0% found this document useful (0 votes)
8 views35 pages

Theory Part of Computer Fundamental

The document provides a comprehensive overview of computer fundamentals, covering topics such as data processing, computer generations, hardware and software technologies, and the functions of a computer system. It details the roles of the CPU, memory types, storage technologies, and the differences between various processors and memory types. Additionally, it discusses secondary storage devices, including magnetic disks, SSDs, and optical disks, along with their characteristics and data organization methods.

Uploaded by

xyz336611
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views35 pages

Theory Part of Computer Fundamental

The document provides a comprehensive overview of computer fundamentals, covering topics such as data processing, computer generations, hardware and software technologies, and the functions of a computer system. It details the roles of the CPU, memory types, storage technologies, and the differences between various processors and memory types. Additionally, it discusses secondary storage devices, including magnetic disks, SSDs, and optical disks, along with their characteristics and data organization methods.

Uploaded by

xyz336611
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Computer Fundamental Question solution

Chapter 1

Question Answer
1. What is data processing? Data Processing is the process of converting raw data into
Differentiate between data meaningful information through various operations such as
and information. collection, organization, and analysis. Data refers to raw
facts, figures, or unprocessed content, while Information is
processed data that is organized, interpreted, and useful for
decision-making.
2.List and explain some 2. Characteristics of a Computer:
important characteristics of • Speed: Computers can perform calculations and tasks
a computer at incredibly fast speeds.
• Accuracy: Computers perform operations with high
precision and minimal errors.
• Automation: Once programmed, computers execute
tasks automatically without human intervention.
• Storage: Computers can store vast amounts of data for
later retrieval.
• Diligence: Computers can work continuously without
tiring or making mistakes due to fatigue

3. What is generation in 3. Generations of Computers:


computer technology? List • 1st Generation (1940-1950s): Vacuum tubes, large
various computer and consumed a lot of power, machines were slow.
generations along with key • 2nd Generation (1950s-1960s): Transistors replaced
characteristics of computers vacuum tubes, smaller, faster, and more reliable.
of each generation. • 3rd Generation (1960s-1970s): Integrated Circuits
(ICs), reduced size and improved performance.
• 4th Generation (1970s-present): Microprocessors,
compact size, increased power and efficiency.
• 5th Generation (Present and beyond): Artificial
intelligence and quantum computing, focusing on
cognitive abilities and advanced algorithms.
4. List the key hardware 4. Hardware and Software Technologies:
and software technologies • 1st Gen: Vacuum tubes, machine language.
used in building computers • 2nd Gen: Transistors, assembly language.
of each generation. • 3rd Gen: ICs, high-level languages (COBOL,
FORTRAN).
• 4th Gen: Microprocessors, advanced OS, high-level
languages (C, Unix).
• 5th Gen: AI hardware, quantum processors, advanced
algorithms.
5. What are the advantages 5. Transistor Advantages: Transistors are smaller, more
of transistors over vacuum reliable, energy-efficient, faster, and durable compared to
tubes? vacuum tubes. They generate less heat and require less space,
which improves overall performance and longevity.
6. What is an IC? How does 6. IC (Integrated Circuit): An IC combines multiple electronic
it help in reducing the size components (resistors, capacitors, transistors) into a small
of computers? chip. It reduces the size of computers by replacing individual
components, thus enhancing performance and reducing cost.
7. Name the technologies 7. Memory and Storage Technologies:
used for constructing main • 1st Gen: Magnetic drums (main), punched cards
memory and secondary (storage).
storage in each generation • 2nd Gen: Magnetic core memory, magnetic tapes.
of • 3rd Gen: Semiconductor memory, hard drives.
computer • 4th Gen: DRAM, SSDs.
• 5th Gen: Advanced semiconductor memory, cloud
storage.

Chapter 2

Question Answer
1. What are the five 1. Five Basic Functions of a Computer System:
basic functions • Input: The computer system receives data from input
performed by a devices like a keyboard or mouse.
computer system? • Processing: The CPU processes the data and performs
necessary operations based on instructions.
• Storage: Data and programs are stored in memory
(RAM) or secondary storage (hard drive, SSD).
• Output: The processed information is sent to output
devices such as a monitor, printer, or speakers.
• Control: The control unit directs and coordinates the
operations of the computer, managing the flow of data
and instructions between units.

2. Draw a block 2. Block Diagram of Basic Organization of a Computer System:


diagram to illustrate
the basic organization
of a computer system
and explain the
functions of various
units
Explanation of the Units:
• Input Unit: This unit accepts input data from the user
via devices like a keyboard, mouse, or scanner.
• Control Unit (CU): It manages and controls the
operations of the computer by fetching instructions,
interpreting them, and directing the flow of data to the
appropriate unit.
• Arithmetic & Logic Unit (ALU): The ALU performs
arithmetic (addition, subtraction, etc.) and logical
(comparison operations) operations on the data.
• Storage Unit: It consists of memory where data and
instructions are temporarily stored. It includes primary
memory (RAM) for immediate access and secondary
storage (like hard drives) for long-term storage.
• Output Unit: After processing, the results are presented
to the user through output devices such as a monitor,
printer, or speakers.

Chapter 7

Question Answer
1. Write the main 1. Main functions of the CPU:
functions of the • Fetch: Retrieves instructions from memory based on the
CPU in a computer program counter.
system. • Decode: Interprets the instruction to understand the
operation and required resources.
• Execute: Performs the operation, which can be arithmetic,
logical, data transfer, or control flow.
• Control: Manages and coordinates all operations within the
computer, ensuring smooth execution of programs by
issuing control signals to other components.
• The CPU cycles through these steps (fetch-decode-execute)
to process instructions and manage the computer system.
2. What are the two 2. Main components of the CPU and their functions:
main components • Control Unit (CU):
of the CPU of a o Function: Acts as the CPU's command center.
computer system? o Key Tasks: Fetches instructions, decodes them,
Write the main generates control signals to orchestrate all CPU
functions of each operations and external components. Manages
of these instruction execution cycle and handles interrupts.
components. • Arithmetic Logic Unit (ALU):
o Function: The CPU's workhorse for computations.
o Key Tasks: Executes arithmetic operations (add,
subtract, etc.) and logical operations (AND, OR,
NOT). Receives data, performs operations, and
stores results.
3. What is a 3. Multicore vs. Single-core processor:
multicore • Single-core: Has one processing unit. Handles multiple
processor? How is it tasks via time-slicing, quickly switching between them,
different from a creating an illusion of multitasking. Performance can
single-core bottleneck with demanding tasks.
processor? • Multicore: Has two or more independent cores within one
processor. Enables true parallel processing, where each core
can execute separate tasks simultaneously.
• Difference: Multicore allows concurrent task execution,
improving efficiency and responsiveness for multitasking
and multithreaded applications, unlike single-core which
simulates concurrency.
4. Explain how a 4. Efficiency of Multicore for Simultaneous Tasks:
multicore processor • Single-core (Time-slicing): Rapidly switches between
can handle the tasks, allocating time slices. Inefficient due to context
execution of switching overhead, limiting true simultaneity.
multiple • Multicore (Parallel Processing): Each core independently
simultaneous task executes tasks concurrently. Operating system distributes
more tasks across cores, enabling genuine simultaneous
efficiently than a execution.
single-core • Efficiency Gain: Multicore eliminates context switching
processor. overhead, allowing each core to dedicate full power to its
task. Results in faster task completion, better
responsiveness, and improved throughput for multiple
simultaneous tasks and multithreaded applications.
5. Write the 5. Advantages and Limitations of Multicore vs. Single-core:
advantages and • Multicore Advantages:
current o Enhanced Multitasking: True parallel processing
limitations of for smoother multitasking.
multicore processor o Improved Responsiveness: Faster application
technology as response and user experience.
compared to single o Efficient Parallel Tasks: Speedup for video editing,
core processor simulations, etc.
technology. • Multicore Limitations:
o Software Optimization: Software needs to be
designed for multicore to fully benefit.
o Programming Complexity: Parallel programming
is more complex.
o Diminishing Returns: Single-threaded tasks don't
fully utilize multicore.
6. Write the key 6. Key properties of storage units:
properties used to • Capacity: Total data amount storage (Bytes, GB, TB).
characterize and • Access Time (Speed): Data read/write speed (ms, ns).
evaluate storage
units of a • Data Transfer Rate (Throughput): Data transfer amount
computer system. per time (MB/s, GB/s).
• Volatility: Data retention with/without power
(Volatile/Non-volatile).
• Access Method: Sequential or Random Access.
• Cost per Bit/Byte: Storage cost efficiency.
• Durability & Reliability: Lifespan and data integrity.
• Power Consumption: Energy usage.
7. Explain the 7. Volatile vs. Non-volatile memory:
difference between • Volatile Memory (RAM - e.g., DRAM):
volatile and non- o Requires constant power to retain data. Data lost
volatile memory when power off.
with an example of o Fast access speeds.
each type. o Used as primary memory for active data & program
execution.
• Non-volatile Memory (ROM - e.g., Flash memory):
o Retains data without power.
o Slower access than RAM.
o Used for long-term storage (SSDs, USB drives)
and firmware (ROM).

8. A computer has 8. Characters stored in 512MB memory:


512MB of • Assume 1 character = 1 byte (e.g., ASCII).
memory. How • 512MB = 512 * 1024 * 1024 Bytes = 536,870,912
many characters Bytes.
can be stored in its • Therefore, 512MB memory can store approximately
memory at a time? 536,870,912 characters.
Find • Note: This is a theoretical max. Actual usable space is less
out with a detailed due to OS and program usage. Unicode characters can use
explanation. more than 1 byte, reducing capacity.
9. What is ROM? 9. ROM (Read-Only Memory):
Why is it so- • Definition: Non-volatile memory primarily for reading,
called? Write a few not easy writing after initial programming.
typical uses of • "Read-Only" Reason: Historically, ROM was immutable
ROM. after manufacturing. Even reprogrammable ROM types
are read-centric.
• Typical Uses:
o Firmware (BIOS/UEFI) for system startup.
o Embedded systems firmware for device control.
o Bootloaders for OS loading.
o Storing fixed programs or data.

10. Draw the 10.


memory
classification tree.
Figure 7.5.

11. How do the 11. Differences: RAM, ROM, PROM, UVEPROM, EEPROM:
following differ • RAM: Volatile, R/W, main memory, fast access.
from each other: • ROM: Non-volatile, Read-Only (initially), firmware
RAM, ROM, storage.
PROM, • PROM: Non-volatile, Read-Only (after one-time program),
UVEPROM, one-time programmable.
EEPROM. • UVEPROM: Non-volatile, Read-Mostly, UV erasable &
reprogrammable, infrequent updates.
• EEPROM/Flash: Non-volatile, Read-Mostly, electrically
erasable & reprogrammable, in-system updates, SSDs,
flash drives.

12. Explain how 12. Cache Memory Performance Improvement:


cache memory • Faster Access: Cache (SRAM) is much faster than main
helps in improving memory (DRAM).
the overall • Locality of Reference: Programs access data and
performance of a instructions in localized patterns.
computer. • Cache Hit/Miss: CPU checks cache first. Hit: fast access.
Miss: slower main memory access.
• Data Fetching: On miss, cache fetches data block from
main memory, anticipating future needs.
• Reduced Average Access Time: Frequent cache hits
minimize CPU wait time for data.
• Improved Performance: Faster data access increases CPU
utilization, throughput, and overall system speed.

Chapter 8

Questions Answer
1. Draw the broad 1.
classification
diagram of popular
secondary storage
devices used in
today’s computers.
Figure 8.1

2. What is a 2. A magnetic disk is a circular platter coated with a magnetic


magnetic disk? material used for non-volatile computer data storage. HDDs and
Explain how data is floppy disks are examples.
stored and Data Storage: Data is stored by magnetizing tiny regions on
organized on a the disk surface. Each region can be magnetized to represent
magnetic disk binary 0 or 1. A read/write head, moving across the spinning
disk, alters or senses the magnetic orientation to write or read
data.
Data Organization: Data is organized in:
• Tracks: Concentric circles on the disk surface.
• Sectors: Tracks are divided into sectors, which are basic
units of data storage, typically holding 512 bytes or
more.
• Cylinders: A set of tracks at the same radial position
across all disk platters forms a cylinder. This helps
optimize read/write operations across multiple platters.
This structured organization allows for efficient addressing
and retrieval of data blocks on the magnetic disk

3. What is the 3. To calculate the storage capacity:


storage capacity of a • Tracks per side: 400
double-sided disk • Sectors per track: 16
that has 400 tracks, • Bytes per sector: 512
16 sectors, per track • Sides: 2 (double-sided)
and 512 Capacity Calculation:
bytes per sector? Capacity = (Sides) x (Tracks per side) x (Sectors per track) x
(Bytes per sector) Capacity = 2 x 400 x 16 x 512 bytes
Capacity = 6,553,600 bytes
To convert to KB (Kilobytes):
Capacity in KB = 6,553,600 bytes / 1024 bytes/KB = 6400
KB
To convert to MB (Megabytes):
Capacity in MB = 6400 KB / 1024 KB/MB ≈ 6.25 MB
Therefore, the storage capacity is approximately 6.25 MB or
6400 KB or 6,553,600 bytes.

4. Compare SSD 4.
and HDD as Feature SSD (Solid State HDD (Hard Disk
secondary storage in Drive) Drive)
computer. Speed Much Faster Slower
(read/write, access (mechanical parts)
time)
Data Access Random Access Random Access
(fast, consistent) (slower
seek/latency)
Durability More Durable (no Less Durable
moving parts, (mechanical parts,
shock-proof) fragile)
Noise Silent Operation Can be noisy
(spinning, head
movement)
Power Lower Power Higher Power
Consumption
Heat Less Heat More Heat
Size & Weight Lighter, Smaller Heavier, Bulkier
Form Factors
Cost Higher cost per GB Lower cost per GB
Lifespan Limited write Theoretically
cycles (wear longer lifespan
leveling used) (but mechanical
failures)
Fragmentation Not susceptible to Can suffer from
fragmentation fragmentation
5. What is an optical 5. An optical disk is a flat, circular disk that stores data using
disk? How a system patterns of pits and lands on its reflective surface, read and written
records/reads data by laser technology. CDs, DVDs, and Blu-ray discs are optical disks.
on/from an optical Data Recording: A high-powered laser beam records data by
disk? burning tiny indentations (pits) onto the reflective layer of the
disk. The areas between pits remain flat and reflective (lands).
For rewritable disks, a phase-change material is used, which can
switch between reflective and non-reflective states when heated
by the laser.
Data Reading: A low-powered laser beam is directed onto the
disk surface. The laser light reflects strongly from lands
(reflective areas) and scatters or reflects weakly from pits (non-
reflective areas). A sensor detects these differences in reflection
intensity. These variations are interpreted as binary data (pits
as 0s and lands as 1s, or vice versa), allowing the system to
read the stored information. The laser and sensor system moves
across the spinning disk to access different data locations.

Chapter 9

Question Answer
1. Name some commonly 1.
used input and output • Input Devices: Keyboard, Mouse, Touchscreen,
devices. Scanner, Microphone, Webcam, Barcode Reader,
MICR Reader, Graphics Tablet.
• Output Devices: Monitor, Printer, Speakers,
Projector, Plotter, Headphones.
2. Explain the working 2. Keyboard Working Principle:
principle of a keyboard. I. Key Press: Mechanical or membrane switch closure
Name some keyboard under key.
types based on their key II. Signal Generation: Circuit completes, generating
arrangement and uses key-specific code.
III. Code Transmission: Controller sends code to
computer.
IV. Interpretation: OS interprets code as
character/command.
Keyboard Types (Arrangement & Use):
• QWERTY: Standard, general use.
• AZERTY: French layout.
• DVORAK: Optimized layout for speed.
• Gaming: Mechanical, fast response, customizable.
• Ergonomic: Comfort-focused, split/curved.
• Membrane: Budget-friendly, quiet.
• Mechanical: Tactile, durable, varied switch types.

3. Discuss the differences 3. Scanner Types and Working Differences:


in the working of various • Flatbed: Light bar scans document on glass using
types of scanners. CCD/CIS sensor. High quality, versatile.
• Sheet-fed: Document fed through rollers, stationary
scan head. Compact, fast for multi-page.
• Handheld: Manually dragged across surface.
Portable, quality depends on user steadiness.
• Drum: Document on rotating drum, photomultiplier
tube scanning. Highest quality, professional.
• 3D: Projects light patterns, cameras capture shape.
3D digital models.
4. What is OCR 4. OCR (Optical Character Recognition): Converts scanned text
technology? How does it images to machine-readable text.
enhance our daily Enhancements:
working environment? • Paperless Workflow: Digital documents, less paper.
• Data Entry Automation: Text extraction from forms,
faster processing.
• Accessibility: Screen readers for visually impaired.
• Searchability: Text in documents becomes
searchable.
• Editability: Scanned documents become editable.

5. Explain the techniques 5. OMR (Optical Mark Recognition) Techniques:


used by OMR in •Light Reflection Detection: Marked areas absorb more
recognizing marks. light, less reflection.
Write some applications • Threshold Comparison: Scanner detects reflectivity below
that make use of it. a threshold as a mark.
• Predefined Templates: Scans only in specified mark
locations.
OMR Applications:
• Exam answer sheets grading.
• Surveys and questionnaires.
• Voting ballots tabulation.
• Inventory management.
• Lottery tickets verification.

6. What is a barcode? 6. Barcode: Machine-readable visual representation of data
How does it work? How (lines/spaces).
does it help in Working Principle:
maintaining and i. Data encoded into barcode pattern.
managing the supply ii. Scanner shines light, detects reflected light from
chain in the inventory spaces.
system? iii. Light/dark patterns converted to digital data,
decoded.
Supply Chain/Inventory Help:
• Product identification, unique tracking.
• Efficient tracking at each stage.
• Inventory accuracy, real-time updates.
• Faster checkout, automated reordering.
• Reduced costs, improved efficiency.

7. What is a MICR 7. MICR (Magnetic Ink Character Recognition): Reads


device? Explain how a characters printed with magnetic ink.
MICR device helps in the Bank Cheque Processing:
faster processing of bank 1. Cheques pre-printed with MICR ink characters
cheques with better (routing, account #).
accuracy. 2. MICR reader magnetizes ink.
3. Reader detects unique magnetic signals of each
character.
4. Signals converted to digital data.
Faster Processing & Accuracy:
• High-speed, reliable reading, even with smudges.
• Automates cheque sorting, reduces manual errors.
• Faster bank transaction processing.
8. What are the various 8. Current Printing Technologies:
printing technology • Inkjet Printing: Sprays ink droplets.
available now? • Laser Printing: Laser, toner, heat fusion.
• Dot Matrix Printing: Impact pins, ink ribbon.
• Thermal Printing: Heat-sensitive paper.
• Dye-Sublimation Printing: Heat dye transfer.
• 3D Printing: Layer-by-layer object creation.

9. Group printers into 9. Printer Types:


impact and nonimpact • Impact Printers: Dot Matrix, Daisy-wheel, Line
types. Why are they so Printers (legacy). Use physical impact to print.
called? • Non-Impact Printers: Inkjet, Laser, Thermal, Dye-
Sublimation. No physical impact, use ink spray,
laser/toner, or heat.
"Impact" vs "Non-Impact": Based on whether they physically
strike the paper to create an image (impact) or not (non-
impact).
10. Describe the working 10.
principle of Inkjet, Laser, • Inkjet: Ink cartridges, nozzles. Thermal or
and Dot matrix printers. piezoelectric ejection of ink droplets to form
images.
• Laser: Laser scans drum, toner attracted,
transferred to paper, fused by heat.
• Dot Matrix: Print head with pins strikes ink
ribbon against paper to create dot matrix
characters.
11. How can you choose 11. Printer Choice Factors:
the best printer for you? • Print volume (low/high).
• Print quality needs (text, photos).
• Cost (initial vs. running).
• Speed requirements.
• Color or monochrome.
• Desired features (duplex, wireless, scanning).
• Media types (paper, labels).
• Space and noise considerations.

12. Name some 12. Common Output Devices:


commonly used output • Monitors/Displays (LCD, LED, OLED).
devices. • Printers (Inkjet, Laser, Dot Matrix).
• Speakers.
• Projectors.
• Plotters.
• Headphones/Earphones.
13. Mention some popular 13. Display Trends (around 2025):
display technology • MicroLED dominance in high-end.
trends in 2025? • OLED advancements (foldable, larger, brighter).
• Mini-LED LCDs more widespread (improved
contrast).
• 8K and higher resolutions growing.
• High refresh rates (120Hz+) standard.
• Transparent and flexible displays evolving.
• Better ambient light rejection and HDR.
14. Categorize popular 14. Popular Display System Categories:
display systems that are • Flat Panel Displays:
used today. o LCD (LED-backlit), Plasma (legacy), LED
(OLED, Micro LED, Mini-LED).
• Projectors:
o DLP, LCD, Laser.
• Legacy Display:
o CRT (obsolete for most).

15. What are the key 15. Key Display Characteristics for Evaluation:
characteristics to • Resolution (pixels).
identify and evaluate • Panel Technology (LCD, OLED, etc.).
display systems today? • Refresh Rate (Hz).
• Response Time (ms).
• Contrast Ratio.
• Brightness (cd/m² or nits).
• Color Accuracy & Gamut.
• Viewing Angles.
• Size & Aspect Ratio.
• Connectivity (HDMI, etc.).
• Power Consumption.
• Ergonomics.
16. Describe the working 16.
principle of each of the • CRT: Electron beam scans phosphor screen, creating
display systems: CRT, pixels. Bulky, legacy.
LCD, LED, Plasma • LCD: Backlight, liquid crystals modulate light,
color filters. Common flat panel type.
• LED (LED LCD): LCD with LED backlight. More
efficient, thinner, better contrast than CCFL LCD.
• Plasma: Gas plasma cells emit UV light, excites
phosphors to glow. Self-emissive, good contrast,
higher power, mostly phased out.
17. Briefly describe 17. LED Technologies:
different LED • OLED: Organic LEDs, self-emissive, excellent
technologies: OLED, blacks, flexible.
QLED, Micro LED, Mini • QLED: Enhanced LED LCD using Quantum Dots
LED, AMO LED, PMO for color (Samsung's term).
LED • MicroLED: Microscopic LEDs, self-emissive, bright,
high contrast, expensive.
• Mini-LED: Dense LED backlight for LCDs, improved
local dimming, better contrast.
• AMOLED: Active Matrix OLED, individual pixel
control, fast response, high contrast.
• PMOLED: Passive Matrix OLED, simpler, cheaper,
lower resolution, for small displays.
18. Briefly Describe 18. LCD Panel Technologies:
different LCD • TN (Twisted Nematic): Fast response, narrow
technologies: TFT, IPS, viewing angles.
VA, TN, AHVA • IPS (In-Plane Switching): Wide viewing angles,
accurate color, slower response.
• VA (Vertical Alignment): High contrast, good
viewing angles (mid-range).
• TFT (Thin-Film Transistor): Implementation tech
used in all modern LCDs (not a type itself).
• AHVA (Advanced Hyper-Viewing Angle): IPS-like,
marketed for improved viewing angles.
19. Mention some 19. Display Resolution Properties:
display resolution • Resolution (pixel count - width x height).
properties. • Aspect Ratio (width: height).
• Pixel Pitch (distance between pixels).
• DPI (Dots Per Inch - pixel density).
• Pixel Depth (color depth/bit depth - colors per pixel).
20. What is resolution, 20.
pixel, DPI, aspect ratio, • Resolution: Total pixels in display (e.g.,
pixel pitch, pixel depth 1920x1080). Detail level.
• Pixel: Smallest colorable unit on display grid.
• DPI: Pixels per inch. Pixel density, sharpness.
• Aspect Ratio: Display width: height ratio (e.g., 16:9).
Shape of display.
• Pixel Pitch: Distance between pixel centers.
Sharpness related to pixel density.
• Pixel Depth: Bits per pixel for color. Number of colors
displayable.
Chapter 10

Questions Answer
1. Define the term 1.1 Hardware
hardware and software. • Definition: Physical components of a computer
system.
• Examples: CPU, RAM, Hard Drive, Monitor, Keyboard.
• Tangible: You can touch and see hardware.
1.2 Software
• Definition: Set of instructions that tells the hardware
what to do.
• Examples: Operating System, Applications (Word,
Browser), Games.
• Intangible: You cannot physically touch software.
2. What is a computer 2. Definition:
program? Set of Instructions: A sequence of instructions written to
perform a specific task.
Purpose:
Directs the computer to execute operations in a defined order.
Written in Code: Created using programming languages.

3. What is a software 3. Definition


package? • Bundle of Programs: A collection of computer
programs designed for related tasks.
• Integrated Solution: Provides a comprehensive solution
for a specific need.
• Examples: Microsoft Office, Adobe Creative Suite.
4. Write an analogy to
bring out the
relationship between
the hardware and
software of a computer
system. Describe with
figure 10.1.

4.1 Analogy: Car and Driver


• Hardware: Like a car - the physical machine, engine,
wheels, chassis.
• Software: Like a driver - the instructions, knowledge,
and skills to operate the car.
4.2 Explanation
• Car (Hardware) alone is useless: Without a driver, it
cannot function purposefully.
• Driver (Software) needs a car: Instructions are useless
without physical components to execute them.
• Together (System): Car and driver work together to
achieve transportation.
5. Normally hardware 5.1 Hardware - One-Time Expense (Normally)
is a one-time expense, • Initial Purchase: Typically bought upfront and
whereas software is a expected to last for a period.
continuing expense. • Upgrade Cycle: Replaced less frequently, often when
Explain performance becomes inadequate or parts fail.
5.2 Software - Continuing Expense
• Updates and Upgrades: Requires ongoing investment
for new versions and features.
• Licenses and Subscriptions: Often require recurring
fees for usage rights.
• Maintenance: Support and bug fixes may be tied to
ongoing costs.
6. How many types of 6.1 System Software
software are there? • Definition: Manages and controls computer hardware
Write three examples of and provides a platform for applications.
each • Examples: Operating Systems (Windows, macOS,
Linux), Device Drivers, Utilities (Antivirus).
6.2 Application Software
• Definition: Designed for specific user tasks.
• Examples: Word Processors (Microsoft Word), Web
Browsers (Chrome, Firefox), Games.
6.3 Programming Software
• Definition: Tools used to create other software.
• Examples: Compilers (GCC), Interpreters (Python
Interpreter), IDEs (Visual Studio Code).
7. Which functions are 7. Functions
performed by system • Hardware Management: Controls and coordinates
software? hardware resources (CPU, memory).
• Platform Provision: Provides an environment for
application software to run.
• Resource Allocation: Manages and distributes system
resources efficiently.
• User Interface: Enables user interaction with the
computer.
• Utility Services: Offers tools for system maintenance
and tasks (file management).
8. What are some 8.1 Operating Systems (OS)
common types of • Example: Windows, macOS, Linux, Android, iOS.
system software?
Write examples for • Function: Core software that manages hardware and
each. software resources.
8.2 Utilities
• Example: Disk Defragmenter, File Compression,
Antivirus, Backup Software.
• Function: Tools for system maintenance and specific
tasks.
8.3 Device Drivers
• Example: Printer drivers, Graphics card drivers,
Network card drivers.
• Function: Enable communication between the OS and
specific hardware devices.
9. What is firmware 9.1 Definition
and what is its • Embedded Software: Software permanently
importance in programmed into hardware devices.
computer system • Read-Only Memory: Often stored in ROM, EPROM,
architecture? or flash memory.
9.2 Importance
• Boot Process: Essential for starting up the computer
and initializing hardware.
• Low-Level Control: Provides basic instructions for
hardware to function.
• Hardware Specific: Tailored to control the specific
device it is embedded in.
10. What are the 10.1 Purchased Software (Commercial)
different ways of • Advantages: Ready to use, often well-supported,
acquiring software? feature-rich.
What are their relative • Limitations: Can be expensive, limited customization,
advantages and vendor dependency.
limitations? 10.2 Open Source Software
• Advantages: Free or low cost, customizable, large
community support, transparent code.
• Limitations: May require technical expertise, support
may be community-based, less user-friendly
sometimes.
10.3 Custom Built Software
• Advantages: Tailored exactly to requirements, unique
solution, competitive advantage.
• Limitations: Most expensive, time-consuming to
develop, requires specialized skills, maintenance
responsibility.
Chapter 12

Question Answer
1. What is a 1. Definition
programming • Formal Language: A set of rules and syntax to write
language? instructions for computers.
• Communication Tool: Allows humans to instruct
computers to perform tasks.
• Abstraction: Provides a level of abstraction from the
computer's hardware.
• Examples: Python, Java, C++, JavaScript.

2. What is machine 2.1 Definition


language? Write the • Computer's Native Language: Binary code (0s and 1s)
advantages and directly understood by the CPU.
limitations of • Low-Level: Closest to the hardware, specific to CPU
machine language. architecture.
2.2 Advantages
• Direct Execution: No translation needed, runs very fast.
• Full Hardware Control: Maximum control over computer
hardware.
2.3 Limitations
• Difficult to Write: Complex and error-prone for humans.
• Machine-Dependent: Code written for one CPU type
won't run on another.
3. What is assembly 3.1 Definition
language? What are • Low-Level Language: Uses symbolic codes
its advantages over (mnemonics) to represent machine instructions.
machine language? • One-to-One Mapping: Each assembly instruction
What are its typically corresponds to one machine instruction.
limitations? 3.2 Advantages over Machine Language
• Easier to Read and Write: Mnemonics are more
understandable than binary code.
• Less Error-Prone: Symbolic representation reduces
coding mistakes.
3.3 Limitations
• Still Low-Level: Requires understanding of computer
architecture.
• Machine-Dependent: Code is specific to CPU family.
• Requires Translation: Needs an assembler to convert to
machine code.
4. What is an
assembler? Describe
with Figure 12.2.
4.1 Definition
• Translator Program: Converts assembly language code
into machine language.
4.2 Process (Figure 12.2 - Conceptual)
• Input: Assembly Language Program (Source Code).
• Assembler Operation: Reads assembly code, translates
mnemonics into binary machine instructions.
• Output: Machine Language Program (Object Code)
ready for execution.
4.3 Purpose
• Bridge: Allows programmers to write in symbolic
assembly and run on hardware.
5. What is a compiler?
Why is it required?
Describe with figure
12.7. What are its
advantages over
assemblers? What are 5.1 Definition
• Translator Program: Converts high-level language code
its limitations?
into machine language.
5.2 Requirement and Purpose (Figure 12.7 - Conceptual)
• Need for Abstraction: High-level languages are
designed for programmer ease, not hardware.
• Compiler Role: Translates human-readable, high-level
source code into machine code the computer can execute.
• Process: Reads entire source code, analyzes it, and
produces machine code in one go.
5.3 Advantages over Assemblers
• Higher Level of Abstraction: Easier to write and
understand code.
• Machine-Independent (Portable): Code can run on
different machines with different compilers.
• Faster Development: Increased programmer
productivity.
5.4 Limitations
• Compilation Time: Requires a compilation step before
execution.
• Less Direct Hardware Control: Abstraction may limit
direct hardware manipulation compared to assembly.
• Object Code Size: Compiled code can sometimes be
larger than hand-optimized assembly.
Chapter 14

Questions Answer
1. What is an operating 1.1 Definition
system? • System Software: Manages computer hardware and
software resources.
• Interface: Acts as a bridge between user and
hardware.
• Resource Manager: Allocates resources like CPU,
memory, storage.
2. What are the two 2.1 Convenience
primary objectives of the • User-Friendly: Make the computer system easy and
operating system? efficient to use.
• Simplified Interaction: Hide complexity of hardware
from users.
2.2 Efficiency
• Resource Utilization: Manage system resources
effectively.
• Performance Optimization: Ensure smooth and fast
execution of tasks.
3. What are the six main 3.1 Process Management
functions of operating • Execution Control: Manage and schedule running
systems? programs (processes).
3.2 Memory Management
• Allocation/Deallocation: Control and allocate
memory to programs.
3.3 File Management
• Organization/Access: Organize and manage files
and directories.
3.4 I/O Management
• Input/Output Control: Manage communication with
peripheral devices.
3.5 Security
• Protection: Protect system and user data from
unauthorized access.
3.6 User Interface
• Interaction Method: Provide ways for users to
interact with the system.
4. What is a computer 4.1 Definition
virus? • Malicious Software: Self-replicating program
designed to harm a computer.
• Infection: Attaches itself to legitimate programs or
documents.
• Damage: Can corrupt data, slow down system, steal
information.
5. What is a BIOS? 5.1 Definition
• Firmware: First software run when a computer boots
up.
• Initialization: Tests hardware and initializes
system components.
• Bootstrapping: Loads the operating system into
memory.
6. What are the different 6.1 Batch OS
categories of operating • Processing: Executes jobs in batches without user
systems? Briefly interaction.
describe each? • Efficiency Focus: Aims for high throughput for
similar tasks.
6.2 Time-Sharing OS
• Multitasking: Allows multiple users to share the
system concurrently.
• Interactive: Provides quick response times for each
user.
6.3 Real-Time OS (RTOS)
• Time-Critical: Designed for applications with strict
time constraints.
• Predictable: Guarantees timely responses to events.
6.4 Distributed OS
• Networked Systems: Manages a group of computers
working together.
• Resource Sharing: Enables sharing resources across
multiple systems.
6.5 Mobile OS
• Mobile Devices: Designed for smartphones and
tablets.
• Touch Interface: Optimized for touch-based
interaction.
6.6 Embedded OS
• Dedicated Devices: Used in embedded systems like
appliances, cars.
• Resource-Constrained: Often designed for limited
hardware resources
7. Write the important 7.1 Windows
features of the following ❖ Features
operating system and • User-Friendly GUI: Easy to learn and use,
also the drawbacks of widespread familiarity.
these systems: • Software Compatibility: Broadest application
(i) Windows (ii) Linux software support.
(iii) Android • Plug and Play: Simplified hardware installation.
❖ Drawbacks
• Cost: Proprietary, requires licensing fees.
• Security Vulnerabilities: Historically prone to
viruses and malware.
• Resource Intensive: Can require significant
hardware resources.
7.2 Linux
❖ Features
• Open Source: Free to use and distribute,
customizable.
• Stability & Security: Known for robust and secure
performance.
• Customizable: Highly configurable and flexible.
❖ Drawbacks
• Learning Curve: Can be more complex for beginners,
command-line reliance.
• Software Compatibility (Games): Less native
support for some commercial applications and
games.
• Hardware Compatibility (Specific): Driver support
can sometimes be an issue for very new hardware.
7.3 Android
❖ Features
• Mobile Focus: Optimized for touch-based mobile
devices.
• Open Source (Kernel): Based on Linux kernel,
fostering community development.
• Large App Ecosystem: Vast selection of apps on
Google Play Store.
❖ Drawbacks
• Fragmentation: Many versions and vendor
customizations lead to inconsistency.
• Resource Intensive: Can be demanding on device
resources, especially older devices.
• Privacy Concerns: Data collection and privacy issues
with Google services.
8. Could you provide a 8.1 Windows Distributions
list of the distributions • Windows 10, Windows 11 (Different editions: Home,
available for each Pro, Enterprise)
operating system? • Windows Server (Various versions)
8.2 Linux Distributions (Examples)
• Ubuntu, Fedora, Debian, CentOS, Mint, Arch Linux,
openSUSE
8.3 Android Distributions (Examples)
• Stock Android (Google Pixel), Samsung One UI,
Xiaomi MIUI, OnePlus OxygenOS, Custom
Chapter 16

Questions Answers
1. Differentiate data and 1. Data vs. Information
information. 1.1 Data
• Raw Facts: Unprocessed facts and figures.
• Meaningless in Isolation: Lacks context and
interpretation.
• Example: Numbers like "25", "London", "Blue".
1.2 Information
• Processed Data: Data that has been organized and
given context.
• Meaningful and Useful: Provides understanding
and insights.
• Example: "The temperature is 25 degrees Celsius in
London," "His favorite color is Blue."
2. What is a database? 2.1 Database
How is it different from a • Organized Collection: Structured set of related data.
file? • Managed by DBMS: Controlled by a Database
Management System.
• Purpose: Efficient data storage, retrieval, and
management.
2.2 File
• Collection of Data: A simple container of data, often
unstructured or loosely structured.
• Managed by OS: Managed directly by the operating
system.
• Purpose: Basic storage of information, less focused
on complex management features.
3. What are the 3.1 Data Redundancy
limitations of • Duplication: Same data stored in multiple files,
organizing data in a leading to wasted space.
file-oriented approach? 3.2 Data Inconsistency
• Conflicting Data: Different files may have
contradictory information for the same entity.
3.3 Data Isolation
• Scattered Data: Data spread across files, making it
difficult to access and integrate.
3.4 Data Dependence
• Application Tied: Applications are tightly coupled
with file structure, changes are difficult.
3.5 Lack of Security & Integrity
• Limited Control: File systems offer basic security,
less robust data validation and integrity
mechanisms.
4. Write the names of 4.1 Examples
some popular database • MySQL
management systems • Oracle Database
used today. • Microsoft SQL Server
• PostgreSQL
• MongoDB
5. What is SQL? 5.1 Definition
• Database Language: Standard language for
managing and querying relational databases.
• Purpose: Used to create, manipulate, and retrieve
data from databases.
• Operations: Includes commands for data definition,
manipulation, and control.
6. What is DDL and 6.1 DDL (Data Definition Language)
DML? • Structure Definition: Commands to define the
database schema (structure).
• Operations: Creating, altering, and dropping
database objects (tables, indexes).
• Example: CREATE TABLE, ALTER TABLE, DROP
TABLE.
6.2 DML (Data Manipulation Language)
• Data Management: Commands to manipulate data
within the database.
• Operations: Inserting, updating, deleting, and
retrieving data.
• Example: SELECT, INSERT, UPDATE, DELETE.
7. Describe relational, 7.1 Relational Data
semi-structured and • Structured Data: Organized in tables with rows and
unstructured data with columns, relationships defined.
examples. • Example: Customer data in tables with columns like
ID, Name, Address, Order History.
7.2 Semi-structured Data
• Organized but Flexible: Doesn't conform to rigid
relational model, uses tags or markers.
• Example: JSON or XML documents, where data is
organized with tags and attributes but schema is
flexible.
7.3 Unstructured Data
• No Predefined Format: Data without a specific
structure, difficult to analyze directly.
• Example: Text documents, images, audio files, video
files, social media posts.
8. What are the key 8.1 Tables
elements of a relational • Entities: Represent collections of data about specific
database? entities (e.g., Customers, Products).
8.2 Columns (Attributes)
• Properties: Define the characteristics of each entity
(e.g., Customer Name, Product Price).
8.3 Rows (Records/Tuples)
• Instances: Represent individual instances of an
entity (e.g., a specific customer record).
8.4 Relationships
• Connections: Define how tables are logically related
(e.g., One-to-Many, Many-to-Many).
8.5 Keys
• Constraints: Used to uniquely identify records
(Primary Key) and establish relationships (Foreign
Key).
9. What is database 9.1 Database Designing
designing? What are its • Process: Planning and structuring a database to
steps? efficiently store and manage data for specific needs.
9.2 Steps
• Requirement Analysis: Understand user needs and
data requirements.
• Conceptual Design: Create a high-level model (ER
diagram) representing entities and relationships.
• Logical Design: Map conceptual model to a specific
database model (relational), define tables and
attributes.
• Physical Design: Decide on storage structures,
indexing, and physical implementation details.
• Implementation & Testing: Build the database,
populate with data, and test its functionality.

Chapter 17

Questions Answers
1. What is a computer 1.1 Definition
network? How is it • Interconnected Devices: Two or more computers
useful? linked together.
• Communication Medium: Uses cables or wireless for
data exchange.
• Resource Sharing: Enables sharing files, printers,
and internet.
1.2 Uses
• Communication: Facilitates email, messaging,
video calls.
• Information Sharing: Allows easy access and
distribution of data.
• Resource Sharing: Reduces costs by sharing
hardware and software.
• Centralized Management: Simplifies
administration and updates.
2. What are modems? 2.1 Definition
What purpose do they • Modulator-Demodulator: Device that converts digital
serve in data data to analog signals and vice versa.
communication systems? 2.2 Purpose in Data Communication
• Signal Conversion: Enables computers (digital) to
transmit data over analog media like phone lines or
cable TV lines.
• Internet Access: Historically crucial for connecting
to the internet via dial-up or cable.
• Data Transmission: Allows long-distance
communication by adapting digital signals.
3. What is network 4.1 Definition
topology? Describe four • Network Layout: Physical or logical arrangement of
network topologies in network devices and connections.
common use. Write their • Structure: Defines how computers are interconnected
relative advantages and in a network.
disadvantages. 4.2 Bus Topology
• Description: Single cable (bus) connects all devices.
• Advantages: Simple, low cost, easy to install.
• Disadvantages: Single point of failure (bus cable),
difficult troubleshooting, limited scalability, slow
performance with many devices.
4.3 Star Topology
• Description: Central hub/switch connects all devices.
• Advantages: Robust (failure of one device doesn't
affect others), easy troubleshooting, scalable,
centralized management.
• Disadvantages: Central point of failure
(hub/switch), more expensive than bus due to central
device.
4.4 Ring Topology
• Description: Devices connected in a closed loop or
ring.
• Advantages: Data flows unidirectionally reducing
collisions, can cover larger distances than bus.
• Disadvantages: Single point of failure (cable
break), difficult troubleshooting, adding/removing
devices disrupts network.
4.5 Mesh Topology
• Description: Multiple paths between devices, some or
all devices are directly connected.
• Advantages: Highly robust (multiple paths), fault-
tolerant, increased security and privacy.
• Disadvantages: Complex and expensive to implement
and manage, redundant connections can be
inefficient in simpler networks.
4. Differentiate among 5.1 PAN (Personal Area Network)
PAN, LAN, CAN, MAN • Scope: Few meters, personal devices.
and WAN. • Example: Bluetooth connection between phone and
headphones.
5.2 LAN (Local Area Network)
• Scope: Limited area, home, office, building.
• Example: Wi-Fi network in a house or office.
5.3 CAN (Campus Area Network)
• Scope: Multiple LANs interconnected, university
campus, industrial park.
• Example: Network connecting buildings within a
university.
5.4 MAN (Metropolitan Area Network)
• Scope: City or metropolitan area.
• Example: Cable TV network in a city.
5.5 WAN (Wide Area Network)
• Scope: Large geographical area, country, global.
• Example: The Internet.
5. What is 6.1 Definition
communication protocol? • Set of Rules: Standardized rules governing data
communication.
• Agreement: Defines format, timing, sequencing of
data exchange.
• Interoperability: Enables different devices to
communicate effectively.
• Examples: TCP/IP, HTTP, Ethernet.
6. What is a network 7.1 Definition
interface card? Explain • Hardware Component: Circuit board that enables a
its usage in a computer computer to connect to a network.
system. • Physical Interface: Provides ports for network cables
or wireless antenna.
7.2 Usage
• Network Connection: Allows computer to send and
receive data over a network.
• Data Link Layer: Operates at the data link and
physical layers of the OSI model.
• Unique Address (MAC): Has a unique Media
Access Control address for identification on the
network.
7. Internetworking tools: 8.1 Bridge
bridge, router, gateway • Function: Connects two LAN segments using the
same protocol.
• Operation: Filters traffic based on MAC addresses,
reducing collisions within segments.
• Purpose: Extends a LAN, improves performance by
segmenting network.
8.2 Router
• Function: Connects different networks, often LANs
to WANs or different LANs with potentially
different protocols.
• Operation: Forwards data packets based on network
addresses (IP addresses), determines best path.
• Purpose: Enables communication between networks,
internet access, network segmentation and
management.
8.3 Gateway
• Function: Connects networks with different
protocols or architectures, performs protocol
conversion.
• Operation: Translates data and protocols between
dissimilar networks.
• Purpose: Interconnects fundamentally different
networks (e.g., LAN to mainframe network),
enables communication across heterogeneous
systems.
8. Wireless technologies: 9.1 2G (Second Generation)
Evolution 5G from 2G, • Digital Voice: Introduced digital cellular technology,
WiMAX, Wi-Fi, improved voice quality.
• Text Messaging (SMS): Enabled short message
service.
• Example: GSM, CDMA.
9.2 5G (Fifth Generation)
• High Speed & Low Latency: Significantly faster
speeds, lower delays.
• Enhanced Mobile Broadband: Improved
streaming, gaming, and data-intensive apps.
• Massive IoT: Supports massive numbers of
connected devices.
• Example: Current mobile networks offering
gigabit speeds.
9.3 WiMAX (Worldwide Interoperability for Microwave
Access)
• Broadband Wireless: Designed for longer-range
wireless broadband access, alternative to cable/DSL.
• Metropolitan Coverage: Aimed at city-wide wireless
internet access.
• Less Successful than Wi-Fi/Cellular: Did not
achieve widespread adoption compared to Wi-Fi and
cellular technologies.
9.4 Wi-Fi (Wireless Fidelity)
• Local Wireless Networking: Short-range, high-speed
wireless LAN technology.
• Standards (802.11 a/b/g/n/ac/ax): Evolved
through different standards with increasing speeds
and ranges.
• Ubiquitous: Widely used in homes, offices, public
hotspots for internet access.

Chapter-Internet E-commerce security and privacy

Questions Answers
1. What is the Internet? 1.1 Internet Definition
How is it correlated with • Global Network of Networks: Vast, worldwide
Computer Networks? network connecting billions of devices.
• Decentralized: No single owner, composed of
interconnected networks.
• TCP/IP Protocol Suite: Uses TCP/IP protocols for
communication.
1.2 Correlation with Computer Networks
• Internet is Built on Networks: The Internet is a
network of computer networks.
• Networks are Building Blocks: LANs, WANs, etc.,
form the infrastructure of the Internet.
• Interconnectivity: Computer networks provide the
connections that enable the Internet to exist and
function.
2. What is IP? How does 2.1 IP Definition
IP play roles as a resource • Internet Protocol: Primary protocol for
locator in Networks? communication over the Internet.
• Addressing and Routing: Responsible for
addressing and routing data packets.
2.2 IP as Resource Locator
• IP Addresses: Unique numerical addresses assigned
to devices on a network.
• Location Identifier: IP address acts as a logical
address, identifying a device's location on the
Internet.
• Routing Packets: Routers use IP addresses to
determine the path to send data packets to their
destination.
3. How e-commerce is 3.1 E-commerce (Electronic Commerce)
different from • Online Transactions: Buying and selling
traditional commerce goods/services over the Internet.
• Digital Medium: Relies on digital platforms,
websites, apps.
• Global Reach: Potential to reach customers
worldwide.
• 24/7 Availability: Transactions can occur at any
time.
3.2 Traditional Commerce
• Physical Transactions: Buying and selling in
physical stores or locations.
• Physical Presence: Requires physical storefronts,
face-to-face interaction.
• Localized Market: Typically limited to a
geographical area.
• Limited Hours: Operates during business hours.
4. What is m-commerce? 4.1 Definition
• E-commerce on Mobile Devices: Subset of e-commerce
conducted via smartphones and tablets.
• Mobile Networks: Leverages mobile internet and
wireless technologies.
• Location-Based Services: Can utilize GPS and
location features for targeted offers.
• App-Based: Often facilitated through mobile
applications.
5. What are the threats in 5.1 Security Threats
the e-commerce business? • Data Breaches: Unauthorized access and theft of
sensitive customer data.
• Cyberattacks: Hacking, malware, phishing attempts
to disrupt operations or steal information.
• Payment Fraud: Unauthorized transactions and
credit card fraud.
5.2 Operational Threats
• Website Downtime: Technical failures leading to loss
of sales and customer trust.
• Supply Chain Disruptions: Issues with logistics,
inventory management, and delivery.
• Customer Service Issues: Inefficient or poor online
customer support.
5.3 Financial Threats
• Price Competition: Intense competition leading to
pressure on profit margins.
• Chargebacks: Customers disputing transactions
leading to financial losses.
• Online Fraud Costs: Losses due to fraudulent
transactions and security breaches.
6. Describe electronic 7.1 Credit and Debit Cards
payment methods in e- • Card Payments: Most common online payment
commerce. method, using card details.
• Payment Gateways: Securely process card
transactions.
7.2 Digital Wallets
• Online Accounts: Services like PayPal, Google Pay,
Apple Pay store payment information.
• Simplified Checkout: Faster checkout without
repeatedly entering card details.
7.3 Mobile Payments
• Smartphone-Based: Payments via mobile apps,
NFC, QR codes (e.g., Alipay, WeChat Pay).
7.4 Bank Transfers
• Direct Payments: Customers pay directly from their
bank accounts.
• Secure but Slower: Can be slower than card
payments.
7.5 Cryptocurrency
• Digital Currency: Using cryptocurrencies like
Bitcoin for payments.
• Decentralized and Secure: Offers anonymity and
potentially lower fees.
7. What are the strategies 7.1 User-Friendly Website
to make an e-commerce • Easy Navigation: Intuitive site design, clear product
business successful? categories, search functionality.
• Mobile Optimization: Responsive design for
seamless mobile experience.
• Fast Loading Speed: Quickly loading pages for
better user experience.
7.2 Strong Marketing & Branding
• Online Presence: SEO, social media marketing,
online advertising to attract customers.
• Brand Building: Develop a strong brand identity
and customer loyalty.
• Content Marketing: Valuable and engaging content
to attract and retain customers.
7.3 Excellent Customer Service
• Responsive Support: Prompt and helpful customer
service via chat, email, phone.
• Easy Returns & Refunds: Clear and customer-
friendly return policies.
• Personalization: Tailored experiences and
recommendations.
7.4 Secure & Trustworthy Platform
• Data Security: Implement robust security measures
to protect customer data.
• Payment Security: Use secure payment gateways
and SSL certificates.
• Build Trust: Display security badges, customer
testimonials, clear privacy policies.
8. Describe the 8.1 E-commerce Platform
technological • Software: Platform to build and manage online
infrastructure to build store (e.g., Shopify, Magento, WooCommerce).
an e-commerce system. • Features: Product catalog, shopping cart, order
management, payment processing.
8.2 Web Server & Hosting
• Infrastructure: Servers to host website and
application files.
• Reliability & Scalability: Ensure website
availability and handle traffic.
8.3 Database System
• Data Storage: Database to store product information,
customer data, order details.
• Efficiency & Security: Robust and secure database
management system.
8.4 Payment Gateway Integration
• Secure Transactions: Integrate with payment
gateways to process online payments securely.
• Multiple Payment Options: Support various
payment methods preferred by customers.
8.5 Security Systems
• Protection Measures: Firewalls, intrusion detection
systems, SSL certificates, malware protection.
• Data Encryption: Encrypt sensitive data to protect
customer information.

Chapter 20

Questions Answers
1. List the parameters 1.1 Traditional Parameters
that were used • Processing Power: Measured in operations per second.
traditionally to classify • Memory Capacity: Amount of data computer could
computers. What major store.
types of computers were • Size and Cost: Physical dimensions and purchase
there based on this price.
classification scheme? 1.2 Major Types (Traditional)
Why is this scheme no • Microcomputers: Smallest, for personal use.
longer relevant? • Minicomputers: Mid-range, for small businesses.
• Mainframe Computers: Large, for big
organizations.
• Supercomputers: Most powerful, for complex
calculations.
1.3 Why No Longer Relevant
• Performance Overlap: Lines blurred due to rapid tech
advancements.
• Microcomputers Powerful: Modern PCs surpass older
mainframes in some tasks.
• Focus Shift: Classification now based on usage and
capabilities, not just raw specs.
2. Write the basis on 2.1 Basis of Classification (Today)
which computers are • Purpose and Capability: Based on intended use and
classified today. What performance characteristics.
major types of computers • Scalability and Application: Ability to handle
are there based on this different workloads and tasks.
classification? 2.2 Major Types (Modern)
• Personal Computers (PCs): General-purpose for
individuals.
• Workstations: High-performance PCs for
professionals.
• Servers: Provide services and resources to other
computers.
• Mainframe Systems: Large-scale processing and
data handling for enterprises.
• Supercomputers: For extremely complex and
computationally intensive tasks.
• Embedded Systems: Computers integrated into
devices for specific control.
• Mobile Devices: Smartphones, tablets, for portable
computing and communication.
3. Describe the typical 3.1 Core Components
configuration of a PC. • CPU (Processor): Central processing unit, the
"brain".
• RAM (Memory): Volatile memory for active data.
• Storage (Hard Drive/SSD): Non-volatile storage for
OS, programs, files.
• Motherboard: Main circuit board connecting
components.
• Graphics Card (GPU): Processes graphics and video
output.
• Power Supply: Provides power to components.
• Case/Chassis: Enclosure for components.
3.2 Peripherals
• Monitor: Display for visual output.
• Keyboard & Mouse: Input devices.
• Network Interface Card (NIC): For network
connectivity.
• Optional: Speakers, printer, webcam, etc.
4. What is a mainframe 4.1 Definition
system? Describe the • Large, Powerful Computers: Designed for high-
typical configuration of volume transaction processing and data
a mainframe system. management.
• Enterprise-Level: Used by large organizations for
critical applications.
• Reliability & Scalability: Built for continuous
operation and handling massive workloads.
4.2 Typical Configuration
• Multiple Processors: Many CPUs for parallel
processing.
• Large Memory Capacity: Massive RAM to handle
huge datasets.
• Extensive Storage: Vast storage systems, often disk
arrays and tape libraries.
• Redundant Systems: Built-in redundancy for
fault tolerance.
• Specialized I/O Channels: High-speed data transfer
with peripherals.
• Operating System: Mainframe OS designed for
stability and resource management.
5. What is the purpose of 5.1 Purpose of Console
a console in a mainframe • System Administration Interface: Dedicated
system? terminal for operators to control and monitor the
mainframe.
• Direct Access: Provides direct access to system
operations and diagnostics.
• System Commands: Used for system startup,
shutdown, resource allocation, troubleshooting, and
maintenance tasks.
• Monitoring: Displays system status, logs, and
performance metrics.
6. What is a 6.1 Definition
supercomputer? What are • Most Powerful Computers: At the leading edge of
its main uses? processing capability.
• Designed for Speed: Optimized for complex scientific
and engineering calculations.
• Massively Parallel: Utilize thousands or millions of
processors working together.
6.2 Main Uses
• Scientific Research: Climate modeling, drug
discovery, astrophysics simulations.
• Engineering: Aerospace design, computational fluid
dynamics, nuclear simulations.
• Data Analysis: Large-scale data analytics, AI and
machine learning.
7. Write examples of at 7.1 Climate Modeling
least three • Complexity: Simulating Earth's climate requires
supercomputing processing vast datasets and complex atmospheric
applications. Explain models.
why these applications • Supercomputer Need: Demands immense
require a supercomputer. computational power for accurate long-term
predictions.
7.2 Drug Discovery
• Complexity: Simulating molecular interactions to
identify potential drug candidates.
• Supercomputer Need: Requires massive parallel
processing to screen millions of molecules
efficiently.
7.3 Nuclear Simulations
• Complexity: Modeling nuclear reactions and
explosions is extremely computationally intensive.
• Supercomputer Need: Demands the highest levels of
processing power for detailed and accurate
simulations.
8. What are the main 8.1 Supercomputer
differences between a • Focus: Maximum processing speed for complex
supercomputer and a calculations.
mainframe computer? • Metric: FLOPS (Floating-point Operations Per
Second).
• Parallel Processing: Massively parallel architectures.
• Applications: Scientific research, simulations.
8.2 Mainframe
• Focus: High reliability, throughput for transaction
processing and data management.
• Metric: Transactions Per Second (TPS), data
throughput.
• Scalability & Redundancy: Robust architecture for
continuous operation.
• Applications: Banking, insurance, large-scale data
centers.

You might also like