0% found this document useful (0 votes)
16 views11 pages

Reasoning

The document is an assignment submitted by Muhammad Rayan to Sir Umair Aslam for the ICT subject, containing a series of questions and answers related to computer hardware, software, and networking concepts. Each question includes the correct answer and reasoning for why it is correct, covering topics such as processors, memory types, cloud computing, and cybersecurity. The assignment demonstrates a comprehensive understanding of fundamental ICT principles.

Uploaded by

rayannuml313
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views11 pages

Reasoning

The document is an assignment submitted by Muhammad Rayan to Sir Umair Aslam for the ICT subject, containing a series of questions and answers related to computer hardware, software, and networking concepts. Each question includes the correct answer and reasoning for why it is correct, covering topics such as processors, memory types, cloud computing, and cybersecurity. The assignment demonstrates a comprehensive understanding of fundamental ICT principles.

Uploaded by

rayannuml313
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Assignment no 2:

• Submitted by:

Muhammad Rayan

• Submitted to:

SIR Umair Aslam

 Subject:

ICT
1. Which of the following is responsible for executing
instructions in a computer? Correct answer: c) Processor
Reasoning:
The processor (CPU) executes all instructions and processes
data in a computer.

2. What is the primary function of the motherboard?


Correct answer: b) Connecting and allowing communication
between hardware components.
Reasoning:
The motherboard connects all computer components and
allows them to communicate.

3. The Arithmetic Logic Unit (ALU) performs:


Correct answer: c) Both arithmetic and logical operations.
Reasoning:
The ALU handles both mathematical calculations and logical
comparisons.

4. Which type of memory is volatile?


Correct answer: c) RAM.
Reasoning:
RAM loses data when the power is turned off, making it volatile
memory.

5. What determines the speed of a processor?


Correct answer: c) The system clock speed.
Reasoning:
The clock speed measures how fast the processor executes
instructions.

6. What is the function of cache memory?


Correct answer: b) Temporarily stores frequently used data for
quick access.
Reasoning:
Cache memory speeds up processing by keeping frequently
used data close to the CPU.
7. What does the system bus do in a computer?
Correct answer: a) Transfers data between components inside
the computer.
Reasoning:
The system bus is responsible for transferring data between
the CPU, memory, and other components.
8. Which type of processor is commonly found in mobile
devices?
Correct answer: c) ARM-based processors.
Reasoning:
ARM processors are power-efficient and commonly used in
mobile devices like smartphones and tablets.

9. What is the role of a power supply unit (PSU)?


Correct answer: a) Converts electrical power from AC to DC.
Reasoning:
The PSU converts AC power from a wall outlet into DC power
that the computer components can use.

10. Which type of bus is used to connect external devices?


Correct answer: c) USB bus.
Reasoning:
USB (Universal Serial Bus) is used to connect external devices
like keyboards, mice, and storage devices.

11. Which of the following is an example of a cloud computing


service?
Correct answer: b) Google Drive.
Reasoning:
Google Drive is a cloud storage service that allows users to store
and access files over the internet.
12. What is the Internet of Things (IoT)?
Correct answer: b) A network of physical devices connected
to the internet.
Reasoning:
IoT refers to smart devices (e.g., smart home appliances,
sensors) that connect and communicate over the internet.

13. Which cloud computing service model provides


infrastructure like virtual machines and storage?
Correct answer: c) IaaS
Reasoning:
Infrastructure as a Service (IaaS) provides computing resources
like virtual machines, storage, and networking over the cloud.

14. What is an advantage of cloud storage?


Correct answer: c) Access data from anywhere.
Reasoning:
Cloud storage allows users to access their files from any device
with an internet connection.

15. Which of the following is a major concern with cloud


computing?
Correct answer: b) Data security and privacy.
Reasoning:
Cloud computing involves storing data online, which can pose
security and privacy risks.

16. Which of the following upgrades would improve a


computer’s multitasking ability?
Correct answer: a) Increasing RAM.
Reasoning:
More RAM allows a computer to handle multiple programs at
the same time without slowing down.
17. What component should be upgraded to improve overall
system speed the most?
Correct answer: b) Hard drive to SSD.
Reasoning:
Upgrading from an HDD to an SSD significantly improves
system speed because SSDs have much faster read/write
speeds.

18. Which storage type provides the fastest data access speed?
Correct answer: b) SSD.
Reasoning:
SSDs are much faster than HDDs, USB flash drives, and DVDs
because they use flash memory with no moving parts.

19. What is the primary reason for processor cooling?


Correct answer: c) Prevents overheating and system crashes.
Reasoning:
Processors generate heat during operation, and without
cooling, they can overheat, leading to system crashes or
damage.

20. Which component is responsible for coordinating all


activities in a computer?
Correct answer: b) The Control Unit.
Reasoning:
The control unit, part of the CPU, directs the execution of
instructions and manages data flow within the system.

21. What is the primary function of an IP address in network


communication?
Correct answer: a) To uniquely identify and locate a device
within a network.
Reasoning:
IP addresses provide unique identification for devices in a
network, allowing communication between them.

22. Which type of malware poses a significant cybersecurity


threat by encrypting critical user data and demanding
financial compensation for decryption?
Correct answer: c) Ransomware.
Reasoning:
Ransomware locks or encrypts user data and demands
payment to restore access.
23. In the context of digital privacy, which of the following is
generally considered a proactive security measure rather
than a vulnerability?
Correct answer: c) The implementation of strong password
policies.
Reasoning:
Strong password policies help prevent unauthorized access and
enhance security, unlike the other options, which represent
security threats or vulnerabilities.

24. What is the fundamental role of an operating system in


computing environments?
Correct answer: a) To efficiently manage and allocate system
hardware and software resources.
Reasoning:
The operating system acts as an intermediary between
hardware and software, ensuring efficient resource allocation
and management.

25. Why are domain names essential for web navigation and
internet accessibility?
Correct answer: a) They enable human-friendly identification
of websites rather than relying on numerical IP addresses.
Reasoning:
Domain names make websites easier to remember and access
instead of using complex numerical IP addresses.
26. Which protocol facilitates the secure transfer of files
between remote systems over the internet?
Correct answer: a) FTP (File Transfer Protocol).
Reasoning:
FTP is a widely used protocol for transferring files over the
internet, though secure variations like SFTP (Secure FTP) offer
additional protection.

27. What is the primary role of an Internet Service Provider


(ISP) in digital connectivity?
Correct answer: b) To establish and maintain internet access
for users and businesses.
Reasoning:
ISPs provide the infrastructure and services necessary for users
and businesses to connect to the internet.
28. What does VoIP (Voice over Internet Protocol) enable in
modern communication systems?
Correct answer: a) The transmission of voice data over
internetbased networks.
Reasoning:
VoIP allows voice communication over the internet instead of
traditional telephone networks. It is used in services like Skype,
Zoom, and WhatsApp calls.
29. In commercial and retail environments, which specialized
computing device is utilized for processing transactions and
managing sales data?
Correct answer: a) Point-of-Sale (POS) terminal.
Reasoning:
A POS terminal is designed for handling transactions in retail
and commercial environments, allowing businesses to process
sales, manage inventory, and track customer purchases.

30. Which of the following best characterizes wearable


computing devices in modern technology?
Correct answer: b) Smart, internet-connected devices worn on
the body, such as smartwatches and fitness trackers.
Reasoning:
Wearable computing devices, like smartwatches, fitness
trackers, and smart glasses, are designed to be worn on the
body and provide real-time monitoring, connectivity, and
data tracking.

You might also like