Вы находитесь на странице: 1из 30

Page 1 of 30

Fundamentals of computer
Exercise No.1
Q.1 Fill in the blanks.
i. The used of ______________marked the second generation of computers. Transistor
ii. One of the first tools used to express numbers was the “abacus”, developed in ____________about 5000
years ago. Babylonia
iii. ____________________is considered to be the “father of modern digital computer. Charles
Babbage
iv. transistors replaced ______________and were used in the second generation computers.
Vacuum tube
v. ___________computer are used to process and represent continuous data. Analog
vi. ______computer is the biggest in size and the most powerful computer. Super Computer
vii. PDA stands for Personal Digital Assistant
viii. ____________are the professionals who design and develop websites. Web designer
ix.___________ is a pointing device with a vertical lever mounted on a base. Joy Stick
x. _______ are high-speed temporary storage locations used to hold data and instructions Register

Q.2 Select the correct choice for each question.


i. Which was the first tool used to express number, developed in ‘’Babylonia’’ about 5000 years ago?
A. Napier’s bones B. abacus C. slide rule D. pascaline
ii. Who developed Napier’s bone?
A. Pascal B. Charles C. john Napier D. Richard
iii. In which generation computer transistor were used
A. First B. Second C. Third D. Forth
iv. which computer is a combination of digital and analog technologies?
A. Hybrid B. super C. mini D. mainframe
v. Where is Columbia supercomputer located?
A. NASA, china C. NASA, USA D. NASA, ltaly
vi. Which are the most expensive, largest and the quickest computer after super computer?
A. Micro B. mini C. mainframe D. laptops
vii. Which technology is used to design and manufacture products in manufacturing industry?
A. CAD/CAM B. CAL/CAM C. CAN/CAD D. AM/CIN
viii. Who applies the principles of software engineering to the design, development, testing, and evaluation
of the software?
A. hardware engineer B. software engineer C. DBA D. analyst
ix. Which of the following is an input device for voice recording?
A. Scanner B. key board C. speaker D. microphone

Q3. Give short answers to the following questions.


i. What are the main characteristics of DATA BASE Administrator?

Answer: Database administrators (DBAs) are highly paid personals that use specialized software to store
and organize data. The role may include capacity planning, installation, configuration, database design,
migration, performance monitoring, security, troubleshooting, as well as backup and data recovery.

ii. What is a register?

Answer: A special, high-speed storage area within the CPU. A register may hold an instruction, a
storage address, or any kind of data (such as a bit sequence or individual characters).

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 2 of 30

iii. What is the purpose of output devices? Name any five output devices.

Answer: Output devices take data from the computer system and convert it to a form that can be interpreted
by humans. For instance a monitor creates a visual electronic display to output information created by the
processor to the user. Name of different output devices are, Printer, Monitor, Speaker, Plotter, Projector.

iv. What is the purpose of multimedia projector?

Answer: A multimedia projector takes the image from a computer and projects it into a larger screen
so that people can see the image clearly.

v. State three difference between RAM and ROM?

Answer:
RAM ROM
1. RAM is volatile memory 2. ROM is non-volatile memory
2. RAM is temporary memory 2 ROM is a permanent memory
3 RAM cannot hold data without power 3 ROM can hold data without power
4 . RAM store information and run programs 4. ROM chip is used primarily in the startup
process

vi. Differentiate between system and application software.


Answer: System Software:
System software consists of the programs that control the operations of a computer and its
devices. System software serves as the interface between a user, the application software, and
the computer’s hardware. The main types of system software are
 Operating System
 Device Drivers
 Utility Programs
 Language Translators etc.
Application Software:
Software that are used performing specific tasks are called application software. For example,
Microsoft PowerPoint is used for presentation purpose, Microsoft Excel is used for calculation
purpose etc. The following are major types of application software:

 Productivity software
 Business Software
 Entertainment Software
 Educational Software etc.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 3 of 30

vii. List Main functions of the operating system.

Answer: Operating System:


An operating system is the most important software that runs on a computer. It manages the
computer's memory and processes, as well as all of its software and hardware. It is the first
program when computer is turned on. The main functionality of operating system is:
 Recognition of sound or text input
 Displaying of Output
 Memory Management
 Provide graphical user interface to users
 Controlling peripheral devices such as USB, printers
 Task management

viii. What is open source software?

Answer: These are types of software that are available to user free of cost on internet. Source code of
these software is also available for study purpose. Examples of open source software are: Linux,
Apache, Firefox etc.

Q.5. What is Computer? Give brief description of computer evolution.


Answer: Computer is an advanced electronic device that takes raw data as input from the user and processes
these data under the control of set of instructions (called program) and gives the result (output) and saves
output for the future use. It can process both numerical and non-numerical (arithmetic and logical)
calculations.
For thousands of years’ mathematicians, scientists and businessmen have searched for computing machines
that could perform calculations quickly and efficiently. One of the first computing device was
Tally Sticks
A tally stick was an ancient memory aid device to record and document numbers, quantities, or even
messages.
Abacus
•An abacus is a mechanical device used to aid an individual in performing mathematical calculations.
•The abacus was invented in Babylonia in 2400 B.C.
•The abacus in the form we are most familiar with was first used in China in around 500 B.C.
•It used to perform basic arithmetic operations.
Napier’s Bones
•Invented by John Napier in 1614.
•Allowed the operator to multiply, divide and calculate square and cube roots by moving the rods around
and placing them in specially constructed boards.
Pascaline
•Invented by Blaise Pascal in 1642.
•It was its limitation to addition and subtraction.
•It is too expensive

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 4 of 30

Difference Engine and Analytical Engine


•It an automatic, mechanical calculator designed to tabulate polynomial functions.
•Invented by Charles Babbage in1822 and 1834
•It is the first mechanical computer.
First Computer Programmer
•In 1840, Augusta Ada Byron suggests to Babbage that he use the binary system.
•She writes programs for the Analytical Engine

Q5. Give main features of each computer generation.

Answer: The generations of computer is referred to the advancement of computer technology. Each new
generation make the size of computer smaller and make computer faster. Detail of each generation is given
below:
First Generation (1946-1958) The computers of this generation used Vacuum Tubes as the basic
component for memory and circuitry for central processing unit. These vacuum tubes were used to control
and amplify electronic signals. They produced a lot of heat and were prone to frequent fusing/ damaging of
the installations.
Therefore, they were used very expensive and could be
afforded only by very large organizations.
Advantages :
i) these computers were the fastest calculating device of their
time. They could perform computations in milliseconds.
ii) vacuum tube technology made possible the advent of
electronic digital computers.
Disadvantages:
i) Too bulky in size
ii) Air conditioning required to control the temperature
iii) Prone to frequent hardware failure.
iv) Commercial production was difficult and costly.
v) Slow input and output operations.
Second Generation (1959-1964) The second generation computer used Semi-conductor transistor instead
of vacuum tubes after the invention of transistor by a team led by William Shockley.
This generation computer used transistors which were cheaper,
consumed less power, more compact in size, more reliable and
faster than the vacuum tubes used in first generation computers.
Advantages:
i) Smaller in size as compared to first generation computers
ii) More reliable
iii) Less heat generated.
iv) Less prone to hardware failure
v) Wider commercial use
Disadvantages :
i) Air conditioning required
ii) Manual assembly of individual components into a functioning unit was a cumbersome task.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 5 of 30

Third Generation (1965-1970) The third generation computers used Integrated Circuits (or IC Chips) in
which many transistors, resistors, capacitors and other
components (circuit elements) are fabricated or integrated and packaged
together into a very small surface of silicon known as Chips.
This new microelectronic technology was called Integrated Circuits.
The IC was invented by Jack Kilby in 1958.
Advantages:
i) Smaller in size as compared to previous generation
ii) More reliable than second generation computers
iii) Low maintenance cost
iv) Easily portable
v) Commercial production was easier and cheaper.
Disadvantages:
i) Air conditioning required in many case
ii) Highly sophisticated technology required for the manufacture of IC chips
Fourth Generation (1971 onwards) The Fourth generation is based on VLSI (Very Large Scale
Integeration). VLSI was achieved by the invention of microprocessor. Microprocessor is a single silicon
chip which consists of millions of transistors.
Advantages:
i) Smaller in size because of high component density
ii) Heat generated is negligible
iii) Much faster in computation then previous generations
iv) Less power consumption
v) No air conditioning is required in most cases
Disadvantages:
i) Highly sophisticated technology is required for the manufacturing of VLSI chips
ii) Highly skilled people are required in its manufacturing

Fifth Generation (Future Generation: 1991 onwards): The fifth generation computers are under
development stage. The fifth generation machine are based on Parallel Processing hardware and Artificial
Intelligence software. The main objective of fifth generation computing is to develop devices that respond
to natural language input and are capable of learning and self-organization.

Q.6. Explain different types of digital computers.

Types of Digital computers according to the size and performance:


i. Supercomputers: The world's largest and fastest computers, are primarily used for complex
scientific calculations. They are the fastest, the largest and most expensive digital computers
available today. They are best used in Weather forecasting, Nuclear Science, Aerodynamic
modeling etc. Speed of the computer is Trillion Instruction per Second. (TIPS). The Cray CDC
6600 supercomputer was introduced, as one of the world's first supercomputers
ii. Mainframe Computers: After Supercomputers Mainframe Computers are the most
expensive, large and fastest computers. The computers process billion instructions per second

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 6 of 30

(BIPS). These computers are used in large organizations to control and supervise hundreds of
users at a time.
Example: IBM System z9, IBM System z13
iii. Mini Computers:
A Minicomputer are smaller than mainframe both in size, speed and other facilities. Their speed
is rated between one and fifty million instructions per second (MIPS). These computers are
used in business organizations and colleges etc.
Examples: IBM 5360, PDP-8, PDP-11
iv. Micro Computers: A microcomputer is a small, relatively inexpensive computer with a
microprocessor as its central processing unit (CPU) introduced in early of 70’s. Today these
computers are the most popular computers due to its smaller size and less cost. These computers
are used in homes, offices, schools etc.

Q.7 Give uses of computer in the following fields.

1. Education 2. Business 3. Defense 4. Media.

Answer: Nowadays computers are important part of our life. It is used in every field of life. The following
are application of computers in different fields:
a) Education:
The computer technology has deep impact on education. Nowadays it is important part of education in
all educational institutes. Student can find all educational material like books and articles on internet.
It is easy and more useful as compared to hand-written to write notes in computer. People use computer
and internet for Online and distance education. By the help of video call teacher from world-wide can
teach students of every country. Classrooms can be monitor true computer camera’s. Students can get
online diplomas of every country.
b) Business:
Computers are extremely important in today’s business. Ordering products, shipping information,
price checks in retail stores, e-commerce etc is done using computers.
Defense:
There are many uses computers in defense such as
1) Controlling UAV or unmanned air-crafts an example is Predator.
2) They are also used on Intercontinental Ballistic Missiles (ICBMs) that uses GPS and Computers
to help the missile get to the target.
3) Computers are used to track incoming missiles
4) Computers are used in tanks and planes and ships to target enemy forces.
5) Computers help design and test new systems.
Media:
Now days computers are very important in both print and electronic media. Computers are used for printing
newspapers and magazines etc. Internet, Social media, E-mail, Blogging, TV etc are use of computer in
electronic media.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 7 of 30

Q.8. Explain scope of the following careers in IT.


Answer: One has many job opportunities in IT industries:
Software Engineer:
A software engineer is a person who applies the principles of software engineering to the design,
development, maintenance, testing, and evaluation of the software. Software engineers work with
businesses, government agencies (civilian or military), and non-profit organizations. Software engineers
are highly paid people in any organization.
Programmer: a person who prepares and tests programs for devices (such as computers, Mobiles etc.)
Programmer get handsome salaries from their employers. Famous programming languages are C, C++,
JAVA etc.
System Analyst:
System analysts are highly paid people whose responsibilities are to analysis and design techniques to
solve business problems using information technology. Systems analysts may serve as change agents who
identify the organizational improvements needed, design systems to implement those changes, and train
and motivate others to use the systems.
Hardware Engineer:
Computer hardware engineers research, design, develop, and test computer systems and components such
as processors, circuit boards, memory devices, networks, and routers. These engineers discover new
directions in computer hardware, which generate rapid advances in computer technology. Hardware
engineers have sound salaries.

Q.9. Write note on any five input devices.


Answer:
1. Light Pen: A Light Pen is a pointing device shaped like a pen and is connected to a VDU.
The tip of the light pen contains a light-sensitive element which, when placed against the screen, detects the
light from the screen enabling the computer to identify the location of the pen on the screen. Light pens have
the advantage of 'drawing' directly onto the screen.
2. Digital Cameras: A digital camera takes pictures and stores the images digitally. Digital cameras use
memory cards and internal memory for storage. The quality of pictures can be determined by its resolution
and color depth. Its measurement unit is Mega Pixel.

3. Scanner: Scanner is an input device that convert input documents that are in the hard form into digital image
by using light-sensing technology. The digital images are stored in computer after processing. The quality of
digital image can be determined by its resolution and color depth.
4. Barcode Reader: A Barcode reader uses laser beams to read bar code printed on products showing product
specification like product name, manufacturing company, price, expiry date etc. Barcode readers are used in
shops, supermarkets, libraries etc.
5. Microphone: A microphone is used for giving input to a computer in voice form. It is also used for voice
recording.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 8 of 30

Q.10. What is system unit? Explain the main parts of CPU.

Answer:

System Unit: The system unit is the rectangular case that houses the electronic components inside
the computer. The motherboard is the main circuitry in the system unit. Two main components on the
motherboard are the central processing unit (CPU) and memory. For a desktop computer, the electronic
components and most storage devices such as floppy drive, hard disk, and CD-ROM drive, reside inside
the system unit. For a laptop computer, the system unit houses almost all of its components including the
keyboard, pointing device, and monitor.
Motherboard:
The motherboard is the part of your computer that wires all of the other parts together. It is a printed circuit
board and includes the CPU and memory. Every component of your computer connects directly into the
motherboard. It typically includes expansion options for high-end graphic displays and additional devices.
Processor:
The processor, or CPU, of a computer is basically the brains of the computer. A personal computer’s CPU
usually is contained on a single chip, which some call a microprocessor. The CPU contains a control unit
and the Arithmetic Logic Unit, or ALU and registers.
Arithmetic and Logical Unit (ALU):
The ALU carries out three operations:

 Arithmetic operations – performing calculations, which include addition, subtraction,


multiplication, and division
 Comparison operations – comparing data items to determine if the first item is greater
than, equal to, or less than the other item
 Logical operations – working with conditions and logical operators such as AND, OR,
and NOT
Control Unit:
The control unit directs and coordinates most of the operations in the computer. For every instruction, the
control unit repeats a set of four basic operations called the machine cycle: (1) fetching the instruction or
data item from memory, (2) decoding the instruction into commands the computer understands, (3)
executing the commands, and, if necessary, (4) storing, or writing the result to memory.
Registers: A processor register (CPU register) is one of a small set of data holding places that are part of
the computer processor. A register may hold an instruction, a storage address, or any kind of data (such
as a bit sequence or individual characters).

Q.11. what is CPU? Explain the main parts of CPU.


Answer: The processor, or CPU, of a computer is basically the brains of the computer. A personal
computer’s CPU usually is contained on a single chip, which some call a microprocessor. The CPU
contains a control unit and the Arithmetic Logic Unit, or ALU and registers.
Arithmetic and Logical Unit (ALU):
The ALU carries out three operations:

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 9 of 30

 Arithmetic operations – performing calculations, which include addition, subtraction,


multiplication, and division
 Comparison operations – comparing data items to determine if the first item is greater
than, equal to, or less than the other item
 Logical operations – working with conditions and logical operators such as AND, OR,
and NOT
Control Unit:
The control unit directs and coordinates most of the operations in the computer. For every instruction, the
control unit repeats a set of four basic operations called the machine cycle:
(1) fetching the instruction or data item from memory,
(2) decoding the instruction into commands the computer understands,
(3) executing the commands, and, if necessary,
(4) storing, or writing the result to memory.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 10 of 30

Fundamentals of Operating System


Exercise No. 2
Q.1 FILL IN THE BLANKS.
i. _____________is a set of program containing instructions that coordinate all the activities of the
computer. Operating System
ii. The main job of Operating System is to manage the ___________and ____________resources
of the system. Hardware and Software
iii. Many users can work in a _____________environment. Networking
iv. The Operating System acts as a _______between the user and the computer. bridge
v. _______was the first widely-installed operating system for personal computers. DOS
Vi.___________ Contains lists of options on the screen that lead to other screen. Menu
vii. In ___________interface user selects command choices from various menus, buttons and icons
using a Mouse. GUI
Viii. Microsoft was the first to introduce the idea an operating system which was named as
in November 1985. Windows
ix.___________ processing system requires the operating system to work through a series of
programs/tasks in a queue. Batch
x. in windows ___________is the default personal folder for storing data. My Documents
xi. ______________Is a named collection of related files that can be retrieved. Folder
Q2. Select the correct choice for each questions.
i. which of the following is a command driven multi-user and multi-tasking options system fir
servers and desktops, developed in the 1960s?
A. windows B. UNIX C. DOS D. Netware.
ii. Which interface consists of a series of screens to navigate by choosing options from lists, i.e
menus.
A. Command driven B. GUI C. Menu driven D. list driven
iii. By whom the Macintosh computer (often called ‘the mac’), was introduced in 1984?
A. Apple computer B. IBM C. Mango computer D. BMW
iv. which of the following is an updated form of UNIX operating system?
A. windows B. LINIX C. DOS D. Netware
v. which of the following operating system is a multitasking system that is designed to give
immediate response to an event
A. single user B. Multiuser C. multitasking D. Real time
vi. which operating system is a multitasking system that is designed to give immediate response
to an event?
A. Batch processing B. Multiuser C. Time sharing D. real time
vii. In windows which folder keeps file that have been deleted whether accidentally or
intentionally?
A. My computer B. My documents C. Recycle bin D. My piles
viii. Which program is used to view internet sites/ page?
A. Internet explorer B. Web viewer C. word D. Excel
ix. Which of the following is a collection of related information, or resource for storing
information?
A. folder B. file C. document D. Drive

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 11 of 30

x. Which program protects computer form many common viruses and Trojans which can be harmful for
the system?
A. Internet explorer B. excel C. word D. Antivirus

Q.3 Give short answer to the following questions.


i. Write objective of an operating system.
Answer: Objectives of Operating System:
 Provide user interface
 Transfer programs between secondary and main memory
 Manage computer hardware and resources
 Manage system memory
 Manage processing tasks
 Provide networking capabilities
 Manage folders and files
 Provide system and user security

ii. List main feature of Linux Operating System.


Answer:
As an Operating System, some of Linux features are:

 Portable(Multiplatform)
 Multitasking
 Multi User
 Multiprocessor (SMP) Support
 Multithreading Support
 Virtual Memory
 Hierarchical File System
 Graphical User Interface (X Window System, Wayland)
 Wide Hardware Support
 Dynamically Linked Shared Libraries as well as Static Libraries
 POSIX Compliant (Almost)
 Multiple Virtual Consoles
 Multiple File System Support
 Multiple Networking Protocols (TCP/IP, IPX/SPX, AppleTalk, AX.25)
 Shell
 Strong Security Model
 Open Source
iii. What is time sharing processing system?
Answer: Time-sharing is a technique which enables many people, located at various terminals, to use a
particular computer system at the same time.

iv. Define file and folder.


Answer:
File
A file is a collection of related information, or resources for storing information on backing storage devices.
Every file has a unique name.
Folder: A folder is named collection of related files that can be retrieved, moved and manipulated as on
entity. It can be used to store and manage files or sub-folders.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 12 of 30

v. Differentiate between COPY and CUT command.


Answer: When an object is cut from a document, it is completely removed and placed into a temporary
buffer; however, if an object is copied, a duplicate of it is placed in a temporary buffer while the original
remains in place. Shortcut key for cut is CTRL+X and for copy CTRL+C.

vi. What is installation process?


Answer: Window 7 installation
 Turn on the computer and insert the windows 7 DVD.
 Select the CD/DVD ROM drive or USB as the first boot device of your computer.
 Select the language of windows installation. Select Time, currency format and click next.
 Click install now in the screen.
 Check the box I accept the license and agreement.
 Click upgrade if the previous version is already installed or custom installation to install window
7.
 Select the drive to install windows in that drive and click next.
 Window will install the items.
 Windows will restart the system.
 Enter the user name of computer and click next.
 Enter desired password of computer and click next.
 Enter product key and click next.
 Click desired setting for windows updates.
 Select the time zone and fix the date and time click next.
 Select network and sharing setting.
 When the windows installation is completed successfully, computer is ready to use.
Q.4. What is an Operating System? Explain some common tasks or Functions of an operating system.
Answer: Operating System is a set of program containing instructions that coordinate all the
activities of the computer. Following are the main tasks or functions of Operating System.
Program development: The OS provides a variety of facilities and services, such as editors and debuggers,
to assist the programmer in creating programs.

Program execution: A number of steps need to be performed to execute a program. Instructions and data
must be loaded into main memory, I/O devices and files must be initialized, and other resources must be
prepared.

Access to I/O devices: Each I/O device requires its own peculiar set of instructions or control signals for
operation.
Error detection and response:
A variety of errors can occur while a computer system is running. The OS must provide a response that
clears the error.
Accounting: A good OS will collect usage statistics for various resources.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 13 of 30

User Management: Operating system provide security and protection to users and data in a networking
environment. This is achieved through the use of access rights given to the multiple users.
Q.5. Explain the following types of operating systems.
Answer: There are three types of interfaces offered by different OS
i. Command Line Interface:
A command-line interface allows the user to interact with the computer by typing in commands. Common
types of CLI are DOS and UNIX.
DOS (Disk Operating System):
PC-DOS (Personal Computer - Disk Operating System) was the first widely-installed operating system
used in personal computers. It was developed for IBM by Bill Gates. DOS is a non-graphical command line
operating system. To open DOS command prompt we follow the following steps:
Select Start
Select All Programs
Select Accessories
Click Command Prompt
UNIX:
UNIX is an operating system which was first developed at AT&T Bell Laboratories in the 1960s.
It is a command driven, stable, multi-user, multi-tasking system for servers, desktops and laptops.
ii. Menu Driven Interface (MDI):
Menu-driven interface. an interface consisting of a series of screens which are navigated by choosing
options from lists, i.e. menus Menu contains lists of options on the screen that lead to other screens.
Examples of MDI are information booths and ATMs.
iii. Graphical User Interface (GUI)
Graphical User Interface, a GUI is one in which user interact with computer and other electronic devices
using icons and other visual indicators, rather than using command line. For example, all versions of
Microsoft Windows utilize a GUI. First GUI based computer was developed by Apple company in 1984.
The Macintosh, Windows and Linux are examples of GUI operating Systems.
Q.6. Write short note on the following.
Answer:
 Macintosh
The Macintosh also called “The Mac”), introduces in 1984 by Apple computer, was the first widely-sold
personal computer with a GUI. This includes the mouse, the use of icon to represent actions.
 Linux:
Linux is a GUI based user friendly OS which is an updated form of UNIX OS. Linux is a free open source
OS. Linux is a powerful, multiuser and multitasking OS.
 Windows:
Windows is a GUI based OS Which contain graphics and icons and is commonly navigated by using a
computer mouse. Microsoft windows introduces the idea of GUI based OS in 1985.
 DOS. DOS (DISK OPERATING SYSTEM) is a non-graphical command line operating system.
To open DOS command prompt we follow the following steps:
Select Start>>Select All Programs>>Select Accessories>>Click Command Prompt.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 14 of 30

Q.7 Explain single user and multi user operating sustems with examples.
 Single User Operating System:
This operating system is designed to manage the computer so that one user can effectively do one thing at
a time. This is the most common type of OS used on home and offices computers.
Examples of single-user OS are MS-DOS, Windows.
 Multi Users Operating System:
An operating system that is designed for network use. This OS manages multiple tasks at the same time
System manages multiple requests to same resource in parallel. Time-sharing systems are multi-user
systems.
Examples of Multi-user OS are UNIX, Linux.

Q.8 Explain different components/features of graphical user interface (GUI).


Answer:
Graphical User Interface, a GUI is one in which user interact with computer and other electronic devices
using icons and other visual indicators, rather than using command line. For example, all versions of
Microsoft Windows utilize a GUI. First GUI based computer was developed by Apple company in 1984.
The Macintosh, Windows and Linux are examples of GUI operating Systems.
Following are GUI components/features.
 Pointer: A symbol that appears on the display screen and that you move to select objects and
commands.
 Pointing device: A device, such as a mouse or trackball, that enables you to select objects on the
display screen.
 Icons: Small pictures that represent commands, files, or windows. By moving the pointer to the
icon and pressing a mouse button, you can execute a command or convert the icon into a window.
You can also move the icons around the display screen as if they were real objects on your desk.
 Desktop: The area on the display screen where icons are grouped is often referred to as the desktop
because the icons are intended to represent real objects on a real desktop.
 Windows: You can divide the screen into different areas. In each window, you can run a different
program or display a different file. You can move windows around the display screen, and change
their shape and size at will.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 15 of 30

OFFICE AUTOMATION
Exercise No.3
Q.1 Fill in the blanks.
i. _____________bar is the top most bar in word window. (TITLE BAR)
ii. _____________layout gives the print layout of a document. (PRINT LAYOUT)
iii. ____________bars are used to move around the document vertically and horizontally. (SCROLL)
iv. entering deleting and moving text in a document refers to text _______________. (EDITING)
v. Microsoft word 2007 introduced _________ inserted of the menus and toolbars in the previous versions
of office. (RIBBON)
vi. ____________is a gallery of text styles that use can add to the documents to create decorative effects,
such as shadowed or mirrored (reflected) text. (WORD ART)
vii. ____________application displays data in multiple cells usually in a two dimensional matrix or grid
consisting of rows and columns. (SPREED SHEET)
viii. ______________is the Excel file that stores users’ information and may contain numerous work sheets.
(WORK BOOK)
ix. ______are the horizontal divisions of a worksheet that are identified by numbers. (ROWS)
x. _______________are graphic presentations of data from a worksheet. (CHARTS)

Q.2 Select the correct choice for the following question.


i. Where is Microsoft office button located in work window.
A. Top-right B. Bottom-right C. Top-left D. Bottom-left
ii. How many tabs are there in word 2007 window?
A. Seven B. Eight C. Nine D. Ten
iii. Which layout give the view of the document as it appears in a web browser?
A. Print B. Page C. Web D. Outline
iv. What is the zoom range of a word document offered through zoom slider?
A. 10%-200% B. 10%-300% C. 10%-400% D. 10%-500%
v. Which of the following commands is used to create a new document in word?
A. New B. Create C. open D. list.
vi. which of the following keyboard shortcuts is used to open print dialog box.?
A. Ctrl + S B. Ctrl + P C. Ctrl + N D. Ctrl + T.
vii. In word document which option is used to move text from one place (source) to another place
(destination)?
A. Cut-print B. Copy-print C. Copy-paste D. Cut-paste
viii. which of the following break option move text to a new page before reaching the of a page?
A. Page break B. Section break C. Line break D. Column break.
ix. which of the following are blank spaces around the edges of the page?
A. Header B. Footer C. Page margins D. Alignment
x. what is a piece of text or an image in a document that can connect readers to another portion of the
document or a web page called?
A. Margin B. Hyperlink C. File D. Web page

Q.3 Give short answers to the following questions.


i. Define a word processor.
Answer: A word processor is a type of software application used for composing, editing, formatting and
printing documents.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 16 of 30

ii. Give few examples of word processing system.


Answer: Some of the functions of word processing software include: Creating, editing, saving and printing
documents. Copying, pasting, moving and deleting text within a document. Formatting text, such as font
type, bolding, underlining or italicizing. Creating and editing tables.

iii . Difference between Save and Save As command.


Save: -
This command is use when you want to save a file by only one name. For example, you have saved a file
by the name of “Word tip” and now you want to open it and want to insert some more information about
“Word tips” so when you inserted more information and now you want to save this more information so as
you click on “Save” command. Our more work will directly save in “Word tips” file.
Save As: -
This command is use when you want to save a file by two or more than two name. For example, you have
saved a file by the name of “Excel functions” and now you want it by another name. So for this, click on
“Office button” then click on “Save As” command or Click “F12” from keyboard. After click on “Save As”
command “Type a name” in the front of “File name” and lastly click on “Save”.

iv. How you can insert a symbol in a word document?


Answer:


Place your cursor in the file at the spot where you want to insert the symbol.

On the Insert tab, click Symbol

If you see the symbol you want listed on that gallery, just click it to insert. Otherwise, click
More Symbols to open the Symbol dialog box
 Scroll up or down to find the symbol you want to insert.
 When you find the symbol you want, double-click it. The symbol will be inserted in your file.
You can click Close now unless you want to insert additional symbols.
v. Give the importance of page break and section break in a word document.
Answer:
A page break does move the text to the top of the next page, A Page Break or hard page break is a
code inserted by a software program such as word processor that tells the printing device where to
end the current page and begin the next. while
A section break is only used when you want to change the document structure, e.g. to insert a
landscape page in a portrait-oriented document.
vi. How a user can insert a header, footer and page break in a word document.?
Answer: To insert page break, choose page Break from the Insert menu. Choose a break from the resulting
dialog and click OK.
To insert Header or footer, With your cursor on the first page of your document, go to Insert , select
Header or Footer, and then pick a built-in layout and design , or select Edit Header or Edit Footer to create
your own.
vii.What is word art?
Answer: Word art is a gallery of text styles that user can add to the documents to create decorative
effects, such as shadowed or mirrored (reflected) text.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 17 of 30

viii. What is the use of hyperlink in a word documents?


Answer: The hyperlink can be text or graphics. By using hyperlinks, you can provide information to
your readers without repeating the same information on different pages. To add links that jump from
one part of a document to another part of the same document, mark the destination and then add a link
to it.
ix. What is a function? Explain different parts of function with one example.
Answer: A function is a predefined formula that perform calculations using specific values in
a particular order.
All functions begin with the equal (=) sign. then function name, Then there will be argument
is the cell range. I.e. =SUM (A3:A9)
x. What is the purpose of Urdu editor?
Answer: Urdu editor is application software to create documents in Urdu languages, the
national language of Pakistan. These are very useful to develop documents like Urdu n
newspapers, Magazines and pamphlets etc.
Q.5. explain different components of word widow.
Answer: The various components of a word document are –
Menu Bar – it has file, edit, view, insert, format, tools, table, window and help menus
Standard Toolbar – It has shortcut icons to the menu commands
Formatting Toolbar – It has various menus for style, font and font-size, bullets and number, border
icons etc.
Ruler – to set tabs, paragraph alignment, other formats.
And many other components like title box, scroll bar, status bar, office assistant, task pane, ruler, view
button, inscription point, end of documents marker, stander tool bar, floating tool bar.
Q.6. Define the following.
Spreadsheet, workbook, worksheet, cell, cell address, cell reference, formula, function, chart.
Answer:
 Spreadsheet: Spreadsheet application displays data in multiple cells usually in a two dimensional
matrix or grid consisting of rows and columns.
 Workbook: is the Excel file that stores users’ information and may contain numerous work sheets.
 Chart: charts are graphic presentations of data from a worksheet.
 Cell: The intersection of rows and columns is called Cell.
 Function: Predefined formulas are called FUNCTIONS.
 Cell reference: A cell reference refers to a cell or a range of cells on a worksheet and can be used
in a formula so that Microsoft Office Excel can find the values or data that you want that formula
to calculate.
 Formulas. In Excel, a formula is an expression that operates on values in a range of cells or a cell.
For example, =A1+A2+A3, which finds the sum of the range of values from cell A1 to Cell A3.
 Cell Address: A combination of a letter and a number that specifies the column and row in which
a cell is located on a spreadsheet.
 Worksheet: A worksheet or sheet is a single page in a file created with an electronic spreadsheet
program such as Microsoft Excel.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 18 of 30

Data Communication
Exercise No.4
Q.3 Give short Answer to the following questions.
i. What is meant by Data Communication?
Data communications (DC) is the process of using computing and communication
technologies to transfer data from one place to another, and vice versa. It enables the movement of
electronic or digital data between two or more nodes, regardless of geographical location, technological
medium or data contents.
ii. Differentiate between analogue and digital signals.
Answer: An analog signal is any continuous signal for which the time varying feature (variable) of the signal is a
representation of some other time varying quantity, i.e., analogous to another time varying signal. For example, in an
analog audio signal, the instantaneous voltage of the signal varies continuously with the pressure of the sound waves.

Digital Signals:
A digital signal is a signal that represents data as a sequence of discrete values; at any given time, it can only
take on one of a finite number of values. Computer accepts and process data in the form of digital signals. The transfer
of data from one place to another in the form of digital signals is called digital data transmission.

iii. define the following properties of a good communication system.


a. Delivery b. Accuracy c. Timeliness
Answer: The effectiveness of a data communications system depends on four fundamental characteristics:
delivery, accuracy, timeliness.
1. Delivery: The system must deliver data to the correct destination. Data must be received by the intended
device or user and only by that device or user.
2. Accuracy: The system must deliver the data accurately. Data that have been altered in transmission and
left uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data delivered late are useless. In the case
of video and audio, timely delivery means delivering data as they are produced, in the same order that they
are produced, and without significant delay. This kind of delivery is called real-time transmission.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 19 of 30

iv . Differentiate between Guided and Un-Guided media.


Answer: Guided media uses a physical path or conductor to transmit the signals. i.e. Twisted pair, Fiber optics
Unguided or wireless media sends the data through air (or water), which is available to anyone who has a device
capable of receiving them. i.e. microwave, Satellite.
v. What is the purpose of communication devices?
Answer: An electronic device that can send and receive data on the network is called the communication
device. i.e. MODEM
vi. What is signal to noise ratio?
Answer: Signal to Noise Ratio: In analog and digital communications, signal-to-noise ratio, often written
S/N or SNR, is a measure of signal strength relative to background noise. The ratio is usually measured in
decibels (dB) using a signal-to-noise ratio formula.
SNR= Signal/ Noise
A high SNR means the signal is less corrupted by the noise; a low SNR means the signal is more corrupted
by noise.
vii. How data rate and baud rate can be linked through formula?
Answer: Date rate (bps) and Baud rate (baud per second) have the following relationship:
Data rate (bps)= Baud rate (baud per second) x (the number of bits per baud)
Baud rate (baud per second) = Data rate (bps)/ the number of bits per baud.

Q.4. What is data communications? Explain the basic components of communication system?
Data communication is a process of transferring data electronically from one place to another. Data can be
transferred by using different medium. The basic components of data communications are as follows:
 Message
The message is the data or information to be communicated. It may consist of text, number, pictures, sound,
video or any a combination of these.
 Sender
Sender is a device that sends message. The message can consist of text, numbers, pictures etc. it is also
called source or transmitter. Normally, computer is use as sender in information communication systems.
 Receiver
Receiver is a device that receives message. It is also called sink. The receiver can be computer, printer or
another computer related device. The receiver must be capable of accepting the message.
 Medium
Medium is the physical path that connects sender and receiver. It is used to transmit data. The medium can
be a copper wire, a fiber optic cable, microwaves etc. it is also called communication channel.

Q.5. Write Modes of Data Communication:


There are two modes of data communication.
1 Synchronous
2 Asynchronous
1. Synchronous
Data transfer method in which a continuous stream of data signals is accompanied by timing signals
(generated by an electronic clock) to ensure that the transmitter and the receiver are in step (synchronized)
with one another. The data is sent in blocks (called frames or packets) spaced by fixed time intervals.
2. Asynchronous
Asynchronous transmission is the transmission of data in which each character is a self-contained unit with
its own start and stop bits and an uneven interval between them. Asynchronous transmission is also referred
to as start/stop transmission.
The two main characteristics specific to asynchronous communication are:

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 20 of 30

 Every character is preceded by a start bit and followed by one or more stop bits
 Spaces between characters are common

Q.6. What is Guided Transmission Media? Write Types of Guided Media:

Guided media uses a physical path or conductor to transmit the signals.


1) Twisted pair cable: A type of wiring in which two conductors of a single circuit are twisted together for
the purposes of canceling out electromagnetic interference (EMI) from external sources; for instance,
electromagnetic radiation from unshielded twisted pair (UTP) cables, and crosstalk between neighboring
pairs. It was invented by Alexander Graham Bell.

2)Coaxial cable: A type of wire that consists of a center wire surrounded by insulation and then a grounded
shield of braided wire. The shield minimizes electrical and radio frequency interference.
Coaxial cabling is the primary type of cabling used by the cable television industry and is also widely used
for computer networks, such as Ethernet.

3)Fiber Optic Cable: A cable made of glass or plastic that can transmit large amounts of information at
the speed of light. Fiber optics allow for a much faster data transmission than standard copper wires, because
they have a much higher bandwidth. Fiber optic consists of narrow fiber of glass called core surrounded by
safety cover called cladding. Fiber optic transmit data with the speed of billions bits per second. It is used
by telephone, internet and television companies nowadays.

Q.7. Explain the following Unguided transmission Media.


Answer:

 Radio Waves: In a wireless transmission medium that is used to communicate information through
radio signals in air, over a long distance such as between cities and countries. In this medium
transmitter is used to send message and receiver is used to receive message. Some network use
special device called transceiver that do both receiving and sending. Data transmission of broadcast
radio is up to 540 Mbps.
 Cellular radio: radio communication based on a network of transmitters each serving a small area
known as a cell: used in personal communications systems in which the mobile receiver switches
frequencies automatically as it passes from one cell to another.
 Satellite: Satellite links are used for very long distance wireless communication. Transmission
from the earth to a satellite is known as uplink. Transmission from a satellite to the earth is known
as downlink. The communication satellite is launched about 22300 miles above the earth into space.
The signals are transmitted from one earth station to the satellite. The satellite receives and
amplifies the signals and sends them to another earth station with the speed up to 1Gbps.

Q.8. What is transmission impairment? Write different types of transmission impairment.


A transmission impairment is a property of a transmission medium which causes the signal to be degraded,
reduced in amplitude, distorted or contaminated. Impairment can introduce errors into digital signals.
Examples of transmission impairments are attenuation, delay distortion, and several sources of noise
including, interference, thermal noise, impulse noise, and inter-modulation noise.
 Attenuation: The strength of a signal decrease with the increase in distance travelled over a
medium. Attenuation means loss of energy. When any signal travels over a medium or channel, it
loses some of its energy in the form of heat in the resistance of the medium.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 21 of 30

 Distortion (Harmonic):
Another meaning of distortion is change in shape of the signal. This type of distortion is observed for the
composite signals made by different frequencies.
 Noise:
When the data travels over a transmission medium, noise gets added to it. Noise is a major limiting factor
in communication system performance. Noise can be categorized into four types as follows:
i. Thermal noise (ii) Intermodulation noise (iii) Crosstalk (iv) Impulse noise

Q.9. What is communication devices? Explain any five communication devices.


Answer:
An electronic device that can send and receive data on the network is called the communication device.
Types of Communication devices:
 Dialup Modem:
Modem stands for Modulator and Demodulator. Dial-up Internet access is a form of Internet access that
uses the facilities of the public switched telephone network to establish a connection to an Internet service
provider by dialing a telephone number on a conventional telephone line.

 Network Interface Card:


Network Interface Card, the NIC is also referred to as an Ethernet card and network adapter. It is an
expansion card that enables a computer, printers and other devices to connect to a network; such as a home
network, or the Internet using an Ethernet cable with an RJ-45 connector.
 Router:
A router is a networking device that forwards data packets between computer networks. A data packet is
typically forwarded from one router to another router through the networks.
 Switch:
A network switch is a computer networking device that connects devices together on a computer network
by using packet switching to receive, process, and forward data to the destination device. Switch uses MAC
address (LAN or WAN card address) for communication.
 Bluetooth: is a computing and telecommunications industry specification that describes how
devices can communicate with each other. Devices that use Bluetooth include computers, a
computer keyboard and mouse, personal digital assistants, and smartphones.

Q.10. What is bandwidth? Explain different types of bandwidth.


Answer: Bandwidth: Bandwidth is the capacity of a wired or wireless network communications link
to transmit the maximum amount of data from one point to another over a computer network or internet
connection in a given amount of time -- usually one second. Synonymous with capacity, bandwidth
describes the data transfer rate. There are three types of bandwidth. They are
1. Voice band or low speed channels.
2. Medium band or medium speed channels.
3. Broad band or high speed channel.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 22 of 30

Computer Networks
Exercise No. 5
Q.3 Give short answers to the following.
i. What is Computer Network?
Answer: A computer network is a set of computers connected together for the purpose of sharing resources.
The most common resource shared today is connection to the Internet.
ii. List various components of communication network.
 Message
The message is the data or information to be communicated. It may consist of text, number,
pictures, sound, video or any a combination of these.
 Sender
Sender is a device that sends message. The message can consist of text, numbers, pictures etc.
it is also called source or transmitter. Normally, computer is use as sender in information
communication systems.
 Receiver
Receiver is a device that receives message. It is also called sink. The receiver can be computer,
printer or another computer related device. The receiver must be capable of accepting the
message.
 Medium
Medium is the physical path that connects sender and receiver. It is used to transmit data. The
medium can be a copper wire, a fiber optic cable, microwaves etc. it is also called
communication channel.

iii. What is the importance of server in a computer network?


Answer: The function of a computer server is to store, retrieve and send computer files and data to
other computers on a network.
iv. Differentiate between LAN and WAN.
Answer: A LAN (local area network) is a group of computers and network devices connected together,
usually within the same building.
A WAN (wide Area Network) connects several LANs, and may be limited to an enterprise (a corporation
or an organization) or accessible to the public.
v. What are the advantages and disadvantages of star topology?
Answer:
Advantages:
1. very reliable – if one cable or device fails then all the others will continue to work

2. high performing as no data collisions can occur


Disadvantages:
1. expensive to install as this type of network uses the most cable (network cable is expensive)

2. extra hardware required (hubs or switches) which adds to cost

3. if a hub or switch fails all the devices connected to it will have no network connection.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 23 of 30

vi. Write few advantages and disadvantages of DSL.


Answer:
Advantages Disadvantages
1. simultaneous access to the 2. A major disadvantage of DSL is that its
telephone and Internet effectiveness depends on proximity
3. use of your existing telephone wiring 3. Uploads are slower than downloads with
DSL
4. it offers greater security as compare to shared
medium.

Q.4. what are different uses of computer network.? Explain in detail.


 Resource sharing: - Computer Network is used in Resource sharing. The Same Device in a
network can be accessed by the different computer which is connected to the same network like the
printer, fax, scanner, etc.
 Information sharing: - Information sharing is the exchange of data between various organizations,
people, and technologies. Different information and data can be shared like the file, videos, etc.
 Communication medium: - Computer Network is widely used in communication like chatting,
video chatting, emails ,etc.
 E-commerce: - Computer Network is also used in E-commerce where users can pay bills, transfer
cash, buy good, etc using the computer.
 Money saving: Computer networking is an important financial aspect for organizations because it
saves money.
 Video Conferencing: A video conference is a live, visual connection between two or more people
residing in separate locations for the purpose of communication. At its simplest, video
conferencing provides transmission of static images and text between two locations.

Q.5. explain different Modes of Data Transmission:


1. A simplex connection is a connection in which the data flows in only one direction, from
the transmitter to the receiver. This type of connection is useful if the data do not need to
flow in both directions (for example, from your computer to the printer or from the mouse
to your computer...).
2. A half-duplex connection (sometimes called an alternating connection or semi-duplex) is
a connection in which the data flows in one direction or the other, but not both at the same
time.
3. A full-duplex connection is a connection in which the data flow in both directions
simultaneously. Each end of the line can thus transmit and receive at the same time. A
regular telephone line is an example of full duplex.

Q.6. What is network architecture? Write its types.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 24 of 30

Network architecture is the design of a communication network. It is a framework for the specification
of a network's physical components and their functional organization and configuration, its operational
principles and procedures, as well as data formats use.
Types of Network Architecture:

1. Client-Server Architecture:
A computer network in which one centralized, powerful computer (called the server) is connected to less
powerful personal computers or workstations (called clients) are through switch or Hub. Client server
architecture is very useful for shared and limited resources. For example, each client can access to a printer
connected with server.

2. Peer to Peer (P2P) Network:

The cost effective and limited network in which all computers and devices are connected with each other
directly and can communicate with each other. Each computer can act as server as well as a client. Each
computer can send audio, video, spreadsheets, pictures etc. to any other computer directly.

3. Point to Point Network:

Point-to-point: In telecommunications, a point-to-point connection refers to a communications


connection between two nodes or endpoints. An example is a telephone call, in which one telephone is
connected with one other, and what is said by one caller can only be heard by the other.

Q.7. Write different types of network.

1. Local Area Network (LAN):

A local area network is a computer network that interconnects computers within a limited area such as a
residence, school, laboratory, university campus or office building.

2. Metropolitan Area Network (MAN):


A Metropolitan Area Network (MAN) is a large computer network on the large geographical area
that include several buildings or even the entire city. The geographical area of the MAN is larger
than LAN, but smaller than WAN.

3. Wide Area Network:


A WAN (wide area network) is a communications network that connect a large geographic area
such as across cities, states, or countries using guided or unguided media.

Q.8 What is network topology? Write different network topologies.


Answer: Physical arrangement of a network is called network topology.
Main Types of Topology:
 Bus Topology:A bus topology is a network setup in which each computer and network device are connected
to a single cable or backbone. Communication in bus topology are bi-directional. End points of bus topology
are called terminator. Special addresses are used for communication. If ‘n ’ is number of nodes in a bus
topology then number of link in bus topology are ‘n’.
 Ring Topology: In Ring Topology, all the nodes are connected to each-other in such a way that
they make a closed loop. Each workstation is connected to two other components on either

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 25 of 30

side, and it communicates with these two adjacent neighbors. Data travels around the
network, in one direction. Number of link in bus topology are ‘n’.
 Star Topology: Star topology Alternatively referred to as a star network, star topology is one of
the most common network setups. In this configuration, every node connects to a central
network device, like a hub, switch, or computer. The central network device acts as a server
and the peripheral devices act as clients. If ‘n ’ is number of nodes in a bus topology then number of
link in bus topology are ‘n’.
 Mesh Topology: A network setup where each computer and network device is interconnected
with one another, allowing for most transmissions to be distributed, even if one of the
connections go down. It is a topology commonly used for wireless networks. If ‘n ’ is number of
nodes in a bus topology then number of link in bus topology are ‘n(n-1)/2’.

Q.9. Write different types of Modems.


 Dial-up Modem: Dial-up modem connects the computer to standard phone lines, which serve as the data
transfer medium. When a user initiates a dial-up connection, the modem dials a phone number of an Internet
Service Provider (ISP) that is designated to receive dial-up calls. The ISP then establishes the connection,
which usually takes about ten seconds. Dial up modem supports less than 56Kbps bandwidth.
 DSL modem: A digital subscriber line modem is a device used to connect a computer or router to a telephone
line which provides the digital subscriber line service for connectivity to the Internet, which is often called
DSL broadband. DSL provides both guided and unguided internet access. It is mostly used in home, offices
and companies.
 ISDN Modem: ISDN modem is used for ISDN connection that enables the transmission of
digital data over standard phone lines. It can be used for voice calls as well as data transfers.
It is much faster than a typical dial up modem. ISDN is famous data communication due
to maximum data transfer, reduce line noise and enhance signal quality.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 26 of 30

Computer Security and Ethics.


Exercise No. 6
Q.3 Give short answer to the following.
i. What is computer security?
Ans: Cyber security, computer security or IT security is the protection of computer systems from the theft
and damage to their hardware, software or information, as well as from natural disaster.
ii. Difference between Computer Crime and Conventional Crime.
Answer:
 Computer Crime: Any criminal activity that uses a computer either as an instrumentality, target
or a means for perpetuating further crimes comes within the ambit of cybercrime.
 Conventional Crime: A crime may be said to be any conduct accompanied by act or omission
prohibited by law and consequential breach of which is visited by penal consequences.
iii. Difference between hacking and cracking?
Answer:
 Hacking:
Unauthorized access to computers, a telecommunication system or exposing security flaws of a
company or an organization is called hacking. The person, who do hacking is called hackers.
Hackers are heavily fined as well as given imprisonment in the court of laws.
 Cracking:
Software cracking is the process of bypassing the registration and payment options on a software
product to remove copy protection safeguards or to turn a demo version of software into a fully
functional version without paying for it. The people who do cracking are called crackers.
iv. Difference between Virus and Worm?
 Answer: Virus: A computer virus is a type of malicious software program that, when executed,
replicates itself by modifying other computer programs and inserting its own code.
 Worm: Computer worms are programs that reproduce, execute independently and travel across
network connections The key difference between a virus and worm is the manner in which it
reproduces and spreads. A virus is dependent on the host file or boot sector, and the transfer of files
between computers to spread, whereas a computer worm can execute completely independently
and spread on its own accord through network connections.
v. What is adware?
Answer:

 Adware: Adware is advertising-supported software, which gets the online ads to play automatically
without user permission. These programs slow down computer and could suddenly make the
content of the computer open to the world.
Vi . how virus spread through internet in computers:
Answer: Files shared on a network and downloaded directly from the internet (either through file-sharing
programs or direct download from websites), are among the fastest growing sources of computer virus
infections.
vii. Differentiate between authentication and authorization.
 Authentication is the process of validating a user using username and password or other
authentication methods.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 27 of 30

 Authorization performs after authentication. Authorization is finding out if the person is


permitted to have resource. Authorization also describe access level of a user.

viii. What is biometric technology? Give an example.


Answer:
Biometrics is the technical term for body measurements and calculations. It refers to metrics related to
human characteristics. Biometrics authentication is used in computer science as a form of identification
and access control. i.e. Finger print identification
ix. What is meant by Multimodal Authentication.
Answer: Multimodal or multifactor authentication is the act of using more than one authentication method
when logging on to a server or a workstation. This form of authentication helps to provide additional
security to application or computers.

Q.4. What is the importance of computer security?


Answer: Computer security was introduced in the 1970’s. The purpose of computer security is to secure a
particular computer system from any kind of crime. Computer security is important because it secure
valuable data and information and to provide uninterrupted services.

Q.5. What is cyber crime? Types of Cyber crime?

Answer: Any criminal activity that uses a computer either as an instrumentality, target or a means for
perpetuating further crimes comes within the ambit of cybercrime.

Common forms of cybercrime include:

 phishing: using fake email messages to get personal information from internet users;
 misusing personal information (identity theft);
 hacking: shutting down or misusing websites or computer networks;
 spreading hate and inciting terrorism;
 distributing child pornography;
 grooming: making sexual advances to minors.

Q.6. What is computer virus? Write different types of computer viruses.


Virus: A computer virus is a type of malicious software program that, when executed, replicates itself by
modifying other computer programs and inserting its own code.
There are following types of computer viruses:
1. Resident Virus: This type of virus is a permanent which resides in the RAM memory. It corrupts
files and programs that are opened, closed, copied, renamed etc.
2. Boot virus: This type of virus effects the boot sector of a hard disk, which is a crucial part of a
disk.
3. Trojans or Trojan horses: A Trojan or Trojan horse is a destructive program that disguises itself
as valuable and useful software available for download on the internet. Unlike viruses or worms,
Trojans do not replicate themselves, but they can be just as harmful as viruses or worms.
4. Logic Bomb ot Time bomb: A logic bomb is a piece of code inserted into an operating system or
software application that implements a malicious function after a certain amount of time, or specific
conditions are met. A logic bomb works similar to a time bomb because it can be set to go off at
a specific date.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 28 of 30

5. Email Viruses: A virus that comes within an attached file in an e-mail message. When that file is
opened, the virus does its damage. Macro viruses can come in Microsoft Word documents that
are sent as e-mail attachments.
Q.7. Write note on Spyware and malware.
Answer:

 Spyware: Spyware is software that aims to gather information about a person or organization
without their knowledge, that may send such information to another entity without the consumer's
permission, or that takes control over a device without the consumer's knowledge. Spyware enter
to the system by installing malicious software’s or visiting malicious websites. It has the abilities
to slow down your computer and internet connection, change computer and browser settings.
 Malware: Malware, or malicious software, is any program or file that is harmful to a computer
user. Malware includes computer viruses, worms, Trojan horses and spyware. These malicious
programs can perform a variety of functions, including stealing, encrypting or deleting sensitive
data, altering or hijacking core computing functions and monitoring users' computer activity
without their permission.
Q.8. How virus spread in Computers?
1. Through infected flash drives/ CD’s:
These are the most common ways of virus spreading from one computer to the other through an infected
computer, and by using a CD/DVD or flash drive, virus can easily be copied on them. Any use of these
removable mediums, by any user, at any time in the future, will infect a computer.
2. Through Pirated Software:
Pirated software is unauthorized copy of original software. Gaining illegal access to protected software by
any means is also known as software piracy. Pirated software’s usually contains viruses.
3. Via Networks and internet:
Files shared on a network and downloaded directly from the internet ( either through file-sharing programs
or direct download from websites), are among the fastest growing sources of computer virus infections.
4. Through E-mail Attachments:
Most of the viruses that spread on your computer are attachments that are sent via email most often from
people you know. Emails infected with a virus usually appear like any normal email in your inbox. When
the unsuspected user opens the email and the attachment, the virus executes itself and will begin to infect
your computer system and other files on the computer and will erase or change information.

Q.9. Write symptoms of a Virus attack.


Answer: A computer virus is a type of malicious software program that, when executed, replicates itself
by modifying other computer programs and inserting its own code.

symptoms

 Slower Internet and Processing.


 Unexpected Computer Behaviour.
 Computer restarting automatically.
 Sudden Freezes & Crashes.
 Error Messages.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 29 of 30

 Advertisements.
 Outgoing Emails.
 Missing or Extra Files.
 Hardware and Accessory Problems.

Q.10. How computer can be protected against virus? Or write short note on Antivirus and anti-
spyware.
Computer can be protected from different types of virus, worms and spywares by the help of antivirus and
anti-spywares.
Antivirus: Anti-virus software is a program or set of programs that are designed to prevent, search for,
detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
These tools are critical for users to have installed and up-to-date because a computer without anti-virus
software installed will be infected within minutes of connecting to the internet.
Anti- Spyware: Anti-spyware is a type of software that is designed to detect and remove unwanted
spyware programs. Spyware is a type of malware that is installed on a computer without the user's
knowledge in order to collect information about them. Anti-spyware software must be updated regularly.
Microsoft security essential is the example anti-spyware software.

Q.11. Write different authentication methodologies.


The following are few important authentication methodologies:
1. Username and Password:
In this method username and password is used for authentication. The username usually reflects the name
of the individual. Passwords need to be complex.
2. Personal Identification Number (PIN)
A personal identification number (PIN) is a numerical code used in many electronic financial transactions.
Personal identification numbers (PINs) are usually used in combination with usernames or other passwords.
They are also usually required when using bank debit or credit cards. It ranges from 0000 to 9999.
3. Access Card:
A plastic card with a chip or magnetic strip containing encoded data that is read by passing the card through
or over an electronic device, used to provide access to restricted or secure areas or systems.
4. Biometrics:
Biometrics is the technical term for body measurements and calculations. It refers to metrics related to
human characteristics. Biometrics authentication is used in computer science as a form of identification and
access control.
Biometric systems use the three components:
1. A sensor that detects the characteristics being used for identification.
2. A computer that reads and stores the information.
3. Software that have programs for operation of device.
Q.12. What is Computer Ethics? Write moral guidelines for the use of computers.
Computer ethics are the issues concerning the legal, professional, social and moral responsibilities of
computer professionals and end users.
Moral guidelines for the use of Computers suggested by the CEI:
1. Do not use computer to harm other people.
2. Do not watch around in other people’s computer files.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397


Page 30 of 30

3. Do not use computer to steal.


4. Do not use computer to bear false witness.
5. Do not copy or use licensed software without payment.
6. Do not use other people resources without permission.
7. Before writing an application think about its social consequences.

Q.13. Explain different areas of computer ethics.


The following are few major areas of computer ethics.
1. Information Accuracy:
Information accuracy deals with correct handling of personal information. Accurate information is essential
to business, non-profit organizations, consumers and government.
2. Copyright and intellectual property rights:
Intellectual property (IP) refers to creations of the mind, such as inventions; literary and artistic works;
designs; and symbols, names and images used in commerce.
Copyright is a legal term used to describe the rights that creators have over their literary and artistic
works.
3. Software Piracy:
Software Piracy define as unauthorized duplication, distribution or use of computer software which
includes making copies of software, installing, sharing, downloading, selling multiple copies to
personal or work computers. We should avoid software piracy because it is illegal and it destroy a
commercial product market.
4. Information Privacy:
Information privacy, or data privacy, is the relationship between the collection and distribution of data,
technology and the other issues related to them. The challenge in data privacy is to protect data from
misuse and mishandle.

Q.14. why antivirus software is necessary for a computer?


Answer: Anti-virus software is a program or set of programs that are designed to prevent, search for,
detect, and remove software viruses, and other malicious software like worms, Trojans, adware, and more.
These tools are critical for users to have installed and up-to-date because a computer without anti-virus
software installed will be infected within minutes of connecting to the internet.

Prepared by IHTISHAM SST-IT @GHS ELAI BUNER 03439174397

Вам также может понравиться