0% found this document useful (0 votes)
1 views

Fundamentals of IT and Programming Assi

The document provides an overview of fundamental concepts in IT and programming, including definitions of computers, their organization, classifications, memory types, software testing, operating systems, and the OSI reference model. Key topics include the roles of input devices, types of computers (supercomputers, mainframes, minicomputers, microcomputers), and the components of operating systems. The document also outlines software testing strategies and the OSI model's layers involved in data transmission.
Copyright
© © All Rights Reserved
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Fundamentals of IT and Programming Assi

The document provides an overview of fundamental concepts in IT and programming, including definitions of computers, their organization, classifications, memory types, software testing, operating systems, and the OSI reference model. Key topics include the roles of input devices, types of computers (supercomputers, mainframes, minicomputers, microcomputers), and the components of operating systems. The document also outlines software testing strategies and the OSI model's layers involved in data transmission.
Copyright
© © All Rights Reserved
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 7

NAME ALEENA FATHIMA

ROLL 2314506573

PRORAM BCA

SEMESTER 1

COURSE NAME FUNDAMENTALS OF IT AND PROGRAMMING

COURSE CODE DCA1101

SET 1
1) A. DEFINE THE TERM COMPUTER?
Computer is a device that receives information (in the form of digitalized data) and
manipulates it for some result based on a program or sequence of instructed on ow the data is
to be processed. technically, a computer is a programmable machine. This means it can
execute a programmed list of instructions and respond to new instructions and responds to
new instructions that’s given.
B. EXPLAIN THE ORGANIZATION OF COMPUTER?
Computer is a fast and accurate device which can accept data store data process them and I
have desired results as output. the computer is organized into four units CPU secondary
memory and output unit. a hardware device tat accepts inputted information and as the
capability that information.
o Input unit: Any device design to assist in the entry of data into a computer is known
as input device. Input devices convert data from any convenient external format into
binary codes that a computer can store and manipulative internally. some of the most
common, most popularly used devices.
 Mouse: tis input device id categorized as a pointing device because it is used
to point and select an option on the monitor. It is small boxlike object. That is
connected to the computer by a cable and can be rolled around on the table. A
pointer on the screen follows the movements of the mouse.
 Lit pen: this is also categorized into a pointing device, which can be used only
wit video displays .it can be used to select an option by simply pointing at it or
drawing figures directly on the screen .an electron beam that repeatedly. it can
be used to select an option by simply pointing at it or drawing figures directly
on the screen.
 Touch screen: a type of display screen that as a touch sensitive transparent
panel covering the screen. instead of using a pointing device such as a mouse
or lit pen, you can use your fingers to point directly to objects on the screen.
 Joystick: a lever that moves in all directions and controls t movement of a
pointer or some other display symbol’s joystick is similar to a mouse, except
that with a mouse the cursor stops moving as soon as you stop moving two
mouse with a joystick is pointing
 Keyboards: are the most widely used input devices. The most popular
keyboards are those that look, feel, and possibly sound like an ordinary
typewriter keyboard. alternatives are membrane keyboard whose keys are
merely printed on a plastic membrane.
 Scanners: these are the eyes of a computer. they can see images or printed text
and translate them into binary code. most scanners collect data from a page by
recording, which areas are light, and which are dark. They contain camera,
which is made up of thousands of tiny cells called cared couple device.

Question number 2
DISCUSS TE DIFFERENT CLASSIFICATION OF COMPUTERS?
ANSWER:
Computers are classified according to their data processing speed amount of data that they
can old and price. computers are classified. Depending upon their speed and memory size,
there are four main groups.
1.supercomputers
2.mainframe computer
3.minicomputer
4.microcomputer
 Supercomputer:
They are the most powerful and fastest and very expensive they are mainly used for
weather forecasting, nuclear energy research, aircraft design, automotive design,
online banking, to control industrial units. try are used in large organizations, research
laboratories, aerospace centres, large industrial units etc.

 Mainframe computer:
They are also large-scale computers, but supercomputers are larger than mainframe. these are
also expensive. they use two types of terminals one. dumb terminal two. Intelligent terminal
The mainframe computers are specifically used as servers on the world wide web. the
mainframe computers are used in large organizations such as banks airlines and universities
etc. the examples of mainframe are IBM S/390,control data CYBER 179 and Amdal 580 etc

 Minicomputers:
These are smaller in size, have lower processing speed and have lower cost than mainframe.
these computers are known as minicomputer because of their small size as compared to other
computers at that time. They are used in business education and many other government
departments. Although some minicomputers are designed for a single user but most designed
to manage multiple terminals.
 Microcomputer:
The computer is also known as personal computer or simply pcs microprocessor is used in
this type of computer these are very small in size and cost. the IBMs first microcomputer was
designed in 1981 and was named as IBM pc after this many computer hardware companies
copied the design of IBM pc. the term pc -compatible refers any personal computer based on
the original IBM personal computer design.
Question number 3:
EXPLAIN RANDOM ACCESS MEMORY AND READ ONLY MEMORY ALON WIT TYPES?
ANSWER:
RANDOM ACCESS MEMORY:
Main memory of a computer system is used to store programs and data RAM provides temporary read
/write storage wile ard disks offer semi-permanent storage. All programs must be run trou ram before
they can be use the term random devices from the fact that e CPU can retrieve data from any
individual location Or address within ram. ram is volatile which means that it requires a steady flow
of electricity to maintain its contents as soon as the power is turned off whatever data was in ram is
lost the volatile memory typically comprises random access memory ram and is considered. The
main memory is considered the main memory for the computer system to enable quick access for
processing a typical modern computer as a main memory connected by a memory bus directly to the
processor. random access memory is much faster to read from and write to tan the other kinds of
storage memory the main memory ram with access times generally less than one hundred
nanoseconds.
READ ONLY MEMORY:
Another memory in computer is called read only memory again it is integrated circuit inside the pc
that forms the rom stores some standard processing program’s supplies by the manufactures to operate
the personal computer. Rom is non-volatile memory system rom is employed to store the computers
BIOS house booting instructions and firmware for additional hardware devices. It is also categorized
as programmable read only memory, erasable read only memory and electrically erasable
programmable read only memory.
(SET 2)
QUESTION NUMBER 4)
A) DEFINE SOFTWARE TESTING?
ANSWER:
Software testing is a systematic process of evaluating and verifying that a software application or
system meets specified requirements and functions correctly it is an essential phase in the software
development life cycle, aiming to identify defects or bus in the software to ensure its quality and
reliability.
The primary goal of software testing is to ensure that the software beaves as expected and meets the
intended business objectives. this process involves executing the software or its components using
manual or automated tools to detect errors aps or missing functionalities. Testin, system testing
acceptance testing each addressing various aspects of the software.
Software testing helps in validating that the software meets bot functional requirements. functional
and non-functional requirements. testers use test cases, and scripts and test scenario to evaluate the
software’s behaviour under different conditions.
B) EXPLAIN SOFTWARE TESTIN STRATEY IN DETAIL?
Software testing strategy is a systematic and comprehensive plan outlining the approach to evaluate a
software application, ensuring it meets specified. The strategy encompasses various testing
methodologies to guarantee high-quality software that align with end user expectations.
The key testing strategies also includes:
 the black box testing:
This method accesses the software functionality without delving into its internal code
structure focusing on inputs and outputs.
 White box testing:
this approach evaluates the internal code structure, and logic of the software examining its
internal workings.
 Unit testing:
This strategy checks individual units or components of the software to ensure they function as
intended in isolation.
 Functional testing:
Evaluating the software functional requirements to confirm that they are met.
 System testing:
Assessing the entire software system to verify complaints with specified requirements.
 Acceptance testing:
Test in the software to ensure it meets customer or end-user expectations.
 Performance testing:
Assessing performance characteristics such as speed scalability and stability
 Security testing:
identifying vulnerabilities and ensuring the software meets security requirements

The overall testing strategies involves several critical steps that is:
1. Identifying and specifying requirements
2. Developing a test strategy
3. Analysing the testing environment
4. Test case and data identification
5. Estimating time, effort, and cost
6. Roles and responsibilities assignment
7. Test plan review and approval
QUESTION NUMBER 5:

A) DEFINE SOFTWARE TESTIN?


ANSWER:
An operating system(OS)is essential software that facilitates the management of computer hardware
resources and provides a platform for various software application. It acts as a comprehensive system
manager handling tasks like process control memory allocation and file system organisation. Servin
intermediary between user level programmes and the computer hardware the (OS) ensures efficient
utilisation of resources such as memory, CPU time and input output devices.
Key responsibilities of an OS include orchestrating the execution of programme’s managing multiple
processes concurrently and provide a secure environment trou access controls and encryption.
Operating system is the foundational software that enables users to interact wit and make the most of
the underlying computer hardware and organised computing experience.
B) DISCUSS TE DIFFERENT COMPONENTS OF OPERATIN SYSTEM?

ANSWER:
An operating (OS) is a complex software that serves as the foundation for computer systems,
managing both hardware and software resources. Its multifaceted role involves several key
components, each playing a crucial role in ensuring the efficient functioning of the computer.
1. Process management: tis component oversees the execution of programs or processes,
allocating resources and scheduling their execution. It includes mechanisms for inter-
process communication and synchronization, essential for the orderly execution of
concurrent tasks.
2. Memory management: the OS is responsible for managing the computer’s memory,
allocating space to processes and overseeing memory access. It introduces the concept
of virtual memory, allowing processes to utilize more memory tan physically
available by swapping data between RAM and secondary storage.
3. File management: operating systems provide a file system to organise and manage
files and directories. This involves tasks such as file creation, deletion, and
manipulation. Additionally, file management includes mechanisms for access control
and protection, ensuring security and integrity of data.
4. IO Device management: the OS manages input output devices like keyboards, mice,
printers and disks. Device drivers are crucial components that enable communication
between these devices and the computer, ensuring efficient data exchange.
5. Network management: wit the increasing emphasis on connectivity, modern operation
systems incorporate network management components. These manage network
interfaces, protocols, and services, facilitating communication between computers in a
networked environment.
6. Security management: security is paramount in computing, and the OS includes
mechanisms to protect the system and its resources from unauthorized access. This
involves implementing user authentication, authorization, and other security
protocols.
QUESTION NUMBER 6
A) EXPLAIN OSI REFERENCE MODEL?
ANSWER:
The OSI reference model is a conceptual framework defining the functions of a computer
network. comprising seven layers, each layer addresses specific aspects of network.
compromising seven layers, each layers address specific aspects of network
communication.
1.pysical layer:
Manages the physical transmission medium, specifying hardware medium
2.data link layer:
Ensures reliable data transmission between neibourin notes incorporatin error detection ,
flow control and access control.
3.network layer:
Focuses on routine data between distinct networks, providing logical addressing and
routing services.
4.transport layer
Facilitates end to end data delivery between application offering reliability flow control
and error recovery.
5.session layer
Establishes manages and terminates session between applications handling task like
authentication and synchronization.
6.presentation layer
Converts data into a format understandable by the application layer incorporating services
like compression and encryption.
7.application layer
Provides network services to end users including functions like file transfer and email.
B) OW IS DATA TRANSMISSION DONE IN OSI MODEL?
ANSWER:
The open system interconnection model serves as a reference framework elucidating the
data transmission process between computers. It comprises seven layers collaboratively
orchestrating specialized network function fostering a systematic network approach
Physical layer: tis layer manages the actual physical connection between devices
transmitting information in the form of bits. It synchronizes bits by providing a clock
defines transmission rates arranges devices in a network and dictates data flow between
connected device.
Data link layer: responsible for node-to-node message delivery tis layer ensures error free
data transfer over the physical layer.it transmits packets to the Ost using mac addresses
and consist of sublayers: Logical link control and media access control.
Network layer: Facilitation packet delivery from source to destination costs, tis layer
provides logical addressing, routine and packet fragmentation.
Transport layer :ensuring end to end message delivery, tis layer uranates reliable
sequential data transfer between endpoints.it also manages flow control error control and
connection control.
Session layer: responsible for initiating sustaining and concluding sessions between
applications tis layer offers services such as authentication and authorization.
Presentation layer: handling data representation tis layer provides services like data
compression encryption and decryption.
Application layer: serving the user tis layer provides various services suc as file transfer
email and remote login.

You might also like