied or moved. There are two basic types of
cell references, each serving a different purpose.
● Relative Cell References
● Absolute Cell References
Relative Cell References
References that will change in relation to the new location of the formula. Relative references
identify cells based on their relationship to the cell containing the reference.
EXAMPLE: In the example shown here, the function in D2 calculates Bob's pay by multiplying
his hours (C2) by his rate of pay (B2). Since the rate of pay varies by student, we can use the Fill
Command to copy the function to the other rows in the spreadsheet. Because the cell references
are relative, the function will adjust to calculate the values in the appropriate rows. In other
words, when we copy the function to Anna's total, her pay will be based on C3*B3.
References that remain the same when a formula is copied to a new location. No matter where
the formula or the values in the original cell are moved, the formula will continue to refer to the
same cell.
EXAMPLE: In the example shown here, the function in C11 calculates Bob's pay by multiplying
his hours (B11) by the rate of pay for all students (C9). Notice the $ before both the column and
row IDs ($C$9). By making the reference to the rate of pay an absolute reference, we can use the
Fill Command to copy the function to the other rows in the spreadsheet. The same rate of pay
will be multiplied by the appropriate hours for each student. In other words, when we copy the
function to Anna's total, her pay will be based on B12*$C$9.
Relative and absolute cell references can be used in all situations that require cell references,
including cell ranges and formulas.
A formula, cell range, or cell reference can have both relative and absolute components. By
adding a dollar sign ($) before either the column or row location or both, that reference becomes
absolute. When adding dollar signs to cell references, only the portion of the reference directly
following the dollar sign is absolute. To keep the entire cell reference constant, place a dollar
sign before both the column and row location.
EXAMPLE: $A$12
c) Graphs represent variations in values of data points over a given duration of time. They are
simpler than charts because you are dealing with different data parameters. Comparing and
contrasting segments of the same set against one another is more difficult.
● Line Graphs: Both 2 dimensional and three dimensional line graphs are available in all
the versions of Microsoft Excel. Line graphs are great for showing trends over time.
Simultaneously plot more than one data parameter – like employee compensation,
average number of hours worked in a week and average number of annual
leaves against the same X axis or time.
● Column Graphs: Column graphs also help viewers see how parameters change over
time. But they can be called “graphs” when only a single data parameter is used. If
multiple parameters are called into action, viewers can’t really get any insights about
how each individual parameter has changed. As you can see in the Column graph
below, average numbers of hours worked in a week and average number of annual
leaves when plotted side by side do not provide the same clarity as the Line graph.
● Bar Graphs: Bar graphs are very similar to column graphs but here the constant
parameter (say time) is assigned to the Y axis and the variables are plotted against the X
axis.
D) A pivot table is essentially a dynamic summary report generated from a database. The
database can reside in a worksheet (in the form of a table) or in an external data file. A pivot
table can help transform endless rows and columns of numbers into a meaningful presentation
of the data. Pivot tables are very powerful tool for summarized analysis of the data.
Pivot tables are available under Insert tab » PivotTable dropdown » PivotTable.
Pivot Table Example
Now, let us see Pivot table with the help of example. Suppose you have huge data of voters
and you want to see the summarized data of voter Information per party, then you can use the
Pivot table for it. Choose Insert tab » Pivot Table to insert pivot table. MS Excel selects the data
of the table. You can select the pivot table location as existing sheet or new sheet.
● Column labels − A field that has a column orientation in the pivot table. Each item in
● Report Filter − You can set the filter for the report as year, then data gets filtered as per
the year.
● Row labels − A field that has a row orientation in the pivot table. Each item in the field
occupies a row.
● Values area − The cells in a pivot table that contain the summary data. Excel offers
several ways to summarize the data (sum, average, count, and so on).
After giving input fields to the pivot table, it generates the pivot table with the data as shown
below.
Q12. Explain the in-built functions in EXCEL.
● Text Functions
o TRIM − Removes duplicate spaces, and spaces at the start and end of a text
string
o FIND − Returns the position of a supplied character or text string from within a
supplied text string (case-sensitive).
● Statistical
o COUNTIF − Returns the number of cells (of a supplied range), that satisfies a
given criteria.
o NOT − Returns a logical value that is the opposite of a user supplied logical
value or expression i.e. returns FALSE if the supplied argument is TRUE and
returns TRUE if the supplied argument is FAL
o ABS − Returns the absolute value (i.e. the modulus) of a supplied number.
o MOD − Returns the remainder from a division between two supplied numbers.
Ans. Information Technology has revolutionized the Railways customer interface over the last
few years and will continue.
∙ an update for train running information; Online booking of retiring rooms at all
important stations;
∙ Online booking of meals on trains for selected en-route stations;
Ans. The advantages accruing from computerization are three-directional - to the customer, to the
bank and to the employee.
For the customer. Banks are aware of customer's need for new services and plan to make
them available. IT has increased the level of competition and forced them to integrate the new
technologies in order to satisfy their customers. They have already developed and
implemented a certain number of solutions among them:
● Self-inquiry facility: Facility for logging into specified self-inquiry terminals at the
branch to inquire and view the transactions in the account.
● Remote banking: Remote terminals at the customer site connected to the respective
branch through a modem, enabling the customer to make inquiries regarding his
accounts, on-line, without having to move from his office.
● Anytime banking- Anywhere banking: Installation of ATMs which offer non-stop cash
withdrawal, remittances and inquiry facilities. Networking of computerized branches
inter-city and intra-city, will permit customers of these branches, when interconnected,
to transact from any of these branches.
● Telebanking: A 24-hour service through which inquiries regarding balances and
transactions in the account can be made over the phone.
● Electronic Banking: This enables the bank to provide corporate or high value
customers with a Graphical User Interface (GUI) software on a PC, to inquire about
their financial transactions and accounts, cash transfers, cheque book issue and inquiry
on rates without visiting the bank. Moreover, LC text and details on bills can be sent
by the customer, and the bank can download the same. The technology used to provide
this service is called electronic data interchange (EDI). It is used to transmit business
transactions in computer-readble form between organizations and individuals in a
standard format.
● As information is centralized and updates are available simultaneously at all places,
single-window service becomes possible, leading to effective reduction in waiting
time.
For the bank. During the last decade, banks applied IT to a wide range of back and front
office tasks in addition to a great number of new products. The major advantages for the bank
to implement IT are:
● Availability of a wide range of inquiry facilities, assisting the bank in business
development and follow-up.
● Immediate replies to customer queries without reference to ledger-keeper as terminals
are provided to Managers and Chief Managers.
● Automatic and prompt carrying out of standing instructions on due date and generation
of reports.
● Generation of various MIS reports and periodical returns on due dates.
● Fast and up-to-date information transfer enabling speedier decisions, by
interconnecting computerized branches and controlling offices.
Social Media Attacks – Cybercriminals are leveraging social media as a medium to distribute
a complex geographical attack called “water holing”. The attackers identify and infect a
cluster of websites they believe members of the targeted organization will visit2.
Mobile Malware – Security experts have seen risk in mobile device security since the early
stages of their connectivity to the Internet. The minimal mobile foul play among the long list
of recent attacks has users far less concerned than they should be. Considering our culture’s
unbreakable reliance on cell phones and how little cybercriminals have targeted them, it
creates a catastrophic threat.
Third-party Entry – Cybercriminals prefer the path of least resistance. Target is the poster
child of a major network attack through third-party entry points. The global retailer’s HVAC
vendor was the unfortunate contractor whose credentials were stolen and used to steal
financial data sets for 70 million customers3.
Neglecting Proper Configuration – Big data tools come with the ability to be customized to
fit an organization’s needs. Companies continue to neglect the importance of properly
configuring security settings. The New York Times recently fell victim to a data breach as a
result of enabling only one of the several critical functionalities needed to fully protect the
organization’s information4.
Outdated Security Software – Updating security software is a basic technology management
practice and a mandatory step to protecting big data. Software is developed to defend against
known threats. That means any new malicious code that hits an outdated version of security
software will go undetected.
Social Engineering – Cybercriminals know intrusion techniques have a shelf life. They have
turned to reliable non-technical methods like social engineering, which rely on social
interaction and psychological manipulation to gain access to confidential data. This form of
intrusion is unpredictable and effective.
Lack of Encryption – Protecting sensitive business data in transit and at rest is a measure few
industries have yet to embrace, despite its effectiveness. The health care industry handles
extremely sensitive data and understands the gravity of losing it – which is why HIPAA
compliance requires every computer to be encrypted.
Corporate Data on Personal Devices – Whether an organization distributes corporate phones
or not, confidential data is still being accessed on personal devices. Mobile management tools
exist to limit functionality but securing the loopholes has not made it to the priority list for
many organizations.
Inadequate Security Technology – Investing in software that monitors the security of a
network has become a growing trend in the enterprise space after 2014’s painful rip of data
breaches. The software is designed to send alerts when intrusion attempts occur, however the
alerts are only valuable if someone is available to address them. Companies are relying too
heavily on technology to fully protect against attack when it is meant to be a managed tool.