BCS-011(MS Word Format) Available.

advertisement
PIXELES CLASSES
BCA & MCA (IGNOU)
Course Code
Course Title
: BCS-011
: Computer Basics and PC Software
Assignment Number
: BCA (I)/011/Assignment/ 2015
15 October, 2015 (For July 2015 Session) April, 2016 (For January 2016 Session)
1. (Covers Block 1)
PIXELES Classes
(7×4=28 Marks)
(a) What are the functions of various operational units of a computer system? What is
Page | 1
von Neumann Architecture? How can you relate von Neumann architecture to an actual
computer? Explain with the help of an example configuration. (4 Marks)
Ans:
“A computer is an electronic device that accepts data, processes it and returns processed
information (Result)”. It works on the principle of input, process and output.
Input
Process
Output
Main Functional Unit:
CPU: - it is the brain of any computer system. It is just like brain that takes all major
decisions, makes all sorts of calculations, functions and controlling the operations.

The Arithmetic Logical Unit: - it is an important component of the CPU, which carry
the actual execution of the instructions.

The control unit: it determines the sequence in which computer programs and
instructions are executed. It acts like the supervisor seeing that things are done in
proper fashion

A von Neumann machine has single path between the main memory and control unit.
This feature is known as bottleneck.
Structure of von-Neumann computer machine & Function
John Von Neumann architecture a design model for the modern computers, which has central
processing unit (CPU), and the concept of memory used for storing both data and instructions.
All computers have memory, an I/O system, arithmetic logic unit (ALU) and control unit (CU).
(Structure of Von-Neumann Machine)
Features of von-Neumann
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)

CPU consists of ALU and CU.

Program and data are stored in the same memory unit.

A von Neumann machine has unique memory address of each location.

A von Neumann machine has only a single path between main memory and control unit
this feature is called bottleneck.

Serial processing system

Input /output system

Main memory system
Page | 2
(b) Compare and contrast the characteristics and/or organisation of the following:
(i) DRAM Vs. SRAM
Ans: Static RAM (or SRAM)

Static RAMs retain stored information for long time as the power supply is on.

Static RAMs are costly and consume more power. Static RAMs have a higher speed
than dynamic RAMs.

Static Ram is faster and so is used in cache memory.

SRAM does not need to be refreshed.
Dynamic RAM (or DRAM)

PIXELES Classes
Dynamic RAM loses its stored information in a very short time even the power supply is
on.

Dynamic RAMs are cheaper and consume less power

Dynamic RAM is cheaper and so is used for main memory.

Dynamic RAM requires the data to be refreshed periodically.
(ii) Access time on Magnetic disks Vs. access time on Magnetic tapes
Ans:
Magnetic disks:-It provides random access. This means that a file can be accessed from any
location directly. The total access time for a disk is equal to the seek time plus the latency time.
The average access time for most disk systems is usually between 10 to 100 milliseconds.
Magnetic tapes: - A file or some particular information stored on a magnetic tape cannot be
accessed directly on random basis as is possible in the case of hard-disks or floppy disks.
These devices are slower, but due to their low cost, they are still widely used for massive data
warehouse and other business storage requirements.
(iii) Pen Drive Vs. CD-RW
Ans:-
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
Pen Drive is available as a very convenient and flexible data storage medium which
can store up to 256 GB data. It can be used for the same purposes as floppy-disks or CDROMs. Pen Drives are a smaller, faster, durable and more reliable storage medium.
CD-R (compact-disk recordable) is another optical disk technology. The user can record (write) PIXELES Classes
their own data once on a CD with a CD-R disk drive unit. After this recording user can read the Page | 3
data as many times as desired.
(iv) ROM Vs. PROM (4 Marks)
Ans:
ROM: it is read only semiconductor memory. It is designed for the purpose for reading only. It is
non-volatile; means it does not lose their contents on power failure. It is written only once at the
time of manufacture. It is used by system program only. There are various varieties of ROM:PROM: it stands for programmable ROM. it is also non-volatile. It is written (programmed) only
once by special writing device.

It is possible for a user to customize a system by storing own program in a PROM chip.

Once a program has been written on to a PROM chip, the recorded information cannot
be changed i.e., the PROM becomes a ROM and it is only possible to read the stored
information.

PROM is also a non-volatile memory. It stored information remains even if power is
switched off.

The basic difference between PROM and a ROM is that a PROM is manufactured as
blank memory, whereas a ROM is programmed during the manufacturing process.
(c) Convert the following numbers as stated
(i) Decimal 79.005125 to binary
(ii) Decimal 3267 to hexadecimal
(iii) Character A and z to ASCII and Unicode Hexadecimal FA6B to binary
(4 Marks)
(d) What is an instruction? What are its components? What is the role of an instruction
in a computer? Explain with the help of an example. Where does the instruction reside at
the time of execution? (4 Marks)
Ans:
An instruction specifies the operation performed by CPU. An instruction tells the processor what
task is to be performed and what micro operations need to be completed to perform the task.
Every instruction is comprised of two parts: opcode and operands.

The opcode specifies the operation to be performed
www.pixelesindia.com
PIXELES CLASSES

BCA & MCA (IGNOU)
Operands provide the data on which the operation is to be performed.
Example
PIXELES Classes
Page | 4
Instructions are stored in CPU register during operation.
(e) A 2.5 inch diameter disk has 8 platters with each platter having two data recording
surfaces, each platter on disk has 4084 tracks, each track has 400 sectors and one
sector can store 1 MB of data. Calculate the storage capacity of this disk in Bytes. If this
disk has a seek time of 2 milli-seconds and rotates at the speed of 6000 rpm, find the
Access time for the disk. Make suitable assumptions, if any.(4 Marks).
Ans:
Surface m=8X2=16
Track (t)=4048
Sector per track (p)=400
Byte per sector (s)=1MB X 1024 X 102 bytes
Capacity =mtps
=16 X 4048 X 400 X 1MB X 1024 X 1024 bytes
Access time= seesk time + latency time
Latency time = (1/(RPM/60))*0.5
=(1/(6000/60))*0.5
=(1/100)*0.5*1000 ms
=5ms
Access time =2ms +5ms=7ms
(f) What are the uses of various components of motherboard of a computer? List at least
four output devices and ports to which these devices can be connected. Explain the
characteristics of these output devices and ports.(4 Marks)
Ans:
Motherboard holds some of the most important components of the computer system. It acts as
a base for these components. It is also known as system board, main board etc. In a typical
computer microprocessor, main memory and other components are connected to the
motherboard. Motherboard also provides connectors for several other devices.
www.pixelesindia.com
PIXELES CLASSES

BCA & MCA (IGNOU)
ATX Power Connector: Advanced Technology Extended (ATX) power connector is
used to connect computer’s power supply to motherboard.

AGP Slot: Accelerated Graphics Ports (AGP) is a point-to point channel which is
used to attach a video card to a motherboard.

CD-in header: At this CD drive is plugged in or connected. FDD Header: Floppy Disk
PIXELES Classes
Drive (FDD) header is used for Floppy drive. Now this slot is obsolete because floppy
Page | 5
disks are outdated.

HDD Headers: Hard Disk Drive header is used for connecting to hard disk.

PCI Slots: It is used for connecting the PCI (Peripheral component interconnect)
card.

USB Headers: It is a group of pins to which an internal USB cable can be attached to
provide extra USB ports. These ports are used for attaching external/auxiliary devices
such as pen drive, printer etc.
4
(g) What are the uses of following Software?
(i) Data compression utility:- - Data compression is the process in which information is
encoded with lesser bits in compare to the original representation. Data compression is very
useful, as it reduces the size of the file so it consumes fewer resources like disk space.
(ii) Media Player: - It is one of the other common examples of application software. It is an
application which is used to play multimedia files. Most of the media players can play both audio
and video files.
(iii) Disk Defragmenter:- it is used to rearrange the files and unused space on the hard disks
that program run faster.
(iv) Disk checker:- Disk Checkers are used to check the integrity of the hard disk and Pen
Drive/ Flash Drive. CHKDSK is a command which is used for this purpose. This command
can be used on a computer running Windows operating system. It fixes the logical file system
errors found in the disk/drive.
(4 Marks)
2. (Covers Block 2)
(7×4=28 Marks)
(a) Why do you need virus detection software? What are their drawbacks? What are the
techniques to identify a virus? Explain the importance of backup for a computer system.
(4 Marks)
Ans:
Computer viruses are software programs that are deliberately designed to interfere with
computer operation; record, corrupt, or delete data; or spread themselves to other computers
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
and throughout the Internet. Virus Scanning Software is utility programs designed to protect
your computer from computer viruses, worms and Trojan horses.

Antivirus software can impair a computer’s performance. Active anti-virus programs can
cause conflicts with other programs.

Most popular anti-virus programs are not very effective against new viruses.
PIXELES Classes

Slow down the system.
Page | 6
Techniques

Signature based detection: This is the most common method. It compares the
contents of the infected file to a known pattern of data. Because viruses can embed
themselves in existing files, the entire file is searched.

Heuristic-based detection: This method is primarily used to identify unknown
viruses by looking for malicious code or variations of such code.

File emulation: This is another heuristic approach in which the infected program
is run in a virtual environment and the actions it performs are recorded. The
actions are analyzed to check for any malicious actions and carry out disinfection
actions accordingly.
Backup
Backup refers to making copies of data so that these additional copies may be used to
restore the original after a data loss event. All types of data could be backed up like
pictures, word documents, files, executables or an entire database. The main purpose is to
recover data in the event of data loss or data getting corrupt. Other purpose could be to
recover historical data.
(b) Consider that you have to run several computer programs simultaneously on a
computer. Each program takes input from a file and output information on a printer. How
does different components of an Operating system (like memory management, I/O
management, Process management, file system and user interface) will help in execution
of these programs.
(4 Marks)
Ans:
Process Management.
A process is a program under the execution. It is the job, which is currently being executed by
processor (CPU). OS manages process of jobs.
Memory Management
OS take-cares of memory allocation and de-allocation of main memory to various processes. It
allocates the memory space in main memory and secondary memory to store the system
program, user program and data.
Input Output Management
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
OS co-ordinates the various input and output devices such as terminals, printers, disk drives,
tape drives. It controls I/O Devices.
File management
As we know, data are stored in a file and files are stored in a device. All operation related to file
are managed by operating system such as data storage, data retrieval, updatation, deletion andPIXELES Classes
Page | 7
other activities.
Scheduling Management
Operating system establishes process priority for the task execution.
Security Management
Operating system provides data security and data integrity. That is, it protects data and
programs stored in computer from unauthorized access.
(c)
Explain the differences between procedural programming and object oriented
programming with the help of one example program of each.(4 Marks)
Ans:
OO programming
 Modular Design: - OOP provides modular approach to design a program that can be
compiled separated and run together in a software, it increase the productivity of
programmers.
 Simple interface: it provides simple and easily understandable interface design of programs.
 Flexible: Software built on objects oriented programming can be flexible in adapting to
different situations because interaction between objects does not affect the internal working
of objects.
 Reusable: OOP provides facility to reuse of code using inheritance.
 Maintainable: Objects are separate entities, which can be maintained separately allowing
fixing of bugs or any other change easily.
Procedure programming

It is based on the principle of building a program from logical structures.

It provides divide and conquer method to reduce complexity.

It provides clear flow of control.

Modules can be reused.

Easy to learn.

It doesn’t provide information hiding.

If any changes made in a program may reflect other part of program.
(d) Draw a flow chart of a program that adds N odd numbers starting from 1. The value
of N should be input by the user.(4 Marks)
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
Ans:-
We are teaching IGNOU’s BCA & MCA
Students
Why join us?
 Regular Classes
PIXELES Classes
Page | 8
 BCA & MCA IGNOU Special Institute
 Free Trial Classes
 Subjective Knowledge
 Free PIXELES Guide Books (Prepared
by our teachers)
 Free Solved Assignments
 Experienced Faculties
 100% Results
 Home Test Series
 Class Test Series
 We teach you until you pass
 Final Year Synopsis & Project
 Proper Guidance
(e) List the elements of a programming language. Explain the terms data type,
expression, assignment; and logical, relational and equality operators with the help of an
example each.
(4 Marks)
Data Types
Here you are going to explain basic data type:Char
It stores a single character by default and reserved 1 byte memory space. For Example Ch=’S’,
here ch is a variable name that is holding a character ‘s’. Single character quoted by single
quote and more than one character quoted by inverted commas like “pixeles” that is called
string. Store more than one character you need to declare size as flows.
Char s [10]
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
Now you can input more than one character, upto 10 characters including NULL into the
variable s.
Character constant declares as
const char emp=‘t’
PIXELES Classes
Integer
This is the numeric data type that accepts number without fraction ranges between –32768 toPage | 9
32767 to be stored. It occupied 2 bytes memory space.
For example:int x=234, y=567;
Constant integer declared as const int x=56;
Float
It is also numeric data type. It can store floating-point values; a number has a precision of only 6
digits. Float variable allocates 4 bytes of memory space.
For Example- float x=34.878677
Double
It is also numeric data type. It can store double floating-point values these number have a
precision of 16 to 18 digits. Double variable allocates 8 bytes of memory space.
double x=134.4500000000000000
Float and double constant
const float pie=3.142857
Expression: Collection of operators and operands is known as expression. For example:
2+5*(6+4)
Logical operator:
it is used to evaluate conditional expression. There are four types of it-.
AND – evaluates true if both condition are true otherwise false.
OR - evaluates true if any condition is true otherwise false.
NOT – Evaluates true if condition is false.
XOR - evaluates true if one condition is true and other is false.
For example:
10>5 AND 7<9 =‘true’
10>5 OR 12<9 = ‘true’
NOT(10>5) = ‘false’
10>5 XOR 37<9 =‘true’
Arithmetical Operators:-
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
This operator performs an arithmetic (numeric) operation such as +,-,*, / or % is called
arithmetic operator. It requires two or more operands. So these operators are called binary
operators.
Operator
Meaning
Example
Answer
+
Addition
6+3
9
PIXELES Classes
-
Subtraction
6-3
3
Page | 10
*
Multiplication
6*3
18
/
Division
6/3
2
%
Modulo
5%2
1
Relational Operators:- This operator is used to check the relation between two values .All
relational operators are binary operators and it require two operands. When relation is false
then it returns zero otherwise non zero.
Operator
Meaning
Example
==
Equal to
3==3
!=
Not equal to
3!=5
>
Greater than
4>2
<
Less than
3<5
>=
Greater than equal to
4>=4
<=
Less than Equal to
7<=7
(f) What are the phases of project development in which project management software
can help. Explain with the help of examples.
(4 Marks)
Ans:Typical development phases of a project are:
o
Project initiation stage
o
Project planning or design stage
o
Project implementation stage
o
Project monitoring and controlling systems
o
Project completion stage.
Software project management is used to maintain following things in Software project:
Scheduling

Calculating critical path

Providing information

Timesheet Management
Example
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
Microsoft Office Project
One of the most widely used software for Project Management used all over the world is MS
Project. It is used for planning, managing and organizing resources for all kinds of projects. It
uses a powerful scheduling engine to help align different projects and tasks with available
PIXELES Classes
resources.
Page | 11
(g) Explain the following with the help of an example/diagram, if needed:
(i) Development Model for Open Source Software
Ans:The Open
source
development model is a collaborative model. It anticipates the
participation of many developers in the development of a single product or
module. Example: The most popular open source utility used by the gatekeeper is
the Concurrent Versioning System (CVS), which is licensed under GPL.
(ii) Tools for program development
Ans:- A programming tool or software development tool is a program or application that
software developers use to create, debug, maintain, or otherwise support other
programs and applications. The most basic tools are a source code editor and a
compiler or interpreter, which are used ubiquitously and continuously.
iii) Use of functions and Macros
Ans:
Excel has builtin functions like IF, AND, OR, SUM which you use in your worksheet.
Functions can invoke other functions to return a value.
A stored series of commands and functions that can be run to perform a specific task or
tasks. In Excel a macro could be a complete program. Macros may be run from a
toolbar button, or menu, from a shape in the workbook, or from another macro.
(iv) Database and Database Management system (4 Marks)
Ans:Database is used to organize information into data in the form of tables. For
example, a table with student’s data. Different tables are joined together on the basis of
relationships.
Database management is software that is used to manage database. It allows creating,
updating, selecting and deleting operation on database.
3. (Covers Block 3)
(6×4=24 Marks)
(a) Explain the characteristics of any two guided and any two unguided channels for
data transmission. (4 Marks)
Ans:
Guided media
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
Twisted pair cable. - It consists of two insulated copper wires, typically about 1mm thick. It is
generally used in local telephone communication. It is also used for digital data communication
over the short distance upto 1 km. unshielded twisted pairs are used to connect computing
devices. Data transferred rates are usually 1-2 megabytes per second.

It is easily available.
PIXELES Classes

Low cost
Page | 12

Used for analog and digital data transmission

Easily breakable

Easily picks the noise
Co- axial cable: - it consists of a stiff copper wire as the core, surrounded by an insulating
material. The insulator is encased by a mesh conductor. The outer mesh conductor is covered
by the plastic. The signal is transmitted through the inner copper wire(copper core).

It is used for digital and analog transmission

It is used for longer distance

Higher data transfer rate (100 mbps)

Difficult to connect to network device

It requires connector.
Radio Waves
Electromagnetic waves ranging in frequencies between 3 Kilo-Hertz and 1 Giga-Hertz are
normally called radio waves. Radio waves are easy to generate and can travel long distances
and can penetrate buildings easily, therefore widely used for communication.
Microwaves
Electromagnetic waves ranging from 1 to 300 Gigahertz are called microwaves. Microwaves are
unidirectional that is the sending and receiving antennas need to be aligned.
(b) Four branch offices of an organisation are located in four major cities of a vast
country. Explain the characteristics of the network that will be needed for every branch
office. The entire four branch offices network should also be connected by another
network. Explain the characteristics of this network also.
(4 Marks)
Ans:
LAN is used for every office branch.
Characteristics

All connected devices share the transmission media

Small area covered.

Data transfer rate are high

Low cost of setting.
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)

Shared the hardware resources

Each device can work standalone or in network
WAN: - As per question four cities in vast country, so, we can assume distance exist among the
cities is more than 50 km. Thus Wan is more suitable for that.
PIXELES Classes
Characteristics

It generally covers large distances (states, countries, continents).

Communication medium used are satellite, public telephone networks that are
Page | 13
connected by routers.

Routers forward packets from one to another on a route from the sender to the receiver.
(c) What is Internet? What are the major protocols used on Internet? What is an IP
address? How can an IP address be related to a web address? Explain with the help of
an example.(4 Marks)
Ans:
Internet is a big network of networks. Some common Protocols used in internet are:
Telnet, FTP, SMTP,RTP

TCP, UDP

IP, ICMP, IGMP
IPv4 address is a series of four numbers separated by dots (.). The four numbers ranges
between 0 and 255. So IPv4 address takes only 4-bytes (or 32-bits) of computer memory.
Example: IP address: 152.108.10.7
Each 32 bit IP address consists of two components:
Network Identifier (Net ID) – which identifies one of the Networks that is a part of
Internet.

Device Identifier (Device ID) – which identifies a specific device within the identified
Net-ID.
How IP address works with web address.

Suppose we want to open www.pixelesindia.com.

The Web browser tries to resolve the IP address of the website www.pixelesindia.com
by the information available in its own cache memory. If web server does not have the
information about IP address stored in its cache, it requests the IP address from Domain
Name System (DNS) servers. The DNS server tells the browser about the IP address of
the website.

Once the web browser knows the IP address of the website, it then requests the web
page (index.html) from the web server.
www.pixelesindia.com
PIXELES CLASSES

BCA & MCA (IGNOU)
The web server responds by sending back the requested web page. If the requested
page does not exist then it will send back the appropriate error message.

web browser receives the page from the web server and displays it as per the display
requirements of the web page.
(d) What are the different features of a browser? If you want to perform Net banking
PIXELES Classes
what precautions will you take before performing a transaction?
Page | 14
Ans:
Features of browser:

Address bar

Navigation button

Stop Button

Tabbed browsing

Bookmark button

Integrated Search
Net banking what precautions

Use a personal firewall and anti-virus software.

Automatic termination of your connection.

Use a personal firewall and anti-virus software.

Avoid clicking through emails.

Access your accounts from a secure location.

Always log out when you are done.

Keep your operating system and browser up-to-date with the latest security patches.
Install these only from a trusted web site.
(e) Describe the process of creating a web email account. What are the different
components of a mail message? Explain with the help of a diagram. (4 Marks)
Ans: Do yourself.
(f) Explain the following in the context of Internet and its applications, giving their
features and uses:
(i) Wiki
Ans:
Wiki’s are a powerful tool for creating collaborative knowledge resources created by the
community. A wiki is a page or collection of Web pages designed to create and edit contents.
Wiki supports hyperlinks and has simple text syntax for creating new pages. Wiki’s are also
used to create websites, to enhance the features of community websites and for knowledge
management.
(ii) Collaboration
www.pixelesindia.com
PIXELES CLASSES
BCA & MCA (IGNOU)
Ans:Collaboration is defined as an act or process of working together on a project or some
intellectual activity. Each collaborative project has several social, political, ethical and technical
issues that are to be addresses at the start of the project itself. Collaboration involves both
communication and sharing of ideas. Modern day science, to certain extent, has becomePIXELES Classes
collaborative. Today, you may find a number of research papers co-authored by many peoplePage | 15
staying at geographically diverse places.
Branches & Contacts Details
Uttam Nagar:-WZ-B7, Old Pankha Road (Opp.
Primary School), Near East Metro Station,
Uttam Nagar, New Delhi-59
Nangloi:-Plot. No-19, Ext- 2A, oppBankeBihari, Talabwali Road, Nangloi, Delhi-41
Ph: 9213327975, 9716339580
8750321695
pixeles@rediffmail.com, web: www.pixelesindia.com
Disclaimer: Prepared by our Students. Institution and publisher
are neither responsible for the result of the any action taken on the
basis of this work or any omissions or errors.
www.pixelesindia.com
Download