0% found this document useful (0 votes)
5 views37 pages

1.1. Com. App. Paper Pattern Answers 2.0

The document outlines the paper pattern and important topics for a Computer Application exam, including questions worth 10, 5, and 2 marks. It covers various subjects such as pointing devices, number systems, document formatting, network classifications, and search engines. Additionally, it provides detailed answers and explanations for key concepts related to computer features and memory.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views37 pages

1.1. Com. App. Paper Pattern Answers 2.0

The document outlines the paper pattern and important topics for a Computer Application exam, including questions worth 10, 5, and 2 marks. It covers various subjects such as pointing devices, number systems, document formatting, network classifications, and search engines. Additionally, it provides detailed answers and explanations for key concepts related to computer features and memory.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Computer

Application

Paper Pattern
+
IMPs
With
Answers

1
Paper Pattern + IMPs

10 Marks Question.
Q1) Pointing Devices. Pg6
Q2) Number Systems. Pg19
a) Binary Number Systems
b) Octal Number Systems
c) Decimal Number Systems
d) Hexadecimal Number Systems.
Q3) Page And Document Formatting. Pg40
Q4) To add a header or footer to a document add a header or footer to a
document.
a) Choose the insert tab and select header or footer from the header &
footer group.
b) Select either header or footer for choices for a footer and page
number.
c) Select one of the style options. Pg43
Q5) Classification of Networks. Pg47
Q6) Search Engines. Pg61

5 Marks Question.

Q1) Computer evolution as per the generations has been tabulated below. Pg2
Q2) Features of Computer. Pg3
Q3) Primary Memory. Pg10
Q4) Data and Information. Pg15
Q5) Functions of Operating System. Pg24
Q6) Type of Operating System. Pg25
Q7 Starting Word. Pg32
Q8) Opening a previously saved document. Pg33
Q9) Creating a Table. Pg43
Q10) Concept of Internet. Pg49
Q11) Internet. Pg50

2
Q12) Clients and Servers. Pg53
Q13) WWW Browsers. Pg57
Q14) Data Transmission Media. Pg57
Q15) Cable. Pg60

2 Marks Question.
Q1) Microcomputer. Pg4
Q2) Minicomputer. Pg4
Q3) Mainframes. Pg4
Q4) Supercomputer. Pg4
Q5) Graphics Software. Pg27
Q6) Desktop. Pg29
Q7) Control Panel. Pg29
Q8) Device Manager. Pg29
Q9) File Explorer. Pg29
Q10) Internet Browser. Pg29
Q11) Taskbar. Pg29
Q12) Task Manager. Pg29
Q13) Definitions. Pg31
Q14) Scrolling. Pg32
Q15) Home. Pg33
Q16) Insert. Pg33
Q17) Font. Pg35
Q18) Spacing. Pg36
Q19) To use the style buttons for bold, italic, and underline. Pg37
Q20) Domain Name Service. Pg55

3
ANSWERS

10 Marks Question.
Q1) Pointing Devices. Pg6

These are also called Cursor Control Devices. Cursor Control Devices are used to
place the cursor (a highlighted screen location indicating where the next action will
occur), select menu items, and control the computer by ‘clicking buttons’ on the
screen. If these are built into the computer they are called Integrated Pointing
Devices. A few such devices available are:

● Mouse: A standard device of GUI (Graphical User Interface). New versions


are optic and have no moving parts.
● An LED (Light Emitted Diode) records a reflected light which senses motion
over a flat surface.
● Trackballs: Like an ‘upside-down mouse’: it has the advantage of being
stationary. Joysticks: A hand-held stick that pivots about one end indicating
360 degree directions.
● Track point or pointing stick: A miniature joystick that responds to the touch of
a single finger.
● Track pads: A touch sensitive surface that translates finger motion into cursor
motion.

Q2) Number Systems. Pg19


a) Binary Number Systems
b) Octal Number Systems
c) Decimal Number Systems
d) Hexadecimal Number Systems.

NUMBER SYSTEMS

Number systems are very important to understand because the design and
organization of a computer depends on the number systems. The know ledge od
number systems is essential for understanding of computers. The useful number
systems discussed are:

4
1. Binary Number Systems.
2. Octal Number System.
3. Decimal Number System.
4. Hexadecimal Number System.

1. Binary Number system

The Binary Number System, as the name suggests, consists of two digits namely, 0
and 1. These binary digits are called BITS. Thus, the word BIT stands for either of
the binary digits, namely 0 or 1. Tish system uses two digits only, it has the base or
radix 2. It may be noted that the base digit namely 2, is not the fundamental or basic
digit of the system. Thus, all the numbers in binary system are written with the help
of these two digits namely, 0 and 1. The positional value of place value of each digit
in a binary number is twice the positional value of the digit on its right. This number
system is identical to decimal number system with the base replaced by 2. The
binary numbers are usually written with the base indicated as a subscript on the least
significant digit (LSD). For example,

Here, the places to the left of the binary point are positive powers of 2 and places to
the right are negative powers of 2.

The commonly used terms in coding of data in computer terminology are:

Bit (Binary digit). A binary digit is logical 0 or 1.

Nibble. A group of four bits (binary digits) is called a Nibble. It is useful in coding the
numeric data to hexadecimal form.

Byte. A group of 8 bits make a byte. A byte is the smallest unit which can represent a
data item or a character.

Computer Word. A computer word, like a byte, is a group of fixed number of bits
which varies from computer to computer but is fixed for each computer. The number
of bits in a computer word is known as the word size or word length. Why is Binary
Number System used by Computers?

5
2. Octal Number System

This number system has base or radix 8. The basic digits of this system are 0, 1, 2,
3, 4, 5, 6 and 7. It may be noted that the base 8 is not the basic digit of the system. It
is commonly used as a shorthand way of expressing binary quantities. Also the
numbers represented in octal number system can be used directly for input and
output operations. The octal number system is also a positional value system,
wherein each octal digit has its own value or weight expressed as a power of 8. For
example,

(157246.3174)8

Here, the places to the left of the octal point are positive powers of 8 and places to
the right are negative powers of 8.

3. Decimal Number System

The decimal number system consists of 10 digits namely 0 to 9. A number written


using these digits is called a decimal number. For example, the numbers 12876,
-1024, 58.74, + 768 are decimal numbers. Apart from these digits, the decimal point
and ± signs may also be used in writing decimal numbers. The base or radix of the
number system is the number of digits used in it. Since the decimal number system
consists of 10 digits, the base of this system is 10.

(i) The face value of the digit, that is, the digit itself.
(ii) The base of the system.

The position of the digit in the number

6
4. Hexadecimal Number System

The Hexadecimal Number System, popularly known as Hex System, has sixteen
symbols and therefore has the base or radix as 16 or H. It is very well suited for big
computers. The hexadecimal number system represents an information in the
concise form. The sixteen symbols used in this system are:
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F

The equivalence between hex-numbers (hexadecimal numbers) and decimal


numbers is given below:

Hexadecimal number system is also a positional value system, wherein each


hexadecimal digit/letter has its own value or weight expressed as a power of 16. For
example,

Q3) Page And Document Formatting. Pg40

Page and Document Formatting

7
Page and document formatting alters the appearance of the page and the document.
It includes such features as headers/footers, page break, margins, page orientation,
pagination, section breaks, and columns to name a few. shows the Page Setup
dialog box.

Footer

The footer is an information area that one places consistently at the bottom of each
page or section of a document. It can hold the name of the document, the page
number, the date, or any information that is helpful.

Header

The header is an information area that is placed consistently at the top of each page
or section of a document. It can hold the name of the document, page number, date,
or other identifying information. When using section breaks, you can have several
different headers.

Line Breaks

To force lines and paragraphs to move as desired use the appropriate pagination
options of keep lines with next and keep lines together. Access this feature from the
Paragraph dialog box.

Margins

8
Margins are the distance of the text from the edge of the paper. By default Word sets
the margins to 1 inch at top, bottom, left, and right.

Page break

A page break is the place where Word ends the text on one page before it continues
text on the next page. Insert a page break by going to the Insert tab and selecting
Page Break from the Pages Group or by pressing Ctrl + Enter. The software then
places the break at the cursor or insertion point location. It is a good idea to review
the finished document to deter- mine where page breaks are necessary. Use this
feature cautiously until you make all the necessary document revisions. You can also
insert a page break from the Page Layout tab in Word; choose Page Layout and
then click Breaks. A list of choices appears. You may also select column, text
wrapping around objects, and section breaks here.

Page Orientation

Page orientation refers to the layout of the paper. Portrait means the paper is upright,
longer than it is wide; landscape means the page is wider than it is long.

Pagination

Pagination consists of the numbers or marks that are used to indicate the sequence
of the pages. It is a process of determining when a sufficient amount of text appears
on one page and then starting the next page. Word processing programs
automatically perform pagination if this feature is turned on. Most pro- grams permit
the variation of placement and style of the page number. Add page numbers by
going to the Insert tab and choosing Page Number from the Header and Footer
Group. A list of options for page number placement appears.

Section Break

Section breaks permit you to create layout or format-ting changes in the document
and apply them only to that section. By default a document is one section and page
and document formatting applies to the total document. When applying a section
break, you can format each section differently. For example, preface material may
have i, ii, iii page numbering while the body of the document has 1, 2, 3, and so forth.

To open the Page Setup dialog box:

1. Open a new document.


2. Choose the Page Layout tab.
3. Click the dialog launcher at the lower-right corner of the Page Setup group. The
Page Setup dialog box appears. Use it to adjust the document’s margins and decide

9
on paper orientation (portrait or landscape), paper size, and layout. In this example
margins are set 1 inch at the top and bottom of the page and on the left and right
sides of the page. Vertical centering of the text is also set in this dialog box; use this
feature to center a title page.

To change the margins:

1. Click Page Layout tab and Margins icon.


2. Select the margin necessary.
3. To change the margins of a section of the document, choose the Page Layout tab
and click Margins; choose Custom Margins at the bottom of the box and do what is
necessary and then select this point forward from the Apply to options.

To set a page break:

1. Go to the place in the document where you want to place the page break.
2. Press Ctrl + Enter or select the Insert tab and Page Break from the Pages group
Use this feature cautiously; use the lines and page break feature in the paragraph
dialog box to keep lines together. For example, use this feature to keep a paragraph
from splitting between pages or a title from being separated from its related
paragraph. Use the page break feature to separate the reference

Q4) To add a header or footer to a document add a header or footer to a


document.
a) Choose the insert tab and select header or footer from the header & footer
group.
b) Select either header or footer for choices for a footer and page number.
c) Select one of the style options. Pg43

Q5) Classification of Networks. Pg47

Classification of Networks

Networks are classified into following types:


● Local Area Network (LAN)
● Metropolitan Area Network (MAN)
● Wide Area Network (WAN)

Local Area Network (LAN)

10
● A LAN connects network devices over a relatively short distance.
● A networked office building, school, or home usually contains a single LAN,
though sometimes one building will contain a few small LANs (perhaps one
per room), and occasionally a LAN will span a group of nearby buildings.
● In addition to operating in a limited space, LANs are also typically owned,
controlled, and managed by a single person or organization.
● Local area network is a system of computers that share resources such as
hard-drives, printers, data, CPU power, fax/modem, applications, etc.
● The components used by LANs can be divided into cabling standards,
hardware and protocols. Examples of cabling standards used on LANs are:
○ Cat 3, 4 and 5 cables
○ IBM Type 1–9 cabling standards
○ Ethernet cabling standards - IEEE 802.3 (10Base5), IEEE 802.3a
(10Base2), IEEE 802.3i (10BaseT)
○ Unshielded Twisted Pair (UTP)
○ Shielded Twisted Pair (STP)
○ Connectors: RJ45, RJ11, Hermaphroditic connectors, RS-232, DB-25,
BNC, TEE

Metropolitan Area Network (MAN)

● Metropolitan Area Networks (MANs) are those which connect LANs together
within a city.
● MANs are used to connect to other LANs.
● A MAN must have the requirement of using a telecommunication media such
as voice channels or data channels.
● Branch offices are connected to head offices through MANs.
● Examples where MANs are used include universities and colleges, grocery
chains and banks.

11
● The main criterion for a MAN is that the connection between LANs is through
a local exchange carrier (the local phone company).
● The protocols that are used for MANs are quite different from LANs except for
ATM which can be used for both under certain conditions.
● Diagram shown below represents MAN used in Local Exchange Carrier.

Wide Area Network (WAN)

● Wide Area Network (WAN) connects LANs together between cities, and is a
geographically dispersed collection of LANs.
● A network device called “Router” connects LANs to a WAN.
● The main difference between a MAN and a WAN is that the WAN uses ‘Long
Distance Carriers’. Otherwise the same protocols and equipment are used as
a MAN.

Q6) Search Engines. Pg61

Search Engines

12
13
14
15
5 Marks Question.

Q1) Computer evolution as per the generations has been tabulated below. Pg2

16
Q2) Features of Computer. Pg3

The main features of computer are as described below:


• Speed: A computer can do billions of actions per second.
• Reliability: Failures are usually due to human error, one way or another.
• Storage: A computer can store huge amounts of data and retrieve it whenever
required.
• Accuracy: A computer is very accurate in its operations and calculations.
• Diligence: A computer is free from monotony, tiredness and lack of concentration
and can perform the tenmillionth calculation with same accuracy and speed as the
first one.
• Versatility: A computer is capable of performing variety of tasks at the same time.
• No IQ: A computer is unable take its own decisions. It has to be told or instructed
on what to do and in what sequence.
• No feeling: Computers are devoid of emotions. They are machines and cannot
make judgements on their own. Their judgements are based on the instructions
given in the forms of program that are written by the programmers.

Q3) Primary Memory. Pg10

• Primary memory, also called main memory or internal memory, provides temporary
storage of programs in execution and the data being processed.
• It is known as Immediate Access Storage (IAS) as this is the portion of CPU which
can be accessed directly.
• From the hardware point of view, the primary memory is formed by a large number
of basic units referred to as ‘memory cells.’ Each memory cell is a device or an
electronic circuit that has two or more stable states, which represents the binary
numbers 0 (Zero) or 1 (One).
• The computer can retrieve any item of data or any instruction stored in primary
memory at lightning speed. The modern computer does this in a few nano seconds.
• Primary memory can be further grouped into Random Access Memory (RAM) and
Read Only Memory (ROM). Cache memory (small, fast RAM) is designed to hold
frequently used data.

17
Q4) Data and Information. Pg15

• The word information was derived from Latin verb ‘informer’, which means ‘to
instruct’. It also means giving shape to an idea or fact. Data is the plural of the Latin
word ‘datum’ which means ‘to give’.
• Data is defined as the raw input, which, when processed or arranged, gives
meaningful output. It is the group or chunks which signifies quantitative and
qualitative traits pertaining to variables. Data is raw material for data processing.
Data relates to fact, event and transactions.
• Information is defined as the processed outcome of data. It is derived from data.
Information is a concept that can be used in many domains. Thus, information is the
data that has been processed in such a way that it will be meaningful to the person
who receives it.
• Data can be anything like bio-data of various applicants for recruiting personnel, or
the marks obtained by various students in various subjects, or the details (name,
age, sex, etc.) of various passengers for airline or railway reservations, or numbers
of different types of inputs for solving scientific research problems and so on.

Q5) Functions of Operating System. Pg24

• Allocating system resources: The operating system directs the traffic inside the
computer, deciding what resources will be used and for how long.
• Time: Time in the CPU is divided into time slices which are measured in
milliseconds. Each task that CPU does is assigned a certain number of time slices.
When time expires, another task gets a turn and the first task must wait until it has
another turn. Since time slices are so small, you usually can't tell that any sharing is
going on. Tasks can be assigned priorities so that high priority (foreground) tasks get
more time slices than low priority (background) tasks.
• Memory: Memory must be managed also by the operating system. All those
rotating turns of CPU use leave data waiting around in buffers. Care must be taken
not to lose data. One way to help out the traffic jam is to use virtual memory. This
includes disk space as part of main memory. While it is slower to put data on a hard
disk, it increases the amount of data that can be held in memory at one time. When

18
the memory chips get full, some of the data is paged out to the hard disk. This is
called swapping. Windows uses a swap file for this purpose.
• Input and output: Flow control is also part of the operating system's responsibilities.
The operating system must manage all requests to read data from disks or tape and
all writes to these and to printers. To speed up the output to printers, most operating
systems now allow for print spooling, where the data to be printed is first put in a file.
This frees up the processor for other work in between the times when data is going
to the printer. A printer can handle limited at a time. Without print spooling, one has
to wait for a print job to finish before doing anything else. With it, one can request
several print jobs and go on working. The print spool will hold all the orders and
process them in turn.
• Monitoring system activities: Following are the activities monitored by the OS:
● System performance: A user or administrator can check to see whether the
computer or network is getting overloaded. Changes could be made to the
way tasks are allocated. System performance would include response time
and CPU utilization.
● System security: Some system security is part of the operating system,
though additional software can add more security functions. For multiple users
who are not all allowed access to everything, there must be a logon or login
procedure where the user supplies a user name or ID and a password. An
administrator must set up the permissions list of who can have access to what
programs and data.
• File and disk management: Keeping track of what files are where is a major job. An
operating system comes with basic file management commands, where, a user
needs to be able to create directories for storing files. A user needs to copy, move,
delete, and rename files. This is the category of operating system functions that the
user actually sees the most. A more technical task is that of disk management.
Under some operating systems, hard disk can be divided up or partitioned into
several virtual disks. The operating system treats each virtual disk as a physically
separate disk. Managing several physical and/or virtual disks can get pretty complex,
especially if some of the disks are set up with different operating systems.

Q6) Type of Operating System. Pg25

• Batch operating system: It requires grouping of similar jobs consisting programs,


data and system commands. The suitability of this type of processing is in programs
with large computation time with no need of user interaction or involvement. Some
examples of such programs include payroll, forecasting, statistical analysis, and
large scientific number crunching programs. Users are not required to wait while the
job is being processed. They can submit their programs to system and collect the
results later.

19
• Multiprogramming operating system: Multiprogramming operating systems,
compared to batch operating systems, are fairly sophisticated. They have a
significant potential for improving system throughput and resource utilization with
very minor differences. Different forms of multiprogramming operating system are
multitasking, multiprocessor and multi-user operating systems.
• Network operating system: A network operating system is a collection of software
and associated protocols that allow a set of autonomous computers, which are
interconnected by a computer network, to be used together in a convenient and
cost-effective manner. In a network operating system, the users are aware of
existence of multiple computers and can log into remote machines and copy files
from one machine to the other.
• Distributed operating system: A distributed operating system is one that looks like
an ordinary centralized operating system but runs on multiple independent CPUs.
The key concept here is transparency. In other words, the use of multiple processors
should be invisible to the user. Another way of expressing the same idea is to say
that user views the system as virtual unit processor but not as a collection of distinct
machines. In a true distributed system, users are not aware of where their programs
are being run or where their files are residing; they are all handled automatically and
efficiently by the operating system.

Q7 Starting Word. Pg32

As with all Windows programs, there are many ways to start Word including the
following.
● Click Start, Programs. Select Microsoft Office, and then choose MS Office
Word from the available options .
● Click the Word icon on the Quick Launch area of the taskbar if it appears
there .
Creating a New Document

After starting Word, a new blank document opens by default. At this point, you can
simply type and format the text as desired. Two methods to create a new document
once you open Word follow:

1. Click the File Tab and then New. A window appears. Click Blank document and
a new document appears formatted using the normal template. Note the choices
available for a new document under Templates.

20
For each document, Word presents a screen with the ribbon at the top, a blank
window or document workplace in the center, a scroll bar on the right side, and the
status bar on the bottom. A blinking vertical bar, or insertion point marker, represents
the position of the cursor in the document. In Figure a cursor appears at the
beginning of the document.

Q8) Opening a previously saved document. Pg33

When changes or additions are necessary in a document, several options are


available for opening the document again after you saved it.

If the application is not open:


1. Start Word and click the File Tab. A list of Recent Documents appears on the
right. Click the desired document.
2. Start Word, click the File Tab, and choose Open. The Open dialog box appears
with a list of documents. Note that you can also choose Recently Changed; this
choice brings up a complete list that includes the name of each document as well as
its size, type, and date modified.
3. Go to the location of the file and double-click the file you want to open.

If Word is open:

1. Click the File Tab and Recent. A list of Recent Documents appears.

2. If the file is not in the list of Recent Documents, click the Open button in File Tab.
The Open dialog box appears, allowing you to search and select the file to open.

The Ribbon in Word: Microsoft’s “Fluent User Interface”

21
Microsoft Word’s Ribbon in 2010 contains a series of task-oriented tabs and groups
organized to keep like tasks together. Each tab contains a different group of
commands or tasks that help you to use Word. Use the Quick Access Toolbar to add
frequently used commands like New, Spell and Grammar Checker, and so forth.
Following is a brief description of each tab and its groups in Word 2010. Note that
the ribbon shows the groups by default. If you turned that option off and only see the
tabs, click the Expand the Ribbon button on the far right of the Tabs.

Q9) Creating a Table. Pg43

Tables in word processing have many uses. For example, they help you set columns
for recording minutes of a meeting or for organizing any kind of information. Tables
are also essential to research reports. It is a good idea to plan the kind of table
needed in terms of number of rows and columns required before selecting them.
Among the choices for a new table in the Tables group is Insert Table, Draw Table, or
(built-in) Quick Tables. shows the dialog boxes that appear when you select Table
and Quick Tables under the Insert tab. shows the dialog box that appears when you
select Insert Table (under the grid).

22
To create a table:
1. Place the insertion point where the table should appear in the document.
2. Click the Insert tab, the Table icon, and Insert Table.
3. Select the number of rows and columns and click OK or, if using the mouse,
drag over the cells for the number of rows and columns desired. Remember
that a row is necessary for headers. Insert additional rows or columns if
necessary.

To create a table by dragging:


1. Click the Table icon on the Insert tab.
2. Place the mouse over the grid and drag to highlight the number of rows and
columns needed. Keep dragging until you create the correct size for the
table.

To insert a row:
1. Right-click in a row.
2. From the menu, select Insert and select Insert rows either above or below
the selected row.
3. You may also insert multiple rows at one time by selecting the number of
rows to be inserted using the quick select area in the left margin, and
right-clicking the selection. Follow the directions from the shortcut menu.
Insert columns the same way.

23
Q10) Concept of Internet. Pg49

Internet is the world’s largest network. It is a unique collection of networks of different


kinds. It is often described as “a network of networks” since all the smaller networks
are linked together into one giant network called the Internet. The use of internet
began in 1969 in the U.S. Department of Defense’s Advanced Research Project
Agency (ARPA) to provide immediate communication within the department during
war. Computers were then installed at U.S. universities with defense related projects.
As scholars began to go online, the network changed from military use to scientific
use. As Arpanet grew, administration of the system became distributed to a number
of organizations, including the National Science Foundation (NSF). This shift of
responsibility began the transformation of the science oriented Arpanet into the
commercially minded and funded internet, which is used by millions today. The core
of the internet is a network of supercomputers connected to each other by
high-speed links (known as “backbones”). Each node is linked to a number of
smaller networks which in turn are linked to even smaller networks and ultimately to
the PC of an individual user.

Internet has four important elements:


● The network.
● The people (who use it).
● The various programmes used in getting the information.
● The information itself.

24
Q11) Internet. Pg50

Applications of the Internet

• Internet can be used by an organization for linking their offices and employees and
thus using the internet as a virtual private network.
• It can serve as a communication channel where one can: exchanging social notes
and information; gathering latest news all over the world; transferring computer files
and software; cooperate communication, etc.
• It may be used as a virtual market place to advertise for products, services,
employment and other personal needs.
• It may be used for publishing general information, as done by many government
and nongovernment agencies.
• Many universities and educational and training institutes use internet for academic
communications.

Q12) Clients and Servers. Pg53

• This is a purely role-based classification of computer systems. With the increased


popularity of computer networks, it has become possible to interconnect several
computers, which can communicate and interact with each other over the network.
• In such a computing environment, there are several resources/services which can
be shared among multiple users for cost-effective usage and can be best
managed/offered centrally. A few examples of such resources/ services are:

File server: It provides a central storage facility to store files of several users on the
network
Database server: It manages a centralized database and enables several users on
the network to have shared access to the same database.
Print server: It manages one or more printers and accepts and processes print
requests from any user in the network.
Name server: it translates names into network addresses, enabling different
computers on the network to communicate with each other.
• In these cases, it is usual to have one process, which “owns” the resource or
service and is in charge of managing it. This process accepts requests from other
processes, which want to use the resources or service.

25
• The process that owns the resource and does this management is called a ‘server
process’, and the computer on which the server process runs is called a ‘server
computer’, because it services requests for use of the resource.
• Other processes, which send service requests to the server, are called ‘client
processes’, and the computers on which the client processes runs are called ‘client
computers’.
• Note that there may be multiple client computers, which send service requests to
the same server computer.

Workstation (Client)

Q13) WWW Browsers. Pg57

To be used as a web client, a computer needs to be loaded with a special software


tool, which is known as ‘WWW browser’ (or browser in short). Browsers normally
provide the following navigation facilities to help users save time when they are
jumping from server to server while internet surfing (the process of navigating the
internet to search for useful information):
• Unlike FTP and Telnet, browsers do not require a user to remotely log in to a server
computer, and then to log out again when the user has finished accessing
information stored on the server computer.
• Browsers allow a user to specify an URL address of a server computer to facilitate
the user to directly visit the server computer’s site, and to access information stored
on it. URL stands for ‘Uniform Resource Locator’. It is an addressing scheme used
by WWW browsers to locate sites on the internet.

26
• Browsers allow a user to create and maintain a personal ‘hotlist’ of favourite URL
addresses of server computers, which the user is likely to frequently visit in future. A
user’s hotlist is stored on his/her local web client computer. Browsers provide hotlist
commands to allow the user to add, delete, update URL addresses in the hotlist, and
to select an URL address of a server computer from the hotlist, when the user wants
to visit that server computer.
• Many browsers have a “history” feature. These browsers maintain a history of the
server that a computer visited in a surfing session. This is, they save (cache) in the
local computer’s memory, the URL addresses of the server computers visited during
a surfing session so that if the user wants to go back to an already visited server
later on (in the same surfing session), the link is still available in the local computer’s
memory.
• Browsers allow a user to download (copy from a server computer to the local
computer’s hard disk) information in various formats (i.e., as a text file, as an HTML
file, or as a PostScript file). The downloaded information can be later (not necessarily
in the same surfing session) used by the user. For example, downloaded information
saved a PostScript file can be later printed on a PostScript-compatible printer, where
even the graphics will be properly reproduced.

Q14) Data Transmission Media. Pg57

The transmission media can be grouped into:


• guided media
• unguided media

Guided Media
• In guided media, the data signals are sent along a specific path, through a wire or a
cable.
• Copper wire and optical fibers are the most commonly used guided media. Copper
wire transmits data as electric signals.
• Copper wires offer low resistance to current signal, facilitating signals to travel
longer distances. To minimize the effect of external disturbance on the copper wire,
two types of wiring is used:
● Twisted pair
● Coaxial pair

Twisted-pair Wire
• Twisted-pair and coaxial cable use metallic (copper) conductors that accept and
transport signals in the form of electrical current. Twisted-pair wire are of two types:
● Unshielded Twisted Pair (UTP) is the most common type and also used in
telephone lines. A twisted pair consists of two conductors (copper) each with
its own coloured plastic insulation and twisted around each other. Twisted pair

27
configuration reduces interference from electrical field as compared to parallel
pair configuration. Unshielded twisted pair is currently the cable standard for
most networks. It is relatively inexpensive, easy to install, very reliable, and
easy to maintain and expand. UTP support a maximum data rate of 155
Mbps.
● Shielded Twisted Pair (STP) wire has a metal foil or braided mesh covering
that encases each pair of insulated conductors. The metal casing prevents the
penetration of electromagnetic noise and the quality of transmission improves.
In all other respects it resembles UTP.

Coaxial Cable
• Coaxial cable (simply called coax) has a central core conductor of solid or standard
wire (usually copper) enclosed in an insulating sheath, which is, in turn, encased in
an outer conductor of metal foil, braid or a combination of the two (also usually
copper).
• The outer metallic wrapping serves both as a shield against noise and as the
second conductor, which completes the circuit.
• This outer conductor is also enclosed in an insulating sheath, and the whole cable
is protected by a plastic cover. Coaxial cable carries signals of higher frequency
ranges than twisted-pair wire. Often many coaxial cables are bundled together.
• As a result of extra insulation, coaxial cable is much better than twisted pair wiring
at resisting noise. Also, it is faster than UTP (supports a maximum data rate of 200
Mbps). Optical fibre transmits data as light signals.

Unguided Media
• In unguided media, the data signals are not bounded by a fixed channel to follow.
The data signals are transmitted by air.
• Radio, microwave, and satellite transmissions fall into this category.

Q15) Cable. Pg60

• By using cable modem, one can access a broadband internet connection which is
designed to function or operate over cable TV lines.
• Cable internet connections works by using TV channel space for data transmission:
○ certain channels are used for downstream transmission
○ other channels for upstream transmission
• The coaxial cable used by cable TV provides greater bandwidth than telephone
lines.
• A cable and internet modem can be used to achieve extremely fast access to the
Web. This, combined with the fact that millions of homes are already wired for cable
TV, has made cable internet service very popular.

28
• The process of modulation and demodulation, that is the conversion of digital data
to analog form and vice versa, is carried out by a special device called a ‘modem’
(modulator/demodulator).
• Hence, when an analog facility is used for data communication between two digital
devices (say a terminal and a computer), two modems are required, one near each
digital device.
• The digital signal generated at the terminal is converted to analog form by the
modulator of the modem placed near it. The analog signal is transmitted through the
telephone line, which is converted to digital form by the demodulator of the modem
placed near the computer. This digital data is processed by the computer.
• The processed digital data is modulated to analog form and returned via the
telephone line to the terminal, where the analog signals are demolished to digital
form for display on the terminal.
• Hence, the modem is an essential piece of hardware for any application in which
two digital devices (say two computers) want to communicate over an analog
transmission channel (say a telephone line).
• When you want to use a modem with your computer to allow it to communicate with
any other computer via the telephone line, the following factors should be
considered:
● Transmission speed: The higher is the transmission speed of a modem, the
better it is, because it can communicate faster.
● Internal versus external: Modems are of two kinds
○ i. internal
○ ii. external
• An internal modem is an optional add-on circuit board, which plugs into one of the
computer’s expansion slots. It gets its power from the computer’s expansion bus. It
is manufactured and supplied by the computer manufacturer itself.
• An external modem, on the other hand, is a separate box, which contains the
circuitry and logic to modulate data signals. It has its own power supply, on/off switch
and front panel LCDs to indicate its status. So, external modems are slightly more
expensive.

29
• Facsimile facility: Some modems, known as FAX modems, are capable of
emulating a FAX machine in addition add to performing the functions of a regular
modem. A computer equipped with a FAX modem can send/receive text and images
as a FAX to/from a remote FAX machine, or another computer equipped with a FAX
modem. FAX modems can be of external or internal type.

30
2 Marks Question.

Q1) Microcomputer. Pg4

• Microcomputer is at the lowest possible end of the computer range in terms of


speed and storage capacity. Its CPU is a microprocessor.
• The first microcomputers were built of 8-bit microprocessor chips. The most
common application of personal computers (PC) is in this category.
• The PC supports a number of input and output devices. An improvement of 8-bit
chip is 16-bit and 32-bit chips.
• Examples of microcomputer are IBM PC, PC-AT.

Q2) Minicomputer. Pg4

• This is designed to support more than one user at a time. It possesses large
storage capacity and operates at a higher speed.
• The minicomputer is used in multi-user system, in which various users can work at
the same time.
• This type of computer is generally used for processing large volume of data in an
organization. They are also used as servers in Local Area Networks (LAN)

Q3) Mainframes. Pg4

• These types of computers are generally 32-bit microprocessors. They operate at


very high speed, have very large storage capacity and can handle the work load of
many users.
• They are generally used in centralized databases. They are also used as
controlling nodes in Wide Area Networks (WAN).
• Example of mainframes are DEC, ICL and IBM 3000 series.

Q4) Supercomputer. Pg4

• These are the fastest and most expensive machines. They have high processing
speed compared to other computers and also have multiprocessing technique.
• One of the ways in which supercomputers are built is by interconnecting hundreds
of microprocessors.

31
• Supercomputers are mainly being used for weather forecasting, biomedical
research, remote sensing, aircraft design and other areas of science and technology.
• Examples of supercomputers are CRAY YMP, CRAY2, CRAY XMP and PARAM
from India.

Q5) Graphics Software. Pg27

• Graphics programs deal with pictures, static or moving, flat or 3D. There are an
amazing number of different formats for images in the world and no one program can
handle them all.
• Adobe Photoshop is the most widely used graphics program for professionals.
Paint Shop Pro is popular because it offers most of Photoshop's features at a lower
cost and with a friendlier interface. There are many other programs, of which, some
specialize in handling photographs or animations or creating logos.
● Purpose - to create and edit images
● Major Advantages
- important tool for professionals in photo or image processing
- easily creates illustrations, logos.

Q6) Desktop. Pg29

The desktop is a fundamental part of the default GUI (graphical user interface) in
Windows. It is a space where you can organize applications, folders, and
documents, which appear as icons. Your desktop is always in the background,
behind any other applications you're running. When you power on your computer
and log in to Windows, the first thing you see is your desktop background, icons, and
the taskbar. From here, you can access the installed programs on your computer
from the Start menu, or by double-clicking any application shortcuts you may have
on your desktop.

Q7) Control Panel. Pg29

The Control Panel is a collection of tools to help you configure and manage the
resources on your computer. You can change settings for printers, video, audio,
mouse, keyboard, date and time, user accounts, installed applications, network
connections, power saving options, and more.

32
Q8) Device Manager. Pg29

The Device Manager lists the hardware devices installed in a computer. It allows
users to see what hardware is installed, view and update hardware drivers, and
uninstall hardware through the Device Manager.

Q9) File Explorer. Pg29

The File Explorer, also called Windows Explorer, provides you with a view of the
files and folders on the computer. You can browse the contents of your SSD, hard
drive, and attached removable disks. You can search for files and folders, and open,
rename, or delete them from the File Explorer.

Q10) Internet Browser. Pg29

Your Internet browser is one of the most important applications on your computer.
You can use it to find information on the Internet, view web pages, shop and buy
merchandise, watch movies, play games, and more.

Q11) Taskbar. Pg29

The Windows taskbar shows programs that are currently open, as well as a Quick
Launch area that allows quick access to launch specific programs. The notification
area is located on the right side of the taskbar, showing the date and time, and
programs running in the background.

Q12) Task Manager. Pg29

The Task Manager gives you an overview of what's running on your computer. You
can see how much of your system resources is being used by each application
(task), sorting by CPU, RAM, and disk I/O usage. If a program is frozen or not
responding, you can right-click it in Task Manager and end the task, forcing it to quit.

33
Q13) Definitions. Pg31

Understanding some of the common concepts related to text manipulation makes


using the help system easier and increases your problem-solving skills when things
go wrong.

Q14) Scrolling. Pg32

Scrolling is the process of moving around a document to view a specific portion of a


page of text when the entire document does not fit on the screen. This navigation
process does not change the location of the insertion point until the user clicks
elsewhere in the document.

Q15) Home. Pg33

Figure shows the Home tab and its groups: Clipboard, Font, Paragraph, Styles, and
Editing. These groups allow you to format the document by (1) cutting, copying, or
pasting items to the clipboard; (2) selecting a font style, size, and color; (3) setting
indents and spacing, adding bullets or numbers to a list, and adjusting text
alignment; (4) selecting a document style; and (5) using find and replace.

34
Q16) Insert. Pg33

The Insert tab has groups such as Pages, Tables, Illustrations, Links, Header &
Footer, Text, and Symbols. You can add a cover page or insert a blank page, page
break, table, chart, SmartArt, or clip art using this tab.

Figure above shows the menu for adding a page number in a footer. Among other
things you can use this ribbon to add a hyperlink, bookmark, text box, or the date
and time.

Q17) Font. Pg35

A font defines a descriptive look or shape (font face or typeface), size, and style of a
group of characters or symbols.
For example, one font is Times Roman, 12 point, Bold, Italic. Another font is Calibri,
10 point, Italic. Th default font for Word 2010 is Calibri. The general rule is to limit the
number of different fonts in one document to three. Use serif fonts (fonts with little
feet) for text documents; this makes the document easier to read. Size refers to the
height of the characters and is measured in 72 points per inch. Normal sizes for
business documents are 10 to 12 points while Word uses 11points.Style or attributes
include bold, italics, and condensed. Use these attributes for emphasis—not for the
whole document

35
Q18) Spacing. Pg36

Proportional or fixed pitch. “Proportional” means a variable amount of space is


allotted for each character depending on the character width. “Fixed space” or
“monospace” means a set space is provided for each character regardless of the
character width. For example, an “I” is allowed the same amount of space as a “W.”
Special

Q19) To use the style buttons for bold, italic, and underline. Pg37

1. Highlight a word or section of text.

2. Click the desired Style button that appears. You can use
the Style button in the Font group to change style attributes. Alternatively,
when you high-light a word, a small toolbar will appear as you hold the
mouse arrow over the highlighted word; you can then choose bold, italic, or
another font size from among the other choices on the toolbar.
3. Clicking a Style button again will change the style back to its previous style.
You can turn these attributes on or off by pressing Ctrl+B (bold), Ctrl+I (italic), or
Ctrl+U (underline). Note also that the underline button under- lines all the highlighted
text. To access variations of underlining, use the Font dialog launcher and select the
desired underlining.

• Click the Change Styles arrow in the Styles group to select a style, color, and
font for text. Even more styles and choices are available when you click the dialog
launcher in the Styles group.

Q20) Domain Name Service. Pg55

• The Domain Name System (DNS), as a whole, consists of a network of servers that
map ‘internet’ domain names to a local IP addresses.
• The DNS enables domain names to stay constant while the underlying network
topology and IP addresses change. This provides stability at the application level
while enabling network applications to find and communicate with each other using
the IP no matter how the underlying physical network changes.

36
THE END

By Amaan Syed .

37

You might also like