0% found this document useful (0 votes)
48 views23 pages

CA Important Questions & Solution

Uploaded by

antariksh.10847
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views23 pages

CA Important Questions & Solution

Uploaded by

antariksh.10847
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

CA IMPORTANT QUESTIONS & SOLUTION

Q1.What is meant by “generation” in computer terminology? How many computer generations


are there? Explain.
OR
Write a short note on evolution of computers? Explain the generations of computer.

Ans. ‘Generation’ in computer terminology is a ‘step’ ahead in technology. As you go through


the history of evolution of computers, you will find that the earliest computers were big in size,
consumed a lot of power and heated up quickly, due to which it had to be shut down,
frequently to be cooled. They were very expensive in terms of development and maintenance.
As technology improved, computers became compact, faster and more powerful. From a user’s
perspective, they become user friendly and more affordable. This has largely contributed
towards the popularity that computers have gained these days.
The term ‘generation’ was earlier used only to distinguish between varying hardware
technologies but was later extended to include both hardware and software. A comparison of
generations is made below.
First Generation Computers (1940 to 1956)
The first generation of computers was characterized by vacuum tubes in the circuitry and
magnetic drums for memory.
These computers were enormous in size, used great deal of electricity and were expensive to
operate. They also had limited storage capacity.
First generation computers relied on machine language (binary-coded program) to perform
operations and could solve only one problem at a time. Punched cards and paper tapes were
used to input data and instructions, and output was displayed on printouts.
Early computers like ENIAC, EDVAC and UNIVAC can all be classified as first generation
computers.
Advantages
1. These computer were based on vacuum tube technology (this make possible for advent of
electronic digital computers.
2. Fastest computing devices of their times (Computation time was in milliseconds).
Disadvantages
1. Too bulky in size
2. Generate large amount of heat because of use of thousand of vacuum tubes.Therfore air
conditioning was essential.
3. Non-portable and very slow equipments.
4. Lacked in versatility and speed.
5. Expensive to operate and used a large amount of electricity.
6. Unreliable and prone to frequent hardware failure. So, constant maintenance was required.
7. Difficult to program and use since machine language was used.
8. Limited commercial use because each individual component had to be assembled manually.

Second Generation Computers (1956 to 1963)


In the early 1950s, the discoveries of Transistor and Magnetic core memory changed the image
of computers – from unreliable to highly reliable machines with increased capability, and higher
storage capacity.

The transistor was far superior to the vacuum tube, allowing computers to become smaller in
size, cheaper, reliable and more energy efficient. Though transistor still generated a great deal of
heat, it was a substantial improvement over the vacuum tube.

Second generation of computers was also characterized by allowing programmers to specify


instructions in symbolic (or assembly) language rather than cryptic binary machine language.
High level programming languages like COmmon Business Oriented Language (COBOL) and
FORmula TRANslation (FORTRAN) were also being developed at this time.

Due to the increase in the cost of expanding programming, these machines were expensive to
purchase and operate. Such computers were, therefore, mostly found in large computer centers
or government/private laboratories with many programmers and support professionals.

Example:-PDP-8,IBM 1401 and IBM 7090

Advantages

1. Smaller in size compared to first generation computer because of Transistor.

2. Reliable and less prone to hardware failure. So less maintenance is required.

3. Reduce computational time from milliseconds to microseconds.

4. Better portability.

5. Less heat generated.

6. Wide commercial use.

7. Programming became more time-efficient since Assembly or Symbolic language was used.

Disadvantages

1. Air conditioning required.

2. Manual assembly of individual components into a functioning unit was required.

3. Commercial production was difficult and costly.

Third Generation Computers (1964 to 1971)


The development of Integrated Circuit by Jack Kilby, an engineer with Texas Instruments, in
1958, was the hallmark of the third generation of computers. Punched cards and printouts gave
way to devices like keyboards and monitors making it easier for the user to interact with the
computer. Computer manufacturers could provide a range of accessories like the cathode ray
tube display devices, page printers, consoles etc.
Existence of an operating system allowed the device to run various applications at one time
with the central program monitoring the memory.
For the first time, computers were being widely used in business for areas like :
● Accounting
● Payroll
● Billing
● Tracking Inventory, etc.
Third generation computers were substantially smaller and cheaper than their predecessors.
Example:- NCR 395,B6500

Advantages
1. Based on Integrated Circuit(IC).
2. Reduce computational time from microsecond to nanoseconds.
3. Better portable and reliable than 2nd generation computers.
4. Consume less power and generated less heat.In some cases,air conditioning was still required.
5. Maintenance cost was quite low since hardware rarely failed.

Disadvantages
1. Highly sophisticated technology required for the manufacture of IC chips.

Fourth Generation Computers (1971 to 1995)


The trend in 1970s was to move from single-purpose but powerful computers towards cheaper
computer systems that could support a large range of applications.
A new revolution in computer hardware came about which could shrink the computer logic
circuitry and its components using the Large Scale Integration (LSI) technology. Hundreds of
components could now fit onto a single chip.
In the 1980s, Very Large Scale Integration (VLSI) squeezed hundreds of thousands of
components onto a single chip. This shrinking trend continued and led to the introduction of
personal computers (PCs) – programmable machines that are small enough and inexpensive so
that these can be purchased and used by individuals. Companies like Apple Computers and
IBM introduced very successful PCs.

The IC technology was not only used to construct the processor, but also for the construction of
memory. The first memory chip was constructed in 1970 and could hold 256 bits.

Advantages

1. Smallest in size because of high component density.

2. Very reliable.

3. Heat generated is negligible.

4. No air conditioning required in most cases.

5. Much faster in computation than previous generation.

6. Hardware failure is negligible and hence minimal maintenance is required.

7. Easily portable because of their small size.


8. Totally general purpose.

9. Minimal labour and cost involved at assembly stage.

10. Cheapest among all generations.

11. Microprocessor based system.

Disadvantage

1. Highly sophisticated technology required for the manufacture of LSI chips.

Fifth Generation Computers (1995- onwards)

The fifth generation of computers characterized by Artificial Intelligence, Parallel Processing


and Mega chips (SLSI) is in the process of development. The goal here is to develop devices that
are capable of learning and responding to natural language input. This generation of computers
is using new technologies in very large scale integration, along with new programming
languages and will be capable of amazing feats, in the area of artificial intelligence, such as
voice recognition. It was based on the concept of Artificial Intelligence(AI) i.e. try to simulate
the human way of thinking & reasoning.AI includes areas like Expert System(ES),Natural
Language Processing(NLP),Speech recognition etc.

Q2. List the various characteristics of a computer.


Ans. CHARACTERISTICS OF
COMPUTER

1. Automatic: A machine is said to be automatic if it works without human


intervention. Once they start on a job, they carry on until it is completed without any human
assistance.
2. Speed: It is a very fast device. The latest computer can perform a take in the billionth portion
of a second.
3. Accuracy: The degree of accuracy of a computer is very high. It can find out the
results of mathematical calculation accurate up to 20 places of decimal and very speedily.
4. Diligence: Unlike humans a computer is free from tiredness and lack of
concentration. It can continuously work for hours, without creating errors or grumbling.
5. Versatility: A computer is capable of performing almost any task, if the task can be reduced
to a series of logical steps. It can send and receive data in various forms. like text, sound,
video, graphics etc. Because of this it is used in all fields of life.
6. Storage: It can store very large amount of data and also it can retrieve
the information required, in fractions of a second. After several years the
information can be recalled and it would be as accurate as on the day when it
was inputted to the computer.
7. Resource Sharing: With the tremendous growth in computer technology, computers today
have the capability to connect with each other. This has made the sharing of costly resources
like printers possible. Apart from device sharing, data and information can also be shared
among group of computers.

Q3. Explain classification of computers.


Ans. 1 Microcomputers
Microcomputers are small, low-cost and single-user digital computer. They consist of CPU,
input unit, output unit, storage unit and the software. Although microcomputers are
stand-alone machines, they can be connected together to create a network of computers that can
serve more than one user. IBM PC based on Pentium microprocessor and Apple Macintosh are
some
examples of microcomputers. Microcomputers include desktop computers, notebook computers
or laptop, tablet computer, handheld computer, smart phones and netbook, as shown in
a) Desktop Computer or Personal Computer (PC) is the most common type of
microcomputer. It is a stand-alone machine that can be placed on the desk. Externally, it
consists of three units—keyboard, monitor, and a system unit containing the CPU,
memory, hard disk drive, etc. It is not very expensive and is suited to the needs of a
single user at home, small business units, and organizations. Apple, Microsoft, HP, Dell
and Lenovo are some of the PC manufacturers.
b) Notebook Computers or Laptop resemble a notebook. They are portable and have all the
features of a desktop computer. The advantage of the laptop is that it is small in size (can
be put inside a briefcase), can be carried anywhere, has a battery backup and has all the
functionality of the desktop. Laptops can be placed on the lap while working (hence the
name). Laptops are costlier than the desktop machines.
c) Netbook These are smaller notebooks optimized for low weight and low cost, and are
designed for accessing web-based applications. Starting with the earliest netbook in late
2007, they have gained significant popularity now. Netbooks deliver the performance
needed to enjoy popular activities like streaming videos or music, emailing, Web surfing
or instant messaging. The word netbook was created as a blend of Internet and notebook.
d) Tablet Computer has features of the notebook computer but it can accept input from a
stylus or a pen instead of the keyboard or mouse. It is a portable computer. Tablet
computer are the new kind of PCs.
e) Handheld Computer or Personal Digital Assistant (PDA) is a small computer that can
be held on the top of the palm. It is small in size. Instead of the keyboard, PDA uses a
pen or a stylus for input. PDAs do not have a disk drive. They have a limited memory and
are less powerful. PDAs can be connected to the Internet via a wireless connection. Casio
and Apple are some of the manufacturers of PDA. Over the last few years, PDAs have
merged into mobile phones to create smart phones.
f) Smart Phones are cellular phones that function both as a phone and as a small PC. They
may use a stylus or a pen, or may have a small keyboard. They can be connected to the
Internet wirelessly. They are used to access the electronic-mail, download music, play
games, etc. Blackberry, Apple, HTC, Nokia and LG are some of the manufacturers of
smart phones.
2 Minicomputers
Minicomputers are digital computers, generally used in multi-user systems. They
have high processing speed and high storage capacity than the microcomputers. Minicomputers
can support 4–200 users simultaneously. The users can access the minicomputer through their
PCs or terminal. They are used for real-time applications in industries, research centers, etc.
PDP 11, IBM (8000 series) are some of the widely used minicomputers.

3 Mainframe Computers
Mainframe computers are multi-user, multi-programming and high performance
computers. They operate at a very high speed, have very large storage capacity and can handle
the workload of many users. Mainframe computers are large and powerful systems generally
used in centralized databases. The user accesses the mainframe computer via a terminal that
may be a dumb terminal, an intelligent terminal or a PC. A dumb terminal cannot store data or
do processing of its own. It has the input and output device only. An intelligent terminal has the
input and output device, can do processing, but, cannot store data of its own. The dumb and the
intelligent terminal use the processing power and the storage facility of the mainframe
computer. Mainframe computers are used in organizations like banks or companies, where
many people require frequent access to the same data. Some examples of mainframes are CDC
6600 and IBM ES000 series.

4 Supercomputers
Supercomputers are the fastest and the most expensive machines. They have high
processing speed compared to other computers. The speed of a supercomputer is generally
measured in FLOPS (FLoating point Operations Per Second). Some of the faster supercomputers
can perform trillions of calculations per second. Supercomputers are built by interconnecting
thousands of processors that can work in parallel.
Supercomputers are used for highly calculation-intensive tasks, such as, weather forecasting,
climate research (global warming), molecular research, biological research, nuclear research and
aircraft design. They are also used in major universities, military agencies and scientific research
laboratories. Some examples of supercomputers are IBM Roadrunner, IBM Blue gene and Intel
ASCI red. PARAM is a series of supercomputer assembled in India by C-DAC (Center for
Development of Advanced Computing), in Pune. PARAM Padma is the latest machine in this
series. The peak computing power of PARAM Padma is 1 Tera FLOP (TFLOP).

Q4. Draw the block diagram of a computer. Also, describe each of the major building blocks of a digital
computer.
Ans.
A typical computer system has an Input Unit, a Central Processing Unit, Memory Unit and
Output Unit. This is also known as Von Neumann Architecture of the computer. Over the years
the technology has changed but basic design/architecture is not changed.
Input Unit:
The input unit links the external environment with the computer system. Data and
instructions inputted to the computer system through this unit. The data can be
inputted to the computer by various means, it can be entered through a keyboard,
through a card reader, through a mouse etc. All the data supplied to the computer is
transformed into the binary codes. Unit called input interface accomplishes this
transformation. Input interface is designed
to match the unique physical or electrical characteristics of input devices with the
requirements of the computer system for example Keyboard, Mouse, Joy stick, Light
Pen, Punched Cards, Optical Mark Reader, Magnetic Tape, Optical Character Reader
etc.

Output Unit:
It links the computer with the external environment. The job of an output unit is just
opposite of an input unit. It supplies information and results of computation to the
outside world. As computers work with binary code, the results produced are also in
the binary form. Hence, before supplying the results to the outside world, it must be
converted to human readable form. Unit called output interface accomplishes this task.
Output interface is
designed to match the unique physical or electrical characteristics of output devices
(e.g. Monitor, Printer, Plotter) with the requirement of the external environment.

Central Processing Unit:


The control unit and ALU of the computer are together known as the Central
Processing Unit (CPU). As in a human body, the brain takes all major decisions and
controls all body parts, similarly, in a computer system, all major computations are
made by the CPU and is also responsible for activating and controlling the operations of
other units. The CPU performs the following functions:
● It performs all calculations.
● It takes all decisions.
● It controls all units of the computer.

1. Control Unit:
The control unit is able to maintain order and direct the operation of the entire system.
By selecting, interpreting, and decoding, it executes the program instructions. This unit
acts as a central nervous system for the computer. It manages and coordinates the entire
computer system. It directs the flow of data through the CPU, and to and from other
devices. Control unit controls the input and output devices and the passing of data to
the Arithmetic/Logical Unit for computation. The control unit stores the CPU's
microcode, which contains the instructions for all the tasks the CPU can perform.
2.Arithmetic Logic Unit:
The Arithmetic Logic Unit (ALU) of a computer system is the place where the actual
execution of the instructions takes place during the processing operation. The data and
instructions, stored in the primary storage (RAM or Cache) prior to processing, are
transferred as and when needed to the ALU. ALU uses various CPU registers to store
intermediate results of computations. The Final result of computations is transferred
back to the primary storage. After the completion of processing, the final results that are
stored in the primary storage unit are released to an output device or to a secondary
storage device.
The ALU is designed to perform all the basic Arithmetic Operations – add, subtract,
multiply, divide, Relational Operations such as comparisons using < , <=, > , >=, == etc
and Logical Operations such as AND, OR, NOT.

Storage Unit (Memory):


The storage unit of the computer holds data and instructions that are entered through
the input unit, before they are processed. It preserves the intermediate and final results
before these are sent to the output devices. It also saves the data for the later use. The
various storage devices of a computer system are divided into two categories.

1. Primary Storage: Stores and provides very fast. This memory is generally used to
hold the program being currently executed in the computer, the data being received
from the input unit, the intermediate and final results of the program. The primary
memory is temporary in nature. The data is lost, when the computer is switched off. In
order to store the data permanently, the data has to be transferred to the secondary
memory.
The cost of the primary storage is more compared to the secondary storage. Therefore
most computers have limited primary storage capacity.

2. Secondary Storage: Secondary storage is used like an archive. It stores several


programs, documents, data bases etc. The programs that you run on the computer are
first transferred to the primary memory before it is actually run. Whenever the results
are saved, again they get stored in the secondary memory. The secondary memory is
slower and cheaper than the primary memory. Some of the commonly used secondary
memory devices are Hard disk, CD, etc.

Q5. Write short notes on the following input devices


a) OMR
b) OCR
c) MICR

Ans. a) MICR

Magnetic Ink Character Recognition is a character recognition system that uses special ink and
characters. When a document that contains this ink needs to be read, it passes through a
machine, which magnetizes the ink and then translates the magnetic information into
characters.
MICR technology is used by banks. Numbers and characters found on the bottom of checks
(usually containing the check number, sort number, and account number) are printed using
Magnetic Ink. To print Magnetic Ink need, you need a laser printer that accepts MICR toner.

MICR provides a secure, high-speed method of scanning and processing information.

MICR, is a character recognition technology used primarily by the banking industry to facilitate
the processing of cheques. The technology allows computers to read information (such as
account numbers) off printed documents. Unlike barcodes or similar technologies, however,
MICR codes can be easily read by humans.

MICR characters are printed in special typefaces with a magnetic ink or toner, usually
containing iron oxide. As a machine decodes the MICR text, it first magnetizes the characters in
the plane of the paper. Then the characters are passed over a MICR read head, a device similar
to the playback head of a tape recorder. As each character passes over the head it produces a
unique waveform that can be easily identified by the system.

The use of magnetic printing allows the characters to be read reliably even if they have been
overprinted or obscured by other marks, such as cancellation stamps and signature. The error
rate for the magnetic scanning of a typical check is smaller than with optical character
recognition systems. For well printed MICR documents, the "can't read" rate is usually less than
1% while the substitution rate (misread rate) is in the order of 1 per 100,000 characters.

b)OCR

Optical character recognition, usually abbreviated to OCR, is the mechanical or electronic


translation of scanned images of handwritten, typewritten or printed text into machine-encoded
text. It is widely used to convert books and documents into electronic files, to computerize a
record-keeping system in an office, or to publish the text on a website. OCR makes it possible to
edit the text, search for a word or phrase, store it more compactly, display or print a copy free of
scanning artifacts, and apply techniques such as machine translation, text-to-speech and text
mining to it. OCR is a field of research in pattern recognition, artificial intelligence and
computer vision.

OCR systems require calibration to read a specific font; early versions needed to be
programmed with images of each character, and worked on one font at a time. "Intelligent"
systems with a high degree of recognition accuracy for most fonts are now common. Some
systems are capable of reproducing formatted output that closely approximates the original
scanned page including images, columns and other non-textual components.

It involves reading text from paper and translating the images into a form that the computer can
manipulate (for example, into ASCII codes).
An OCR system enables you to take a book or a magazine article, feed it directly into an
electronic computer file, and then edit the file using a word processor.

All OCR systems include an optical scanner for reading text, and sophisticated software for
analyzing images. Most OCR systems use a combination of hardware (specialized circuit
boards) and software to recognize characters, although some inexpensive systems do it entirely
through software. Advanced OCR systems can read text in large variety of fonts, but they still
have difficulty with handwritten text.

The potential of OCR systems is enormous because they enable users to harness the power of
computers to access printed documents. OCR is already being used widely in the legal
profession, where searches that once required hours or days can now be accomplished in a few
seconds.

Benefits

● Includes assessment of coursework, the best way to assess the candidate's level of
practical skills in computing.

● Simple, straightforward assessment, with all examination papers externally assessed. For
the AS level, coursework weighting reduced to 20%.

● Content revised to include greater emphasis on programming and removal of topics


entirely ICT based.

● A2 exam paper cut to two hours in length, with AS one and a half hours.

● This specification is excellent preparation for those students intending to pursue


computing studies at degree level, or for anyone considering any kind of career in
computing.

c) OMR

● Optical Mark Recognition (also called Optical Mark Reading and OMR) is the process
of capturing human-marked data from document forms such as surveys and tests.
● Optical Mark Recognition also called Mark Reading (“mark sensing”). Through the
technology of OMR a simply and reasonable method of entering data by document into
a computer system is enable. Optical Mark Reading (OMR) is one of the fastest and
safest methods for data-entry into a host until today.
● OMR forms are used for collecting data. Preparation of this type of form involves several
critical steps.
● Obviously, one needs to thoughtfully determine the kind of data that needs to be
gathered and layout the questions in a clear, understandable format. These questions are
then sent to the designer to figure out the best way to present these questions in an
attractive layout. The designer needs to understand how the OMR scanner reads this
information and position the questions and related response bubbles in just the right
position on the form to assure that the scanner can accurately read the information.
When the form design or layout is approved by the customer, the electronic form is
moved to the printing phase. It is critical that the printer also understands the
importance of consistent positioning of the printed sheet according to the layout.
● OMR is a great time-saving process in collecting data but can also create a huge
headache if not done correctly. It's important to do some homework and get a good
handle on how OMR works before jumping into an OMR evaluation survey project.
There are many good resources to be found on the internet that can assist you in one or
all of the steps involved. Just google "omr data collection services" for an extensive list.

What are the main advantages of OMR-Technology?

● simplicity: “Tick box answers” are marked with a by pen or pencil


● functionality: the OMR-Reader scans the form, detect the presence of marks and passes
information to the computer
● speed: OMR-Readers can read up to 9,000 forms DIN A4 per hour
● flexibility: OMR-readers tests for plausibility’s and transmit the processed information to
the computer with up to 38,400 Baud.
● The interpretation based on a simple “Yes/No” answer.

When to use OMR-readers?

● on applications where other entering possibilities are not present


● if a large volume of data has to be collected and processed within a short period of time
● if the persons who have to collect the data are not regular computer users
● if information mainly comprises the selection of categories or “Tick box answers” to
multiple choice questions

Where do the OMR-readers work?

● examinations at schools, colleges and universities


● public opinion polls of research institutes
● assessment tests
● counting of votes
● staff opinion surveys

Q6. Explain Difference between RAM & ROM .

Ans.

RAM ROM

▪ Used in the computer’s regular operations, ▪ Used mostly in a computer’s start-up


after loading the OS. process.

▪ With RAM, writing data is a fast process. ▪ Writing data to ROM is very slow.

▪ RAM is a type of volatile memory, meaning ▪ ROM is a type of non-volatile memory,


the stored data is lost when powering off. meaning that the data will not be lost when
power is removed.

▪ A RAM chip can store quite a lot of data, ▪ ROM chips usually store only a few
up to 16 GB. megabytes of information, around 4 MB per
chip.

▪ There are two main types of RAM: dynamic ▪ ROM types include EPROM, EEPROM,
(DRAM) and static (SRAM). PROM and Mask ROM.
Q7. What is Computer software? Discuss the types of softwares.
Ans. Software is a set of electronic instructions consisting of complex codes (Known as
programs) that make the computer perform tasks. In other words, software tells the computer
what to do, some programs exist primary for the computer’s use & help the computer perform
& manage its own task.

Types of software
A wide variety of computer software is available today. Although the range of software
available is vast and varied, most software can be divided into two major categories:
1. System software,
2. Application software

System Software
System software is a set of one or more programs designed to control the operation and extend
the processing capability of a computer system. It acts as an intermediary between the computer
hardware and application program, it also provides interface between user and computer In
general, a computer's system software performs one or more of the following functions:
1. Supports the development of other application software.
2. Supports the execution of other application software.
3. Monitors the effective use of various hardware resources such as CPU, memory,
peripherals, etc.
4. Communicates with and controls the operation of peripheral devices such as printer,
disk, tape, etc.
5. It helps the hardware components work together and provides support for the
6. Development and execution of application software (programs).
7. The programs included in a system software package are called system programs and
the programmers who prepare system software are referred to as system programmers.

Advantages
1. Good system software allows application packages to be run on the computer with less
time and effort.
2. Without system software, application packages could not be run on the computer
system. A system software is an indispensable part of a total computer system.
3. A computer without some kind of system software would be very ineffective and most
likely impossible to operate.

APPLICATION SOFTWARE

The software that a user uses for accomplishing a specific task is the application software.
Application software may be a single program or a set of programs. A set of programs that are
written for a specific purpose and provide the required functionality is called software package.
Application software is written for different kinds of applications—graphics, word processors,
media players, database applications, telecommunication, accounting purposes etc.
Some examples of application software packages are as follows:
 Word Processing Software: For writing letter, reports, documents etc. (e.g. MS-WORD).
 Image Processing Software: For assisting in drawing and manipulating graphics (e.g.
Adobe Photoshop).
 Accounting Software: For assisting in accounting information, salary, tax returns (Tally
software).
 Spreadsheet Software: Used for creating budget, tables etc. (e.g. MS-Excel).
 Presentation Software: To make presentations, slide shows (e.g. MS-PowerPoint)
 CAD/CAM Software: To assist in architectural design. (e.g. AutoCAD, Autodesk)
 Geographic Information Systems: It captures, stores, analyzes, manages, and presents
data, images and maps that are linked to different locations. (e.g. ArcGIS)
 Web Browser Software: To access the World Wide Web to search documents, sounds,
images etc. (e.g. Internet Explorer, Netscape Communicator, Chrome).

Q8. What is operating system? Explain the main functions of OS.

Ans. Operating system (OS) is the software that provides an interface between the computer
hardware, and the application programs or users. An operating system is a software which
performs all the basic tasks like file management, memory management, process management,
handling input and output, and controlling peripheral devices such as disk drives and printers.
Some popular Operating Systems include Linux, Windows, Macintosh, MS-DOS, etc.

FUNCTIONS OF OS

1) Process Management—The process management activities handled by the OS are—(1)


control access to shared resources like file, memory, I/O and CPU, (2) control execution
of applications, (3) create, execute and delete a process (system process or user process),
(4) cancel or resume a process (5) schedule a process, and (6) synchronization,
communication and deadlock handling for processes.
2) Memory Management—The activities of memory management handled by OS are—(1)
allocate memory, (2) free memory, (3) re-allocate memory to a program when a used
block is freed, and (4) keep track of memory usage.
3) File Management—The file management tasks include—(1) create and delete both files
and directories, (2) provide access to files, (3) allocate space for files, (4) keep back-up of
files, and (5) secure files.
4) Device Management—The device management tasks handled by OS are—(1) open,
close and write device drivers, and (2) communicate, control and monitor the device
driver.
5) Protection and Security—OS protects the resources of system. User authentication, file
attributes like read, write, encryption, and back-up of data are used by OS to provide
basic protection.
6) User Interface or Command Interpreter—Operating system provides an interface
between the computer user and the computer hardware. The user interface is a set of
commands or a graphical user interface via which the user interacts with the
applications and the hardware.
Q9. What is GUI? Explain the terms Directory, File, Volume, Volume lable, Drive name.
Ans. GUI(Graphical user interface)
A Graphical user interface (GUI) is a type of user interface that allows users to interact with
electronic devices using images rather than text commands. GUIs can be used in computers,
hand-held devices such as MP3 players, portable media players or gaming devices, household
appliances and office equipment. A GUI represents the information and actions available to a
user through graphical icons and visual indicators such as secondary notation, as opposed to
text-based interfaces, typed command labels or text navigation.
Elements of a GUI include such things as: windows, pull-down menus, buttons, scroll bars,
iconic images, wizards, the mouse. With the increasing use of multimedia as part of the GUI,
sound, voice, motion video, and virtual reality interfaces seem likely to become part of the GUI
for many applications. A system's graphical user interface along with its input devices is
sometimes referred to as its "look-and-feel."
Components of GUI
1. Program icons : Those icons which represent programs. Program can be run by double
click on the icon by mouse.
2. Object icons: All those icons which represent object like devices, files, folders, ect are
called object icons.
3. Menu: Menus allow the user to execute commands by selecting from a list of choices.
Options are selected with a mouse or other pointing device within a GUI.
4. List & drop-down list: List boxes display various choices within a box. An item of choice
is selected by clicking the mouse on it.
5. Check-box, radio button, text box, Buttons & Toolbars are also components of GUI.
COMMON TERMINOLOGIES
1) DIRECTORY
A computer directory refers to the hierarchy of folders within folders that make up the
computer system. A directory in general is an approach to organizing information. In computer
file systems, a directory is named group of related files that are separated by the naming
convention from other group of files.
Files and folders are usually viewed in a hierarchical format: the top of hierarchy for any
storage medium is called the “Root directory”. A directory that is below another directory is
called a subdirectory. A directory above a sub directory is called a parent directory.
2) FILE
It is a string used to uniquely identify a file stored on the file system. Different file systems
impose different restrictions on length and allowed characters on filenames. A filename includes
one or more of these components:
● Directory (or path) – directory tree (e.g., /usr/bin etc.)
● file – base name of the file
● type (format or extension) – indicates the content type of the file (e.g., .txt, .exe,
.COM, etc.)
There are many different types of files: data files, text files, program files, directory files and so
on. Different types of files store different types of information. For example program files store
programs, whereas text files store text. There can only be one file with exact same file name in
any particular folder.

3) VOLUME:
Volume refers to tape or disk that stores computer data. A volume or logical drive is a single
accessible storage area with a single file system Sometimes large hard disk are divided into
several volumes called partitions, each of which is treated as separate disk.

4) VOLUME LABEL:
Volume label refers to a name for disk or tape. For mass volume storage devices, a label is the
name of a storage volume.

5) DRIVE NAME:
Drive name is name assigned to a storage unit such as a hard disk, floppy disk or CD-ROM
when the disk is first created.

Q10. What are Computer Languages?

Ans. Machine Language


⮚ A program written in machine language is a collection of binary digits or bits
that the computer reads and interprets. It is a system of instructions and data
executed directly by a computer’s CPU. It is also referred to as machine code or
object code. It is written as strings of 0’s and 1∙s,
Some of the features of a program written in machine language are as follows:
⮚ The computer can understand the programs written in machine language
directly. No translation of the program is needed.
⮚ Program written in machine language can be executed very fast (Since no
translation is required).
⮚ Machine language is defined by the hardware of a computer. It depends on the
type of the processor or processor family that the computer uses, and is thus
machine-dependent. A machine- level program written on one computer may
not work on another computer with a different processor.
⮚ Computers may also differ in other details, such as memory arrangement,
operating systems, and peripheral devices; because a program normally relies on
such factors, different computer may not run the same machine language
program, even when the same type of processor is used.
⮚ Most machine-level instructions have one or more opcode fields which specify
the basic instruction type (such as arithmetic, logical, jump, etc), the actual
operation (such as add or compare), and some other fields.
⮚ It is difficult to write a program in machine language as it has to be written in
binary code. For e.g., 00010001 11001001. Such programs are also difficult to
modify.
⮚ Since writing programs in machine language is very difficult, programs are
hardly written in machine language.
Assembly Language
A program written in assembly language uses symbolic representation of machine codes
needed to program a particular processor (CPU) or processor family. This representation
is usually defined by the CPU manufacturer, and is based on abbreviations (called
mnemonics) that help the programmer remember individual instructions, registers, etc.
Small, English-like representation is used to write the program in assembly language
Assembly language programs are easier to write than the machine language programs,
since assembly language programs use short, English-like representation of machine code.
For e.g.:
ADD 2, 3
LOAD A
SUB A, B
⮚ The program written in assembly language is the source code, which has to be converted
into machine code, also called object code, using translator software, namely, assembler.
⮚ Each line of the assembly language program is converted into one or more lines of
machine code. Hence assembly language programs are also machine-dependent.
⮚ Although assembly language programs use symbolic representation, they are still
difficult to write.
⮚ Assembly language programs are generally written where the efficiency and the speed
of program are the critical issues, i.e. programs requiring high speed and efficiency.

● High-level Language

A program in a high-level language is written in English-like language. Such languages hide the
details of CPU operations and are easily portable across computers. A high-level language
isolates the execution semantics of computer architecture from the specification of the program,
making the process of developing a program simpler and more understandable with respect to
assembly and machine level languages. Some of the features of a program written in high-level
language are as follows:
⮚ Programs are easier to write, read or understand in high-level languages than in
machine
language or assembly language. For example, a program written in C++ is easier to
understand than a machine language program.
⮚ Programs written in high-level languages is the source code which is converted into the
object code (machine code) using translator software like interpreter or compiler.
⮚ A line of code in high-level program may correspond to more than one line of machine
code.
⮚ Programs written in high-level languages are easily portable from one computer to
another.
Q11. Explain the following w.r.t Excel

a) Conditional Formating

b) Relative addressing and Absolute addressing

c) Graphs & Charts

d) Pivot table

Ans. CONDITIONAL FORMATTING


Conditional formatting is a feature in many spreadsheet applications that allows you to apply
specific formatting to cells that meet certain criteria. It is most often used as color-based
formatting to highlight, emphasize, or differentiate among data and information stored in a
spreadsheet.

Conditions can be following:

Greater than

Less than

Between

Equals to

Top/Bottom Rules

Data Bars

Color scale

b) Cell references are an important part of creating formulas in Excel. Using cell references
allows your formulas to update automatically if the value in a particular cell changes and can
also assist you in updating formulas as cells are copied or moved. There are two basic types of
cell references, each serving a different purpose.
● Relative Cell References
● Absolute Cell References
Relative Cell References

References that will change in relation to the new location of the formula. Relative references
identify cells based on their relationship to the cell containing the reference.
EXAMPLE: In the example shown here, the function in D2 calculates Bob's pay by multiplying
his hours (C2) by his rate of pay (B2). Since the rate of pay varies by student, we can use the Fill
Command to copy the function to the other rows in the spreadsheet. Because the cell references
are relative, the function will adjust to calculate the values in the appropriate rows. In other
words, when we copy the function to Anna's total, her pay will be based on C3*B3.

Absolute Cell References

References that remain the same when a formula is copied to a new location. No matter where
the formula or the values in the original cell are moved, the formula will continue to refer to the
same cell.
EXAMPLE: In the example shown here, the function in C11 calculates Bob's pay by multiplying
his hours (B11) by the rate of pay for all students (C9). Notice the $ before both the column and
row IDs ($C$9). By making the reference to the rate of pay an absolute reference, we can use the
Fill Command to copy the function to the other rows in the spreadsheet. The same rate of pay
will be multiplied by the appropriate hours for each student. In other words, when we copy the
function to Anna's total, her pay will be based on B12*$C$9.

Relative and absolute cell references can be used in all situations that require cell references,
including cell ranges and formulas.
A formula, cell range, or cell reference can have both relative and absolute components. By
adding a dollar sign ($) before either the column or row location or both, that reference becomes
absolute. When adding dollar signs to cell references, only the portion of the reference directly
following the dollar sign is absolute. To keep the entire cell reference constant, place a dollar
sign before both the column and row location.
EXAMPLE: $A$12

c) Graphs represent variations in values of data points over a given duration of time. They are
simpler than charts because you are dealing with different data parameters. Comparing and
contrasting segments of the same set against one another is more difficult.

Types of Graphs Available in Excel

Excel offers three varieties of graphs:

● Line Graphs: Both 2 dimensional and three dimensional line graphs are available in all
the versions of Microsoft Excel. Line graphs are great for showing trends over time.
Simultaneously plot more than one data parameter – like employee compensation,
average number of hours worked in a week and average number of annual
leaves against the same X axis or time.

● Column Graphs: Column graphs also help viewers see how parameters change over
time. But they can be called “graphs” when only a single data parameter is used. If
multiple parameters are called into action, viewers can’t really get any insights about
how each individual parameter has changed. As you can see in the Column graph
below, average numbers of hours worked in a week and average number of annual
leaves when plotted side by side do not provide the same clarity as the Line graph.

● Bar Graphs: Bar graphs are very similar to column graphs but here the constant
parameter (say time) is assigned to the Y axis and the variables are plotted against the X
axis.

D) A pivot table is essentially a dynamic summary report generated from a database. The

database can reside in a worksheet (in the form of a table) or in an external data file. A pivot

table can help transform endless rows and columns of numbers into a meaningful presentation

of the data. Pivot tables are very powerful tool for summarized analysis of the data.

Pivot tables are available under Insert tab » PivotTable dropdown » PivotTable.
Pivot Table Example

Now, let us see Pivot table with the help of example. Suppose you have huge data of voters

and you want to see the summarized data of voter Information per party, then you can use the

Pivot table for it. Choose Insert tab » Pivot Table to insert pivot table. MS Excel selects the data

of the table. You can select the pivot table location as existing sheet or new sheet.

Fields in pivot tables are:

● Column labels − A field that has a column orientation in the pivot table. Each item in

the field occupies a column.

● Report Filter − You can set the filter for the report as year, then data gets filtered as per

the year.

● Row labels − A field that has a row orientation in the pivot table. Each item in the field

occupies a row.

● Values area − The cells in a pivot table that contain the summary data. Excel offers

several ways to summarize the data (sum, average, count, and so on).

After giving input fields to the pivot table, it generates the pivot table with the data as shown

below.
Q12. Explain the in-built functions in EXCEL.

Ans. Functions by Categories

Let us see some of the built in functions in MS Excel.

● Text Functions

o LOWER − Converts all characters in a supplied text string to lower case

o UPPER − Converts all characters in a supplied text string to upper case

o TRIM − Removes duplicate spaces, and spaces at the start and end of a text
string

o CONCATENATE − Joins together two or more text strings.

o LEFT − Returns a specified number of characters from the start of a supplied


text string.

o MID − Returns a specified number of characters from the middle of a supplied


text string

o RIGHT − Returns a specified number of characters from the end of a supplied


text string.

o LEN − Returns the length of a supplied text string

o FIND − Returns the position of a supplied character or text string from within a
supplied text string (case-sensitive).

● Date & Time

o DATE − Returns a date, from a user-supplied year, month and day.

o TIME − Returns a time, from a user-supplied hour, minute and second.

o DATEVALUE − Converts a text string showing a date, to an integer that


represents the date in Excel's date-time code.

o TIMEVALUE − Converts a text string showing a time, to a decimal that


represents the time in Excel.

o NOW − Returns the current date & time.

o TODAY − Returns today's date.

● Statistical

o MAX − Returns the largest value from a list of supplied numbers.

o MIN − Returns the smallest value from a list of supplied numbers.

o AVERAGE − Returns the Average of a list of supplied numbers.

o COUNT − Returns the number of numerical values in a supplied set of cells or


values.

o COUNTIF − Returns the number of cells (of a supplied range), that satisfies a
given criteria.

o SUM − Returns the sum of a supplied list of numbers


● Logical

o AND − Tests a number of user-defined conditions and returns TRUE if ALL of


the conditions evaluate to TRUE, or FALSE otherwise

o OR − Tests a number of user-defined conditions and returns TRUE if ANY of the


conditions evaluate to TRUE, or FALSE otherwise.

o NOT − Returns a logical value that is the opposite of a user supplied logical
value or expression i.e. returns FALSE if the supplied argument is TRUE and
returns TRUE if the supplied argument is FAL

● Math & Trig

o ABS − Returns the absolute value (i.e. the modulus) of a supplied number.

o SIGN − Returns the sign (+1, -1 or 0) of a supplied number.

o SQRT − Returns the positive square root of a given number.

o MOD − Returns the remainder from a division between two supplied numbers.

Q13. Explain the applications of IT in Railways

Ans. Information Technology has revolutionized the Railways customer interface over the last
few years and will continue.

Some of the initiatives that would be taken are -

∙ proliferation of cash accepting Automatic Ticket Vending Machines;

∙ Ticketing on mobile phones in the unreserved segment;

∙ PNR status update to passengers through system generated SMS;

∙ an update for train running information; Online booking of retiring rooms at all
important stations;
∙ Online booking of meals on trains for selected en-route stations;

∙ Introduction of e-forwarding note and electronic transmission of railway receipts for


freight customers, which will enable users to carry out freight business with Railways
from the comfort of their homes and offices; and
∙ Computerisation of claims settlement process on Indian Railways.

Q14. Explain the applications of IT in Banking.

Ans. The advantages accruing from computerization are three-directional - to the customer, to the
bank and to the employee.
For the customer. Banks are aware of customer's need for new services and plan to make
them available. IT has increased the level of competition and forced them to integrate the new
technologies in order to satisfy their customers. They have already developed and
implemented a certain number of solutions among them:
● Self-inquiry facility: Facility for logging into specified self-inquiry terminals at the
branch to inquire and view the transactions in the account.
● Remote banking: Remote terminals at the customer site connected to the respective
branch through a modem, enabling the customer to make inquiries regarding his
accounts, on-line, without having to move from his office.
● Anytime banking- Anywhere banking: Installation of ATMs which offer non-stop cash
withdrawal, remittances and inquiry facilities. Networking of computerized branches
inter-city and intra-city, will permit customers of these branches, when interconnected,
to transact from any of these branches.
● Telebanking: A 24-hour service through which inquiries regarding balances and
transactions in the account can be made over the phone.
● Electronic Banking: This enables the bank to provide corporate or high value
customers with a Graphical User Interface (GUI) software on a PC, to inquire about
their financial transactions and accounts, cash transfers, cheque book issue and inquiry
on rates without visiting the bank. Moreover, LC text and details on bills can be sent
by the customer, and the bank can download the same. The technology used to provide
this service is called electronic data interchange (EDI). It is used to transmit business
transactions in computer-readble form between organizations and individuals in a
standard format.
● As information is centralized and updates are available simultaneously at all places,
single-window service becomes possible, leading to effective reduction in waiting
time.
For the bank. During the last decade, banks applied IT to a wide range of back and front
office tasks in addition to a great number of new products. The major advantages for the bank
to implement IT are:
● Availability of a wide range of inquiry facilities, assisting the bank in business
development and follow-up.
● Immediate replies to customer queries without reference to ledger-keeper as terminals
are provided to Managers and Chief Managers.
● Automatic and prompt carrying out of standing instructions on due date and generation
of reports.
● Generation of various MIS reports and periodical returns on due dates.
● Fast and up-to-date information transfer enabling speedier decisions, by
interconnecting computerized branches and controlling offices.

Q15. Discuss the security issues in Information Technology.


Ans. Technology with Weak Security – New technology is being released every day. More times than
not, new gadgets have some form of Internet access but no plan for security. This presents a very
serious risk – each unsecured connection means vulnerability. The rapid development of technology is
a testament to innovators, however security lags severely1.

Social Media Attacks – Cybercriminals are leveraging social media as a medium to distribute
a complex geographical attack called “water holing”. The attackers identify and infect a
cluster of websites they believe members of the targeted organization will visit2.
Mobile Malware – Security experts have seen risk in mobile device security since the early
stages of their connectivity to the Internet. The minimal mobile foul play among the long list
of recent attacks has users far less concerned than they should be. Considering our culture’s
unbreakable reliance on cell phones and how little cybercriminals have targeted them, it
creates a catastrophic threat.
Third-party Entry – Cybercriminals prefer the path of least resistance. Target is the poster
child of a major network attack through third-party entry points. The global retailer’s HVAC
vendor was the unfortunate contractor whose credentials were stolen and used to steal
financial data sets for 70 million customers3.
Neglecting Proper Configuration – Big data tools come with the ability to be customized to
fit an organization’s needs. Companies continue to neglect the importance of properly
configuring security settings. The New York Times recently fell victim to a data breach as a
result of enabling only one of the several critical functionalities needed to fully protect the
organization’s information4.
Outdated Security Software – Updating security software is a basic technology management
practice and a mandatory step to protecting big data. Software is developed to defend against
known threats. That means any new malicious code that hits an outdated version of security
software will go undetected.
Social Engineering – Cybercriminals know intrusion techniques have a shelf life. They have
turned to reliable non-technical methods like social engineering, which rely on social
interaction and psychological manipulation to gain access to confidential data. This form of
intrusion is unpredictable and effective.
Lack of Encryption – Protecting sensitive business data in transit and at rest is a measure few
industries have yet to embrace, despite its effectiveness. The health care industry handles
extremely sensitive data and understands the gravity of losing it – which is why HIPAA
compliance requires every computer to be encrypted.
Corporate Data on Personal Devices – Whether an organization distributes corporate phones
or not, confidential data is still being accessed on personal devices. Mobile management tools
exist to limit functionality but securing the loopholes has not made it to the priority list for
many organizations.
Inadequate Security Technology – Investing in software that monitors the security of a
network has become a growing trend in the enterprise space after 2014’s painful rip of data
breaches. The software is designed to send alerts when intrusion attempts occur, however the
alerts are only valuable if someone is available to address them. Companies are relying too
heavily on technology to fully protect against attack when it is meant to be a managed tool.

You might also like