Академический Документы
Профессиональный Документы
Культура Документы
Fundamentals of computer
Exercise No.1
Q.1 Fill in the blanks.
i. The used of ______________marked the second generation of computers. Transistor
ii. One of the first tools used to express numbers was the “abacus”, developed in ____________about 5000
years ago. Babylonia
iii. ____________________is considered to be the “father of modern digital computer. Charles
Babbage
iv. transistors replaced ______________and were used in the second generation computers.
Vacuum tube
v. ___________computer are used to process and represent continuous data. Analog
vi. ______computer is the biggest in size and the most powerful computer. Super Computer
vii. PDA stands for Personal Digital Assistant
viii. ____________are the professionals who design and develop websites. Web designer
ix.___________ is a pointing device with a vertical lever mounted on a base. Joy Stick
x. _______ are high-speed temporary storage locations used to hold data and instructions Register
Answer: Database administrators (DBAs) are highly paid personals that use specialized software to store
and organize data. The role may include capacity planning, installation, configuration, database design,
migration, performance monitoring, security, troubleshooting, as well as backup and data recovery.
Answer: A special, high-speed storage area within the CPU. A register may hold an instruction, a
storage address, or any kind of data (such as a bit sequence or individual characters).
iii. What is the purpose of output devices? Name any five output devices.
Answer: Output devices take data from the computer system and convert it to a form that can be interpreted
by humans. For instance a monitor creates a visual electronic display to output information created by the
processor to the user. Name of different output devices are, Printer, Monitor, Speaker, Plotter, Projector.
Answer: A multimedia projector takes the image from a computer and projects it into a larger screen
so that people can see the image clearly.
Answer:
RAM ROM
1. RAM is volatile memory 2. ROM is non-volatile memory
2. RAM is temporary memory 2 ROM is a permanent memory
3 RAM cannot hold data without power 3 ROM can hold data without power
4 . RAM store information and run programs 4. ROM chip is used primarily in the startup
process
Productivity software
Business Software
Entertainment Software
Educational Software etc.
Answer: These are types of software that are available to user free of cost on internet. Source code of
these software is also available for study purpose. Examples of open source software are: Linux,
Apache, Firefox etc.
Answer: The generations of computer is referred to the advancement of computer technology. Each new
generation make the size of computer smaller and make computer faster. Detail of each generation is given
below:
First Generation (1946-1958) The computers of this generation used Vacuum Tubes as the basic
component for memory and circuitry for central processing unit. These vacuum tubes were used to control
and amplify electronic signals. They produced a lot of heat and were prone to frequent fusing/ damaging of
the installations.
Therefore, they were used very expensive and could be
afforded only by very large organizations.
Advantages :
i) these computers were the fastest calculating device of their
time. They could perform computations in milliseconds.
ii) vacuum tube technology made possible the advent of
electronic digital computers.
Disadvantages:
i) Too bulky in size
ii) Air conditioning required to control the temperature
iii) Prone to frequent hardware failure.
iv) Commercial production was difficult and costly.
v) Slow input and output operations.
Second Generation (1959-1964) The second generation computer used Semi-conductor transistor instead
of vacuum tubes after the invention of transistor by a team led by William Shockley.
This generation computer used transistors which were cheaper,
consumed less power, more compact in size, more reliable and
faster than the vacuum tubes used in first generation computers.
Advantages:
i) Smaller in size as compared to first generation computers
ii) More reliable
iii) Less heat generated.
iv) Less prone to hardware failure
v) Wider commercial use
Disadvantages :
i) Air conditioning required
ii) Manual assembly of individual components into a functioning unit was a cumbersome task.
Third Generation (1965-1970) The third generation computers used Integrated Circuits (or IC Chips) in
which many transistors, resistors, capacitors and other
components (circuit elements) are fabricated or integrated and packaged
together into a very small surface of silicon known as Chips.
This new microelectronic technology was called Integrated Circuits.
The IC was invented by Jack Kilby in 1958.
Advantages:
i) Smaller in size as compared to previous generation
ii) More reliable than second generation computers
iii) Low maintenance cost
iv) Easily portable
v) Commercial production was easier and cheaper.
Disadvantages:
i) Air conditioning required in many case
ii) Highly sophisticated technology required for the manufacture of IC chips
Fourth Generation (1971 onwards) The Fourth generation is based on VLSI (Very Large Scale
Integeration). VLSI was achieved by the invention of microprocessor. Microprocessor is a single silicon
chip which consists of millions of transistors.
Advantages:
i) Smaller in size because of high component density
ii) Heat generated is negligible
iii) Much faster in computation then previous generations
iv) Less power consumption
v) No air conditioning is required in most cases
Disadvantages:
i) Highly sophisticated technology is required for the manufacturing of VLSI chips
ii) Highly skilled people are required in its manufacturing
Fifth Generation (Future Generation: 1991 onwards): The fifth generation computers are under
development stage. The fifth generation machine are based on Parallel Processing hardware and Artificial
Intelligence software. The main objective of fifth generation computing is to develop devices that respond
to natural language input and are capable of learning and self-organization.
(BIPS). These computers are used in large organizations to control and supervise hundreds of
users at a time.
Example: IBM System z9, IBM System z13
iii. Mini Computers:
A Minicomputer are smaller than mainframe both in size, speed and other facilities. Their speed
is rated between one and fifty million instructions per second (MIPS). These computers are
used in business organizations and colleges etc.
Examples: IBM 5360, PDP-8, PDP-11
iv. Micro Computers: A microcomputer is a small, relatively inexpensive computer with a
microprocessor as its central processing unit (CPU) introduced in early of 70’s. Today these
computers are the most popular computers due to its smaller size and less cost. These computers
are used in homes, offices, schools etc.
Answer: Nowadays computers are important part of our life. It is used in every field of life. The following
are application of computers in different fields:
a) Education:
The computer technology has deep impact on education. Nowadays it is important part of education in
all educational institutes. Student can find all educational material like books and articles on internet.
It is easy and more useful as compared to hand-written to write notes in computer. People use computer
and internet for Online and distance education. By the help of video call teacher from world-wide can
teach students of every country. Classrooms can be monitor true computer camera’s. Students can get
online diplomas of every country.
b) Business:
Computers are extremely important in today’s business. Ordering products, shipping information,
price checks in retail stores, e-commerce etc is done using computers.
Defense:
There are many uses computers in defense such as
1) Controlling UAV or unmanned air-crafts an example is Predator.
2) They are also used on Intercontinental Ballistic Missiles (ICBMs) that uses GPS and Computers
to help the missile get to the target.
3) Computers are used to track incoming missiles
4) Computers are used in tanks and planes and ships to target enemy forces.
5) Computers help design and test new systems.
Media:
Now days computers are very important in both print and electronic media. Computers are used for printing
newspapers and magazines etc. Internet, Social media, E-mail, Blogging, TV etc are use of computer in
electronic media.
3. Scanner: Scanner is an input device that convert input documents that are in the hard form into digital image
by using light-sensing technology. The digital images are stored in computer after processing. The quality of
digital image can be determined by its resolution and color depth.
4. Barcode Reader: A Barcode reader uses laser beams to read bar code printed on products showing product
specification like product name, manufacturing company, price, expiry date etc. Barcode readers are used in
shops, supermarkets, libraries etc.
5. Microphone: A microphone is used for giving input to a computer in voice form. It is also used for voice
recording.
Answer:
System Unit: The system unit is the rectangular case that houses the electronic components inside
the computer. The motherboard is the main circuitry in the system unit. Two main components on the
motherboard are the central processing unit (CPU) and memory. For a desktop computer, the electronic
components and most storage devices such as floppy drive, hard disk, and CD-ROM drive, reside inside
the system unit. For a laptop computer, the system unit houses almost all of its components including the
keyboard, pointing device, and monitor.
Motherboard:
The motherboard is the part of your computer that wires all of the other parts together. It is a printed circuit
board and includes the CPU and memory. Every component of your computer connects directly into the
motherboard. It typically includes expansion options for high-end graphic displays and additional devices.
Processor:
The processor, or CPU, of a computer is basically the brains of the computer. A personal computer’s CPU
usually is contained on a single chip, which some call a microprocessor. The CPU contains a control unit
and the Arithmetic Logic Unit, or ALU and registers.
Arithmetic and Logical Unit (ALU):
The ALU carries out three operations:
x. Which program protects computer form many common viruses and Trojans which can be harmful for
the system?
A. Internet explorer B. excel C. word D. Antivirus
Portable(Multiplatform)
Multitasking
Multi User
Multiprocessor (SMP) Support
Multithreading Support
Virtual Memory
Hierarchical File System
Graphical User Interface (X Window System, Wayland)
Wide Hardware Support
Dynamically Linked Shared Libraries as well as Static Libraries
POSIX Compliant (Almost)
Multiple Virtual Consoles
Multiple File System Support
Multiple Networking Protocols (TCP/IP, IPX/SPX, AppleTalk, AX.25)
Shell
Strong Security Model
Open Source
iii. What is time sharing processing system?
Answer: Time-sharing is a technique which enables many people, located at various terminals, to use a
particular computer system at the same time.
Program execution: A number of steps need to be performed to execute a program. Instructions and data
must be loaded into main memory, I/O devices and files must be initialized, and other resources must be
prepared.
Access to I/O devices: Each I/O device requires its own peculiar set of instructions or control signals for
operation.
Error detection and response:
A variety of errors can occur while a computer system is running. The OS must provide a response that
clears the error.
Accounting: A good OS will collect usage statistics for various resources.
User Management: Operating system provide security and protection to users and data in a networking
environment. This is achieved through the use of access rights given to the multiple users.
Q.5. Explain the following types of operating systems.
Answer: There are three types of interfaces offered by different OS
i. Command Line Interface:
A command-line interface allows the user to interact with the computer by typing in commands. Common
types of CLI are DOS and UNIX.
DOS (Disk Operating System):
PC-DOS (Personal Computer - Disk Operating System) was the first widely-installed operating system
used in personal computers. It was developed for IBM by Bill Gates. DOS is a non-graphical command line
operating system. To open DOS command prompt we follow the following steps:
Select Start
Select All Programs
Select Accessories
Click Command Prompt
UNIX:
UNIX is an operating system which was first developed at AT&T Bell Laboratories in the 1960s.
It is a command driven, stable, multi-user, multi-tasking system for servers, desktops and laptops.
ii. Menu Driven Interface (MDI):
Menu-driven interface. an interface consisting of a series of screens which are navigated by choosing
options from lists, i.e. menus Menu contains lists of options on the screen that lead to other screens.
Examples of MDI are information booths and ATMs.
iii. Graphical User Interface (GUI)
Graphical User Interface, a GUI is one in which user interact with computer and other electronic devices
using icons and other visual indicators, rather than using command line. For example, all versions of
Microsoft Windows utilize a GUI. First GUI based computer was developed by Apple company in 1984.
The Macintosh, Windows and Linux are examples of GUI operating Systems.
Q.6. Write short note on the following.
Answer:
Macintosh
The Macintosh also called “The Mac”), introduces in 1984 by Apple computer, was the first widely-sold
personal computer with a GUI. This includes the mouse, the use of icon to represent actions.
Linux:
Linux is a GUI based user friendly OS which is an updated form of UNIX OS. Linux is a free open source
OS. Linux is a powerful, multiuser and multitasking OS.
Windows:
Windows is a GUI based OS Which contain graphics and icons and is commonly navigated by using a
computer mouse. Microsoft windows introduces the idea of GUI based OS in 1985.
DOS. DOS (DISK OPERATING SYSTEM) is a non-graphical command line operating system.
To open DOS command prompt we follow the following steps:
Select Start>>Select All Programs>>Select Accessories>>Click Command Prompt.
Q.7 Explain single user and multi user operating sustems with examples.
Single User Operating System:
This operating system is designed to manage the computer so that one user can effectively do one thing at
a time. This is the most common type of OS used on home and offices computers.
Examples of single-user OS are MS-DOS, Windows.
Multi Users Operating System:
An operating system that is designed for network use. This OS manages multiple tasks at the same time
System manages multiple requests to same resource in parallel. Time-sharing systems are multi-user
systems.
Examples of Multi-user OS are UNIX, Linux.
OFFICE AUTOMATION
Exercise No.3
Q.1 Fill in the blanks.
i. _____________bar is the top most bar in word window. (TITLE BAR)
ii. _____________layout gives the print layout of a document. (PRINT LAYOUT)
iii. ____________bars are used to move around the document vertically and horizontally. (SCROLL)
iv. entering deleting and moving text in a document refers to text _______________. (EDITING)
v. Microsoft word 2007 introduced _________ inserted of the menus and toolbars in the previous versions
of office. (RIBBON)
vi. ____________is a gallery of text styles that use can add to the documents to create decorative effects,
such as shadowed or mirrored (reflected) text. (WORD ART)
vii. ____________application displays data in multiple cells usually in a two dimensional matrix or grid
consisting of rows and columns. (SPREED SHEET)
viii. ______________is the Excel file that stores users’ information and may contain numerous work sheets.
(WORK BOOK)
ix. ______are the horizontal divisions of a worksheet that are identified by numbers. (ROWS)
x. _______________are graphic presentations of data from a worksheet. (CHARTS)
Place your cursor in the file at the spot where you want to insert the symbol.
On the Insert tab, click Symbol
If you see the symbol you want listed on that gallery, just click it to insert. Otherwise, click
More Symbols to open the Symbol dialog box
Scroll up or down to find the symbol you want to insert.
When you find the symbol you want, double-click it. The symbol will be inserted in your file.
You can click Close now unless you want to insert additional symbols.
v. Give the importance of page break and section break in a word document.
Answer:
A page break does move the text to the top of the next page, A Page Break or hard page break is a
code inserted by a software program such as word processor that tells the printing device where to
end the current page and begin the next. while
A section break is only used when you want to change the document structure, e.g. to insert a
landscape page in a portrait-oriented document.
vi. How a user can insert a header, footer and page break in a word document.?
Answer: To insert page break, choose page Break from the Insert menu. Choose a break from the resulting
dialog and click OK.
To insert Header or footer, With your cursor on the first page of your document, go to Insert , select
Header or Footer, and then pick a built-in layout and design , or select Edit Header or Edit Footer to create
your own.
vii.What is word art?
Answer: Word art is a gallery of text styles that user can add to the documents to create decorative
effects, such as shadowed or mirrored (reflected) text.
Data Communication
Exercise No.4
Q.3 Give short Answer to the following questions.
i. What is meant by Data Communication?
Data communications (DC) is the process of using computing and communication
technologies to transfer data from one place to another, and vice versa. It enables the movement of
electronic or digital data between two or more nodes, regardless of geographical location, technological
medium or data contents.
ii. Differentiate between analogue and digital signals.
Answer: An analog signal is any continuous signal for which the time varying feature (variable) of the signal is a
representation of some other time varying quantity, i.e., analogous to another time varying signal. For example, in an
analog audio signal, the instantaneous voltage of the signal varies continuously with the pressure of the sound waves.
Digital Signals:
A digital signal is a signal that represents data as a sequence of discrete values; at any given time, it can only
take on one of a finite number of values. Computer accepts and process data in the form of digital signals. The transfer
of data from one place to another in the form of digital signals is called digital data transmission.
Q.4. What is data communications? Explain the basic components of communication system?
Data communication is a process of transferring data electronically from one place to another. Data can be
transferred by using different medium. The basic components of data communications are as follows:
Message
The message is the data or information to be communicated. It may consist of text, number, pictures, sound,
video or any a combination of these.
Sender
Sender is a device that sends message. The message can consist of text, numbers, pictures etc. it is also
called source or transmitter. Normally, computer is use as sender in information communication systems.
Receiver
Receiver is a device that receives message. It is also called sink. The receiver can be computer, printer or
another computer related device. The receiver must be capable of accepting the message.
Medium
Medium is the physical path that connects sender and receiver. It is used to transmit data. The medium can
be a copper wire, a fiber optic cable, microwaves etc. it is also called communication channel.
Every character is preceded by a start bit and followed by one or more stop bits
Spaces between characters are common
2)Coaxial cable: A type of wire that consists of a center wire surrounded by insulation and then a grounded
shield of braided wire. The shield minimizes electrical and radio frequency interference.
Coaxial cabling is the primary type of cabling used by the cable television industry and is also widely used
for computer networks, such as Ethernet.
3)Fiber Optic Cable: A cable made of glass or plastic that can transmit large amounts of information at
the speed of light. Fiber optics allow for a much faster data transmission than standard copper wires, because
they have a much higher bandwidth. Fiber optic consists of narrow fiber of glass called core surrounded by
safety cover called cladding. Fiber optic transmit data with the speed of billions bits per second. It is used
by telephone, internet and television companies nowadays.
Radio Waves: In a wireless transmission medium that is used to communicate information through
radio signals in air, over a long distance such as between cities and countries. In this medium
transmitter is used to send message and receiver is used to receive message. Some network use
special device called transceiver that do both receiving and sending. Data transmission of broadcast
radio is up to 540 Mbps.
Cellular radio: radio communication based on a network of transmitters each serving a small area
known as a cell: used in personal communications systems in which the mobile receiver switches
frequencies automatically as it passes from one cell to another.
Satellite: Satellite links are used for very long distance wireless communication. Transmission
from the earth to a satellite is known as uplink. Transmission from a satellite to the earth is known
as downlink. The communication satellite is launched about 22300 miles above the earth into space.
The signals are transmitted from one earth station to the satellite. The satellite receives and
amplifies the signals and sends them to another earth station with the speed up to 1Gbps.
Distortion (Harmonic):
Another meaning of distortion is change in shape of the signal. This type of distortion is observed for the
composite signals made by different frequencies.
Noise:
When the data travels over a transmission medium, noise gets added to it. Noise is a major limiting factor
in communication system performance. Noise can be categorized into four types as follows:
i. Thermal noise (ii) Intermodulation noise (iii) Crosstalk (iv) Impulse noise
Computer Networks
Exercise No. 5
Q.3 Give short answers to the following.
i. What is Computer Network?
Answer: A computer network is a set of computers connected together for the purpose of sharing resources.
The most common resource shared today is connection to the Internet.
ii. List various components of communication network.
Message
The message is the data or information to be communicated. It may consist of text, number,
pictures, sound, video or any a combination of these.
Sender
Sender is a device that sends message. The message can consist of text, numbers, pictures etc.
it is also called source or transmitter. Normally, computer is use as sender in information
communication systems.
Receiver
Receiver is a device that receives message. It is also called sink. The receiver can be computer,
printer or another computer related device. The receiver must be capable of accepting the
message.
Medium
Medium is the physical path that connects sender and receiver. It is used to transmit data. The
medium can be a copper wire, a fiber optic cable, microwaves etc. it is also called
communication channel.
3. if a hub or switch fails all the devices connected to it will have no network connection.
Network architecture is the design of a communication network. It is a framework for the specification
of a network's physical components and their functional organization and configuration, its operational
principles and procedures, as well as data formats use.
Types of Network Architecture:
1. Client-Server Architecture:
A computer network in which one centralized, powerful computer (called the server) is connected to less
powerful personal computers or workstations (called clients) are through switch or Hub. Client server
architecture is very useful for shared and limited resources. For example, each client can access to a printer
connected with server.
The cost effective and limited network in which all computers and devices are connected with each other
directly and can communicate with each other. Each computer can act as server as well as a client. Each
computer can send audio, video, spreadsheets, pictures etc. to any other computer directly.
A local area network is a computer network that interconnects computers within a limited area such as a
residence, school, laboratory, university campus or office building.
side, and it communicates with these two adjacent neighbors. Data travels around the
network, in one direction. Number of link in bus topology are ‘n’.
Star Topology: Star topology Alternatively referred to as a star network, star topology is one of
the most common network setups. In this configuration, every node connects to a central
network device, like a hub, switch, or computer. The central network device acts as a server
and the peripheral devices act as clients. If ‘n ’ is number of nodes in a bus topology then number of
link in bus topology are ‘n’.
Mesh Topology: A network setup where each computer and network device is interconnected
with one another, allowing for most transmissions to be distributed, even if one of the
connections go down. It is a topology commonly used for wireless networks. If ‘n ’ is number of
nodes in a bus topology then number of link in bus topology are ‘n(n-1)/2’.
Adware: Adware is advertising-supported software, which gets the online ads to play automatically
without user permission. These programs slow down computer and could suddenly make the
content of the computer open to the world.
Vi . how virus spread through internet in computers:
Answer: Files shared on a network and downloaded directly from the internet (either through file-sharing
programs or direct download from websites), are among the fastest growing sources of computer virus
infections.
vii. Differentiate between authentication and authorization.
Authentication is the process of validating a user using username and password or other
authentication methods.
Answer: Any criminal activity that uses a computer either as an instrumentality, target or a means for
perpetuating further crimes comes within the ambit of cybercrime.
phishing: using fake email messages to get personal information from internet users;
misusing personal information (identity theft);
hacking: shutting down or misusing websites or computer networks;
spreading hate and inciting terrorism;
distributing child pornography;
grooming: making sexual advances to minors.
5. Email Viruses: A virus that comes within an attached file in an e-mail message. When that file is
opened, the virus does its damage. Macro viruses can come in Microsoft Word documents that
are sent as e-mail attachments.
Q.7. Write note on Spyware and malware.
Answer:
Spyware: Spyware is software that aims to gather information about a person or organization
without their knowledge, that may send such information to another entity without the consumer's
permission, or that takes control over a device without the consumer's knowledge. Spyware enter
to the system by installing malicious software’s or visiting malicious websites. It has the abilities
to slow down your computer and internet connection, change computer and browser settings.
Malware: Malware, or malicious software, is any program or file that is harmful to a computer
user. Malware includes computer viruses, worms, Trojan horses and spyware. These malicious
programs can perform a variety of functions, including stealing, encrypting or deleting sensitive
data, altering or hijacking core computing functions and monitoring users' computer activity
without their permission.
Q.8. How virus spread in Computers?
1. Through infected flash drives/ CD’s:
These are the most common ways of virus spreading from one computer to the other through an infected
computer, and by using a CD/DVD or flash drive, virus can easily be copied on them. Any use of these
removable mediums, by any user, at any time in the future, will infect a computer.
2. Through Pirated Software:
Pirated software is unauthorized copy of original software. Gaining illegal access to protected software by
any means is also known as software piracy. Pirated software’s usually contains viruses.
3. Via Networks and internet:
Files shared on a network and downloaded directly from the internet ( either through file-sharing programs
or direct download from websites), are among the fastest growing sources of computer virus infections.
4. Through E-mail Attachments:
Most of the viruses that spread on your computer are attachments that are sent via email most often from
people you know. Emails infected with a virus usually appear like any normal email in your inbox. When
the unsuspected user opens the email and the attachment, the virus executes itself and will begin to infect
your computer system and other files on the computer and will erase or change information.
symptoms
Advertisements.
Outgoing Emails.
Missing or Extra Files.
Hardware and Accessory Problems.
Q.10. How computer can be protected against virus? Or write short note on Antivirus and anti-
spyware.
Computer can be protected from different types of virus, worms and spywares by the help of antivirus and
anti-spywares.
Antivirus: Anti-virus software is a program or set of programs that are designed to prevent, search for,
detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
These tools are critical for users to have installed and up-to-date because a computer without anti-virus
software installed will be infected within minutes of connecting to the internet.
Anti- Spyware: Anti-spyware is a type of software that is designed to detect and remove unwanted
spyware programs. Spyware is a type of malware that is installed on a computer without the user's
knowledge in order to collect information about them. Anti-spyware software must be updated regularly.
Microsoft security essential is the example anti-spyware software.