0% found this document useful (0 votes)
35 views12 pages

Fundamental It A

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views12 pages

Fundamental It A

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Q2. Define a Computer System.

List its Main Components and Explain Each


Briefly.

Ans:
A computer system is a collection of hardware and software components that work together to
process, store, and retrieve information.

Main Components of a Computer System:

Component Explanation
- Known as the "brain" of the computer.
1. Central Processing Unit
- Executes instructions, performs arithmetic and logical
(CPU)
operations.
- Temporary storage for data and instructions.
2. Memory (RAM)
- Allows fast access while the system is running.
- Long-term storage for data and software.
3. Storage (HDD/SSD) - Examples: HDD (Hard Disk Drive), SSD (Solid-State
Drive).
- Main circuit board connecting all components.
4. Motherboard - Allows communication between CPU, RAM, storage, and
peripherals.
- Converts AC electricity into DC power.
5. Power Supply Unit (PSU)
- Supplies stable power to all components.
- Devices like keyboard, mouse, scanner.
6. Input Devices
- Allow users to input data into the system.
- Devices like monitor, printer, speaker.
7. Output Devices
- Display results or outputs from the computer system.
8. Graphics Processing Unit - Specialized hardware for rendering graphics.
(GPU) - Used for gaming, video rendering, and visual applications.
9. Network Interface Card - Allows the computer to connect to a network.
(NIC) - Supports internet and data communication.

Q3. Explain the Difference Between Primary and Secondary Storage Devices.

Ans:

Feature Primary Storage Secondary Storage


Temporary storage used by the CPU Permanent storage for long-term data
Definition
during processing. retention.
Speed Very fast (e.g., RAM). Slower compared to primary storage.
Capacity Limited capacity. Larger storage capacity.
Feature Primary Storage Secondary Storage
Non-volatile (data is retained even after
Volatility Volatile (data is lost when power is off).
power loss).
HDD, SSD, Optical Discs (CD, DVD),
Examples RAM, Cache Memory.
USB Drives.

Q4. What is a Flowchart? Why is it Useful in Programming?

Ans:
A flowchart is a diagram that uses symbols and arrows to represent the steps of a process or
program logic visually.

Uses of Flowcharts in Programming:

 1. Visual Clarity: Provides a clear understanding of complex program logic.


 2. Simplifies Problem-Solving: Breaks problems into steps for better analysis.
 3. Efficient Design: Helps outline the program structure before coding.
 4. Enhanced Communication: Easier for teams and stakeholders to understand.
 5. Debugging Aid: Identifies errors by analyzing the flow.
 6. Documentation: Acts as part of program documentation for maintenance.

Common Symbols in Flowcharts:

Symbol Meaning
Oval Start/End of the process.
Rectangle Process or instruction step.
Diamond Decision point (Yes/No).
Parallelogram Input/Output (e.g., data entry or display).
Arrow Indicates the flow of steps.

Q5. How Do You Initialize a Pointer? Write a Program to Demonstrate Pointer


Initialization.

Ans:

 Pointer Initialization: A pointer is initialized with the memory address of another


variable using the & operator.

Syntax:

data_type *pointer_variable = &variable_name;


Program Demonstrating Pointer Initialization:

#include <stdio.h>

void main() {
int b, *ptr; // Pointer declaration
printf("Enter the value of b: ");
scanf("%d", &b);
ptr = &b; // Pointer initialization
*ptr = 100; // Modifying value using pointer
printf("\nValue of *ptr after initializing the pointer: %d", *ptr);
printf("\nValue of b after initializing the pointer: %d", b);
}

Output:

Enter the value of b: 30


Value of *ptr after initializing the pointer: 100
Value of b after initializing the pointer: 100

Explanation:

 The pointer ptr holds the address of variable b.


 Using *ptr, we modify the value of b directly.

Q6: What is Call by Value? How does it work in C Programming?

Aspect Explanation
Call by Value is a method of passing arguments to a function where the actual
Definition
value of variables is copied to the formal parameters.
- The value of the actual argument is copied to the formal parameter.
Working - Any modification to the formal parameter does not reflect on the actual
argument.
- Actual and formal parameters occupy different memory locations.
Memory
- Changes to one do not affect the other.
Default
Call by Value is the default method of passing arguments in C.
Behavior
- Original data remains safe from unintended modifications.
Advantages
- Useful when data security is critical.
- Any modifications done to the copied value are lost after the function ends.
Disadvantages
- Extra memory is used to store copies of variables.
c<br> #include <stdio.h> <br> void func(int x) { x = x + 5;
printf("Inside function: %d\n", x); } <br> int main() { int a =
Example 10; func(a); printf("After function call: %d\n", a); return 0;
}<br>
Inside function: 15
Output
After function call: 10
Q7: What are User-Defined Functions in C? How are they Different from
Library Functions?

Type Explanation
User-Defined - Functions created by the programmer to perform specific tasks.
Function - Defined using the void or return_type keyword.
- Predefined functions provided by C libraries like <math.h> or <stdio.h>.
Library Function
- Example: printf(), scanf(), sqrt().
- User-defined functions are written manually.
Key Differences
- Library functions are already available in C libraries.
Example (User- c<br> #include<stdio.h> void greet() { printf("Hello
Defined) User!"); } int main() { greet(); return 0; }
Output Hello User!

Q8: What are the Main Types of Buses in a Computer System?

Bus Type Purpose


Data Bus - Transfers data between the CPU, memory, and I/O devices.
Address
- Carries the address of memory locations used for reading/writing data.
Bus
Control - Transfers control signals (e.g., read/write commands, clock signals) between
Bus components.

Q9: What is a Search Engine? Provide Examples of Popular Search Engines.

Aspect Explanation
A search engine is a software system that helps users search for information on the
Definition
Internet.
- It uses algorithms to search, index, and rank web pages.
Function
- Provides relevant results based on keywords.
- Google
- Bing
Examples - Yahoo
- DuckDuckGo
- Baidu

Q10: What is the Internet? Explain its Basic Structure and Purpose.
Aspect Explanation
The Internet is a global network of computers connected to exchange information
Definition
and services.
- Comprises servers, clients, and routers.
Structure
- Connected via TCP/IP protocol.
- Sharing data, accessing resources, and communicating globally.
Purpose
- Examples: Emails, websites, and file transfers.

Q11: What is a Network Interface Card (NIC)? Explain Its Importance in


Networking.

Aspect Explanation
A Network Interface Card (NIC) is a hardware component that allows a
Definition
computer to connect to a network.
- Acts as a bridge between the computer and the network.
- Provides unique MAC addresses for identification.
Importance
- Enables data transmission using wired (Ethernet) or wireless (Wi-Fi)
connections.
- Ethernet NIC
Types
- Wireless NIC

Q12: Difference Between while Loop and do-while Loop

Aspect while Loop do-while Loop


Execution Condition is checked first before Loop body is executed first, and then
Condition executing the loop body. the condition is checked.
Execution Loop body may not execute if the Loop body executes at least once, even
Guarantee condition is false initially. if the condition is false.
c while(condition) { c do { statements; }
Syntax statements; } while(condition);

Example Program (do-while loop):

#include <stdio.h>
int main() {
int i = 1;
do {
printf("Number: %d\n", i);
i++;
} while (i <= 5);
return 0;
}
Output:

Number: 1
Number: 2
Number: 3
Number: 4
Number: 5

Q13: Difference Between break and continue Statements in C

Aspect break Statement continue Statement


Exits the loop or switch statement Skips the current iteration and
Functionality
immediately. continues to the next iteration.
Used to skip specific iterations based
Usage Used for terminating loops.
on conditions.
c int i; for(i=1; i<=5; i++) { c int i; for(i=1; i<=5; i++) {
Example if(i==3) break; printf("%d ", if(i==3) continue; printf("%d ",
i); } i); }
Output 1 2 Output (continue): 1 2 4 5
(break)

Q types of Logic Gates

Logic Gate Explanation Truth Table


Inputs (A, B) → Output
- NAND stands for NOT AND. (Y)
a) NAND - Output is false (0) only when both inputs are true 0, 0 → 1
Gate (1). 0, 1 → 1
- It is the complement of an AND gate. 1, 0 → 1
1, 1 → 0
Inputs (A, B) → Output
- NOR stands for NOT OR. (Y)
- Output is true (1) only when both inputs are false 0, 0 → 1
b) NOR Gate
(0). 0, 1 → 0
- It is the complement of an OR gate. 1, 0 → 0
1, 1 → 0

Q Difference Between Application Software and System Software

Aspect Application Software System Software


Software designed to perform Software that manages and controls the
Definition
specific tasks for users. hardware and system operations.
Aspect Application Software System Software
MS Word, Excel, VLC Player,
Examples Operating System, Device Drivers, BIOS
Photoshop
User Indirect interaction (supports application
Directly interacts with the user.
Interaction software).
Dependency Runs on top of system software. Essential for running the computer.
Performs specific user-required Manages system resources and ensures
Purpose
tasks. system operation.

Q What is Operating System? Write Its Features and Applications.

Aspect Explanation
An Operating System (OS) is system software that acts as an interface between
Definition the user and hardware. It manages system resources and provides a platform for
software execution.
- Process Management: Handles CPU scheduling and process execution.
- Memory Management: Allocates and manages memory.
- File Management: Manages data storage and retrieval.
Features - Device Management: Controls input/output devices.
- User Interface: Provides CLI (Command-Line Interface) or GUI (Graphical
User Interface).
- Security: Ensures system security via authentication and permissions.
- Used in computers, servers, and mobile devices.
Applications
- Examples: Windows, Linux, macOS, iOS, Android.

Q Define Batch Operating System

Aspect Explanation
A Batch Operating System processes similar jobs in a batch without user
Definition
intervention.
- Jobs are grouped together.
Working
- The OS processes them sequentially.
- Jobs are executed one after the other.
Features
- Users do not interact with the system during execution.
Examples Early IBM mainframe systems.
- Reduces CPU idle time.
Advantages
- Efficient for repetitive tasks.
- Debugging is difficult.
Disadvantages
- Long waiting time for job completion.
Q Define Real-Time Operating System (RTOS)

Aspect Explanation
A Real-Time Operating System (RTOS) processes data and events within a
Definition
strict time limit.
- Hard RTOS: Missing a deadline causes system failure (e.g., flight systems).
Types
- Soft RTOS: Delays are acceptable but undesirable (e.g., multimedia streaming).
- Fast response time.
Features - Handles tasks in real time.
- High reliability and performance.
- Industrial control systems
- Medical systems (e.g., pacemakers)
Applications
- Robotics
- Automotive systems

Q Define Mobile OS

Aspect Explanation
A Mobile Operating System is an OS specifically designed for smartphones,
Definition
tablets, and other mobile devices.
- Optimized for touchscreens and smaller hardware.
Features - Supports mobile apps and real-time connectivity.
- Provides power management for longer battery life.
- Android
- iOS (Apple)
Examples
- Windows Phone OS
- KaiOS
Applications - Smartphones, tablets, and handheld gaming consoles.

Q: Explain the Linux Operating System and Describe Open-Source Software

Aspect Linux Operating System Open-Source Software


- Linux is a free, open-source, - Software whose source code is freely
Unix-like operating system. available to the public.
Definition
- It was created by Linus Torvalds - Users can view, modify, and distribute the
in 1991. code.
- Transparency: Users can inspect the
- Highly secure and stable.
source code.
- Multitasking and multi-user
Features - Collaboration: Developers worldwide
support.
contribute to improving the software.
- Open-source and customizable.
- Cost-effective: Generally free to use.
Aspect Linux Operating System Open-Source Software
- Used for servers, desktops, and
embedded systems.
- Ubuntu - Linux OS
- Fedora - Mozilla Firefox
Examples
- Debian - LibreOffice
- Red Hat - MySQL
- Used in servers, cloud computing,
- Academic research
and supercomputers.
Applications - Software development
- Embedded systems like Android
- Cloud computing
are built on Linux.

Q Explain Network Topology & Its Types

Aspect Explanation
Network Topology refers to the physical or logical arrangement of nodes
Definition
(computers, devices) in a network.
Types of
Topology
- All devices share a single communication line (bus).
1. Bus Topology - Data travels in both directions.
- If the main cable fails, the entire network is affected.
- All nodes are connected to a central hub or switch.
2. Star
- Easy to manage and troubleshoot.
Topology
- If the central hub fails, the network stops working.
- Devices are connected in a circular loop.
3. Ring
- Data travels in one direction.
Topology
- Failure in one node can disrupt the network.
- Each node is connected to every other node.
4. Mesh
- High redundancy and reliability.
Topology
- Expensive to implement due to many connections.
5. Hybrid - Combines two or more types of topologies (e.g., Star-Bus).
Topology - Flexible but complex.

Q: Difference Between Analog Modulation & Digital Modulation

Aspect Analog Modulation Digital Modulation


Modulation where analog signals are Modulation where digital signals are
Definition
modulated. modulated.
Signal Type Continuous signal Discrete signal (0s and 1s)
Aspect Analog Modulation Digital Modulation
- AM (Amplitude Modulation) - ASK (Amplitude Shift Keying)
Techniques - FM (Frequency Modulation) - FSK (Frequency Shift Keying)
- PM (Phase Modulation) - PSK (Phase Shift Keying)
Noise
More prone to noise interference. Less affected by noise.
Sensitivity
Radio broadcasting, analog TV, Digital TV, Wi-Fi, mobile
Applications
telephones communication

Q3: Difference Between Internet & Intranet

Aspect Internet Intranet


A global network that connects millions of A private network used within an
Definition
devices. organization.
Open for everyone with an internet
Access Restricted to authorized users only.
connection.
Internal communication and resource
Purpose Sharing information worldwide.
sharing.
Company portals, internal
Examples Websites, email, online services.
communication tools.

Q4: Explain LAN, MAN, & WAN

Type of Network Explanation


- A network that covers a small geographic area such as a
home, office, or building.
LAN (Local Area Network)
- High data transfer speeds.
- Examples: Wi-Fi, Ethernet.
- A network that covers a city or large campus.
MAN (Metropolitan Area
- Larger than LAN but smaller than WAN.
Network)
- Examples: Cable TV networks, metro Wi-Fi.
- A network that covers large geographic areas such as
countries or continents.
WAN (Wide Area Network)
- Slower than LAN and MAN due to distance.
- Examples: The Internet, global enterprise networks.

Q Explain IPv4 & IPv6


Aspect IPv4 IPv6
Full Form Internet Protocol Version 4 Internet Protocol Version 6
Address Size 32-bit address (e.g., 192.168.1.1) 128-bit address (e.g., 2001:0db8::1)
Decimal format (4 octets separated Hexadecimal format (8 groups
Address Format
by dots). separated by colons).
Number of Approximately 4.3 billion
Vastly larger (3.4 × 10³⁸ addresses).
Addresses addresses.
Security Limited security features. Built-in security via IPsec.
Still widely used but running out of
Usage The new standard to replace IPv4.
addresses.

Q6: Explain Cryptography

Aspect Explanation
Cryptography is the practice of securing information by transforming it into
Definition
unreadable formats to prevent unauthorized access.
- Symmetric Cryptography: Same key for encryption and decryption.
Types - Asymmetric Cryptography: Uses public and private keys for encryption and
decryption.
- Encryption: Converts plaintext into ciphertext.
Techniques - Decryption: Converts ciphertext back to plaintext.
- Hashing: Converts data into a fixed-length code.
- Securing emails
- Online banking
Applications
- Password protection
- Data integrity verification.

Q What is Security?

Aspect Explanation
Security refers to the measures taken to protect systems, data, and networks from
Definition
unauthorized access, breaches, or damage.
- Physical Security: Protects hardware.
Types - Network Security: Protects network traffic.
- Information Security: Protects data and files.
- Confidentiality: Only authorized people can access.
Features - Integrity: Ensures data is not altered.
- Availability: Resources are available when needed.
Examples - Firewalls, antivirus, encryption, secure passwords.
Q Define Attack

Aspect Explanation
An attack refers to an attempt to gain unauthorized access to data, disrupt
Definition
services, or harm systems.
- Passive Attack: Monitoring or eavesdropping without altering data (e.g.,
Types of
sniffing).
Attacks
- Active Attack: Modifying or disrupting data (e.g., malware, DDoS).
- Phishing: Fraudulent emails to steal credentials.
Examples - Man-in-the-Middle: Intercepting communication.
- Malware: Malicious software to harm systems.

You might also like