Fundamental It A
Fundamental It A
Ans:
A computer system is a collection of hardware and software components that work together to
process, store, and retrieve information.
Component Explanation
- Known as the "brain" of the computer.
1. Central Processing Unit
- Executes instructions, performs arithmetic and logical
(CPU)
operations.
- Temporary storage for data and instructions.
2. Memory (RAM)
- Allows fast access while the system is running.
- Long-term storage for data and software.
3. Storage (HDD/SSD) - Examples: HDD (Hard Disk Drive), SSD (Solid-State
Drive).
- Main circuit board connecting all components.
4. Motherboard - Allows communication between CPU, RAM, storage, and
peripherals.
- Converts AC electricity into DC power.
5. Power Supply Unit (PSU)
- Supplies stable power to all components.
- Devices like keyboard, mouse, scanner.
6. Input Devices
- Allow users to input data into the system.
- Devices like monitor, printer, speaker.
7. Output Devices
- Display results or outputs from the computer system.
8. Graphics Processing Unit - Specialized hardware for rendering graphics.
(GPU) - Used for gaming, video rendering, and visual applications.
9. Network Interface Card - Allows the computer to connect to a network.
(NIC) - Supports internet and data communication.
Q3. Explain the Difference Between Primary and Secondary Storage Devices.
Ans:
Ans:
A flowchart is a diagram that uses symbols and arrows to represent the steps of a process or
program logic visually.
Symbol Meaning
Oval Start/End of the process.
Rectangle Process or instruction step.
Diamond Decision point (Yes/No).
Parallelogram Input/Output (e.g., data entry or display).
Arrow Indicates the flow of steps.
Ans:
Syntax:
#include <stdio.h>
void main() {
int b, *ptr; // Pointer declaration
printf("Enter the value of b: ");
scanf("%d", &b);
ptr = &b; // Pointer initialization
*ptr = 100; // Modifying value using pointer
printf("\nValue of *ptr after initializing the pointer: %d", *ptr);
printf("\nValue of b after initializing the pointer: %d", b);
}
Output:
Explanation:
Aspect Explanation
Call by Value is a method of passing arguments to a function where the actual
Definition
value of variables is copied to the formal parameters.
- The value of the actual argument is copied to the formal parameter.
Working - Any modification to the formal parameter does not reflect on the actual
argument.
- Actual and formal parameters occupy different memory locations.
Memory
- Changes to one do not affect the other.
Default
Call by Value is the default method of passing arguments in C.
Behavior
- Original data remains safe from unintended modifications.
Advantages
- Useful when data security is critical.
- Any modifications done to the copied value are lost after the function ends.
Disadvantages
- Extra memory is used to store copies of variables.
c<br> #include <stdio.h> <br> void func(int x) { x = x + 5;
printf("Inside function: %d\n", x); } <br> int main() { int a =
Example 10; func(a); printf("After function call: %d\n", a); return 0;
}<br>
Inside function: 15
Output
After function call: 10
Q7: What are User-Defined Functions in C? How are they Different from
Library Functions?
Type Explanation
User-Defined - Functions created by the programmer to perform specific tasks.
Function - Defined using the void or return_type keyword.
- Predefined functions provided by C libraries like <math.h> or <stdio.h>.
Library Function
- Example: printf(), scanf(), sqrt().
- User-defined functions are written manually.
Key Differences
- Library functions are already available in C libraries.
Example (User- c<br> #include<stdio.h> void greet() { printf("Hello
Defined) User!"); } int main() { greet(); return 0; }
Output Hello User!
Aspect Explanation
A search engine is a software system that helps users search for information on the
Definition
Internet.
- It uses algorithms to search, index, and rank web pages.
Function
- Provides relevant results based on keywords.
- Google
- Bing
Examples - Yahoo
- DuckDuckGo
- Baidu
Q10: What is the Internet? Explain its Basic Structure and Purpose.
Aspect Explanation
The Internet is a global network of computers connected to exchange information
Definition
and services.
- Comprises servers, clients, and routers.
Structure
- Connected via TCP/IP protocol.
- Sharing data, accessing resources, and communicating globally.
Purpose
- Examples: Emails, websites, and file transfers.
Aspect Explanation
A Network Interface Card (NIC) is a hardware component that allows a
Definition
computer to connect to a network.
- Acts as a bridge between the computer and the network.
- Provides unique MAC addresses for identification.
Importance
- Enables data transmission using wired (Ethernet) or wireless (Wi-Fi)
connections.
- Ethernet NIC
Types
- Wireless NIC
#include <stdio.h>
int main() {
int i = 1;
do {
printf("Number: %d\n", i);
i++;
} while (i <= 5);
return 0;
}
Output:
Number: 1
Number: 2
Number: 3
Number: 4
Number: 5
Aspect Explanation
An Operating System (OS) is system software that acts as an interface between
Definition the user and hardware. It manages system resources and provides a platform for
software execution.
- Process Management: Handles CPU scheduling and process execution.
- Memory Management: Allocates and manages memory.
- File Management: Manages data storage and retrieval.
Features - Device Management: Controls input/output devices.
- User Interface: Provides CLI (Command-Line Interface) or GUI (Graphical
User Interface).
- Security: Ensures system security via authentication and permissions.
- Used in computers, servers, and mobile devices.
Applications
- Examples: Windows, Linux, macOS, iOS, Android.
Aspect Explanation
A Batch Operating System processes similar jobs in a batch without user
Definition
intervention.
- Jobs are grouped together.
Working
- The OS processes them sequentially.
- Jobs are executed one after the other.
Features
- Users do not interact with the system during execution.
Examples Early IBM mainframe systems.
- Reduces CPU idle time.
Advantages
- Efficient for repetitive tasks.
- Debugging is difficult.
Disadvantages
- Long waiting time for job completion.
Q Define Real-Time Operating System (RTOS)
Aspect Explanation
A Real-Time Operating System (RTOS) processes data and events within a
Definition
strict time limit.
- Hard RTOS: Missing a deadline causes system failure (e.g., flight systems).
Types
- Soft RTOS: Delays are acceptable but undesirable (e.g., multimedia streaming).
- Fast response time.
Features - Handles tasks in real time.
- High reliability and performance.
- Industrial control systems
- Medical systems (e.g., pacemakers)
Applications
- Robotics
- Automotive systems
Q Define Mobile OS
Aspect Explanation
A Mobile Operating System is an OS specifically designed for smartphones,
Definition
tablets, and other mobile devices.
- Optimized for touchscreens and smaller hardware.
Features - Supports mobile apps and real-time connectivity.
- Provides power management for longer battery life.
- Android
- iOS (Apple)
Examples
- Windows Phone OS
- KaiOS
Applications - Smartphones, tablets, and handheld gaming consoles.
Aspect Explanation
Network Topology refers to the physical or logical arrangement of nodes
Definition
(computers, devices) in a network.
Types of
Topology
- All devices share a single communication line (bus).
1. Bus Topology - Data travels in both directions.
- If the main cable fails, the entire network is affected.
- All nodes are connected to a central hub or switch.
2. Star
- Easy to manage and troubleshoot.
Topology
- If the central hub fails, the network stops working.
- Devices are connected in a circular loop.
3. Ring
- Data travels in one direction.
Topology
- Failure in one node can disrupt the network.
- Each node is connected to every other node.
4. Mesh
- High redundancy and reliability.
Topology
- Expensive to implement due to many connections.
5. Hybrid - Combines two or more types of topologies (e.g., Star-Bus).
Topology - Flexible but complex.
Aspect Explanation
Cryptography is the practice of securing information by transforming it into
Definition
unreadable formats to prevent unauthorized access.
- Symmetric Cryptography: Same key for encryption and decryption.
Types - Asymmetric Cryptography: Uses public and private keys for encryption and
decryption.
- Encryption: Converts plaintext into ciphertext.
Techniques - Decryption: Converts ciphertext back to plaintext.
- Hashing: Converts data into a fixed-length code.
- Securing emails
- Online banking
Applications
- Password protection
- Data integrity verification.
Q What is Security?
Aspect Explanation
Security refers to the measures taken to protect systems, data, and networks from
Definition
unauthorized access, breaches, or damage.
- Physical Security: Protects hardware.
Types - Network Security: Protects network traffic.
- Information Security: Protects data and files.
- Confidentiality: Only authorized people can access.
Features - Integrity: Ensures data is not altered.
- Availability: Resources are available when needed.
Examples - Firewalls, antivirus, encryption, secure passwords.
Q Define Attack
Aspect Explanation
An attack refers to an attempt to gain unauthorized access to data, disrupt
Definition
services, or harm systems.
- Passive Attack: Monitoring or eavesdropping without altering data (e.g.,
Types of
sniffing).
Attacks
- Active Attack: Modifying or disrupting data (e.g., malware, DDoS).
- Phishing: Fraudulent emails to steal credentials.
Examples - Man-in-the-Middle: Intercepting communication.
- Malware: Malicious software to harm systems.