BCA CFA Question Paper Solution 2018 , 2019 - 1st Semester
BCA CFA Question Paper Solution 2018 - 1st Semester
Group - A
1. Circle (O) the correct answer in the following questions:
i. Which one of the following is not a characteristic of a Computer?
a) Diligence
b) Versatility
c) Intelligence
d) Reliability
ii. Which one of the following is the utility software?
a) Skype
b) Windows Defender
c) MS-Paint
d) Adobe Photoshop
iii. Which one of the following is not a type of Operating System?
a) Hierarchical
b) Network
c) Batch
d) Multiprogramming
iv. Which one of the following is not an attribute of information?
a) Accuracy
b) Relevancy
c) Timeliness
d) Redundancy
v. Which one of the following does not belong to the OSI reference model?
a) Network Administrator
b) Internet Protocol (IP)
c) Data link Layer
d) Data Presentation
vi. Who invented WWW?
a) Sundar Pichai
b) Tim Berners-Lee
c) Bill Gates
d) Steve Jobs
vii. Which one of the following is a cryptocurrency?
a) Payment Gateway
b) PayPal
c) Dollar
d) Bit coin
viii. Which one of the following belongs to LMS (Learning Management System)?
a) e-Commerce
b) e-Governance
c) e-Banking
d) e-Learning
ix. Which one of the following is a characteristic of DOS (Disk Operating System)?
a) 32-bit Operating System
b) 16-bit operating System
c) Server Operating System
d) WIMP
x. Which one of the following is not a graphical File Format?
a) PNG
b) BMP
c) TIFF
d) PPT
2. What do you mean by Computer Architecture? Describe the functional components of computer architecture with block diagram.
Computer Architecture refers to the science and art of selecting and interconnecting hardware components to create computers that meet functional, performance, and cost goals. It encompasses software standards, hardware instructions, and technology infrastructure that define how computer systems, platforms, and programs operate. In essence, it outlines a system's design, functionality, and compatibility, considering user needs, technology limitations, and process requirements.
What do you mean by Computer Architecture? Describe the functional components of computer architecture with block diagram.
Input Unit:
The input unit comprises input devices attached to the computer, such as the keyboard, mouse, and scanner. These devices interact with the computer system by converting data and instructions into a binary form acceptable by the computer. The input unit performs the following functions:
1. Accepts data and instructions from the outside world.
2. Converts data and instructions into a binary form understandable by the computer.
3. Supplies the converted data and instructions to the computer system for further processing.
Memory Unit:
Also known as the storage unit, it stores data and instructions entered through the input devices before processing begins. It also holds intermediate and final processing results. The storage unit consists of two types of memory or storage: primary and secondary storage.
Primary Storage:
Main memory directly communicates with the CPU and temporarily stores data and instructions. It primarily holds data, instructions, and intermediate processing results. Primary memory is volatile, meaning it loses its content when the power supply is off. Random access memory (RAM) is an example of primary/main memory.
Secondary Storage:
Auxiliary or secondary storage supplements main memory and is non-volatile. It is used for transferring data between computers, storing data and programs permanently, and creating backups. Examples include magnetic disks and optical disks.
Central Processing Unit (CPU):
The CPU interprets and executes commands from computer hardware and software and controls the operation of other components. It accepts binary data as input, processes it according to instructions, and provides the output. The CPU's functions include:
1. Reading instructions from memory.
2. Communicating with peripherals using the system bus.
3. Controlling the sequence of instructions and data flow.
4. Performing computing tasks specified in the program.
Control Unit:
The control unit provides timing and control signals to all computer operations. It controls data flow between the CPU, memory, and peripherals, as well as the entire operation of the computer. Its main functions are:
1. Performing data processing operations with user-prepared programs.
2. Issuing commands to transfer data between input devices, memory, and arithmetic logic units (ALU).
3. Storing and fetching programs from memory.
Arithmetic Logic Unit (ALU):
The ALU is part of the CPU where various computing functions are performed on data. It handles arithmetic operations (addition, subtraction, multiplication, division) and logical operations (AND, OR, Exclusive OR). The ALU's functions include:
1. Accepting operands from registers.
2. Performing arithmetic and logical operations.
3. Returning results to registers or memory.
Output Unit:
Comprising output devices such as monitors, printers, and speakers, the output unit presents computer-generated results to users in human-readable form. It converts electric signals into human-readable formats. The main functions of the output unit are:
1. Accepting computer-generated results in electric binary signals.
2. Converting results into human-readable form.
3. Supplying converted results to the outside world.
3. Define Operating System. Explain the types of operating system with their examples.
An Operating System (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. It performs basic tasks like managing files, processes, and memory, acting as an interface between users and machines.
Define Operating System. Explain the types of operating system with their examples
Here's a breakdown of different types of operating systems:
a. Batch Operating System:
Batch Operating System
- This type of OS doesn't interact directly with the computer. Instead, an operator groups similar jobs with the same requirements into batches.
- Examples: Payroll Systems, Bank Statements.
- Advantages:
- Difficult to estimate the time required for jobs to complete.
- Multiple users can share batch systems.
- Low idle time.
- Suitable for managing large workloads.
- Disadvantages:
- Requires knowledgeable operators.
- Debugging can be challenging.
- Can be costly.
- Other jobs may have to wait if one job fails.
b. Time-Sharing Operating Systems:
- Also known as multitasking OS, it allows many users to use a computer system simultaneously by sharing processor time.
- Users receive immediate responses, and CPU switches between tasks frequently.
- Example: Transaction processing systems.
c. Distributed Operating System:
- Uses multiple central processors to serve real-time applications and users.
- Jobs are distributed among processors, which communicate via communication lines.
- Processors vary in size and function.
- Example: Various server systems.
d. Network Operating System:
- Runs on a server and manages data, users, groups, security, applications, and networking functions.
- Allows shared file and printer access among multiple computers in a network.
- Examples: Microsoft Windows Server, UNIX, Linux, Mac OS X, Novell NetWare, BSD.
e. Real-Time Operating System (RTOS):
- Processes and responds to inputs within a small time interval, controlling the environment.
- Response time is crucial, making it suitable for time-sensitive applications like scientific experiments, medical imaging, industrial control systems, etc.
- Divided into:
- Hard Real-Time Systems: Guarantee critical tasks complete on time, with limited or no secondary storage.
- Soft Real-Time Systems: Less restrictive, allowing critical tasks to prioritize over others until completion.
Each type of operating system serves specific purposes and caters to different computing needs, from batch processing to real-time control systems.
4. Define DBMS. Explain the different database models with their merits and demerits.
A Database Management System (DBMS) is system software for creating and managing databases. It allows users and programmers to systematically create, retrieve, update, and manage data. The DBMS acts as an interface between the database and end-users or application programs, ensuring consistent organization and accessibility of data. It manages data, the database engine for accessing, locking, and modifying data, and the database schema defining the database's logical structure, facilitating concurrency, security, data integrity, and uniform administration procedures.
There are different types of database models, each with its own merits and demerits:
a. Hierarchical Database Model:
Hierarchical Database Model
- Organizes data in a tree structure with each child node having one parent node.
- Advantages:
- Various structures/forms.
- Simplifies data overview.
- Manages large data.
- Expresses relationships between information.
- Disadvantages:
- One parent per child.
- Complex navigation.
- Lack of structural independence.
b. Network Database Model:
Network Database Model
- Provides multiple paths among segments, allowing one-to-one, one-to-many, and many-to-many relationships.
- Advantages:
- Conceptual simplicity.
- Handles various relationship types.
- Ease of data access.
- Data integrity.
- Disadvantages:
- System complexity.
- Operational anomalies.
- Absence of structural independence.
c. Relational Database Model:
Relational Database Model
- Represents data in simple two-dimensional tables (relations).
- Advantages:
- Structured independence.
- No need for knowledge of physical representation.
- Use of SQL.
- Easier database design.
- Disadvantages:
- Data anomalies.
- Requires training.
d. Entity-Relationship Data Model:
Entity-Relationship Data Model
- Graphical representation depicting relationships among people, objects, places, concepts, or events within a system.
- Advantages:
- Important data modeling tool.
- Allows more details with extended ERD.
- Organizes data into categories.
- Visual representation.
- Disadvantages:
- Limited relationship representation.
- Loss of information.
- No data manipulation language.
e. Object-Oriented Database Model:
Object-Oriented Database Model
- Stores and maintains objects, supporting distribution across servers.
- Advantages:
- Adds semantic content.
- Database integrity.
- Structural and data independence.
- Disadvantages:
- Lack of standards.
- Complex navigational data access.
- Steep learning curve.
- High system overhead.
5. Define Computer Network. Explain the different types LAN topologies with their advantages and disadvantages.
Computer Network:
A computer network is a set of connected computers, or nodes, allowing them to share resources like Internet access, printers, file servers, and more. Networks enable file, hardware, and application sharing, user communication, network gaming, and Voice over IP (VoIP).
Network Topology:
Network topology refers to the physical layout of computers, cables, and components on a network. Generally, there are six types:
a. Bus Topology:
Bus Topology
- Every computer and network device connects to a single cable.
- Linear Bus topology has exactly two endpoints.
- Merits:
- Cost-effective.
- Requires minimal cable.
- Easy to understand and expand.
- Demerits:
- Whole network fails if cable fails.
- Performance decreases with heavy traffic or more nodes.
- Limited cable length.
b. Ring Topology:
Ring Topology
- Devices form a ring structure, passing data uni-directionally.
- Merits:
- Requires small cable segments.
- High transmission speeds possible.
- Demerits:
- Troubleshooting is difficult.
- Adding/deleting computers disturbs network activity.
- Failure of one computer affects the whole network.
c. Star Topology:
Star Topology
- All computers connect to a central hub.
- Each node has a dedicated connection to the hub.
- Merits:
- Fast performance with few nodes.
- Easy to troubleshoot and modify.
- Demerits:
- Cost of installation is high.
- Network halts if hub fails.
d. Mesh Topology:
Mesh Topology
- Hosts connect to one or multiple hosts.
- Full Mesh: All hosts have point-to-point connections.
- Partially Mesh: Hosts connect arbitrarily.
- Merits:
- Each connection carries its own data load.
- Robust and easily diagnosable.
- Demerits:
- Difficult installation and configuration.
- High cabling cost.
e. Tree Topology:
Tree Topology
- Star networks connect to a linear bus backbone.
- Incorporates features of both star and bus topologies.
- Merits:
- Extension and expansion possible.
- Easily managed and error detection.
- Demerits:
- Heavily cabled and costly.
- Maintenance becomes difficult with more nodes.
f. Hybrid Topology:
Hybrid Topology
- Integration of two or more different topologies.
- Inherits merits and demerits of incorporated topologies.
- Merits:
- Reliable and scalable.
- Effective and flexible.
- Demerits:
- Complex in design and costly.
6. What is WWW? Differentiate between intranet, extranet and internet.
World Wide Web (WWW):
The World Wide Web is a network of online content formatted in HTML and accessed via HTTP. It consists of interlinked HTML pages accessible over the Internet. Here are its key features:
a. It's a global system of interconnected computer networks.
b. Content is accessible to anyone connected to the Internet.
c. It has the largest number of connected devices globally.
d. It is not regulated by any single authority.
Intranet:
An intranet is a private network confined within an organization, used to share company information and resources among employees. Here are its distinguishing features:
a. It's specific to an organization and is a private network.
b. Content is accessible only to members of the organization.
c. It is owned and regulated by the organization.
d. It usually has fewer connected devices compared to the Internet.
Extranet:
An extranet is a network within an organization that uses the Internet to connect with external parties like customers and suppliers. Here are its key aspects:
a. It's a private network but uses the public Internet to connect with external parties.
b. Content is accessible to both organization members and authorized external parties.
c. It is owned by the organization but involves collaboration with external entities.
d. It is regulated by multiple organizations involved in the collaboration.
Internet:
The Internet is a global computer network providing various information and communication facilities. It carries a vast range of resources and services, including the World Wide Web, email, telephony, and file sharing. Here are its defining characteristics:
a. It's a global system of interconnected computer networks.
b. Content is accessible to anyone connected to the Internet.
c. It has the largest number of connected devices globally.
d. It is not owned or regulated by any single entity.
These distinctions highlight the different scopes, access permissions, ownership, and regulations associated with the WWW, intranet, extranet, and the Internet.
What is WWW? Differentiate between intranet, extranet and internet
7.What is e-Commerce? Explain its role to enhance the country's economy.
E-commerce, short for electronic commerce, refers to the buying and selling of goods and services over electronic networks such as the Internet. It encompasses various online transactions conducted by businesses and consumers. Here's how different e-commerce examples function:
a. Online Shopping:
- Customers purchase products or services through digital platforms like Amazon.
- Example: Buying books, electronics, or clothing from online retailers.
b. Internet Banking:
- Banks offer services through their websites, allowing customers to perform transactions online.
- Example: Transferring money, applying for overdraft facilities, and paying off credit cards online.
c. Electronic Payments:
- Companies provide online payment services for digital transactions.
- Example: PayPal facilitates online money transfers, serving as an electronic alternative to traditional payment methods like money orders and checks.
d. Online Auctions:
- Individuals place bids and acquire products at competitive prices through online platforms.
- Example: Participating in auctions on websites like eBay to purchase collectibles, antiques, or other items.
Now, let's discuss the role of e-commerce in enhancing a country's economy:
E-commerce plays a significant role in driving economic growth by leveraging technology and innovation to create new market opportunities and streamline business processes. Here's how e-commerce enhances a country's economy:
a. Access to New Market Segments:
- E-commerce enables businesses to reach a broader audience beyond their geographical boundaries.
- This access to new market segments increases sales potential and fosters economic growth.
b. Increased Business Speed and Flexibility:
- E-commerce allows businesses to operate with greater agility and responsiveness.
- Companies can adapt quickly to changing market conditions, trends, and consumer preferences, leading to improved efficiency and competitiveness.
c. Reduced Costs:
- E-commerce reduces the need for physical infrastructure, such as brick-and-mortar stores, thereby lowering operational costs.
- Businesses can also save on advertising, sales, and distribution expenses through digital marketing and online sales channels.
d. Simplified Procedures:
- E-commerce streamlines business processes, making transactions more efficient and less time-consuming.
- Customers benefit from simplified purchasing procedures, leading to increased convenience and satisfaction.
Overall, the emergence of e-commerce has revolutionized economic growth by harnessing the power of technology and connectivity to create new opportunities, drive innovation, and enhance productivity. As one of the most important developments since the industrial revolution, e-commerce continues to play a pivotal role in shaping the future of global economies.
8.Write DOS commands to complete the tasks:
a) Create subdirectories BCA, BIM, BSC inside d:\TU:
md d:\TU\BCA
md d:\TU\BIM
md d:\TU\BSC
b) Create the file named bcainfo.txt inside BCA with the content "BCA is a professional degree":
echo BCA is a professional degree > d:\TU\BCA\bcainfo.txt
c) Rename the file name beainfo.txt to myinfo.txt:
rename d:\TU\BCA\beainfo.txt myinfo.txt
d) Make the file myinfo.txt hidden:
attrib +h d:\TU\BCA\myinfo.txt
e) Format the pen drive installed as g:\ in your computer:
format g: /FS:NTFS
OR
diskpart
list disk
select disk <disk_number>
clean
create partition primary
format fs=ntfs
assign
Here are the DOS commands to complete the tasks:
a) Create subdirectories BCA, BIM, BSC inside d:\TU:
md d:\TU\BCA
md d:\TU\BIM
md d:\TU\BSC
b) Create the file named bcainfo.txt inside BCA with the content "BCA is a professional degree":
echo BCA is a professional degree > d:\TU\BCA\bcainfo.txt
c) Rename the file name beainfo.txt to myinfo.txt:
rename d:\TU\BCA\beainfo.txt myinfo.txt
d) Make the file myinfo.txt hidden:
attrib +h d:\TU\BCA\myinfo.txt
e) Format the pen drive installed as g:\ in your computer:
format g: /FS:NTFS
OR
diskpart
list disk
select disk <disk_number>
clean
create partition primary
format fs=ntfs
assign
Group - C
Attempt any TWO questions.
9. i) You are provided following data:
Churiya Mai Secondary School
Hetauda
Mark-ledger
Write the formula in spread sheet package to solve the following problems:
a. Calculate Total marks
=SUM(B2:F2)
b. Calculate Percentage
-G2/5
c. Mark the student with either "PASS" or "FAIL" [Pass mark 35]
=IF(AND(B2>=35, C2>=35,D2>=35,E2>=35,F2>=35), "Pass", "Fail")
d. Calculate the division [if percentage >=60 then First, if percentage >=45 and percentage < 60 then Second, if percentage >=35 and percentage <45 then Third otherwise "xxx"]
=IF(H2>=60, "First",IF(AND(H2<60,H2>=45), "Second",IF(AND(H2<45,H2 >=35), "Third","XXX")))
ii.Explain the features of the Font control dialog box in Microsoft Word.
The Font control dialog box in Microsoft Word provides various commands for formatting text, offering functionalities beyond what is available in the Font group on the Home tab. Here are some features of the Font dialog box:
a. Underline Styles: The dialog box allows users to choose from several types of underlining using the Underline Style drop-down list. This includes options for single, double, dotted, and dashed underlines, among others.
b. Text Effects: Users can add decorative effects to text, such as shadows, outlines, embossing, and engraving, through the Effects area of the dialog box. However, these effects are typically reserved for titles and headings rather than body text.
c. Preview Window: One of the most beneficial features of the Font dialog box is the Preview window located at the bottom. This window provides a real-time preview of how the selected font and formatting options will affect the text in the document. It allows users to see the changes before applying them, ensuring the desired appearance.
Overall, the Font control dialog box in Word enhances the user's ability to format text effectively by providing a wide range of options and a convenient preview feature.
10. i. What is memory hierarchy, and what are the different types of memory?
Memory hierarchy refers to the organization of computer storage into a hierarchy based on response time, with each level distinguished by its performance, capacity, and controlling technologies. As we move down the hierarchy, the capacity of storage increases while the cost per bit decreases, but the frequency of access by the CPU decreases and the access time increases. The main types of memory in the memory hierarchy are:
a. Internal Memory:
- Cache Memory: Cache memory is a high-speed semiconductor memory that acts as a buffer between the CPU and main memory, holding frequently used data and programs.
- Primary/Main Memory (RAM): RAM (Random Access Memory) is the internal memory of the CPU used for storing data, programs, and program results. It is volatile and provides fast access to data.
b. External Memory:
- Magnetic Disk / Optical Disk: These are examples of external storage devices that provide larger storage capacity but slower access compared to internal memory.
- Auxiliary Memory (Secondary Memory): Auxiliary memory, such as hard disk drives and solid-state drives, is larger in size but slower than main memory. It stores system programs, instructions, and data files, and can also be used as virtual memory.
What is memory hierarchy, and what are the different types of memory?
c. Types of Memory:
- RAM (Random Access Memory):
- Static RAM (SRAM): Retains its contents as long as power is applied and is faster but more expensive.
- Dynamic RAM (DRAM): Requires constant refreshing to maintain data and is cheaper but slower.
- ROM (Read Only Memory):
- MROM (Masked ROM): Contains pre-programmed data or instructions and is inexpensive.
- PROM (Programmable ROM): Can be modified once by a user using a PROM programmer.
- EPROM (Erasable and Programmable ROM): Can be erased by exposure to UV light and reprogrammed.
- EEPROM (Electrically Erasable and Programmable ROM): Can be electrically erased and reprogrammed multiple times.
Memory hierarchy and the different types of memory play crucial roles in computer architecture, affecting performance, capacity, and cost considerations in computing systems.
ii. What do you mean by presentation package? Write the basic elements of Power Point Window.
A presentation package, also known as presentation software, is a software tool used to create slideshows or presentations. It allows users to combine text, images, videos, and other multimedia elements to convey information to an audience. Presentation packages are commonly used in business meetings, educational settings, and public speaking engagements to visually communicate ideas.
Basic Elements of PowerPoint Window:
a. Title Bar: Located at the top of the PowerPoint window, it displays the name of the presentation and the name of the program (e.g., Microsoft PowerPoint).
b. Menu Bar: Contains menus such as File, Edit, View, Insert, Format, Tools, Slide Show, Window, and Help. Each menu contains a list of commands that can be used to perform various tasks.
c. Standard Toolbar: Located below the menu bar, it contains icons for commonly used commands such as Save, Undo, Redo, and Print.
d. Formatting Toolbar: Also known as the Ribbon, it provides quick access to formatting options for text and objects in the presentation.
e. Slide Pane: Displays the current slide being edited. You can add, delete, and rearrange slides in this pane.
f. Outline Pane: Displays the text content of each slide in outline form. You can edit the text directly in this pane.
g. Slide Sorter View: Allows you to view and organize all slides in the presentation. You can rearrange slides by dragging them to a new position.
h. Notes Pane: Provides space to add notes or comments about the current slide. These notes are not visible during the presentation but can be helpful for the presenter.
i. Status Bar: Located at the bottom of the PowerPoint window, it displays information such as the number of slides in the presentation, the current slide number, and the zoom level.
j. View Buttons: Located in the lower right corner of the window, these buttons allow you to switch between different views such as Normal, Slide Sorter, and Slide Show.
These elements provide users with the necessary tools to create, edit, and deliver engaging presentations using PowerPoint.
11. Define RGB color model. Explain the basic tools and transforms available in Adobe Photoshop.
RGB Color Model:
The RGB color model is a color representation system used primarily in electronic displays, such as computer monitors, TVs, and digital cameras. In this model, colors are created by combining varying intensities of three primary colors: Red (R), Green (G), and Blue (B). Each primary color channel can have values ranging from 0 to 255, or in some cases, from 0 to 1. By mixing different intensities of these primary colors, a wide range of colors can be produced. The RGB model follows an additive color mixing process, where the combination of fully saturated red, green, and blue light results in white light. Other colors are created by mixing different proportions of these primary colors. For instance, mixing red and blue light produces magenta, while combining green and blue light creates cyan. The RGB color model is widely used in digital imaging, computer graphics, and multimedia applications due to its versatility and compatibility with electronic display devices.
Basic Tools and Transforms in Adobe Photoshop:
a. Transform Tools: Photoshop provides various tools for transforming images, including scaling, rotating, skewing, stretching, and warping. These transformations can be applied to selections, layers, paths, shapes, and masks. Non-destructive transformations can be achieved using Smart Objects.
b. Scale: This tool allows users to enlarge or reduce an item relative to a fixed reference point. Scaling can be performed horizontally, vertically, or both.
c. Rotate: The rotate tool is used to turn an item around a reference point. By default, the reference point is at the center of the object, but it can be moved to another location.
d. Skew: Skewing slants an item vertically and horizontally, allowing users to create perspective effects.
e. Distort: Distortion stretches an item in all directions, enabling users to manipulate the shape of an object freely.
f. Perspective: This tool applies one-point perspective to an item, simulating depth and spatial relationships.
g. Warp: Warping allows users to manipulate the shape of an item by dragging control points, creating custom distortions.
h. Flip: Flipping vertically or horizontally mirrors the item along the selected axis, providing symmetrical transformations.
These basic tools and transforms in Adobe Photoshop empower users to manipulate images creatively, enabling precise adjustments and transformations to achieve desired visual effects.
BCA CFA Question Paper Solution 2019 - 1st Semester
1. Which one of the following is not a non-impact printer?
a) Inkjet
b) Dot-matrix
c) Laser
d) Thermal
2. Which one of the following is the example of the utility software?
a) Anti-virus
b) Operating system
c) Language translators
d) Word Processor
3. Which one of the following is not a Network Operating System?
a) Unix
b) Linux
c) Windows 7
d) Windows Server
4. Which one of the following key is used to uniquely identify a row in a table?
a) Composite Key
b) Foreign Key
c) Primary Key
d) Candidate Key
5. Which one of the following layers of OSI reference model contains TCP protocol?
a) Network Layer
b) Transport Layer
c) Data Link Layer
d) Application Layer
6. Which one of the following is not a web server?
a) Apache
b) LGWS
c) HTTP
d) IIS
7. Which one of the following is a crypto-currency?
a) Credit Card
b) PayPal
c) Bit Coin
d) Mater Card
8. Which one of the following commands is used to shut down the computer normally?
a) shutdown /fb
b) shutdown /sc
c) shutdown /hd
d) shutdown /r
9. What is the default font type in MS Word 2016?
a) Arial
b) Times New Roman
c) Calibri
d) Microsoft Sans Serif
10. Which one of the following key is used for help in MS PowerPoint?
a) F1
b) F5
c) F6
d) F12
2. What is an Operating System? Explain the major functions of an Operating System.
Ans: An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. The Operating System is a program with the following features:
- Acts as an interface between the software and the computer hardware.
- Controls and monitors the execution of programs stored in the computer.
- Manages all the resources and operations of the computer.
- Sets standards for application programs running on it.
Major functions of an Operating System:
a. Memory Management: Observes the use of primary memory, allocates memory when requested by a process, and deallocates memory when not in use.
b. Processor Management: Allocates the CPU to processes and deallocates it when no longer needed.
c. Device Management: Keeps track of all devices, decides which process gets access to the devices, and manages the usage time.
d. File Management: Allocates and deallocates resources, controls access to files, and organizes file storage.
e. Security: Prevents unauthorized access to programs and data through password protection and other security measures.
f. Job Accounting: Records the time and resources used by various jobs and users.
g. Control over System Performance: Monitors system performance and records delays in service requests.
h. Interaction with Operators: Acknowledges instructions from operators, performs corresponding actions, and communicates through display screens.
i. Error-detecting Aids: Provides error detection methods like dumps, traces, and error messages for debugging.
j. Coordination between Software and Users: Assigns and coordinates compilers, interpreters, and other software for various users of the computer system.
3. Differentiate between primary and secondary memory.
Ans:
a. Primary Memory:
- Also known as main memory or internal memory.
- It is directly accessible by the CPU.
- Primary memory is volatile, meaning data is lost when power is turned off.
- Examples include RAM (Random Access Memory) and ROM (Read-Only Memory).
- Primary memory is much faster but has limited storage capacity compared to secondary memory.
b. Secondary Memory:
- Also known as auxiliary memory or external memory.
- It is not directly accessible by the CPU and requires input/output operations to access data.
- Secondary memory is non-volatile, meaning data is retained even when power is turned off.
- Examples include hard disk drives (HDDs), solid-state drives (SSDs), magnetic tapes, and optical disks (CDs, DVDs).
- Secondary memory has slower access times compared to primary memory but offers larger storage capacity.
4. What is computer virus? Explain symptoms of computer virus.
Ans:
Computer Virus:
- A computer virus is a type of malicious software program that can replicate itself and spread from one computer to another.
- It is designed to interfere with the normal functioning of a computer system, often causing damage to files, applications, and the operating system.
- Viruses can be spread through various means, such as infected email attachments, infected software downloads, and compromised websites.
- Once a computer virus infects a system, it can execute malicious code, steal sensitive information, and corrupt or delete files.
Symptoms of Computer Virus:
- Slow Performance: A computer infected with a virus may experience sluggish performance, including slow boot-up times, delayed response to commands, and overall system slowdowns.
- Unexplained Pop-Ups: Viruses may generate pop-up windows containing advertisements, warnings, or fake error messages, even when the user is not browsing the internet.
- Crashes and Freezes: Infected computers may frequently crash or freeze, resulting in unexpected system shutdowns or the inability to access certain applications.
- Unusual Behavior: Viruses can cause a variety of unusual behaviors on a computer, such as changes to desktop backgrounds, alterations to file names, or the appearance of unfamiliar icons.
- Missing or Corrupted Files: Files may mysteriously disappear from the system, or existing files may become corrupted and fail to open properly.
- Excessive Network Activity: Some viruses attempt to spread themselves to other computers on the network, leading to unusually high network traffic or bandwidth usage.
- Security Warnings: Antivirus software may detect and display warnings about the presence of malicious software on the computer, indicating a possible virus infection.
5. Define database? Explain the advantages of database over file-based system.
Ans:
A database is an organized collection of data, generally stored and accessed electronically from a computer system. Let's discuss a few examples. An online telephone directory would definitely use a database to store data pertaining to people, phone numbers, other contact details, etc.
Advantages of a database over a file-based system:
- No redundant data: Redundancy is removed by data normalization. No data duplication saves storage and improves access time.
- Data Consistency and Integrity: Data normalization takes care of data redundancy, thereby ensuring data consistency and integrity.
- Data Security: It is easier to apply access constraints in database systems, ensuring only authorized users can access the data, thus enhancing data security.
- Privacy: Limited access means privacy of data, protecting sensitive information.
- Easy access to data: Database systems manage data in such a way that it is easily accessible with fast response times, improving efficiency.
- Easy recovery: Database systems keep backups of data, making it easier to perform full recovery in case of a failure.
- Flexibility: Database systems are more flexible than file processing systems, allowing for easier management and manipulation of data.
6. What is a proxy server? Write down the benefits of using a proxy server in the organization.
A proxy server acts as an intermediary server between a client and the internet. It intercepts requests from clients seeking resources from servers and forwards those requests to the appropriate servers. The response from the server is then sent back to the client by the proxy server.
Benefits of using a proxy server in the organization:
- Improved Security: Proxy servers can act as a barrier between the internal network and the internet, filtering out potentially harmful content, malicious websites, and malware before they reach the internal network.
- Anonymity: Proxy servers can mask the IP address of the organization's internal network, providing anonymity and privacy for users browsing the internet.
- Bandwidth Optimization: Proxy servers can cache frequently accessed web content, reducing the amount of bandwidth required for accessing the same content repeatedly and improving overall network performance.
- Access Control: Proxy servers can enforce access control policies, restricting access to specific websites or types of content based on predefined rules and user permissions.
- Monitoring and Logging: Proxy servers can log all internet traffic passing through them, allowing administrators to monitor user activity, track internet usage, and identify potential security threats or policy violations.
- Content Filtering: Proxy servers can block access to inappropriate or non-work-related websites, helping organizations enforce acceptable use policies and maintain productivity.
- Load Balancing: Proxy servers can distribute incoming internet traffic across multiple servers, helping to balance the load and prevent server overload for improved performance and reliability.
7. Define e-commerce? Mention the benefits of using it in the context of customer.
Ans:
a. E-commerce is the activity of electronically buying or selling products or services over the Internet. It encompasses a wide range of transactions conducted online, including online retail, electronic payments, online auctions, and internet banking.
b. Benefits of using e-commerce in the context of customers:
- Overcome Geographical Limitations: E-commerce enables customers to shop from anywhere with an internet connection, overcoming geographical limitations and expanding access to a wider range of products and services.
- Gain New Customers with Search Engine Visibility: E-commerce websites benefit from search engine visibility, allowing customers to discover new products and services through search engine results, thus attracting new customers.
- Lower Costs: E-commerce often leads to lower costs for both businesses and customers due to reduced overhead expenses, advertising costs, and personnel requirements, which can result in discounted prices for customers.
- Locate Products Quicker: E-commerce websites provide intuitive navigation and search functions, allowing customers to quickly locate desired products without the need to physically browse through aisles or stores.
- Eliminate Travel Time and Cost: By shopping online, customers can avoid the need to travel to physical stores, saving time and money on transportation costs.
- Provide Comparison Shopping: E-commerce platforms enable customers to compare prices and features across multiple vendors easily, empowering them to make informed purchasing decisions and find the best deals.
- Enable Deals, Bargains, Coupons, and Group Buying: E-commerce websites offer various promotional offers, discounts, coupons, and group buying opportunities, allowing customers to save money and access exclusive deals conveniently.
- Provide Abundant Information: E-commerce websites provide customers with comprehensive product information, reviews, and specifications, empowering them to make informed decisions and find the products that best meet their needs.
8. a) Write down DOS command to create above files and directories.
Ans:
- To create directories:
E:\>mkdir "Dir1"
E:\>mkdir "Dir2"
E:\>mkdir "Dir3"
- To create files:
E:\>copy nul > file1.txt
E:\>copy nul > file2.txt
E:\>copy nul > file3.txt
b) Write down DOS command to move all text files into Dir3 directory.
Ans:
E:\>move .txt Dir3
c) Write DOS command to delete Dir1 directory.
Ans:
E:\>rmdir /s Dir1
d) Hide the root directory from E drive.
Ans:
E:\>attrib +h Dir1
9. (a) From the following spreadsheet, write the formula to address the following conditions:
1. Bonus will give 15% of salary if his/her salary is less than and equal to 6000.
Answer: IF(E2>6000,0.15*E2, 0)
2. Tax will pay 10% of salary if his/her post is manager
Answer: IF(D2="Manager", 0.01* E2, 0)
3. HA will get 5% of salary if he/she is not from Ktm.
Answer: IF(C2<>"Kim",0.05 *E2, 0)
4. Total is equal to the sum of (Salary, Bonus and Ha) by deducting the Tax
Answer: E2+F2+H2-G2
5. Write a formula to find the maximum salary above the excel sheet.
Answer: MAX(E2:E4)
b) What is Photoshop? Explain five major tools of Photoshop.
Answer: Photoshop is Adobe's photo editing, image creation, and graphic design software. The software provides many image editing features for raster (pixel-based) images as well as vector graphics. It uses a layer-based editing system that enables image creation and altering with multiple overlays that support transparency. Layers can also act as masks or filters, altering underlying colors. Shadows and other effects can be added to the layers. Photoshop actions include automation features to reduce the need for repetitive tasks. An option known as Photoshop CC (Creative Cloud) allows users to work on content from any computer.
1. Move Tool (Keyboard: V): The move tool simply lets you move objects in a given layer around the Photoshop canvas. To use it, click anywhere on the canvas and drag. As you drag, the Photoshop layer will move with your mouse.
2. Marquee (Keyboard: M): The marquee lets you select part of the canvas in a specific shape. By default, you get a rectangular (or perfect square if you hold down shift while selecting), but you can also select in the shape of an ellipse (or a perfect circle if you hold down shift while selecting).
3. Lasso (Keyboard: L): The lasso is a free-form selection tool that lets you drag around the canvas and select anything the lasso'd area covers. Within this tool, you also have access to the polygonal lasso, which lets you create a selection by clicking around on the canvas and creating points, and the magnetic lasso, which works the same as the regular lasso but attempts to detect edges for you and automatically snap to them.
4. Magic Wand (Keyboard: W): Clicking an area with the magic wand will tell Photoshop to select the spot you clicked on and anything around it that's similar. This tool can be used as a crude way to remove backgrounds from photos.
5. Crop Tool (Keyboard: C): The crop tool is used to (surprise!) crop your pictures. You can specify the exact size and constrain the crop tool to those proportions, or you can just crop to any size you please.
10. a) What is a word processor? Explain the Home tab of a Word document and major functions available in it.
Answer: A word processor is a device or computer program that provides for input, editing, formatting, and output of text, often with some additional features. Early word processors were stand-alone devices dedicated to the function, but current word processors are word processor programs running on general-purpose computers.
The Home Tab is by far the most important Tab in Microsoft Word. The Home Tab contains all the commands that are used most often. These include formatting commands like changing text size, font style, font color, list types, and clipboard functionality like Cut, Copy and Paste. Furthermore, the home tab in Word includes features like text alignment, line spacing gallery styles and theme settings. Finally, the Home Tab includes the facility to find and replace text.
The groups on the Home Tab are as follows:
- Clipboard
- Font
- Paragraph
- Styles
- Editing
b) Define Network Topology? Write down the advantages of Network.
Answer: Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses, and computer networks.
Advantages of computer networking:
- File sharing: You can easily share data between different users, or access it remotely if you keep it on other connected devices.
- Resource sharing: Using network-connected peripheral devices like printers, scanners, and copiers, or sharing software between multiple users, saves money.
- Sharing a single internet connection: It is cost-efficient and can help protect your systems if you properly secure the network.
- Increasing storage capacity: You can access files and multimedia, such as images and music, which you store remotely on other machines or network-attached storage devices.
11. a) What is animation? What are the advantages of using slide master in PowerPoint?
Answer: Animation is the capturing of sequential, static images-drawings or photos of inanimate objects-and playing them in rapid succession to mimic real-world motion. Animation is a method in which pictures are manipulated to appear as moving images. In traditional animation, images are drawn or painted by hand on transparent celluloid sheets to be photographed and exhibited on film. Today, most animations are made with computer-generated imagery.
Slide master: The slide master is the top slide in a hierarchy of slides that stores information about layout including the background, color, fonts, effects, placeholder sizes, and positioning. The key benefit to using slide master is that you can make changes to every slide in your presentation, quickly. It also enables every slide on your presentation to follow a singular theme and look cohesive perfect for creating a professional business presentation. Slide Master can be accessed by navigating to View > Master > Slide Master.
Advantages of using slide master in PowerPoint:
- The key benefit to modifying and using slide masters is that you can make universal style changes to every slide in your presentation, including ones added later to the presentation.
- When you use a slide master, you save time because you don't have to type the same information on more than one slide.
- The slide master especially comes in handy when you have extremely long presentations with lots of slides.
- Because slide masters affect the look of your entire presentation, when you create and edit a slide master or corresponding layouts, you work in Slide Master View. The slide master helps in:
1. Changing font colors and styles for every slide
2. Adding clipart or picture to every slide
3. Adding a footer or date to every slide.
b. Explain the block diagram of a computer and its various components.
Answer: Computer is an electronic device which performs tasks given by user with extremely fast speed and accuracy. Like any other device or machine, a computer system has also a number of parts. A computer system can be blocked into mainly three parts:
1. Input Unit
2. Central Processing Unit (CPU)
3. Output Unit
Input unit: Input unit is a unit that accepts any input device. The input device is used to input data into the computer system.
- Function of input unit:
- It converts inputted data into binary codes.
- It sends data to main memory of computer.
Central Processing Unit (CPU): CPU is called the brain of a computer. It is an electronic circuitry that carries out the instruction given by a computer program.
- CPU can be sub-classified into three parts:
1. Control unit (CU)
2. Arithmetic & Logic unit (ALU)
3. Memory Unit (MU)
- Function of CPU:
- It controls all the parts and software and data flow of the computer.
- It performs all operations.
- It accepts data from input device.
- It sends information to output device.
- Executing programs stored in memory.
- It stores data either temporarily or permanently.
- It performs arithmetical and logical operations.
Output Unit: Output unit is a unit that constitutes a number of output devices. An output device is used to show the result of processing.
- Function of Output unit:
- It accepts data or information sends from the main memory of the computer.
- It converts, binary coded information into HLL or inputted languages.
0 Comments