0% found this document useful (0 votes)
50 views

IT Notes

IT NOTES FREE PDF DOWNLOAD

Uploaded by

monishsardar41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

IT Notes

IT NOTES FREE PDF DOWNLOAD

Uploaded by

monishsardar41
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Unit-1

Basic Internet skills


 Write down the difference between :
1. SRAM and DRAM: -

SRAM DRAM
1) SRAM is faster and more expensive 1) DRAM is slower and less expensive.
2) SRAM is made up of six transistors. 2) DRAM only uses one.
3) SRAM Consumes more Power. 3) DRAM is a memory chip that can store more data.

2. Primary Memory and Secondary Memory.

Primary memory Secondary memory


1) Primary memory is the main memory 1) Secondary memory is the external memory and
and stores data temporarily. stores data permanently.
2) Primary memory is volatile. It loses data 2) Secondary memory is non-volatile data is stored
in case of a power outage. even during power failure.
3) It can be divided into RAM and ROM. 3) They do not have such a classification. Secondary
memories are permanent storage devices like CDs,
DVDs etc.

3. Internet Browser and Search Engine.

Internet browser Search Engine


1) Displays information from the internet, such as 1) Provides line of specific information from the
website, images and videos. internet.
2) Accesses information on the internet through a 2) Display content according to queries and
URL. keywords.
3) Accessible through any device with an internet 3) Accessible through a browser.
connection.

4. Web Page and Website.

Web Page Website


1) Webpage consists of content regarding a 1) Website constitutes content regarding several
single entity type. entities.
2) A direct URL link on a website can be used 2) A domain address is used to access it.
to access it.
Example: Contact Page, Registration Page, Example: Flipcart.Com, Nykaa.com
Service Page about US Page and so on. Amazon.com and more.

KNOWLEDGE IMPROVER mobile no 9875493754


5) Internet and Intranet.

Internet Intranet
1) Internet is used to connect different 1) Intranet is owned by Private firm
networks of Computers Simultaneously.
2) On the internet, there are multiple users. 2) On an intranet, there are limited user.
3) Internet is unsafe. 3) Intranet is safe.

6) Web Browser & Search Engine.

Web browser Search Engine.


1) A web browser is a software application 1) Search Engine is kind of a website where a
used to retrieve data from webpages or user can search for information and the
HTML files present in servers. results based on the same are displayed on
2) No database of its own only comprises a the screen.
memory to store cache and cookies. 2) It has its own database
3) Examples of web browser are: 3) Examples of search engine include:
 Chrome  Google
 Firefox  Yahoo
 Mosaic  Bing
 Internet Explorer  ASK.
 Opera.

7) RAM and ROM.

RAM ROM
1) Temporary storage. 1) Permanent storage.
2) Store data in MBS 2) Store data in GBS.
3) Volatile. 3) Non-Volatile.
4) Used in normal operations. 4) Used too startup process of computer
5) Writing data is faster. 5) Writing data slower.

8) 1's Complement and 2's Complement

1's Complement 2's Complement


1) To generate a 1's complement for any givers 1) To generate a 2's complement for any given
binary number, you only need to invent that binary number, you need to invent it. Then you
number. need to add 1 to the LSB (Least Significant
Bit) of the generate result.
2) For a binary number like 110010 the 1's 2) For binary number like 110010 the 2's
complement is would be 001101. complement would be 001110.

KNOWLEDGE IMPROVER mobile no 9875493754


9) Positional and Non-Positional Number System.

Positional Non-Positional
1) In positional number system, each symbol 1) In non-positional number system, each
represents different, value depending on the symbol represents the same value regardless of
Position they occupy in a number. its position.
2) In positional number system, each system 2) In non-Positional number System, each
has a value that relates to number directly next symbol represents a number with its own place
to it. The total value of a positional number is value.
the total of the resultant value of all positions.

10) Hardware, Software and Firmware.

Hardware Software Firmware.


1) Hardware is a Physical 1) Software’s are generally a Set of 1) Firmware is a set of
entity. instructions to instruct a computer. instructions.
2) Hardware is a Complete 2) Types of Software includes 2) Firmware is saved in
tool on devices. application Software, Shareware, system hardware.
Software etc.
3) Programs are required to 3) Software are usually developed using 3) It is the Program itself.
run the hardware. both low-level languages and high-level
Languages such as Java.

 Short Note on: -


Search Engine : After a number popularly of search engines appeared for these included - Magellan,
Excite, InfoSec, Northern Light and Alto Vista. The first popular search engine on the web was
Yahoo!

Digital India Portal : It is a campaign launched by our country to ensure that the government
services are all available electronically through increasing the internet connectivity and improved
online infrastructure make government services available to citizen electronically by online
infrastructure improvement.

E-mail : Electronic mail, commonly shortened to "email" is a communication method that uses
electronic devices to deliver massages across computer networks. "Email" refers to both the delivery
system and individual massages that are sent and received.

BCD: Binary-Coded decimal (BCD) is a class of binary encodings of decimal numbers where each
digit is represented by a fixed number of bits, usually four or eight.

Gray Code: Gray Code is a form of binary that uses a different method of incrementing from one
number to the ten With Gray code only one-bit changes states from one Position to another.

KNOWLEDGE IMPROVER mobile no 9875493754


Excess -3 Code : It is a Binary Coded Decimal (BCD) Code that is utilized to address decimal digits
that arrange in a particular double structure for general understanding of various computer hardware
components.

7) Characteristics of Computer: -

I) Speed:

 It works in higher speed. It has unit of speed in microsecond, nanosecond, and even
picosecond.
 Process millions (1,000,000) of instruction Pen.

II) Accuracy:

 Computer does not make any mistakes if it has provided accurate instruction. Errors may
occur due to data inconsistency on inaccuracy.

III) Diligence:

 It works efficiently without any tiredness (lack of concentration).


 It can perform millions of tasks on calculation with the same consistency and accuracy.

IV) Reliability:

 A computer is reliable as it gives consistent result for a similar set of data i.e, if we give same
set of input any number of times, we will get the same result.
 Stores a large amount of data. The data may be in any form video / audio / text / image.

V) Logical:

 A computer system has certain characteristics. Such as capability of thinking, reasoning and
learning. These characteristics of computer help them perform tasks logically.

VI) Versatility:

 It performs different kinds of work with same accuracy and efficiency.

VII) Automation:

 Performs all the tasks automatically i.e, it performs tasks without manual intervention.

8) Organization of a Computer System: The basic organization of a computer system is the


processing unit, memory unit, and input-output devices. The processing unit controls all the
functions of the computer system.

KNOWLEDGE IMPROVER mobile no 9875493754


9) Discuss different types of Printers.

Ans: Thene are 13 types of Printers.

I) Inkjet Printers.
II) Laser Printers.
III) Dot matrix Printers,
IV) 3D Printers,
V) LED Printers,
VI) Thermal Printer
VII) Line Printer.
VIII) A3 Printer.
IX) Plotter.
X) Canvas Printer.
XI) Xi) Daisy wheel Printers
XII) Sublimation Printers.
XIII) Digital Printing.

10) Cache memory: Most frequently used data Stoned into Cache for further requirement of that
data. Placed in between CPU and Main memory.

11) Web browser and its function: A web browser, also known as a browser, is an application on
software. The main function of a browser is to allow us to access websites available on the Internet.
Some of the web browsers are Google Chrome, Apple Safari etc. Web browsers are mainly used to
access and display website on the Internet.

12) Briefly explain ASCII, EBCDIC.

 ASCII: American Standard Code for Information Interchange is the most common character
encoding format for text data in computers and on the internet.

 EBCDIC: EBCDIC was devised in 1963 and 1964 by IBM and was announced with the
release of the IBM System/360 line of mainframe computers. It is an eight-bit character
encoding, developed separately from the seven-bit ASCII encoding scheme.

13) Why should we use none more than one search engine simultaneously?

By sending multiple queries to several other search engines this extends the coverage data of the
topic and allows more information to be found. They use the indexes built by other search engines,
aggregating and often fast processing results in unique ways.

KNOWLEDGE IMPROVER mobile no 9875493754


Number system and codes
Number System Conversion

1) Binary to Decimal

i) (𝟏𝟎𝟏𝟏)𝟐 = (? )𝟏𝟎
⇒13 02 11 10
⇒(1x23 ) + (0x2²) + (1x21 ) + (1x2°)
⇒ (1x8) +0+2+1
⇒8+2+1
=⇒(11)10
ii) (𝟏𝟎𝟏𝟏𝟏. 𝟎𝟏)𝟐 = (? )𝟏𝟎
=15 04 13 12 11 10 . 0−1 1−2
= (1*25 ) + (0 ∗ 24 ) + (1 ∗ 23 ) + (1 ∗ 22 )+ (1*21 ) + (1*20 ) + (0*2−1 ) + (1*2−2 )
1
= 32+0+8+4+2+2+1+0+4

=47+0.25
=(47.25)10

2. Octal to Decimal

I )(𝟒𝟏𝟐. 𝟒)𝟖 =(? )𝟏𝟎


=43 12 21 20 . 4−1
=(4*83 ) + (1 ∗ 82 ) + (2 ∗ 81 ) + (2 ∗ 80 ) + (4 ∗ 8−1 )
1
=2048+64+16+2+4*8

=2125+0.5
=(2125.5)10

3. Hexadecimal to Decimal

I) (𝐀𝟔𝟗. 𝟒𝟖)𝟏𝟔 = (? )𝟏𝟎


= 102 61 90 4−1 8−2
=(10 ∗ 162 )+(6 ∗ 161 )+(9 ∗ 160 ) + (4 ∗ 16−1 ) + (8 ∗ 16−2 )
1 1
=2560+96+9+4* +8*
16 256

=2665+0.2812
=(2665.2812)10

KNOWLEDGE IMPROVER mobile no 9875493754


4) Decimal to Binary:

1. (175)10 = (?)2

2 175
2 87 1

2 43 1

2 21 1

2 10 1

2 5 0

2 2 1

1 0

⸫ (75)10 = (10101111)2

2. (125.75)10 = (?)2

2 125
0.75 X 2 = 1.5 = 1 + 0.5
2 62 1 0.5 X 2 = 1.0 = 1 + 0.0

2 31 0

2 15 1

2 7 1

2 3 1
1 1

⸫ (125.75)10 = (1111101.11)2

5) Decimal to Octal:

1. (57.3125)10 = (?)8
0.3125 X 8 = 2.5 = 2 + 0.5
8 57 0.5 X 8 = 4.0 = 4 + 0.0

7 1

⸫ (57.3125)10 = (71.24)8

KNOWLEDGE IMPROVER mobile no 9875493754


6. Decimal to Hexadecimal:

1. (147.45)10 = (?)16

16 147
9 3 0.45 X 16 = 7.2 = 7 + 0.2
0.2 X 16 = 3.2 = 3 + 0.2
⸫ (147.45)10 = (93.73)16

7. Binary to Octal:

1. (1010101110101)2 = (?)8
1010101110101
= 001 010 101 110 101
= (12565)8

9. Octal to Binary:

1. (1532.501)8 = (?)2
1532.501
=1 5 3 2 . 5 0 1
= (001 101 011 010 . 101 000 001)2
= (001101011010.101000001)2

10. Hexadecimal to Binary:

1. (31E7.D2)16 = (?)2
31E7.D2
= 3 1 14 7 . 13 2
= (0011 0001 1110 0111. 1101 0010)2
= (0011000111100111.11010010)2

11. Octal to Hexadecimal:

1. (3724.365)8 = (?)16
3724.365
= 3 7 2 4 . 3 6 5
= 011 111 010 100 . 011 110 101
= (7D4.7A)16
12.Hexadecimal to Octal:
1) (7A5B)16=(?)8
=7 A 5 B
=000111101001011011
= (75133)8

KNOWLEDGE IMPROVER mobile no 9875493754


UNIT 2
Overview of Operating System
1. Define OS. Explain briefly the necessity of OS.

An operating system is manages Computer hardware and system software that and Software,
resources Provides Common services for Computer Programs.
It manages the computer’s memory and process. as well as all of its software and hardware.

2. What are the function of operating system. Explain each of them.

An operating system serves as the intermediary between computer hardware the computer user. Its
primary functions include managing hardware software resources and providing common service for
computer programs. Here are the function of the main function of an operating system.

1. Process Management :-

Process Scheduling : Determines the order in which processes are executed by the CPU. It ensure
efficient CPU utilization by switching between processes.
Creation and Termination : Facilitates the creation and deletion of processes. When a new process
is initiated, the OS allocates resources and schedules it for execution.
Synchronization: Manages process synchronization to ensure that process do not interference with
each other while accessing shored resources with cache resources.
Inter-Process Communication (IPE) : Provides mechanisms for process to Communicate and
synchronize their actions.

2. Memory Management:

Allocation and deallocation : Manage the allocation of memory various application while ensuring
no overlap occurs, and locates memory when it is on longer needed.
Paging and Segmentation : Implements techniques like paging efficiently paging and segmentation
to efficiently use memory and manage the loading of process into memory.
Virtual Memory : Allows the execution of process that may not be completely in memory,
effectively extending the physical memory into the hand disk.

3. File System Management :

File Operations : Provides mechanism to create, delete, read, write and manipulate files.
Directory Management : Organizes files in directories for easy navigation and access.
Access Control : Enforces security measure to control who can access and measures to modify
files.

KNOWLEDGE IMPROVER mobile no 9875493754


4. Device Management :
Device Drivers : Manages hardware devices through software drives that translate general I/O
instruction into device specific operations.
I/O Scheduling : Schedules and prioritizes input and output operations to ensure efficient
processing.
Buffering and Caching: Uses bafflers and caches to enhance the performance of I/O operations by
temporarily storing data in fast – access memory.

5. Security and Access Control :


User Authentication : Ensures that only authorized users can access the system by implementing
login procedures.
Permissions : Controls access to files directions and system resources by setting permission and
access rights.
Encryption and Firewalls : Provides mechanisms to protect data from unauthorized access to
prevent external threats.
6. User Interface :-
Command Line Interface : Allows through users to interact with the OS through text commands.
Graphical User Interface : Provides a visual interface with icons, windows, and menus make
interaction more user- friendly.
7. Networking:
Protocol Support : Implements network protocols to facilitate communication between computers.
Resource Sharing : Allows sharing of resources connections like, files, printers, and internet
connections over a network.
Remote Access : Enables users to access the system remotely through network connections.

8. System Performance Monitoring and optimization.


Resource Monitoring : Continuously monitoring system resources such as CPU, memory, and disk
usage.
Performance Tuning : Adjusts system Settings and permanent to optimize performance based on
the monitored data.
Each of these functions is Crucial that a Computer system runs and in a User friendly ensuring
efficiently, securely, manner.

3. Explain briefly different types of OS.

KNOWLEDGE IMPROVER mobile no 9875493754


Operating Systems are software that manage computer hardware and provide services for
applications. There are several types of operating systems, each with its own characteristics and
functionalities.

1. Single-User Single Operating systems:


 Designed for Single user at a time
 MS - DOS, and examples include Microsoft Windows, early versions of Mac OS
2. Multi User Operating systems:

 Supports multiple users accessing the system simultaneously.


 Provides mechanisms for resource sharing and user management.
 Examples include UNIX , LINUX , and modern versions of Windows.
3. Real-time operating systems:

 Prioritizes quick and predictable response times for critical tasks.


 User applications where timing is circular such as industrial automation and medical devices.
4. Single-tasking Operating systems:.

 Executes one task at a time


 Simple and lightweight, suitable for embedded system and devices with limited resources.
 Examples include early versions of MS-DOS OS and some embedded OS for
microcontrollers.

5 Multi-tasking operating systems:

 Allots multiple tasks or process to run concurrently.


 Time-sharing and multi-tasking are common features, enabling efficient resource utilization.
6. Distributed operating systems:

 Runs and on multiple interconnected Computer and appears as a Single Coherent system.
 Facilitates resource sharing and communication between nodes in a network.
Examples include Google's Chrome OS, distributed versions of Unix/Linux.
7. Embedded Operating systems:

 Optimized for specific hardware and embedded devices.


 Typically lightweight with minimal resource requirements.
 Include embedded, windows embedded.
Each type of OS servers and is optimized servers different purpose and it is optimized for specific
environments and applications.

4. Explain the advantages of multiuser and multitasking OS.

KNOWLEDGE IMPROVER mobile no 9875493754


I) Resource Utilization : They allow multiple users to efficiently share system resources such
as CPU time , memory ,and peripherals maximizing the utilization of hardware resources.
II) Increased Productivity : Multi-tasking enables users to run multiple applications
simultaneously allowing them to switch between tasks seamlessly without waiting for one
task to finish before starting another. This enhances productivity efficiency.
III) Time sharing : Multiuser systems enable multiple users to access the system concurrently,
allowing them to share the system resources effectively. This facilitates and teamwork, as
users can work on projects simultaneously.
IV) Security : Multiuser systems can user permissions and access controls, ensuring the users
can only access authorization. This enhances security prevents unauthorized access to
sensitive information.
V) Fault Tolerance : In multiusers system ,if one users application crashes on encounter on
error, it typically does not effect other user or the system as a whole. This fault tolerance that
the system remains stable and operational even individual in the face of individual
application failures.

5. What do you mean by GUI and CUI?


GUI : Stands for Graphical User Interface, which is a visual way for users to interact with electronic
devices using graphical elements such as icons, buttons, and menus. Examples include operating
systems like Windows, MacOS and Linux.
CUI : CUI Stands for Character User Interface, which relies on text-based commands for interaction.
Users communicate with the system by typing commands into a terminal or command prompt.
Classic examples include MS-DOS and Unix/Linux Command Line Interfaces.
6. What is Software, classify different types of Software?
Software refers to and data that a collection of instructions and data that tell a computer how to
perform specific tasks. It encompasses programs, applications, and data that are used to open
computers and other electronic devices.
Here are some board classification of software:
I) System Software : This software manages and controls the computer hardware so
application software can performs tasks. Example - Windows include MacOS.
II) Application Software : This types of software performs specific tasks for end-users.
includes Programs like Word Processors, Web Browsers, Email Clients, Multimedia Players
and Games.

KNOWLEDGE IMPROVER mobile no 9875493754


III) Programming Software : These are tools used by developers to create debug and maintain
software applications. Examples include Integrated Development Environments, Compilers,
and Text Editors.
IV) Utility Software : Utility software provides additional functionality to the operating system
or assists in performing maintenance tasks. Examples include antivirus software, backup
software and file management tools.
7. Describe basic elements of a Computer System.
A computer system consists basic element, each playing a crucial role in its operation:
I) Central Processing Unit (CPU) : Often referred to as the brain of the computer, the
CPU executes instructions stored in the computer's memory. Logical, control, performs
arithmetic coordinating activities of other the hardware components.
II) Memory (RAM) : Random Access Memory data and needs is temporary storage that
holds instructions that the CPU while executing programs.
III) Storage Devices : Storage devices, such as hand disk drives and solid-state drives,
provide long-term storage for data, programs and the operating system.
IV) Input Devices : Input devices allow users to interact and input data on with the computer
commands. Common input devices include keyboards, mice and microphones.
V) Output Devices : Output devices display information processed by the computers to the
user. Examples include monitor printers, speakers, and headphones.
VI) Motherboard : The motherboard is the board of the computer connecting
communication between the devices and other main and circuit coordinating components.
It contains slots and connectors for expansion cards, natiform cards and sound cards.
VII) Power Supply Unit convents outlet into a unit (PSU) : The Power supply electrical
Power from an that the Computer Can use. It supplies Porten to all Components of the
computers system.
These elements work together to Process data, execute programs and tasks according to the
User's Perform instructions.

8. Describe the general architecture of an operating system.


The general architecture of an operating system consists of several key components that work
together to resources of a manager computer platform for running the hardware and provide
applications. Here's an overview of these components:
I) Kernel : The kernel is the core component of the operating system that provides essential
services, such as process management memory management, device management and system
call handling. It interacts directly with the hand aare and manages resources of the computer.

KNOWLEDGE IMPROVER mobile no 9875493754


II) Device Drivers : Device driven facilitate operating are software modules that communication
between the system and hardware devices, such as printers ,keyboards. Mice and network,
adopters.
III) File System : The file system is responsible for organizing managing the and storage of data
on disk drives, it provides hierarchical structure for organizing files and directories as well as
mechanisms for reading, writing and modifying files.
IV) User Interface : The user interface enables users to interact with the operating system and the
form of operating run applications. It can take Graphical User Interface, which uses graphical
elements such as windows, icons, menus, and pointers on a Command Line Interface, which
relies on text based commands entered via terminal on command prompt.
V) Process Management : Process management involves creating scheduling and terminating
processes, which instances computer of programs running on the computer.
VI) Memory Management : This involves allocating resources and deallocating to processes as
needed by the operating system, tracks the usage of memory disk and handles memory
swapping to physical memory.

These components work together to provide a stable. Running applications facilitating and
facilitating and efficient platform for managing user computer system. Hardware resources
interaction with the computer system.

9.Write down the difference between system Software and application software.

System Software Application Software

1) Gives path to software application to run. 1) It’s designed and built for specific task.
2) Programing is complex. 2) Programing is simple when components to
system software.
3) When compared to application software. 3) Installed by the users as needed.
4) Installed by the manufactures. 4) Works in the forefront.
5) Works in the background. 5) Works in foreground.

10. Write Short notes on:

KNOWLEDGE IMPROVER mobile no 9875493754


I) Multi Programming : Multi programming is a computer technique where multiple programs are
same time for loaded into memory and at the executed concurrently. Increases CPU utilization and
more efficient use of system auto is renounces by switching between programs during idle times
when one program is waiting for I/O operations to complete.
II) Multi-user OS : A multiuser operating system autos multiple users to access computer system
simultaneously user each has their own individual account, with unique settings ,files and
permission. This enables efficient resource sharing and enhances security by controlling to sensitive
data.
III) Multi-processing OS : A multi-processing operating system is designed to efficiently manage
multiple tasks running concurrently enables on a computer's CPU. It is the execution of multiple
processes at the same time the available CPU enounces, utilizing effectively. This operating system
typically employ techniques such as time-sharing, where CPU time is divided among process to run
seemingly simultaneously.
IV) System Software : As the backbone, system software serves the computer system, providing
essential functions and software to enable hardware to work together efficiently. Operating systems,
device driven utility programs nets and other software compo - necessary for operating systems, such
as windows, hardware MacOS, and resources provide Linux, manage a user interface and run
application software smoothly.

KNOWLEDGE IMPROVER mobile no 9875493754


Unit – 3
Algorithm and Flowchart
1. With the help of an example, explain the use of flowchart.
Use of flowchart- A flowchart is a diagram depicting a process a system on a computer
algorithm. It is a system on a computer algorithm. It is a diagrammatic representation of the
solution to a given problem but more importantly, it provides a breakdown of the essential steps
to solving the problem.
Example - Draw the flow chart to add two numbers. Print the sum.

START

INPUT A,
B

C=A+B

PRINT C

STOP

2. Write the advantages and disadvantages of the flowcharts.

• Advantages of Flowcharts-

I) It is dependent of any programming language

II) Logic flow can be understood easily

III) It is useful for modulus designs and documentation

IV) It is helpful for writing programs

• Disadvantages of Flowcharts-

I) Time consuming

II) Difficult for modification

III) Difficult task to draw flowcharts for big programs

KNOWLEDGE IMPROVER mobile no 9875493754


3. Distinguish between loop and branching Statement.

LOOP BRANCHING
1) A programming loop is a series of statements 1) Branching statement allow the flow of
that executes for a specific no. of repetitions execution to jump to a different part of
or until specific conditions are met. program.
2) Loop always means backward jump. 2) Branching means a simple forward jump.

4. Write on flowchart to find the LCM and HCF of two integers.

Solution :
START

INPUT A,
B

M=A
N=B

YES
H=A IS B =
L = (M*N)/H 0?

NO
PRINT H, L R = A% B

A=B
STOP B=R

5. Why algorithm is used before any programming?

Algorithm gives computer step-by-step instruction to accomplish specific takes and make
decisions that is why algorithm is used before any programming.
A program is a set of instructions for the computer to follow. The machine cannot read a program
directly, because it only understands machine code. But you can write stuff in a computer
language, and then a compiler or interpreter can make it understandable to the computer.
6. Draw a flowchart to find out highest number among the three different number.

KNOWLEDGE IMPROVER START mobile no 9875493754


Solution

INPUT A, B, C

YES
IS A>B
&& A>C
?
PRINT A
NO

IS
B>C
PRINT B
?

PRINT C

STOP

7. Algorithm and Flowchart to convert temperature from Celsius to Fahrenheit

Algorithm Flowchart
STEP 1 : START
STAR
STEP 2 : INPUT C T
STEP 3 : CALCULATE F =(9*C +160)/5
INPUT C
STEP 4 : PRINT F
STEP 5 : END
F = (9*C + 160)/5

PRINT F

STOP

KNOWLEDGE IMPROVER mobile no 9875493754


8. Describe the use of different symbols used in any flowchart with example.

Symbols used in flowchart.

START / STOP

PROCESS

INPUT / OUTPUT

DECISION

FLOW OF DATA

Example - Draw the flowchart to add 10 and 20 print the sum.

START

LET A = 10, B =
20

C=A+B

PRINT C

STOP

KNOWLEDGE IMPROVER mobile no 9875493754


9. Draw a flowchart to check whether a given number is even or odd.

Solution :
START

INPUT A

YES IS A mod 2 NO
=0?

PRINT PRINT
“EVEN” “ODD”

STOP

KNOWLEDGE IMPROVER mobile no 9875493754


10. Draw a flowchart to check whether a given integer is prime or not.

Solution : START

INPUT N

LET I = 2, FLAG = 0

IS N > I
?

YES
FLAG = 1 IS N
mod I =
0?
NO

I=I+1

NO
IS
FLAG = 0 PRINT “NOT
? PRIME”

YES

PRINT STOP
“PRIME”

KNOWLEDGE IMPROVER mobile no 9875493754


11. Write an algorithm to calculate the factorial of an integer!
Solution :
STEP 1 : START
STEP 2 : INPUT N
STEP 3 : LET F =1, I = 1
STEP 4 : IF I >= N GOTO STEP 8 OTHERWISE GOTO STEP 5
STEP 5 : F=F*I
STEP 6 : I=I+1
STEP 7 : GOTO STEP 4
STEP 8 : PRINT F
STEP 9 : END
12. Write an of algorithm to find the LCM and HCF of two integers.
Solution :
STEP 1 : START
STEP 2 : INPUT A, B
STEP 3 : LET M = A, N = B
STEP 4 : IF B = 0 GOTO STEP 8 OTHERWISE GOTO STEP 5
STEP 5 : LET R = A MOD B
STEP 6 : LET A = B, B = R
STEP 7 : GOTO STEP 4
STEP 8 : LET HCF = A
STEP 9 : CALCULATE LCM = (M*N)/H
STEP 10 : PRINT HCF, LCM
STEP 11 : END
13.Write an algorithm to check whether a given year is leapyear or not
Solution :
STEP 1 : START
STEP 2 : INPUT YEAR
STEP 3 : IF YEAR MOD 4 = 0 GOTO STEP 5 OTHERWISE GOTO STEP 8
STEP 4 : AND IF YEAR MOD 100 != 0 GOTO STEP 6 OTHERWISE GOTO STEP 8
STEP 5 : OR IF YEAR MOD 400 = 0 GOTO STEP 6 OTHERWISE GOTO STEP 8
STEP 6 : PRINT “LEAP YEAR”
STEP 7 : GOTO STEP 9
STEP 8 : PRINT “NOT A LEAP YEAR”
STEP 9 : END

KNOWLEDGE IMPROVER mobile no 9875493754


UNIT 4
HTML
1. What is HTML? Give an example of HTML?
HTML Stands for Hyper Text Markup Language. It is a language at World Wide Web. It is a
standard formatting language, which is used to create and display pages on the web.

Example as Html

<!DOCTYPE html> defines that this document is an HTML document <html> root element at an
HTML page which of an enclose all other elements in the HTML page <head> - contains
information about the page, such as, the <title> and <metadata.>.

2. What is Advantage as HTML?

1) Flexibility and Extensibility.


2) Compatibility.
3) Accessibility.
4) Continuous Evolution
5) Community and Resources.

3. Create Unordered List in HTML?

The Unordered List is displays in bulleted format. It represent by <u1> tag.


Definition list - The definition, list plays elements in definition from like in dictionary.
The <dl> <dt> and <dd> tags are used to define description list.

4. What is "CSS''?

CSS stands for Cascading Style Sheets. It is a simple design language which simplifies the process
CSS is control making web pages presentable to control the used as the text, the color at the text,
the style at the fonts, the speeding between par grapes, variety of effects such as back ground pages
and colors, layout design, columns sizing and other effects can handle by CSS it is easy to learn
and understand.

KNOWLEDGE IMPROVER mobile no 9875493754


5. What are tags in “HTML”?

HTML tags defines that how can browser will format and display content. HTML tags are nothing
but like keywords by the help at which a browser can distinguish between HTML content and
simple content. HTML tags have three main parts – (a) opening tag (b) content and closing tag.

6. What are different types of lists in "HTML"?

There are three types of lists in HTML

1) Unordered List on Bulleted List (UI)


2) Ordered List or Numbered List(OL)
3) Description List or Definition List (DL)

7. Write down the tags in "HTML"? Various formatting tags in “HTML”?

1) <b> Bold text.


2) <strong> important text.
3) <I> Italic text.
4) <em> Emphasized text.
5) <mark> Marked sext.
6) <small> Smaller text.
7) <del> Deleted text
8) <ins> incited text

8. Write down the advantage CSS ?

Ans. The advantage CSS are

(a) Consistent Design.


(b) Time Saving
(c) Better Device compatibility.
(d) Positioning of Design Elements.
(e) Improved Website a eateries.
(f) Faster loading times.
(g) Ability to create responsive designs.

9) Name some CSS style components ?

KNOWLEDGE IMPROVER mobile no 9875493754


(a) Age (b) Selector (c) CSS (d) External CSS (e) ID Selector (f) Border (g) Combination Sectors
(h) Internal CSS

10) What is JavaScript ? Features of JavaScript ?

JavaScript is a scripting language that enables you to create dynamically updating content, control
multimedia, animate images, and pretty much everything else.

11) Advantage of JavaScript?

(a) Speed (b) Reduces load on the server (c) Rich interface (d) Versatility (e) In term operability
(f) Popularity (g) Response to user activity (h) Updates.

12) What are the different data types present in JavaScript?

Variety of data types in java scripts-

(a) Number
(b) String
(c) Boolean
(d) Null
(e) Undefined
(f) object

1. Number : The valid numbers in java script are in tag and floating point numbers like,C-237,Oxd.
Here OXD is a hexadecimal number and it is valid in java script.

2. STRING : A string is a collection of characters enclosed in single or double quotation(“ “).

eg - “Hello", “Kolkata”, “Xl”, “Welcome to IT System"


Let us write past at a program as beloved
const S1 = "Good”
Const S2 = "Morning"
Var S3 = "Thank You”
Strings can also concerted by addition (+) Operator alert("Hello"+" "+”world)
It returns Hello world.

3. BOOLEAN : Boolean are the logical Values it can be either true or false.

KNOWLEDGE IMPROVER mobile no 9875493754


const x1 = true

const x2 = !false // returns true

const x3 = true //false //returns true

const x4 =true ?? false // returns false.

4. NULL : Null is used to represent the absence at identity and can only come from a listed
expression. [let a = null]

When something is expected, but it is currently unavailable in this case "NULL" is used.

5. Undefined : Undefined is a global which represents the non-existence of data. eg.- var a;

Console log ("a's value // rations as value is undefined.


The above types of data are Primitive data types cowitch define immutable value.
A JavaScript strings are imitative and its means that once a string created, it is not possible to
modify it. Below, another data types mentioned.
[object] which consists at collection of properties.

13) Write down some relational (comparison) operators in JavaScript?

Ans: The comparison or relation at operators are used to compare two quantities to take decision
depending on their relation whether it for it is true or false. If for it is true it returns 1and false it
returns O'.

Example : if (n>0) document-cost (Positive number")

Similarly different statements can be used operators using this operators.

14) Limitation of JavaScript?


1) Cross-Browser issues and browser compatibility.
2) Learning curve
3) Security concerns.
4) Complex layouts and limited Layout control
5) File size performance impact.
6) Over - Specificity and over reading styles.

15) How do you use external java script file?

KNOWLEDGE IMPROVER mobile no 9875493754


To include an external. JavaScript file, we can use the Script tag with the attribute SRC.

16) If Java Script case sensitive?

Java-Script is a is a CSS-Sensitive language. This means that Language key wants variables,
functions other names, any identifier’s must always be typed with as consist capital Z.

UNIT - 5
NETWORK UTILITIES AND DEVICE TOOLS/PROJECT
1) A) What is Malware?

Malware is intrusive Software that is designed to damage and destroy computers and computer
Systems Malware is for malicious Software. Example as common malware include, viruses,
warm, Trojan viruses, SPY ware, adware, Ran son ware.

B) Types of malware?

Ans. (a) Viruses (b) Worms (c) Trojans (d) Ransomware. (e) Adware (f) Spy ware Root .etc.

2) Why computer security important ?

Ans- It’s important because computer security protects individuals and organizations against cyber
threats and the Loss al important data Becoming the target at a cybercriminal can be incredibly
damaging and disruptive to daily activities, whether personal or professional.

3) How is a virus installed in a computer?

Virus get installed in a computer through, malicious online downloads infected-email


attachments, on by plugging in infected hardware like an external flash drive.

4) Define Source code. Code and Executable code.

1) Source Code - Source Code means, Statement that are Programmer, with Or a Programming
created by a text editor or a visual programming tool and the Saved in a file.

2) Executable code - Executable language code refers which is native instructions that carries out
in hardware to machine Set of computer.

5) Write difference internet browser & search engine.

KNOWLEDGE IMPROVER mobile no 9875493754


Web browser

1) A Web browser is a Software application used to retrieve data from Web Pages of HTML
Files present Servers.
2) Multiple web browser can installed on a single device
3) Example –chrome, Fire fox, Internet explorer.
4) Uses to web browser to able to display in formation.

Search Engine-

1) Search engine is Kind of Engine Where Websites a user can Search for information and
results based on are the same displayed on the Screen.

Example – (a) Google (b) Yahoo (c) Bing.

2) You do not need to install a Search engine in your system.


3) Uses. a Search engine to find in formation.

6) Is worm a computer Virus? Write your opinion.

Ans: Yes, a worm is a type of Computer virus. unlike tradition al viruses, which attach themselves
to files and require user action to Spread, worms can replicate themselves and Spread across
networks without any user interaction. They can cause significant damage by consuming
bandwidth Slowing doon network traffic, and even deleting files.

My Opinion : Worms represent a serious threat to cybersecurity due to their ability to rapidly
propagate and cause wide spread damage.

7) How does computer worm attack?

A computer standalone program Worm malware is a computer that replicates itself in order to
spread to other computer often uses a it computer network to spread it Sat, re lying on Security
failures on target Computer access it. it will this to machine Scan Other as and the to use host a
infect computer.

8) What do you mean by the term of "Ethical Hacking"?

KNOWLEDGE IMPROVER mobile no 9875493754


Ethical hacking is a process of detecting vulnerabilities in an application, system, or organizations
that an attacker can use to exploit an individual organization.

9) Advantage of ethical Hacking.

1) To catch a thief you have.

2) Help in closing the open holes in the network.

3) Provides security to banking and financial establishment.

4) Prevent Web Site defacement.

5) An evolving technique.

10) Write the short note at (Dos) attack?

A DDoS on, Distributed Denial – of service attack is a cyber-attack in which the central Server is
continuously flooded with frequent data requests. Such attacks intend to disrupt the target system
and business. In DD OS attack, the hackers make are a network resource unavailable to its users
by disrupting the services at a host connected to the internet. It is done by flooding on, crashing
the websites with too much traffic.

11) Why Fire walls have becomes so important today ?

Firewalls are Software that can keep us a way and spams. They protect our privacy and can save
us from hassle of getting data recovered by preventing its theft and spamming.
1) Fire walls can help enhance your systems security.

2) Fire walls can Block unwanted visitors.


3) Fire walls Keep Spies Out of your computer.
4) Fire was can Block virus.

5) Fine walls improve your Overall internet Experience.


6) Fire walls help save work place computer.
7) Fire walls Block harmful programs.
8) Fire walls help keep employes productive .so, it is very important today.

12) Write the difference between phishing and spamming.

KNOWLEDGE IMPROVER mobile no 9875493754


Phishing-

1) Phishing attacks are designed to steal user private information such as password, bank accounts
credits card details.

2) Phishing is not limited to emails it can happen via phone calls, SMS, social media etc.

3) Example-

(a) Chain-emails (b) Get virus warming massage.

Spamming

1) Spamming is unsolicited email or junk having irrelevant content or commercial advertising


contents.

2) Spam uses email to flood your emails.

3) Example - Chain emails, get rich.

13) What is cyber Stalking what is Spam?

1) Cyber Stalking - The World Wide Web and internet are Great even Place to study. But cyber
space, has an ugly side cyberspace reflects the real world and some people and to forget that cyber
staking and harassment are problems that a large number at people are realizing.

2) Spam - Spam is any Unsolicited Communication sent- in bulk. Usually sent via emails, spam
is also distributed through text massage, social media or phone calls.

14) What is computer hacking.

Computer hacking is defined as one who uses programming skills to legally or illegally to a
computer or file.

15) What is the difference b/w LAN/WAN.

LAN

1) Full form- Local Area network.

2) LAN is high speed connection typically ranging from 100 Mbps to 10 Gbps.

3) File sharing, network printing and LAN parties for gaming.

KNOWLEDGE IMPROVER mobile no 9875493754


4) Example-Home Wi-Fi, school computer, Labs, office networks.

WAN

1) Full form- Wide area network.

2) Slower speeds due to vast distance data must travels widely depending on the technology used.

3) Internet access, email communication, and connecting branch offers a business.

4) Example- Internet, public Wi-Fi.

16) Write down the prevention of hacking?

1) Delete Suspicious emails. It is best to delete Spam on dubious- looking emails without opening
them.

2) Use secure devices.

3) Create strong passwords.

4) Sign up account alerts.

5) Use multifactor authentication your accounts.

17) Write a short note at Internet?

Internet is the connection of different networks interacting with each other. Computers and many
devices can be connected Communicate among each other’s.

18)What are the security measures against Dos attack?

(1) Firewalls - Implementing firewalls can help filter out malicious traffic before it reaches your
network.

(2) Intrusion Prevention Systems - IPS can delete and block Suspicious traffic Patterns
associated with DoS attacks.

(3) Load Balancers - Distributing incoming traffics across multiple Servers the impact can help
mitigate the impact of Dos attacks by preventing any single server from being overwhelmed.

(4) Rate limiting - Implementing rate – limiting mechanism Can restrict the number of request
from single source, reducing the effectiveness of Dos attacks.

KNOWLEDGE IMPROVER mobile no 9875493754


(5) Anomaly Detection Systems - Employing systems that monitor network traffic for abnormal
behavior can help detect and mitigate Dos attacks in real time.

(6) Network Segmentation - Segmenting your network can limit the scope of a Dos attack.
Preventing it from affecting the entire infrastructure.

(7) Regular Updates and Patches - Keeping systems software up-to-date with the latest security
patches can help prevent vulnerabilities that attackers might exploit for Dos attacks between
Software and Hardware.

KNOWLEDGE IMPROVER mobile no 9875493754

You might also like