FAZAIA DEGREE COLLEGE MRF KAMRA
Computer Science Notes: Class IX-FBISE-Chapter-I-2024
Short Questions:
Q. What is the function and significance of Napier's Bone in early computing?
Napier’s bones, invented by John Napier in 1617, was manually-operated calculating devices used for
multiplication and division. Advanced use was the rods could also extract square roots. Napier’s bones was
also the first machine to calculate using the decimal point system.
Q. How did Charles Babbage's Difference Engine differ from the Analytical Engine?
Charles Babbage’s Difference Engine and Analytical Engine were both remarkable inventions, but they had
distinct differences:
Difference Engine: Analytical Engine:
Purpose: Designed to compute tables of numbers, Purpose: General-purpose mechanical computer.
particularly for mathematical and scientific Programming: Could be programmed using
applications. punched cards.
Operations: Limited to basic arithmetic (addition, Operations: Capable of any mathematical
subtraction, multiplication, division). operation (including complex ones like logarithms
and trigonometry).
Accuracy: Highly accurate, suitable for scientific Challenges: Complex design, lack of funding, and
research and engineering. technological limitations.
Automation: Fully automatic, reducing manual Potential: If fully realized, it could have
calculation errors. revolutionized computation.
Limitations: Focused on specific tasks, lacked
flexibility.
Q. What is the primary goal of fifth-generation computers?
The primary goal of fifth-generation computers is to create machines that can learn and organize
themselves. These computers are based on artificial intelligence (AI) and parallel processing hardware. The
term “artificial intelligence” encompasses concepts like robotics and neural networks
Q. Name the three types of memory mentioned on the motherboard in the Von Neumann
architecture?
In the Von Neumann architecture, the three types of memory mentioned on the motherboard are:
Primary Memory: This includes Random Access Memory (RAM), which provides fast access for data and
instructions during program execution.
Secondary Memory: Examples include hard disk drives and solid-state drives, which store data more
permanently but with slower access times compared to RAM
Q. Differentiate between volatile and non-volatile memory.
The differences between volatile memory and non-volatile memory:
1. Volatile Memory:
Also known as temporary memory.
Data is stored only while the system is powered on.
Examples: RAM (Random Access Memory) and Cache Memory.
Fast access and economical.
Used for active data during program execution.
Processor can read and write to volatile memory.
Generally has less storage capacity.
SHOUKAT MEHMOOD-THE LIGHT ACADEMY ATTOCK CITY-03132702320
FAZAIA DEGREE COLLEGE MRF KAMRA
2. Non-Volatile Memory:
Data remains stored even when power is shut off.
ROM (Read Only Memory) is a common example.
Slower access but stores data permanently.
Ideal for long-term storage.
Processor can only read from non-volatile memory.
Generally has more storage capacity.
Q. Show memory hierarchy with the help of diagram.
Registers i. Registers: The smallest, fastest, and
Smallest and Faster most expensive type of memory.
Located within the CPU.
ii. Cache Memory: Intermediate memory
Cache Memory between CPU and RAM. Comes in
L1,L2,L3 Fast Memory multiple levels (L1, L2, L3), with L1
being the fastest.
iii. Main Memory (RAM): Primary volatile
Main Memory (RAM- Fast) memory used by programs to store
data temporarily while the computer
is running.
Secondary Storage iv. Secondary Storage: Non-volatile
(HDDs, SSDs - slower) storage like HDDs and SSDs used to
store data long-term. Slower than
Tertiary Storage RAM but larger in capacity.
(optical disks, magnetic tapes, etc.) v. Tertiary Storage: Used for backup and
(slowest & largest) archival purposes. Examples include
optical disks (CDs, DVDs) and magnetic
tapes. Slowest access time but can
store vast amounts of data.
Q. Why is the word size of a processor important, and how does it affect the computer's
performance?
Following are the reasons of the word size of a processor directly impact its performance and
ability to process data.
1. A larger word size allows the CPU to handle more data at once.
2. It reduces the need for multiple instructions to process a single piece of
information.
3. Larger word lengths are crucial for handling complex operations efficiently.
4. With a larger word size, we can process more data faster within the processor.
5. Image and video editing software benefit from 64-bit versions because they can
manipulate larger amounts of data in less time.
Q. What is pipelining, and how does it improve the efficiency of a CPU?
Pipelining: It allows the CPU to work on multiple instructions simultaneously by breaking down the
execution process into several stages. Each stage completes a part of the instruction, and different stages
work in parallel.
How Does Pipelining Work?
In a non-pipelined CPU, each instruction would go through the entire process (like building a product from
start to finish) before the next instruction starts. Before pipelining, CPUs executed instructions sequentially,
one after the other. This is slow and inefficient.
In a pipelined CPU, the process is divided into smaller steps, with each step being handled by a different
part of the CPU. A pipeline consists of stages (e.g., fetching, decoding, execution, memory access, write-
back). When an instruction enters the pipeline, it moves through these stages sequentially.
SHOUKAT MEHMOOD-THE LIGHT ACADEMY ATTOCK CITY-03132702320
FAZAIA DEGREE COLLEGE MRF KAMRA
Q. What are the benefits and limitations of Pipelining?
Benefits of Pipelining:
Increased Throughput: Pipelining reduces idle cycles, enabling multiple instructions to be in
different stages at once.
Reduced Latency: Instructions complete faster due to parallel processing.
Better Resource Utilization: Pipelining maximizes CPU utilization.
Challenges and Limitations:
Instruction Dependencies: Some instructions depend on the results of previous ones, causing stalls.
Branch Instructions: Branches can disrupt the pipeline.
Q. Imagine you are building a custom computer for a friend. Give three considerations you
would take into account when choosing the type and size of memory for this computer.
General Use: If your friend plans to use the computer for everyday tasks like web browsing, word processing,
and watching videos, 8GB of RAM is usually sufficient.
Gaming: For a gaming PC, 16GB is often the sweet spot. It provides enough memory for modern games and
multitasking without overkill.
Professional Work: For tasks like video editing, 3D rendering, and heavy multitasking, 32GB or more may be
necessary to ensure smooth performance and fast processing times.
Q. You are a computer technician tasked with upgrading an older computer with a slow
CPU. How might you improve its performance without replacing the entire CPU?
Upgrade RAM: Increase capacity of RAM
Install SSD: Replace or add to existing storage (Upgrading from HDD to SSD)
Optimize Software: Clean up, update, and adjust settings.
Improve Cooling and Power: Enhance cooling solutions and ensure a stable power supply.
Regular Maintenance: Clean the computer and check for malware.
Q. Your school is planning to purchase new printers for the computer lab. Give three
advantages and disadvantages of impact and non-impact printers to help them make a
decision. OR Compare impact and non-impact printers. OR Difference between impact and
non-impact printers.
Impact Printers
Advantages:
Reliability: Impact printers are known for their reliability. They can operate in extreme conditions
(heat, cold, humidity, and dust) without compromising performance.
Cost-Effective: Impact printers are the most cost-effective printing technology. They use ink ribbons
and paper, which are more affordable than other methods.
Low Maintenance: These printers require minimal upkeep, making them convenient for users1.
Carbon Copies: Impact printers can create carbon copies (multi-part forms), which is useful for
applications like invoices or receipts.
Durability: The prints produced by impact printers are long-lasting and durable.
Disadvantages:
Noise: Impact printers create noise when the plastic head strikes the paper.
Lower Print Quality: The quality of outputs from impact printers is generally lower compared to non-
impact printers.
Manual Paper Handling: Paper needs to be manually inserted into impact printers.
Old Technology: Impact printers are designed using older technology, which limits their capabilities.
Slower Printing: They are slower in printing compared to non-impact printers.
Non-Impact Printers
SHOUKAT MEHMOOD-THE LIGHT ACADEMY ATTOCK CITY-03132702320
FAZAIA DEGREE COLLEGE MRF KAMRA
Advantages:
Less Maintenance: Non-impact printers require less maintenance compared to impact printers.
Quiet Operation: These printers operate silently, without noisy moving parts.
Fast Printing: Non-impact printers can print quickly, making them efficient for various tasks.
Versatile Paper Sizes: You can print on different paper sizes, from standard to banner formats.
Disadvantages:
Higher Operating Costs: Non-impact printers, especially inkjet printers, can have higher operating
costs due to the price of consumables like toner or ink cartridges.
Complexity and Maintenance: These printers can be more complex and require regular maintenance
to keep them functioning properly. Issues such as ink drying out or toner replacement can be more
frequent and require attention.
Initial Cost: The initial purchase price of non-impact printers, can be higher compared to impact
printers.
Q. Define protocol" in the context of data communication.
In the context of data communication, a protocol refers to a set of rules and guidelines that govern how
devices communicate with each other. These rules define how data is formatted, transmitted over a network,
and acknowledged by the receiving device.
Q. Define simplex, half-duplex, and full-duplex modes of communication with one example
each.
Simplex Mode:
Definition: Simplex allows communication in one direction only.
Example: Satellite broadcasting or cable TV broadcasting1.
Half-duplex Mode:
Definition: Half-duplex enables communication in both directions but not simultaneously.
Example: Walkie-talkies
Full-duplex :
Definition: Full-duplex allows simultaneous two-way communication.
Example: Telephone Call
Q. What are start and stop bits, and where are they used in data transmission?
In data transmission, start and stop bits play a crucial role in asynchronous communication.
Start Bit:
The start bit marks the beginning of a data frame.
It’s usually a 0 and alerts the receiver that data is coming.
Without the start bit, the receiver wouldn’t know when to start communication.
Stop Bit:
The stop bit indicates the end of a data frame.
It’s typically one or more 1s appended after the data bits.
The stop bit allows the receiver to recognize to prepare for the next one.
Why are they necessary?
In asynchronous communication, there’s no continuous clock signal.
Start and stop bits provide synchronization, ensuring proper framing of data characters.
They help receivers identify where one character ends and another begins.
Q. How does a switch differ from a hub in a network? OR Write down the difference between
Hub and Switch in Star topology.
SHOUKAT MEHMOOD-THE LIGHT ACADEMY ATTOCK CITY-03132702320
FAZAIA DEGREE COLLEGE MRF KAMRA
Q. How does asynchronous transmission differ from synchronous transmission, and in
what situations are they typically used? OR compare asynchronous transmission and
synchronous transmission.
Aspect Synchronous Communication Asynchronous Communication
Time interval between two Time interval between two characters is
Timing
characters is always the same variable
Data Speed of communication is slow due to
Speed of communication is fast
Transmission extra control bits: stop and start
Examples Telephone call, Video conferencing Email, keyboard transmission
Q. Explain the concept of a peer-to-peer network and its limitations compared to a
client/server network.
Peer-to-Peer (P2P) Network:
A P2P network is the simplest type of network where all computers share equal responsibility.
Every computer plays a role of client, server or both at a time.
Each computer on the network referred to as peer.
Q. Compare and contrast the star and ring network topologies.
Star Network Topology
Structure: In a star network, all devices (nodes) are connected to a central hub or switch.
Connection: Each node has a direct connection to the central hub/switch.
Communication: Communication between nodes occurs through the central hub/switch.
Scalability: Easy to add or remove devices without affecting the rest of the network.
Reliability: Failure of one node typically does not affect other nodes.
Ring Network Topology
Structure: In a ring network, devices are connected in a closed loop or ring.
Connection: Each device is connected to exactly two other devices, forming a continuous loop.
Communication: Data travels in one direction around the ring from one device to the next until it
reaches its destination.
Token Passing: Some ring networks use a token passing protocol where a token circulates around
the ring, granting the right to transmit data.
Q. Explain the advantages and limitations of Server-client and Peer to Peer network.
Ring Topology
Advantages:
Efficiency: Data transmission is orderly, with each device having a turn to transmit.
No Collisions: Collisions are minimized because only one device can transmit at a time (if using token
passing).
Equal Access: Each device has equal access to the network bandwidth.
Disadvantages:
Single Point of Failure: If one device or connection fails, the entire network can be disrupted.
Limited Scalability: Adding or removing devices can disrupt the network or require reconfiguration.
Token Management: Token passing networks require efficient management of the token to ensure
fair access.
SHOUKAT MEHMOOD-THE LIGHT ACADEMY ATTOCK CITY-03132702320
FAZAIA DEGREE COLLEGE MRF KAMRA
Example: Older technologies like Token Ring networks, though less common today.
Client Server Network
Advantages:
Centralized Management: Easy to manage and troubleshoot because all communications pass
through the central hub/switch.
Scalability: Simplifies the addition or removal of devices.
Reliability: Failure of one node does not affect the entire network.
Disadvantages:
Single Point of Failure: If the central hub/switch fails, the entire network can become inoperable.
Limited Distance: Distance between the central hub/switch and nodes is limited by the type of cables
used (e.g., Ethernet cables).
Example: Typical in modern Ethernet networks where computers connect to a central switch.
Q. Why is mesh topology considered the most reliable but also the most expensive to
implement?
Reliability of Mesh Topology:
Mesh topology provides multiple paths between devices. If one link or node fails, data can still reach its
destination through an alternative path.
Why expansive?
Implementing a mesh topology requires more cabling and network equipment compared other topologies
like star or bus. Setting up and configuring a mesh network can use numerous connections and devices, such
as routers and switches capable of handling multiple connections and routing paths. These devices tend to
be more expensive than those used in simpler topologies.
Q. What is the role of the Application Layer in the OSI model?
Application Layer provides services to the End-user. It interacts with an operating system or application
software whenever the user wants to send files, read messages or perform other network-related activities.
SHOUKAT MEHMOOD-THE LIGHT ACADEMY ATTOCK CITY-03132702320
FAZAIA DEGREE COLLEGE MRF KAMRA
Give Long answers to the following extended response questions (ERQs).
Q1. Describe the evolution of computer generations from the first generation to the fourth
generation, highlighting the key technological developments and their impact on
computing.
Q2. Discuss the importance of categorizing and understanding different types of systems,
both natural and artificial, and provide examples of each type.
Q3. Explain the characteristics and potential challenges associated with fifth- generation
computers that aim to understand natural languages and possess thinking capabilities.
What are the implications of such advancements computing on society? he
Q4. Explain the fundamental components of network communication and they work
together to facilitate data transfer?
05. Describe the roles of common communication devices funters, and gateways in
functionality of a network?
SHOUKAT MEHMOOD-THE LIGHT ACADEMY ATTOCK CITY-03132702320