Uploaded by Mustafa Abrar

Computer's Solved Guess Paper

advertisement
Computer Studies
Guess Paper Solved
Short Q & A
Q1: What are the five major activities of an operating system?
Ans: An operating system has five main activities that it handles:
Process Management: The operating system manages programs or
processes running on the computer. It makes sure they get the
resources they need, like CPU time and memory, and handles their
scheduling.
Memory Management: The operating system keeps track of which
parts of the computer's memory are used by different programs. It
assigns memory when programs need it and ensures efficient
memory usage.
File Management: The operating system takes care of organizing,
storing, and retrieving files on storage devices, such as hard drives.
It lets users create, modify, and access files and ensures the security
and integrity of data.
Device Management: The operating system manages input and
output devices like keyboards, mice, printers, and disk drives. It
handles device communication, allocation, and scheduling to ensure
they work properly and efficiently.
User Interface: The operating system provides an interface for users
to interact with the computer system. This can be a graphical
interface with icons and menus or a text-based interface with
commands. It makes it easier for users to run programs, manage
files, and perform tasks.
These activities, process management, memory management, file
management, device management, and user interface, are essential
for the operating system to function well and be user-friendly.
Q2:What do you mean by protocol?
Ans: Protocol refers to a set of rules that devices follow to
communicate with each other. It's like a language they use to
understand and exchange data efficiently. Protocols ensure smooth
and reliable communication between devices or systems.
Q3:What do you understand by the term input devices and output
devices?
Ans: Input devices are tools or devices that allow users to provide
information or commands to a computer. They enable users to input
data or interact with the computer system. Examples of input
devices include keyboards, mice, touchscreens, and microphones.
On the other hand, output devices are devices that display or
present information processed by the computer. They convey the
results or output of the computer's operations to the user in a
human-readable form. Examples of output devices include monitors,
printers, speakers, and headphones.
Q4:Identify three pointing devices?
Ans:Three common pointing devices are:
Mouse: A mouse is a handheld device that typically has one or more
buttons and a scrolling wheel. It is moved across a surface to control
the movement of a cursor on the computer screen.
Trackpad: A trackpad, also known as a touchpad, is a flat surface
usually found on laptops. It allows users to control the cursor by
moving their fingers across the surface.
Touchscreen: A touchscreen is a display that can detect and respond
to touch input. It allows users to directly interact with the computer
screen by tapping, swiping, or gesturing with their fingers.
Touchscreens are commonly found on smartphones, tablets, and
some laptops or desktop monitors.
Q5: What are the three advantages of a computer network?
Ans:Three advantages of a computer network are:
Resource Sharing: Devices can share things like printers and files,
making it easier to collaborate and access shared resources.
Communication: Networks enable users to exchange messages,
share files, and work together more effectively.
Internet Access: Networks provide connectivity to the internet,
giving users access to a wealth of information and online services.
Q6: Differentiate between blog and vlog?
Ans:A blog is a website where individuals or groups write and
publish articles or posts on various topics. It typically consists of
written content with images, and sometimes includes videos or
other media. Blogs are like online journals or diaries where people
share their thoughts, experiences, or knowledge.
On the other hand, a vlog is a type of blog where the main content
format is video. Instead of written articles, vlogs primarily consist of
recorded videos that individuals create and upload to platforms like
YouTube. Vlogs often focus on personal experiences, travel,
tutorials, or entertainment.
Q7: What is the difference between LAN and WAN?
Ans:
LAN (Local Area Network)
WAN (Wide Area Network)
Covers a small area, such as a
home, office, or building.
Spans a larger area, such as
multiple cities, countries, or
continents.
Operates within a limited
geographical area, typically
within a single building or
campus.
Connects multiple LANs over a
larger geographical area, often
across different locations or
cities.
Usually owned and controlled by Involves multiple organizations
a single organization or
or service providers. Control
individual.
and management may be shared
or outsourced.
Offers higher data transfer
speeds and lower latency due to
the smaller coverage area.
May have lower data transfer
speeds and higher latency due
to larger distances and multiple
network nodes.
Q8: Describe the function of peer-to-peer network?
Ans:A peer-to-peer network is a type of network where computers
or devices connect directly with each other, without the need for a
central server. In a peer-to-peer network, every device can act as
both a client and a server, allowing them to share files, resources,
and services directly with other devices on the network.
Peer-to-peer networks are often used for tasks like file sharing,
collaborative work, or multiplayer gaming, where devices can
interact with each other directly and quickly.
Q9: Describe the different type of display?
Ans:There are different types of displays used in computers and
other devices. Here are brief descriptions of some common display
types:
1. LCD (Liquid Crystal Display): LCD displays use liquid crystals to
create images. They are thin, lightweight, and energy-efficient.
LCDs are commonly found in computer monitors, laptops, and
TVs.
2. LED (Light-Emitting Diode) Display: LED displays use
light-emitting diodes to produce images. They are known for
their brightness, color accuracy, and energy efficiency. LED
displays are commonly found in TVs, digital signage, and some
computer monitors.
3. CRT (Cathode Ray Tube) Display: CRT displays use electron
beams to create images on a glass screen. They were
commonly used in older computer monitors and TVs, but have
become less popular due to their bulkiness and power
consumption.
Q10: Distinguish between primary and secondary storage?
Ans:Primary storage and secondary storage are two types of storage
used in computer systems. Here's a simplified comparison between
the two:
Primary Storage:
● Also known as main memory or RAM (Random Access
Memory).
● It is directly accessible by the computer's processor.
● Stores data and instructions that are actively being used by the
computer.
● Provides fast and temporary storage for data and programs
during the computer's operation.
● Data is lost when the computer is turned off or restarted.
● Examples include RAM and cache memory.
Secondary Storage:
Also known as auxiliary storage or non-volatile storage.
It is not directly accessible by the computer's processor.
Stores data and programs for long-term storage.
Provides non-volatile storage, meaning data is retained even
when the computer is turned off.
● Examples include hard disk drives (HDD), solid-state drives
(SSD), and optical discs (CDs, DVDs).
● Secondary storage is slower than primary storage but offers
larger storage capacity.
●
●
●
●
Q11: What is a web browser?
Ans:A web browser is a software application that allows you to
access and view websites on the internet. It acts as a gateway
between your computer and the internet, enabling you to search for
information, visit websites, and interact with online content.
Q12: What is a search engine?
Ans:A search engine is an online tool or website that helps you find
information on the internet. It allows you to enter keywords or
phrases related to what you're looking for and then provides a list of
relevant websites, documents, images, or other content.
Q13: Identify the basic element of communication system and the
purpose of each?
Ans:The basic elements of a communication system and their
purposes are as follows:
1. Sender: The sender is the person or device that initiates the
communication. Their purpose is to convey a message or
information to the receiver.
2. Message: The message is the information or content being
transmitted from the sender to the receiver. It can be in the
form of text, speech, data, or any other form of
communication.
3. Medium: The medium is the channel through which the
message is transmitted. It can be a physical medium like wires,
cables, or airwaves for wireless communication. The purpose
of the medium is to carry the message from the sender to the
receiver.
4. Receiver: The receiver is the person or device that receives the
transmitted message. Their purpose is to interpret and
understand the message sent by the sender.
5. Feedback: Feedback is the response or reaction from the
receiver back to the sender. It helps in confirming successful
communication, ensuring the message was understood, and
providing an opportunity for clarification if needed.
Q14: What is the role of computers in medical science?
Ans:Computers in medical science have important roles:
1. They help manage and organize medical data efficiently.
2. They aid in medical imaging and diagnosis, analyzing detailed
body images.
3. Computers support medical research and simulations for
improved understanding.
4. Electronic Medical Record systems digitize and store patient
information.
5. Computers enable telemedicine, allowing remote healthcare
communication.
Q15: What is a graphical user interface (GUI)?
Ans:A graphical user interface (GUI) is a visual interface that helps
users interact with computers or software. It uses icons, menus, and
windows to make it easier to perform tasks. GUIs are designed to be
user-friendly and intuitive, allowing users to navigate and interact
with the system visually. They have become the standard way we
interact with computers today.
Q16: Define cache memory?
Ans:Cache memory is a small and fast type of memory that is located
closer to the processor in a computer system. It is used to store
frequently accessed data and instructions to speed up the
performance of the system. By keeping a copy of frequently used
data in cache memory, the processor can access it quickly, reducing
the need to fetch data from slower main memory or storage. Cache
memory plays a vital role in improving the overall speed and
efficiency of a computer by reducing the time needed to access data.
Q17: What is virus and how can viruses affect the computer?
Ans:A computer virus is a malicious program that can infect a
computer and cause various harmful effects. It is designed to
replicate and spread from one computer to another, often without
the user's knowledge or consent. Viruses can affect computers in
several ways:
1. Damage Files: Viruses can corrupt or delete files on a
computer, causing data loss and disrupting normal operations.
2. Slow Performance: Viruses can consume system resources,
leading to slower computer performance and sluggishness.
3. Unauthorized Access: Some viruses are designed to gain
unauthorized access to sensitive information, such as personal
data, login credentials, or financial details.
4. Spread and Replicate: Viruses can replicate themselves and
spread to other computers through networks, email
attachments, or infected files, potentially infecting more
systems.
5. System Instability: Viruses can cause system crashes, freezing,
or unexpected errors, making the computer unstable and
unreliable.
6. Unwanted Behavior: Viruses can exhibit various unwanted
behaviors, such as displaying pop-up ads, redirecting web
browsers, or modifying system settings.
To protect against viruses, it's important to use antivirus software,
regularly update system software and applications, avoid
downloading files from untrusted sources, and exercise caution
when opening email attachments or clicking on suspicious links.
Q18: Define analog signal?
Ans:An analog signal is like a continuous electrical wave that
represents real-world things such as sound or temperature. It
changes smoothly over time, just like the original non-electric signal
it represents. We call it "analog" because it's similar to the original
signal. For example, when you talk on a telephone or use a mercury
thermometer, the signals they use are analog.
Q19: Describe fetch - decode - execute of CPU?
Ans:The fetch-decode-execute cycle is the fundamental process that
a CPU (Central Processing Unit) goes through to execute
instructions. Here's a simplified explanation:
1. Fetch: The CPU fetches the next instruction from memory. It
retrieves the instruction and brings it into the CPU for
processing.
2. Decode: The CPU decodes the fetched instruction,
understanding what operation needs to be performed and the
operands involved.
3. Execute: The CPU executes the decoded instruction by
performing the required operation. This may involve
calculations, data manipulation, or transferring data between
different parts of the computer system.
This fetch-decode-execute cycle repeats continuously, allowing the
CPU to process instructions one by one and perform the necessary
operations to execute a program.
Q20: Compare compiler and interpreter?
Compiler
Interpreter
Translates entire program into
machine code before execution
Interprets and executes code
line by line
Produces executable file or
target code
Does not produce separate
executable file
Usually results in faster
execution
Generally slower execution
compared to compiled code
Detects errors before runtime
Errors are identified during
runtime
Requires compilation phase
before execution
Does not require a separate
compilation phase
Commonly used in languages
like C, C++
Commonly used in languages
like Python, JavaScript
Q21: What are the four type of internet abuse?
Ans:The four types of internet abuse are:
1. Cyberbullying: The act of using the internet to harass,
intimidate, or harm others, typically through malicious
messages, rumors, or threats.
2. Online scams and fraud: Deceptive practices aimed at tricking
individuals into providing personal information or money, such
as phishing scams, fake online auctions, or identity theft.
3. Online harassment: Persistent and unwanted behavior online
that causes distress or harm, including stalking, hate speech,
or sharing private information without consent.
4. Cyberstalking: The use of the internet to track, monitor, or
harass someone, often involving excessive online surveillance,
unwanted messages, or threats of physical harm.
Q22: Define the term software piracy?
Ans: Software piracy is the unauthorized copying of computer
software. It's illegal to make and use unauthorized copies. Software
developers invest time and resources in creating software, and
piracy undermines their rights and ability to continue producing
quality products. Respecting software licenses and avoiding piracy
supports the developers and encourages the creation of innovative
software.
Q23: What is computer bus?
Ans: A computer bus is a pathway or communication system that
allows different components of a computer to exchange data and
information. It's like a highway that connects the processor,
memory, storage, and input/output devices. The bus carries signals
and data between these components, enabling them to work
together and transfer information. It ensures smooth
communication and coordination within the computer system,
allowing different parts to interact and share data efficiently.
Q24: What are the components of LAN?
Ans:A Local Area Network (LAN) consists of several
components that work together to enable network
communication within a limited area, such as an office building
or a home. These components include:
1. Computers/Workstations: These are the devices used by
individuals to perform tasks and access network resources
within the LAN.
2. Network Interface Cards (NIC): These cards are installed in
computers and provide the physical connection to the LAN,
allowing communication between the computer and the
network.
3. Switches: These devices connect multiple devices within the
LAN, such as computers and printers, enabling them to share
data and communicate with each other.
4. Routers: Routers are responsible for connecting the LAN to
other networks, such as the internet, and managing the flow of
data between them.
5. Bridges: Bridges connect different segments of the LAN,
allowing communication between them.
6. Repeaters: Repeaters amplify and boost signals to extend the
distance that data can travel within the LAN.
7. File Servers: These servers store and manage shared files and
resources that can be accessed by users within the LAN.
Q25: Define impact printer and non impact printer?
Ans:An impact printer is a type of printer that uses a physical
mechanism, typically a print head with pins or hammers, to strike an
ink ribbon and transfer ink onto the paper. This physical impact
creates visible marks on the paper, resulting in the printing of
characters or images. Dot matrix printers are examples of impact
printers.
On the other hand, a non-impact printer is a type of printer that
does not involve any physical impact between the printing
mechanism and the paper. Instead, it uses technologies like inkjet,
laser, or thermal to create images or text on the paper. These
printers are generally quieter, faster, and produce higher quality
prints compared to impact printers. Inkjet printers and laser
printers are common examples of non-impact printers.
Q26: Define bandwidth with an example?
Ans:Bandwidth refers to the capacity or speed at which data can be
transmitted over a network or communication channel. It
represents the maximum amount of data that can be transferred
within a given time period. It is typically measured in bits per
second (bps).
For example, imagine you have an internet connection with a
bandwidth of 100 Mbps (megabits per second). This means that the
maximum amount of data that can be transmitted in one second is
100 million bits. With higher bandwidth, more data can be
transferred quickly, resulting in faster internet speeds and smoother
data transmission. It's like having a wider highway where more cars
can pass through simultaneously, allowing for faster traffic flow.
Download