1. Elaborate the following: MIPS, OMR, ROM, WWW, USB, MBR, FAT, GUI,
POP, RPM, LCD, SFTP, RAM, EPROM, DVD, MAN, CRT, URL, FTP, LAN, WAN, ENIAC,
EDVAC, EDSAC, UNIVAC, ABC, IBM, PC, CD, CPS, BCD, EBCDIC, ASCII, CPU, ALU, HDD,
FDD, EPROM, EEPROM, RAM, CGA, VGA, SVGA, AGP, CCD, OSI, ISO, NIC, LASER, LED,
TCP/IP, NOS, HTML, HTTP, SMTP, IRC, NNTP.
Ans. to the
question no: 1
MIPS - Millions Instructions Per Second
OMR – Optical Mark Reader
ROM – Read Only Memory
WWW – World Wide Web
USB – Universal Serial Bus
MBR – Master Boot Record
FAT – File Allocation Table
POP – Post Office Protocol
RPM – Revolutions Per Minute
LCD – Liquid Crystal Display
SFTP – Secure File Transfer Protocol
RAM – Random Access Memory
EPROM – Erasable Programmable Read Only Memory
DVD – Digital Video Disc
MAN – Metropolitan Area Network
CRT – Cathode Ray Tube
URL – Uniform Resource Locator
FTP – File Transfer Protocol
LAN – Local Area Network
WAN – Wide Area Network
ENIAC – Electronic Numerical Integrator And
Calculator
EDVAC – Electronic Discrete Variable Automatic
Computer
EDSAC – Electronic Delay Storage Automatic Computer
UNIVAC – Universal Automatic Computer
ABC – Atanasoff Berry Computer
IBM – International Business Machine
PC – Personal Computer
CD – Compact Disk
CPS – Characters Per Second
BCD – Binary Coded Decimal
EBCDIC – Extended Binary Coded Decimal Information
Code
ASCII – American Standard Code of Information
Interchange
CPU – Central Processing Unit
ALU – Arithmetic Logic Unit
HDD – Hard Disk Drive
FDD – Floppy Disk Drive
EPROM – Erasable Programmable Read Only Memory
EEPROM – Electrically Erasable Programmable Read Only
Memory
RAM – Random Access Memory
CGA – Color Graphics Adapter
VGA – Virtual Graphics Array
SVGA – Super Virtual Graphics Array
AGP – Accelerated Graphics Port
CCD – Charge Coupled Devices
OSI – Open Systems Interconnection
ISO – International Standards Organization
NIC – Network Interface Card
LASER – Light Amplification by Stimulated Emission of
Radiation
LED – Light Emitting Diode
TCP/IP – Transmission Control Protocol/Internet
Protocol
NOS – Network Operating Systems
HTML – Hypertext Markup Language
HTTP – Hypertext Transfer Protocol
SMTP – Simple Mail Transfer Protocol
IRC – Internet Relay Chat
NNTP - Network News Transfer Protocol
—— ○ ——
2.
What are the features that distinguish computers from other machines?
Ans. to the
question no: 2
Computers can be
programmed. Programming means that a computer can be instructed in detail about
what it should do in solving a problem.
This unique feature enables computer to have diverse use and endless
possibility.
Ø
Speed: Computers work lot faster
than human, especially in numerical calculations. Two moderately long integer
numbers can be added in a very small fraction of second that may need few
minutes for human. Computer speeds are measured in MIPS (Millions Instructions
per Second). Five to six years ago, a typical desktop computer had speed of
around five MIPS whereas, now computers with speed of less than forty MIPS are
hard to find.
Ø
Accuracy: Computers function
accurately because their-principles are based on mathematical laws. If the data
provided by the users are good, and the program used to process them is
flawless, then a computer is expected to produce the same accurate result every
time it runs. However, compute human programmers who are prone to make mistakes
that end up in generating wrong results develop programs.
Ø
Diligence: Computers neither get
tired after long use nor get bored for repetitive use the only boredom is the
heat produced by the different components inside. If enough measures are taken
to remove that extra heat, computers can function continuously for their entire
life.
Ø
Price Decline: This is an unusual
feature of computers and related accessories. Where prices of most things rise
with time, computer prices tend to decline. Added to that, they come with
faster speed and extra features. The factors contributing this price decline
are the extraordinary development in semiconductor technology, improvement in
manufacturing engineering and higher sales. Some people argue that, with the
price decline, the reliability of computers has been compromised.
Ø
Automation: Computers can work
automatically. If the required data and instructions are provided, computers
can process them without requiring any intervention of human operator. The
results produced can be instructed to store in proper place. Most of the modern
manufacturing plants are now computer controlled. A TV advertisement can be a
good example.
Ø
Memory: Computers have been
designed with the ability to store. Data and instructions given to a computer
system are usually stored in temporary memory for immediate processing. For
future use, they are stored in permanent storage. Computer memories do not get
erased or weak after multiple times of use.
—— ○ ——
3. Write short notes on different types of computer.
Ans. to the
question no: 3
Supercomputers: The
large and powerful mainframe computer is called a supercomputer. The supercomputer is the top of the heap
in power and expense.
Figure
3.1: Cray XMP Supercomputer.
- Largest and fastest
- Several million dollars
- Can process enormous volume of data
- Over 50 BIPS (Billions Instructions Per Second)
- Uses
Ø
Weather forecasting
Ø
Code breaking
Ø
Special effects
Ø
Engineering design
Ø
Economic forecasting
Ø
Space research and administration
Ø
Researches for Genetic Engineering and DNA
mapping.
Ø
Astronomical and Cosmological researches
Ø
Calculating the value of pi (π)
Example: Cray-11,
Cray-XMP, Cray-T90 and Cyber-250.
Main Frame: The main frame is the workhorse of the
business world. A main frame is the heart of a network of computers or
terminals, which allows hundreds of people to work at the same time on the same
data. It requires a special environment, cold and dry.
Figure
3.2: IBM 9673 Mainframe Computer.
- Centralized storage, processing, and management for large amounts of data
- Cost — ½–1½ million dollars
- 1000s of users
- Uses
Ø
Governmental agencies
Ø
Large Business corporations
Ø
Airline reservations
Example: IBM System/370, IBM 4300, IBM 9672,
NCR 8000, UNIVAC 1100/90 etc.
Minicomputers:
Figure
3.3: PDP8 Minicomputer.
A minicomputer
system performs the basic arithmetic and logic functions and supports some of
the programming languages used with large computer systems. They are physically
smaller, less expensive, and gave a small storage capacity than mainframes.
Minicomputers are ideally suited for processing tasks that do not require access
to huge volumes of stored data. As a result of their low cost, ease of
operation, and versatility, minicomputers have gained rapid acceptance from
their introduction in the mid-sixties. Some of the larger and expensive
minicomputers are capable of supporting a number of terminals in a time-shared
mode. DEC PDP8, DEC PDP11, IBM 134 and DEC VAX, etc. are some examples of
Minicomputers.
Workstation:
Figure
3.4: Sun Ultra 60 workstation.
Workstations are single user
computer with more processing power than personal computers. Such computers
have many features of minicomputer but at slightly lower price. Workstations
are mainly equipped with one or more processor, specialized processor for
mathematics and graphics, high-speed larger size memory and fast disk storage.
They also have bigger high-resolution monitor. Workstations are more reliable
than personal computers and so popular among scientists, engineers, graphic
artists and animators who need to process real time data reliably. Video editing,
animations, scientific modeling are few applications of workstations. Sun Ultra
60 is an example of popular workstation. Price of workstations is two to three
times than of a personal computer.
Microcomputers:
Microcomputers
are microprocessor based small laptop or desktop systems with varying
capability depending on the input/ output and secondary storage devices
supporting it.
Figure
3.5: Microcomputers.
Subcategories:
Ø
Single user
General computing tasks:
Ø
Word processing
Ø
E-mail
Ø
Internet access
Hand-held computers or PDA:
Figure
3.6: Handheld Computer.
- Cost — $100–$700
- Fit in the palm of people’s hand
- Run on batteries
- Uses
Ø Appointment
book
Ø Address
book
Ø Calculator
Ø Notepad
—— ○ ——
4. Describe with example various generation of computers.
Ans. to the
question no: 4
First Generation Computers (1944-1958)
:
- They were the fastest calculating devices of their time.
- They used vacuum tubes.
- Discrete semiconductor device based with limited system software supported.
- They were too bulky in size.
- They should be properly air-conditioned.
- The power consumption was very high.
- They were prone to frequent hardware failures.
- Constant maintenance required.
- Commercial production of these computers was difficult and costly.
- They had limited commercial use.
Figure
4.1: UNIVAC — First Generation Computer.
Figure
4.2: Vacuum Tubes.
Example: ENIAC, EDVAC, EDSAC, UNIVAC-I, IBM
701, etc.
Second Generation Computers
(1959-1963)
:
- Ten times faster than the first-generation computers.
- Used transistors in circuits.
- Much smaller in size.
- Consumed much less power.
- Much more reliable and less prone to hardware failures.
- Had faster and larger primary and secondary storage devices.
- Easier to program.
- Hence they had wider commercial use.
- High-level programming Languages like FORTRAN, COBOL, ALGOL and SNOBOL were developed.
Figure
4.3: Transistor.
Third Generation Computers
(1964-1970):
- Much more powerful (Performs 1 million instruction per sec).
- Used IC (Integrated Circuit) instead of transistors.
- Much smaller in size.
- Much less power consumption.
- Much more reliable and less prone to hardware failures.
- Faster and larger primary and secondary storage devices.
- Totally general-purpose machines suitable for both scientific and commercial applications
- Standardization of high-level programming languages allowed programs written for one computer to be easily ported to and executed on another computer.
- Timesharing O.S helped in drastically improving the productivity of programmers cutting down the time and cost of program development by several fold.
Figure
4.4: IC.
Fourth Generation Computers
(1971-now):
- Microprocessors came into existence.
- Starting of Personal Computer Revolution.
- P.C. Compact and inexpensive
- Hard disk: Cheaper, smaller in size and larger in capacity
- Floppy disks became popular.
- LAN, WAN came into existence.
- Several O.S like MS-DOS, MS Windows, and UNIX were developed.
- C, C++ programming became popular.
- The PCs were much smaller and cheaper than the mainframes or minicomputers of 3rd generation.
- They are much more powerful.
- No air-conditioning was required for the PCs
- Consumed much less power.
- Much more reliable and less prone to hardware failures.
- Faster and larger primary and secondary storage devices.
- Totally general-purpose machines.
- They contained graphical user interface.
- Availability of C programming language allowed these systems to be effectively used for systems programming also, like design of compilers and O.S
- Object-oriented languages allowed rapid software development.
Figure
4.5: Microprocessor.
Fifth Generation Computers
(Now to future):
- Superconductors like Gallium Arsenide (GaAs2), which has zero resistance, will be used in computers’ electronic circuits.
- Larger disk space
- Optical disks (CD-ROM) emerged.
- Internet came into existence.
- The concept of ‘Multithreading’ was introduced.
- Java programming gained popularity.
- Portable PCs (notebook computers) are much more smaller and handy.
- Desktop PCs and workstations are several times more powerful
- Consume less power
- Hot pluggable feature.
- Commercial production of these systems is easier and cheaper.
- Newer and more powerful applications, including multimedia applications.
- Internet usage by common man.
Figure
4.6: An IC made by Gallium Arsenide.
Figure
4.7: Fifth Generation Computers.
—— ○ ——
5. What factors determine the type of a computer?
Ans. to the
question no: 5
There are seven factors. They are
following:
- Types of CPU;
- Amount of main memory;
- Storage capacity;
- Speed of output device in CPS;
- Processing speed in MIPS;
- Number of users;
- Price.
—— ○ ——
6. a)
Subtract (100)2 from (1011)2 using the 1’s/2’s complement
method.
b)
Subtract (7)10 from (14)10 using the 1’s/2’s complement
method.
c)
Subtract (9)10 from (7)10 using the 1’s/2’s complement
method.
d)
Subtract (1010)2 from (011)2 using the 1’s/2’s complement
method.
Ans. to the question no: 6
a)
1’s complement method
Here, the length of 1002
is not equal to 10112 so an extra zero will be added with 1002
to make the length of both numbers the same.
Now,
Taking the 1’s complement of 01002 we get, 10112,
which will be added with 10112
∴
Since, there is an overflow, the result will be positive and this
overflow will be added with 01102
∴
∴ The result is (111)2 using
1’s complement method.
2’s
complement method
Here, the length of 1002
is not equal to 10112 so an extra zero will be added with 1002
to make the length of both numbers the same.
Now,
Taking the 1’s complement of 01002 we get, 10112
and to get 2’s complement of 01002,
we have to add 1 with 10112.
Hence, the 2’s complement of 01002 is
Now, this 2’s
complement 11002 will be added with 10112
∴
Since, there is an overflow, the result will be positive
∴ Ignoring the overflow, the result is
(111)2 using 2’s complement method.
b)
1’s complement method
Here, the length of 1112
is not equal to 11102 so
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Now,
Taking the 1’s complement of 01112 we get, 10002,
which will be added with 11102
|
|
|
|
|
|
|
|
|
|
|
|
Since, there is an overflow, the result will be positive and this
overflow will be added with 01102
∴
∴ The result is (111)2 using
1’s complement method.
Now, (111)2 → (7)10
Hence, the
result is (7)10 using 1’s complement method.
2’s
complement method
Here, the length of 1112
is not equal to 11102 so an extra zero will be added with 1112
to make the length of both numbers the same.
Now,
Taking the 1’s complement of 01112 we get, 10002
and to get 2’s complement of 01112,
we have to add 1 with 10002.
Hence, the 2’s complement of 01112 is
Now, this 2’s
complement 10012 will be added with 11102
∴
∴ Ignoring the overflow, the result is
(111)2 using 2’s complement method.
Since, there
is an overflow, the result will be positive
Now, (111)2
→ (7)10
Hence, the
result is (7)10 using 2’s complement method.
c)
1’s complement method
|
Here, the length of 1112
is not equal to 10012 so
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Now,
Taking the 1’s complement of 10012 we get, 01102,
which will be added with 11102
|
|
|
|
|
|
|
|
|
|
|
|
Since, there is no overflow, the result will be negative. To get the
result, we take 1’s complement of 11012 and find 00102.
Attaching a negative sign the result is -00102 using 1’s complement
method.
Now, -(0010)2 → -(2)10
Hence, the
result is -(2)10 using 1’s complement method.
2’s
complement method
Here, the length of 1112
is not equal to 10012 so an extra zero will be added with 1112
to make the length of both numbers the same.
Now,
Taking the 1’s complement of 10012 we get, 01102
and to get 2’s complement of 10012,
we have to add 1 with 01102.
Hence, the 2’s complement of 10012 is
Now, this 2’s
complement 01112 will be added with 01112
∴
|
Attaching a negative sign the result is -00102 using 2’s
complement method.
Now, -(0010)2
→ -(2)10
Hence, the
result is -(2)10 using 2’s complement method.
d)
1’s complement method
Here, the length of 0112
is not equal to 10102 so an extra zero will be added with 0112
to make the length of both numbers the same.
Now,
Taking the 1’s complement of 10102 we get, 01012,
which will be added with 00112
∴
Since, there is no overflow, the result will be negative. To get the
result, we take 1’s complement of 10002 and find 0111. Attaching a
negative sign the result is -01112 using 1’s complement method.
2’s
complement method
Here, the length of 0112
is not equal to 10102 so an extra zero will be added with 0112
to make the length of both numbers the same.
Now,
Taking the 1’s complement of 10102 we get, 01012
and to get 2’s complement of 10102,
we have to add 1 with 01012.
Hence, the 2’s complement of 10102 is
Now, this 2’s
complement 01102 will be added with 00112
∴
|
Attaching a negative sign the result is -01112 using 2’s
complement method.
—— ○ ——
7. Fill in the question marks:
i) (10101010)2 → (?)8 ii) (50)8 → (?)16 iii) (3F)16 → (?)8
iv) (1110111)2 → (?)10 v) (40)8 → (?)16
vi) (A0)16 → (?)2
vii) (1110111)2 → (?)16 viii) (40)8 → (?)10 ix) (A0)16 → (?)8
x) (1010101)2 → (?)10 xi) (39)8 → (?)16 xii) (3F)16 → (?)2
Ans. to the question no: 7
i) (10101010)2 → (?)8
Solution:
To convert (10101010)2
to octal number we have to convert it first into decimal and than we have to
convert the decimal number into octal. Then we will get the result.
(10101010)2 Converting
into decimal:
=
1×27 + 0×26 + 1×25 + 0×24 +
1×23 + 0×22 + 1×21 + 0×20
= 1×128 + 0×64 + 1×32 + 0×16 +
1×8 + 0×4 + 1×2 + 0×1
= 128 + 32 + 8 + 2
= 170
|
8 170
|
|
|
|
|
|
|
|
∴ (10101010)2 = (252)8
ii) (50)8 → (?)16
Solution:
To convert (50)8 to
hexadecimal number we have to convert it first into decimal and than we have to
convert the decimal number into hexadecimal. Then we will get the result.
(50)8 Converting into
decimal:
=
5×81 + 0×80
= 5×8 + 0×1
= 40 + 0
= 40
|
|
40
|
|
|
|
|
|
|
∴ (40)10 = (28)16
∴ (50)8 = (28)16
iii) (3F)16 → (?)8
Solution: To convert (3F)16
to octal number we have to convert it first into decimal and than we have to
convert the decimal number into octal. Then we will get the result.
(3F)16 Converting into
decimal:
= 3×161 + 15×160
= 3×16 + 15×1
= 48 + 15
= 63
|
|
63
|
|
|
|
|
|
∴ (63)10 = (77)8
∴ (3F)16 = (77)8
iv) (1110111)2 → (?)10
Solution:
(1110111)2 Converting
into decimal:
= 1×26 + 1×25
+ 1×24 + 0×23
+ 1×22 + 1×21 + 1×20
= 1×64 + 1×32 + 1×16 + 0×8 + 1×4
+ 1×2 + 1×1
= 64 + 32 + 16 + 0 + 4 + 2 + 1
= 119
∴ (1110111)2 = (119)10
v) (40)8 → (?)16
Solution: To convert (40)8
to hexadecimal number we have to convert it first into decimal and than we have
to convert the decimal number into hexadecimal. Then we will get the result.
(40)8 Converting into
decimal:
=
4×81 + 0×80
= 4×8 + 0×1
= 32 + 0
= 32
|
|
32
|
|
|
|
|
|
|
∴ (32)10 = (20)16
∴ (40)8 = (20)16
vi) (A0)16 → (?)2
Solution: To convert (A0)16
to binary number we have to convert it first into decimal and than we have to
convert the decimal number into binary. Then we will get the result.
(A0)16 Converting into
decimal:
= 10×161 + 0×160
= 10×16 + 0×1
= 160 + 0
= 160
Now (160)10
converting into binary:
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
∴ (160)10 =
(10100000)2
∴ (A0)16 = (10100000)2
vii) (1110111)2 → (?)16
Solution: To convert (1110111)2 to
hexadecimal number we have to convert it first into decimal and than we have to
convert the decimal number into hexadecimal. Then we will get the result.
(1110111)2 Converting
into decimal:
= 1×26 + 1×25
+ 1×24 + 0×23
+ 1×22 + 1×21 + 1×20
= 1×64 + 1×32 + 1×16 + 0×8 + 1×4
+ 1×2 + 1×1
= 64 + 32 + 16 + 0 + 4 + 2 + 1
= 119
∴ (1110111)2 = (119)10
Now (119)10 converting into hexadecimal:
∴ (119)10 = (77)16
∴ (1110111)2 = (77)16
viii) (40)8 → (?)10
Solution:
(40)8 Converting into
decimal:
=
4×81 + 0×80
= 4×8 + 0×1
= 32 + 0
= 32
∴ (40)8 = (32)10
ix) (A0)16 → (?)8
Solution: To convert (A0)16
to octal number we have to convert it first into decimal and than we have to
convert the decimal number into octal. Then we will get the result.
(A0)16 Converting into
decimal:
= 10×161 + 0×160
= 10×16 + 0×1
= 160 + 0
= 160
Now (160)10 converting
into octal:
|
|
|
|
|
|
|
|
|
|
|
∴ (160)10 = (240)8
∴ (A0)16 = (240)8
x) (1010101)2 → (?)10
Solution:
(1010101)2 Converting
into decimal:
= 1×26 + 0×25
+ 1×24 + 0×23
+ 1×22 + 0×21 + 1×20
= 1×64 + 0×32 + 1×16 + 0×8 + 1×4
+ 0×2 + 1×1
= 64 + 0 + 16 + 0 + 4 + 0 + 1
= 85
∴ (1010101)2 = (85)10
xi) (39)8 → (?)16
Solution:
(39)8 cannot be converted into hexadecimal number
because the digits, which are included in octal number system are 0, 1, 2, 3,
4, 5, 6 and 7 and obviously 9 is not a number of octal number system. So 39
cannot be an octal number. So it is absurd to convert 39 into hexadecimal or
any other number.
xii) (3F)16 → (?)2
Solution: To convert (3F)16
to binary number we have to convert it first into decimal and than we have to
convert the decimal number into binary. Then we will get the result.
(3F)16 Converting into
decimal:
= 3×161 + 15×160
= 3×16 + 15×1
= 48 + 15
= 63
Now (63)10 converting
into binary:
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
∴ (63)10 = (111111)2
∴ (3F)16 = (111111)2
—— ○ ——
8. Convert (12.525)10 to
Octal/Binary number.
Ans. to the question no: 8
Solution:
Converting (12.525)10
into Octal:
(12)10 Octal (.525)10 Octal
0.525×8
= 4.2 4
0.2×8
=1.6 1
|
|
|
|
|
|
|
|
|
0.8×8
= 6.4 6
0.4×8
= 3.2 3
∴ (12)10 = (14)8
0.2×8 = 1.6 1
|
∴ (.525)10 = (414631)8
∴ (12.525)10 =
(14.414631)8
Converting
(12.525)8 into Binary:
(12)10 Binary (.525)10 Binary
|
|||||||||
0.525×2 = 1.05 1
|
0.05×2
= 0.1 0
|
|
|
|
|
|
|
|
|
|
|
|
0.2×2 = 0.4
0
|
0.4×2 = 0.8
0
0.8×2 = 1.6
1
|
∴ (.525)10 = (100001)2
∴ (12)10 = (1100)2
∴ (12.525)10 = (1100.100001)2
—— ○ ——
9. How (-25)10, (-57)10,
(-28)10, (- 40)10 will be stored in an 8-bit RAM?
Ans. to the question no: 9
Solution:
(-25)10 is stored in a
8-bit RAM by this way,
First (-25)10
will be converted into Binary.
|
So,
|
So, -(25)10
= -(11001)2
As the number
is negative, so, to store -(11001)2 in 8-bit RAM we have to take the
2’s complement of the number.
So, 11001 → 00110
|
So, (00111)2 that
means -(25)10 will be stored in 8-bit RAM like shown below.
1
|
0
|
0
|
0
|
0
|
1
|
1
|
1
|
|
Figure1-8bit
RAM
(-57)10 is stored in a
8-bit RAM by this way,
First (-57)10
will be converted into Binary.
|
So,
|
|
As the number
is negative, so, to store -(111001)2 in 8-bit RAM we have to take
the 2’s complement of the number.
So, 111001 → 000110
|
So, (000111)2 that means -(57)10 will be stored
in 8-bit RAM like shown below.
1
|
0
|
0
|
0
|
0
|
1
|
1
|
1
|
|
Figure1-8bit
RAM
(-28)10 is stored in a
8-bit RAM by this way,
First (-28)10
will be converted into Binary.
|
So,
|
So, -(28)10
= -(11100)2
As the number
is negative, so, to store -(11100)2 in 8-bit RAM we have to take the
2’s complement of the number.
So, 11100 → 00011
|
So, (00100)2 that
means -(28)10 will be stored in 8-bit RAM like shown below.
1
|
0
|
0
|
0
|
0
|
1
|
0
|
0
|
|
Figure1-8bit
RAM
(-40)10 is stored in a
8-bit RAM by this way,
First (-40)10
will be converted into Binary.
|
So,
|
So, -(40)10
= -(101000)2
As the number
is negative, so, to store -(101000)2 in 8-bit RAM we have to take
the 2’s complement of the number.
So, 101000 → 010111
|
So, (011000)2 that
means -(40)10 will be stored in 8-bit RAM like shown below.
1
|
0
|
0
|
1
|
1
|
0
|
0
|
0
|
|
Figure1-8bit
RAM
—— ○ ——
10. What is BCD? Represent (15)10,
(253)10 in BCD.
Ans. to the question no: 10
BCD:
BCD is the shortcut of Binary Coded Decimal, which is a coding scheme
used to represent decimal numbers only. In BCD a decimal number is not
converted to binary rather each digit of the number is replaced by its binary
equivalent.
Decimal and binary
equivalent
Decimal
Binary
|
Decimal
Binary
|
0
0000
|
5
0101
|
1
0001
|
6
0110
|
2
0010
|
7
0111
|
3 0011
|
8
1000
|
4
0100
|
9
1001
|
As compared to
binary, BCD codes use lots of bits to represent a decimal number. BCD is used
because; it does not require any conversion of decimal numbers just each digit
is replaced. Conversion to binary requires a fair amount of calculation for a
digital system to use binary. Computers have great computing power and so use
binary. But small digital systems (like pocket calculator) cannot afford the
computation and so use BCD.
(15)10 will be represented in BCD as:
1 5
0001 0101
So, (15)10 ≡ 00010101BCD
(253)10 will be represented in BCD as:
2 5 3
0010 0101 0011
So, (253)10 ≡ 001001010011BCD
—— ○ ——
11. Describe all Logic gates, their symbols, truth table.
Ans. to the question no: 11
Logic Gates:
Computers work on an electrical flow where a high voltage is considered a 1 and
a low voltage is considered a 0. Using these highs and lows, data is
represented. Electronic circuits must be designed to manipulate these
positive and negative pulses into meaningful logic. Logic gates are the
building blocks of digital circuits. Combinations of logic gates form
circuits designed with specific tasks in mind. Basic Logic Gates are:
- NOT,
- AND,
- NAND,
- OR,
- NOR,
- XOR and
- XNOR.
The AND Gate:
The AND gate
implements the AND function. With the gate shown to the left, both inputs must
have logic 1 signals applied to them in order for the output to be a logic 1.
With either input at logic 0, the output will be held to logic 0.
|
Input B
|
Output Q
|
||||
|
0
|
0
|
||||
|
1
|
0
|
||||
|
0
|
0
|
||||
1
|
1
|
1
|
Figure
11.1: Truth Table and Symbol for AND Gate.
There is no limit to the number of inputs that may be
applied to an AND function, so there is no functional limit to the number of
inputs an AND gate may have. However, for practical reasons, commercial AND
gates are most commonly manufactured with 2, 3, or 4 inputs. A standard
Integrated Circuit (IC) package contains 14 or 16 pins, for practical size and
handling. A standard 14-pin package can contain four 2-input gates, three 3-input
gates, or two 4-input gates, and still have room for two pins for power supply
connections.
The OR Gate:
|
Input B
|
Output Q
|
||||||
|
0
|
0
|
||||||
0
|
1
|
1
|
||||||
|
0
|
1
|
||||||
1
|
1
|
1
|
Figure
11.2: Truth Table and Symbol for OR Gate.
The OR gate is
sort of the reverse of the AND gate. The OR function, like its verbal
counterpart, allows the output to be true (logic 1) if any one or more of its
inputs are true. This is correctly reflected by the basic OR function. In
symbols, the OR function is designated with a plus sign (+). In logical
diagrams, the symbol to the left designates the OR gate. As with the AND
function, the OR function can have any number of inputs. However, practical
commercial OR gates are mostly limited to 2, 3, and 4 inputs, as with AND
gates.
The NOT Gate, or Inverter:
|
Output Q
|
||||||||
0
|
1
|
||||||||
1
|
0
|
Figure
11.3: Truth Table and Symbol for NOT Gate.
The inverter is a little different from AND and OR
gates in that it always has exactly one input as well as one output. Whatever
logical state is applied to the input, the opposite state will appear at the
output. The NOT function, as it is called, is necessary in many applications
and highly useful in others. The NOT function is denoted by a single bar mark (
¯ ) may also be used for this purpose: 0 and . In the inverter symbol, the triangle actually denotes only
an amplifier, which in digital terms means that it "cleans up" the
signal but does not change its logical sense. It is the circle at the output,
which denotes the logical inversion. The circle could have been placed at the
input instead, and the logical meaning would still be the same.
The NAND Gate:
|
Input B
|
Output Q
|
||||||
|
0
|
1
|
||||||
|
1
|
1
|
||||||
1
|
0
|
1
|
||||||
1
|
1
|
0
|
Figure
11.4: Truth Table and Symbol for NAND Gate.
The NAND gate implements the NAND
function, which is exactly inverted from the AND function you already examined.
With the gate shown to the left, both inputs must have logic 1 signals applied
to them in order for the output to be a logic 0. With either input at logic 0,
the output will be held to logic 1. The circle at the output of the NAND gate
denotes the logical inversion, just as it did at the output of the inverter. As
with AND, there is no limit to the number of inputs that may be applied to a
NAND function, so there is no functional limit to the number of inputs a NAND
gate may have. However, for practical reasons, commercial NAND gates are most
commonly manufactured with 2, 3, or 4 inputs, to fit in a 14-pin or 16-pin package.
The NOR Gate:
Input A
|
Input B
|
Output Q
|
||||||||||
|
0
|
0
|
||||||||||
0
|
1
|
1
|
||||||||||
1
|
0
|
1
|
||||||||||
1
|
1
|
1
|
Figure
11.5: Truth Table and Symbol for NOR Gate.
The NOR gate is an OR gate with the output
inverted. Where the OR gate allows the output to be true (logic 1) if any one or
more of its inputs are true, the NOR gate inverts this and forces the output to
logic 0 when any input is true.
In symbols, the
NOR function is designated with a plus sign (+), with an over bar over the
entire expression to indicate the inversion. In logical diagrams, the symbol to
the left designates the NOR gate.
As expected,
this is an OR gate with a circle to designate the inversion. The NOR function
can have any number of inputs, but practical commercial NOR gates are mostly
limited to 2, 3, and 4 inputs, as with other gates in this class, to fit in
standard IC packages.
The Exclusive-OR, or XOR
Gate:
|
Input B
|
Output Q
|
||||
|
0
|
0
|
||||
|
1
|
1
|
||||
|
0
|
1
|
||||
1
|
1
|
0
|
Figure
11.6: Truth Table and Symbol for XOR Gate.
The
Exclusive-OR, or XOR function is an interesting and useful variation on the
basic OR function. Verbally, it can be stated as, "Either A or B, but not
both." The XOR gate produces a logic 1 output only if its two inputs are different.
If the inputs are the same, the output is a logic 0. The XOR symbol is a
variation on the standard OR symbol. It consists of a plus (+) sign with a
circle around it; that is ⊕.
The logic symbol, as shown here, is a variation on the standard OR symbol.
Unlike standard OR/NOR and AND/NAND functions, the XOR function always has
exactly two inputs, and commercially manufactured XOR gates are the same. Four
XOR gates fit in a standard 14-pin IC package.
XNOR (Exclusive-NOR) gate:
|
Input B
|
Output Q
|
||||||
|
0
|
1
|
||||||
|
1
|
0
|
||||||
1
|
0
|
0
|
||||||
1
|
1
|
1
|
Figure
11.7: Truth Table and Symbol for XNOR Gate.
If a NOT is
attached to the output of an XOR gate, an XNOR gates is formed. XNOR gate
produces an output of 1 when there are even (or zero) number of 1 in the input.
Otherwise, the output is 0. The symbol used for XNOR gate and truth table is
shown in Figure . XNOR operation sometimes is denoted by ⊙ symbol. XNOR gates can only
have 2 inputs.
—— ○ ——
12. What is scan code? Write the binary of ASCII value
for uppercase & lowercase characters.
Ans. to the question no: 12
Scan Code:
The code a keyboard sends on each key-press and release is unique for each key
on the keyboard. This code is known as scan code.
Under the keys of a
keyboard, there is a circuit board containing a processor and few other support
chips. Keys are actually switches arranged in rows and columns. When a switch
is pressed or released it produces an electric signal along particular row and
column. The processor receives the signal and locates the position of the key.
It then sends a predefined binary code to the computer. After receiving the
code, it is then job of the processing devices (of system unit) to process that
code.
Scan codes are
unique; so Shift keys on the left and right have different scan code values.
Similarly, the digit keys on the topside and on the numeric keypad have
different scan codes.
The binary of
ASCII (American Standard Code for Information Interchange) value for
uppercase and lowercase characters are shown in the table below:
Uppercase
Characters
|
Decimal
Equivalent
|
ASCII Code in
binary value
|
Lowercase
Characters
|
Decimal
Equivalent
|
ASCII Code in
binary value
|
A
|
065
|
01000001
|
a
|
097
|
01100001
|
B
|
066
|
01000010
|
b
|
098
|
01100010
|
C
|
067
|
01000011
|
c
|
099
|
01100011
|
D
|
068
|
01000100
|
d
|
0100
|
01100100
|
E
|
069
|
01000101
|
e
|
0101
|
01100101
|
F
|
070
|
01000110
|
f
|
0102
|
01100110
|
G
|
071
|
01000111
|
g
|
0103
|
01100111
|
H
|
072
|
01001000
|
h
|
0104
|
01101000
|
I
|
073
|
01001001
|
i
|
0105
|
01101001
|
J
|
074
|
01001010
|
j
|
0106
|
01101010
|
K
|
075
|
01001011
|
k
|
0107
|
01101011
|
L
|
076
|
01001100
|
l
|
0108
|
01101100
|
M
|
077
|
01001101
|
m
|
0109
|
01101101
|
N
|
078
|
01001110
|
n
|
0110
|
01101110
|
O
|
079
|
01001111
|
o
|
0111
|
01101111
|
P
|
080
|
01010000
|
p
|
0112
|
01110000
|
Q
|
081
|
01010001
|
q
|
0113
|
01110001
|
R
|
082
|
01010010
|
r
|
0114
|
01110010
|
S
|
083
|
01010011
|
s
|
0115
|
01110011
|
T
|
084
|
01010100
|
t
|
0116
|
01110100
|
U
|
085
|
01010101
|
u
|
0117
|
01110101
|
V
|
086
|
01010110
|
v
|
0118
|
01110110
|
W
|
087
|
01010111
|
w
|
0119
|
01110111
|
X
|
088
|
01011000
|
x
|
0120
|
01111000
|
Y
|
089
|
01011001
|
y
|
0121
|
01111001
|
Z
|
090
|
01011010
|
z
|
0122
|
01111010
|
—— ○ ——
13. Name keyboard connectors.
Ans. to the question no: 13
Keyboards are connected with the
CPU via connectors, which are called keyboard connectors. The followings
are the names of common keyboard connectors –
Ø 5–pin
DIN (Deustche Industrie Norm) connector
Ø 6–pin
IBM PS/2 mini-DIN connector
Ø 4–pin
USB (Universal Serial Bus) connector
Figure
13.1: 5–pin DIN (Deustche Industrie Norm) connector.
Figure
13.2: 6–pin IBM PS/2 mini-DIN connector.
Figure
13.3: 4–pin USB (Universal Serial Bus) connector.
Normal DIN connectors are
becoming obsolete. They are being replaced with smaller size mini-DIN PS/2
connectors. Newer keyboards are coming with USB connectors. Regardless
of the connector used, the connecting cable has wires to carry power supply and
scan codes. Power is supplied to a keyboard from the system unit, but scan code
data are transferred from the keyboard to the system unit. (Technically the
reverse flow is also possible.) There are also wireless keyboards.
—— ○ ——
14.
Describe all the keys in a keyboard with types and use.
Ans. to the question no: 14
Types And Uses of All The
Keys on A Keyboard:
The keyboard is
the primary way of entering text in a computer. The personal computers, which
we are using today, have 101 to 105 keys. The IBM Enhanced standard keyboard is
the most popular keyboard today. It contains 101 keys. Figure 14.1 shows the
IBM Enhanced standard keyboard.
Figure
14.1: The IBM Enhanced standard keyboard
Types of Keys:
Different
keys of a keyboard have different functions and uses. The keys, which are
contained in on a keyboard (for example, The IBM Enhanced standard keyboard),
are classified in five types and these are:
1. Alphanumeric keys
2. Numeric keypad
3. Function keys
4. Modifier keys
5. Cursor-movement keys
Alphanumeric Keys:
The Alphanumeric keys are:
Ø
Letters of the English alphabet from a to z;
Ø
Decimal digits 1, 2, 3… etc.;
Ø
Punctuation marks such as comma, semicolon, full
stop, question mark etc.
Ø
Some special symbols for example, braces, hash
(#), dollar sign (&), percentage sign (%) etc.,
Ø
Special characters for example, Space bar,
Enter, Tab Caps Lock and Backspace;
Alphanumeric
keys remain from the second to fifth rows on the keyboard from the top. These
keys are used to input characters (letters from a to z), digits, punctuation
signs and some other special symbols. The alphanumeric keys are like the keys
of an ordinary typewriter machine. The second row contains the keys of decimal
digits and other common symbols (such as @, #, &, $ etc.). The letters of
English alphabet and punctuation marks are on the third, fourth and fifth rows
from the top. There are few other keys in alphanumeric group that have special
use. They are the following:
Ø
Tab:
1.
The Tab key is used to move the current typing
position that is the cursor or the insertion point (on the
screen) by a predefined amount.
2.
In dialog boxes it moves the focus of default key-press
into different buttons.
3. Tab
is often used to switch between two or more running programs or to go one
program from another without using mouse.
Ø
Caps Lock: The Caps Lock key is used to type
capital letters of English alphabet.
Ø Space
bar:
1. It
is used to give spaces between two letters during typing.
2.
Sometimes space bar is used to assign tick (ü)
marks in dialog boxes or menus.
Ø Enter:
1. In
text editor programs the Enter key ends the current text line and starts a new
one.
2.
It usually finishes a command or data entry or executes
the final command.
3.
In dialog boxes or popup menus it executes a given
command.
4.
Without using mouse the Enter key can be used to
give the command ‘OK’ in dialog boxes.
5.
In MS-DOS the Enter key executes the command
after writing the command.
6.
During browsing the Internet the Enter key is
pressed after typing the web address in the address bar.
Ø
Backspace: The Backspace
key erases the last typed word, which is useful in editing any text writing.
Cursor Movement Keys:
The small
blinking mark on the screen that indicates the point of current text input is
called cursor. The cursor control keys are in the middle of the Alphanumeric
Keys and the Numeric Keypad and these are the left, right,
up and down arrows, the Home, End, Page Up
and the Page Down keys. These keys are used to move the cursor across
the screen. The Home key sends the cursor at the beginning of the
current text line and the End key sends the cursor at the end of the
current text line. The Page Up and the Page Down keys move a page
full of text or graphics up and down respectively.
Numeric Keypad:
1. The
numeric keypad exists on the very right side of the keyboard and is used for
numeric inputs.
- The layout of the numeric keypad is just like the ordinary calculators, which is helpful to input data quickly.
- It contains the 10 decimal digits, the decimal point (.), the Num Lock key and some keys of mathematical symbols such as addition (+), subtraction (-), multiplication (*) and division (/).
- At the right top of the Numeric Keypad a key named Num Lock is remained. When the Num Lock key is on, the Numeric Keypad is activated and when it is off, the numeric keypad is deactivated. A Status LED for the Num Lock key, which indicates the activated or deactivated situation of the Numeric keypad, is situated at just above of the Num Lock key. When the LED is on, the Numeric Keypad is activated and when the LED is off, the Numeric Keypad is deactivated.
- When the Numeric Keypad is deactivated that means the LED is off, the keys 4, 6,8 and 2 work as just like the left, right, up and down arrow keys and the keys 7, 9, 1 and 3 work as just like the Home, Page Up, Page Down and End keys.
Function Keys:
On the top of
the keyboard in the first row the keys labeled from F1 to F12 are called Function
Keys. These keys have different functions in different application
programs. The uses of some of the Function Keys are described below:
Ø
The F1 key is generally used to view help in any
application program.
Ø
The F2 key is used to rename the selected icon
of any file or folder.
Ø
The F3 key is used to show the Search Window,
which searches files and folders.
Ø
The F5 key is used to refresh the screen.
Ø
The F8 key is used to enter the Windows in “Safe
Mode” after booting the PC.
Ø
The F11 key is used to view full screen the windows
of some application programs.
Ø
The F12 key is used to execute the input of the
“Save As” command.
Modifier Keys:
Modifier Keys modify the
usual functions of other keys and creates the opportunity to make more commands
using same keys. Any key those functions for an individual command can be
functioned for multiple commands. These keys need to be pressed and held down
while other keys are pressed. The names and uses of some Modifier Keys
are given below:
Ø Ctrl:
The Ctrl (Control) key is used for command input in association with
other keys in editing and formatting texts and various kinds of tasks. For
example, to copy any text, graphics, file and folder, we have to press Ctrl
and C (Ctrl + C) that means we have to press and hold down Ctrl first
and then to press C. There are two Ctrl keys on the keyboard, which have
same use.
Ø
Alt: The function of the Alt
(Alternative) key is almost same as the Ctrl key. Traditionally, Alt
key is programmed to active some menus, or selecting an item from the menu. For
example, to open File menu, Alt + F has to be pressed. However, there are some
complex functions of Alt key, when it is pressed in association of Ctrl
to execute some complex commands, such as Ctrl + Alt + Delete to open the
program Windows Task Manager. Two Alt keys on the keyboard have
the same function.
Ø
Shift: There are two Shift
keys on the keyboard having the same function. Shift key converts an Alphanumeric
Key, which is a lowercase English alphabet into an uppercase alphabet.
However, the Shift key is also used to execute the functions done by the
Ctrl and Alt key when it is pressed in conjunction with them. For
example, to select some texts to the end of the document from any part of the
document, the Ctrl + Shift + End has to be pressed.
Special Keys: There
are some special keys on the IBM keyboard and they are:
Ø
Esc: The Esc (Escape) key
is situated at the top left of the keyboard. It is used to cancel a command and
to close a dialog box and popup menus.
Ø
Delete: It is used to erase a
character, which is at the left side of the cursor. It functions like the
Backspace key. An important function of Delete key is, after booting the
PC the Delete key is pressed to enter the BIOS (Basic Input/Output
System).
Ø
Insert: The Insert key
controls whether the text typed will overwrite the current text line or not. If
it is on, subsequent characters are inserted into the current cursor position
and the text on the right side of cursor are pushed further right. Status of
the Insert is not indicated on the keyboard and only a program can make use of
it.
Ø
Print Screen: The Print Screen
key is used to print any graphics or the sceneries that is shown in the monitor
screen.
Ø
Scroll Lock: The Scroll Lock
had the use of locking scrolling of large amount of running text. This key has
now been depreciated and still found on keyboards for unknown reason.
Ø
Pause: The Pause key pauses
the execution of running program. This is useful in diagnosis of hardware
problems.
In fact, there
are some more keys are available in today’s computers such as Power, Sleep,
Wake and Multimedia keys etc.
—— ○ ——
15. Describe the types and working of scanner with
diagram.
Ans. to the question no: 15
Scanners: Scanners
allow a PC to convert a drawing or photograph into code that a graphics or
desktop publishing program can use to display the image on the screen, to
reproduce the image with a graphics printer.
Types of Scanners: Three types of
scanners are available.
- Flatbed Scanner
- Handheld Scanner
- Drum Scanner
Figure
15.1: Flatbed Scanner
Figure
15.2: Drum Scanner
Working Mechanism of a
Scanner:
Figure 15.3: Working of a Scanner
A scanner works much like a photocopy machine. The
document to scan is placed on the top of a glass plate and covered by a white
cover. Under the glass plate, is scanning head. The scanning head is comprised
of a lamp and an array of sensors. The sensors are known as CCDs (Charge
Coupled Devices). The CCDs are arranged in an array so that the width of the
document can be covered. When the lamp is illuminated, an optical image of a
thin slice of the document is produced on a mirror. After two or three optional
reflections, the image is passed through a lens and projected on the CCD
sensors. These sensors convert the image into digital signals. As there are
finite number of sensors, the thin slice of the document that looks continuous
to human eyes, gets divided into small dots, called pixels. To scan the entire
document, the scanning head is moved in vertical direction in small steps, and
in each step a thin slice of the document gets scanned. Scanning a whole page
of a document is called a pass. Some scanners use multiple passes to improve
image quality. CCDs are inherently insensitive to colors. So to scan a color
document, prior to project the optical image on sensors, it is split into RGB
(red, green, blue) components. These components are sensed by the sensor-array
separately, and then the on-board processor combines them digitally to produce
a color image.
—— ○ ——
16. Describe different types of monitor, their working
process and scanning process.
Ans. to the question no: 16
Monitor:
A monitor
is simply a physical display device that allows one to see what the computer is
doing. Monitors come in many different sizes.
CRT Monitors:
Figure 16.1:CRT Monitor
and scanning process
A standard monitor screen is a CRT (cathode ray tube). The screen is coated on the
inside surface with dots of chemicals called phosphors. When a beam of
electrons hits a dot, the dot will glow.
On a color monitor these phosphor dots are in groups of
three: Red,
Green,
and Blue.
This RGB
system can create all the other colors by combining what dots are aglow.
There are
3 signals that control the 3 electron beams in the monitor, one for each
RGB color. Each beam only touches the dots that the signal tells it to light.
All the glowing dots together make the picture that you see. The human eye
blends the dots to "see" all the different colors.
A shadow mask blocks the path of the beams in a way that
lets each beam only light its assigned color dots.
LCD
screen monitor or flat panel monitor:
Figure 16.2: LCD Monitor
and its Scanning Process
LCD
(Liquid Crystal Display)
screens use an entirely different technique. The screen is still made of dots
but is quite flat. LCD displays are made of two layers of a polarizing material
with a liquid crystal solution in between. An electrical signal makes the
crystals line up in a way that keeps light from going through entirely or just
partly. A black screen has all the crystals lined up so that no light gets
through. A color LCD screen uses groups of 3 color cells instead of 3
phosphor dots. The signal for a picture cleverly lets just the right spots show
their colors. Human eye does the rest.
—— ○ ——
17. Describe different types of printers, their working
process and comparison.
Ans. to the question no: 17
Types of Printers:
Basically two types of printers are available. They are:
- Impact Printers, and
- Non-Impact Printers
Impact Printers: With this type of printer something
strikes paper & ribbon together to form a character, like a typewriter.
Types of Impact Printers:
Ø
Daisy-wheel
Printers:
These printers
have print heads composed of metallic or plastic wheels cut into petals.
Each petal has the form of a letter (in capital and lower-case), number, or
punctuation mark on it. When the petal is struck against the printer ribbon,
the resulting shape forces ink onto the paper. Daisy-wheel printers are loud
and slow. They cannot print graphics, and cannot change fonts unless the print
wheel is physically replaced. With the advent of laser printers, daisy-wheel
printers are generally not used in modern computing environments.
Figure 17.1: Daisy-wheel
Printers Figure 17.2: Petals
Advantages: Best print quality
Disadvantages:
- Very slow - 20 to 80 cps.
- Only one font can be used at a time.
- Cannot print graphics.
Ø
Dot
Matrix Printer:
Figure 17.3: Dot Matrix Printer
Pins fired at a ribbon, producing dots on the
paper, form characters. Using more and smaller pins produces higher resolution
output. Two standards have emerged 9-pin and 24-pin. Dot matrix printers
typically print up to 200 characters per second in draft mode. They usually have
a slower higher resolution (NLQ - Near Letter Quality) mode. Graphics are
possible as is color with a special four-color ribbon.
Figure
17.4: Working process of Dot Matrix Printer
One application
of dot matrix printers is in POS terminals where they are used to print the
itemized receipt for a customer. Multi-part stationery is used and the second
copy is retained at the till to provide an audit trail.
Forms characters using row(s) of pins, 9, 18, or 24, which
impact the ribbon on top of the paper. Also called pin printers. The
more pins, the smoother looking the characters.
Most dot matrix
printers have the characteristics below:
Bi-directional: prints left to right and also right to left
Tractor feed: uses sprockets to pull
continuous-feed paper
Friction feed: uses pressure to pull
single sheets
Advantages:
- Inexpensive
- Can does multi-copy forms
Disadvantages:
- Can be slow
- Loud
- Graphics of low quality, if possible at all
Non-Impact Printers:
This type of printer does not involve actually striking the paper. Instead, it
uses ink spray or toner powder.
Types of Non-Impact
Printers:
Ø Ink-Jet
Printer:
Figure
17.5: Ink-Jet Printer
Ink Jet printers
work by firing small bubbles of ink from a series of jets. The dots formed when
the ink hits the paper build up the image. Ink Jet printers are faster than a
dot matrix printer, and the quality of the image formed is much better although
it can depend on the paper used. If the paper is not absorbent then the ink
will smear. Ink jet printers have a resolution of 300 dots per inch although in
practice if the ink smears, the final result is not this good. The inks are
water based and will run if the paper gets wet.
Good quality
color is available with many monochrome printers having a color upgrade option.
Color printing is more economical when there is a separate black cartridge;
otherwise black has to be produced by mixing all three colors. Since color
cartridges are more expensive than black this adds to the cost.
A monochrome
ink-jet printer does not cost much more than a dot matrix to buy, but the
running costs are much greater. The ink cartridges are expensive and it may be
necessary to buy special high quality absorbent paper to obtain the best
results.
Ink jet printers are non-impact and are therefore
quiet in operation. They are an option when high quality output is required,
but the total amount of output does not justify the cost of a laser printer.
Most ink jet printers use cut sheet stationery some can be adapted to take
continuous stationery. Like the dot matrix printer, they produce text one
character at a time.
Advantages:
- Quiet
- High quality text and graphics
- Some can do color.
Disadvantages:
- Cannot use multiple-copy paper
- Ink can smear
Ø Laser Printers:
Laser printers
set up the image of the complete page before printing. This means that there is
an initial delay while the page is processed but once printing starts the page
is completed within a second or so. For this reason we call laser printers page
printers.
The image is formed by
small particles of toner that are distributed electro-statically on the paper.
The laser is used to build up a pattern of charge on a roller that then
transfers the toner to the paper. The toner is then heated so that it melts
onto the paper forming a permanent image.
Figure
17.6: Laser printers
The resolution
of a typical laser printer is 600 dots per inch. This refers to the number of
dots per inch used when the laser beam marks out the pattern of electric charge
that is used to distribute the toner. If the toner particle size is too large
then the effective resolution is reduced but a laser printer still produces the
highest quality output of all the printers described. Special fine tone toner
is used to obtain the best results in laser printers.
The initial cost
of buying a laser printer is two to three times that of an ink jet. The running
costs are however much less. In addition laser printers can print overhead
transparencies and they have a higher print speed compared to an ink jet.
Laser printers
are non-impact and all of them use cut sheet paper. Because of the way that
they produce the image it would be very expensive to produce a laser printer
handling large size paper. Most will take A4 paper and it is possible to buy an
A3 laser printer. Color is also an expensive option.
Laser printers
are used when high quality output is required and there is sufficient output to
justify the initial outlay or where speed of printing is important. The quality
is sufficiently good for CAD applications but these often require output to
sheets larger than the A4 that the normal laser printer can handle.
Comparison Between Printers:
Printer Type
|
Technology
|
Advantage
|
Disadvantage
|
Typical Speed
|
Daisy-wheel
Printers
|
Characters are fully formed on the “petals”, like
typewriter keys.
|
Best print quality.
|
Cannot print graphics;
Very slow;
Only one font can be used at a time.
|
20 to 80 CPS (Characters Per Second).
|
Dot Matrix Printer
|
Print head contains a cluster of pins.
The pins press an inked ribbon against the paper, creating
an image.
|
Cheaper in price;
Can print multi-copy forms.
|
Slow;
Loud;
Low quality Graphics.
|
500 CPS.
|
Ink-Jet Printer
|
Electro-statically charged drops hit paper.
|
Quiet;
Prints color;
Less expensive;
Fast.
|
Relatively slow;
Clogged jets;
Lower DPI (Dots Per Inch).
|
Several hundred characters per second.
|
Laser Printer
|
Laser beam directed onto a drum, “etching” spots that
attract toner, which is then transferred to paper.
|
Quiet;
Excellent quality;
Very high speed;
Color/black and white.
|
High Cost.
|
Up to several hundred pages per minute.
|
—— ○ ——
18. A 2.5” square image was scanned with resolution 350
ppi. If we are using 5 bit to represent this image, how much space it would
need to be stored in the computer? Leave your answer in KB, MB, Kb, Mb, GB, Gb.
Ans. to the question no: 18
The total area of the image is
2.5×2.5 = 6.25 square inch.
So the whole area in pixels is
6.25×350 pixels as 350 pixels per inch.
|
Since we are using 5bit memory to
represent this image so it will take
|
2187.5×5 = 109375 bits
Hence 109375-bit memory would need to store the image in the
computer.
Now, the answer in KB
(kilobyte) is
|
= 13671.875
Byte
Or, KB
= 13.35 KB
Now,
the answer in MB (Megabyte) is
|
= 1.40625 MB
= 0.013 MB
Now,
the answer in GB (Gigabyte) is
Or, GB
= 0.000012731
GB
Now, the answer in Kb
(Kilobit) is
Kb
= 109.375 Kb
Now, the answer in Mb
(Megabit) is
Mb
= 0.109375 Mb
Now, the answer in Gb
(Gigabit) is
Gb
=
0.00109375 Gb
—— ○ ——
19. Resize a 1024´768 image with same aspect
ratio and width of 480.
Ans. to the question no: 19
Here the ratio =
Given that width = 480
Let, height = x
According to the rule,
So, 1024×768 size in imaged
into width of 480. Then the size of the image will be 480×360.
—— ○ ——
20. A 15” color monitor has aspect ratio of 4:3.
Calculate the actual length and width of any image (in pixels) that fits exactly
with the monitor. Your monitor’s resolution is 768´624 ppi.
Ans. to the question no: 20
Let, the length is x and
the width is y.
So, the aspect ratio is __________(1)
|
|
|
Now from the Pythagoras’ theorem,
(Hypotenuse)2 = (Base)2
+ (Perpendicular)2
|
Again from equation (1),
and
Now, putting the value of x
in equation (2) we find
Hence, the width is 12 inch.
Now, putting y = 12 in
equation (2) we find
Hence, the length is 9 inch.
Given that, resolution is 768´624
ppi.
So the width in pixels will be 12×768 = 9216 pixels
And the length in pixels will be
9×624 = 56616 pixels
Hence, the actual length and
width of any image (in pixels) that fits exactly with the monitor is
Length = 9216 pixels
Width = 56616 pixels
—— ○ ——
21. Draw and label the block diagram of m - processor and computer hardware.
Ans. to the question no: 21
Block Diagram of m - Processor
(Microprocessor):
Block Diagram of Computer Hardware:
—— ○ ——
22. Define Software. Draw the hierarchical model of S/W
with examples of each.
Ans. to the question no: 22
Software:
Software is a
set of electronic instructions that tells the computer how to do certain tasks.
A set of instructions is often called a program.
Software of a
computer system is intangible rather than physical. It is the term used for any
type of program. Software consists of statements, which instruct a computer to
perform the required task. Without software a computer is simply a mass of
electronic components. For a computer to input, store, make decisions,
arithmetically manipulate and output data in the correct sequence it must have
access to appropriate programs. Thus, the software includes all the activities
associated with the successful development and operation of the computing
system other than the hardware pieces. Hardware does the actual computing, and
the software drives the computer. Figure 22.1 shows the communication between
users and hardware, Software plays the role to connect the users and the
hardware. The application software conveys the user intention to system
software and the system software transfers and translates the intention for the
hardware.
Figure
22.1
Hierarchical Model of Software:
Figure
22.2: Hierarchical model of Software.
System Software
:
System software refers to programs that assist the users to
generate, debug, test modify application programs, and then to execute them.
System software consists of programs designed to facilitate the use of the
computer by the user. The followings are some characteristics of system
software:
Ø
System software exists primarily for the
computer itself, to help the computer perform specific functions.
Ø
One major type of system software is the
operating system (OS). All computers require an operating system.
Ø
The OS tells the computer how to interact with
the user and its own devices.
Example of system software:
Common systems software
includes MS DOS, Windows95/98/200/XP, the Macintosh OS, OS/2, and UNIX, LINUX
etc.
Application Software:
Ø
Application software is a program designed for
specific user application.
Ø
Application software tells the computer how to
accomplish tasks the user requires, such as creating a document or editing a
graphic image.
Some important kinds of
application software are:
- Word Processing Programs: Microsoft Word, Notepad, WordPad, and WordPerfect etc.
- Spreadsheet Software: Microsoft Excel, Lotus 1-2-3, and LATEX etc.
- Database Management Software: Microsoft Access, dBASE etc.
- Presentation Programs: Microsoft PowerPoint
- Graphics Programs: Microsoft Paint, Adobe Photoshop, and 3D Studio Max etc.
- Networking Software: Novell NetWare, Microsoft Windows NT Server, Microsoft Windows 2000, etc.
- Web Design Tools And Browsers: Microsoft FrontPage, Internet Explorer etc.
- Entertainment: Windows Media Player, Power DVD etc.
Utility Software:
Utility software gives the
user greater control over the computer system through efficient file
management. For example, file can be easily prepared, copied, deleted, merged,
sorted, and updated by using the appropriate utility programs.
Examples of
Utility Software:
1.
Antivirus Software (Norton, McAfee etc.),
2.
File Compression Utilities (Win Zip),
3.
Disk Management Utilities (Disk Defragmenter, Disk
Cleanup etc.).
—— ○ ——
23. Describe the structure of FDD and HDD. Calculate the
storage capacity of a 3.5” HD/ED/DD floppy disk. Define low-level &
high-level formatting.
Ans. to the question no: 23
Structure of Floppy Disk
Drive (FDD):
A floppy disk is
a thin magnetic-coated disk contained in a flexible or semi-rigid protective
jacket. Data is stored in tracks and sectors.
The 3½-inch disk is made
of two pieces of rigid plastic, with the fabric-medium-fabric sandwich in the
middle. The front has only a label and a small aperture for reading and writing
data, protected by a spring-loaded metal cover, which is pushed back on entry
into the drive.
Figure 23.1:The basic internal components of a 3½-inch
floppy disk: 1. Write-protect tab, 2. Hub, 3. Shutter, 4. Plastic
housing, 5. Paper ring, 6. Magnetic disk, 7. Disk sector.
The 3½-inch floppy disk drive automatically
engages when the user inserts a disk, and disengages and ejects with the press
of a button, or by motor on the Apple Macintosh.
Figure
23.2: Floppy disk drive on front of the system case Figure 23.3: Inside of a FDD
Figure 23.4: Internal Architecture of FDD
The reverse has a similar covered aperture, as
well as a hole to allow the spindle to connect into a metal plate glued to the
media. Two holes, bottom left and right, indicate the write-protect status and
high-density disk correspondingly, a hole meaning protected or high density,
and a covered gap meaning write-enabled or low density. (Incidentally, the
write-protect and high-density holes on a 3½-inch disk are spaced exactly as
far apart as the holes in punched A4 paper (8 cm), allowing write-protected floppies to be clipped into European
ring binders.) A notch top
right ensures that the disk is inserted correctly, and an arrow top left
indicates the direction of insertion. The drive usually has a button that, when
pressed, will spring the disk out at varying degrees of force. Some would
barely make it out of the disk drive; others would shoot out at a fairly high
speed. In a majority of drives, the ejection force is provided by the spring
that holds the cover shut, and therefore the ejection speed is dependent on
this spring. Data are read from or writtrn onto the disk by a read/write head.
This head moves in or out over the head-access slot in the jacket to access
different tracks on the surface of the disk.
Structure of Hard Disk Drive (HDD):
The hard disk drive in computer
system is the "data center" of the PC. It is here that all of
programs and data are stored between the occasions that use the computer. Hard
disk (or disks) is the most important of the various types of permanent storage
used in PCs (the others being floppy disks and other storage media such as
CD-ROMs, tapes, removable drives, etc.) The hard disk differs from the others
primarily in three ways: size (usually larger), speed (usually faster) and
permanence (usually fixed in the PC and not removable).
Figure
23.5: Internal structure of a HDD
A hard disk uses
round, flat disks called platters, coated on both sides with a special media
material designed to store information in the form of magnetic patterns.
Cutting a hole in the center and stacking them onto a spindle mount the
platters. The platters rotate at high speed, driven by a special spindle
motor connected to the spindle. Special electromagnetic read/write
devices called heads are mounted onto sliders and used to
either record information onto the disk or read information from it. The
sliders are mounted onto arms, all of which are mechanically connected
into a single assembly and positioned over the surface of the disk by a device
called an actuator. A logic board controls the
activity of the other components and communicates with the rest of the PC.
Each surface of each
platter on the disk can hold tens of billions of individual bits of data. These
are organized into larger "chunks" for convenience, and to allow for
easier and faster access to information. Each platter has two heads, one on the
top of the platter and one on the bottom, so a hard disk with three platters
(normally) has six surfaces and six total heads. Each platter has its
information recorded in concentric circles called tracks. Each track
is further broken down into smaller pieces called sectors, each of
which holds 512 bytes of information.
Calculation:
Storage capacity of a HD (Higher Density) floppy disk which size is 3.5".
We know,
A 3.5" floppy disk has 80
tracks
HD floppy disk has 18 sectors
Each sector contains 512 bytes of
data.
Storage capacity is –
= (2×80×18×512) byte
= 1474560 byte = 1440 KB [1024 byte = 1 KB]
= 1.40625 MB. [1024 KB = 1 MB]
Storage capacity of ED
floppy disk:
ED floppy disk has 36 sectors
(2×80×36×512) byte
= 2949120 byte = 2880 KB [1024 byte = 1 KB]
= 2.8125 MB. . [1024 KB = 1 MB]
Storage capacity of DD
floppy disk:
ED floppy disk has 9 sectors
(2×80×9×512) byte
= 737280 byte
= 720 KB. [1024 byte = 1 KB]
Ø
Low-level formatting: Sectors (or
cluster) are the smallest addressable unit in a hard disk. Marking the tracks
and sector is known as low-level formatting. Low-level formatting also
creates master boot record (MBR) – a set-aside area for special purpose.
Ø
High-level formatting: A low-level
formatted hard disk is required to be partitioned into one or more logical
partitions. Each partition can be split into one or more logical drives. Each
drive needs to be formatted by an operating system to create file system and
FAT (File Allocation Table). This type of formatting is called high-level
formatting.
—— ○ ——
24. What is OS? Define various types of OS with their examples.
What is the function of OS?
Ans. to the question no: 24
Operating System (OS):
An operating system is an organized collection of software that controls the
overall operations of a computer. In other words, an operating system is a
program that acts as an interface between a user of a computer and computer
hardware. The primary goal of an OS is to make the computer system convenient
to use. A secondary goal is to use the computer hardware in an efficient
manner.
Types of OS:
Operating systems can be classified in a number of ways: by how they organize
primary memory, by how many different programs they can execute concurrently,
by what kind of secondary storage devices they use for work areas, by the
setting in which they are to be used, or by the basic design of their
components. So, operating system can be classified according to above
outstanding, characteristics, but some overlap occurs among the categories. We
will divide operating system into four types:
- Serial Batch-Processing
- Multiprogramming
- Time Sharing
- Multiprocessing
1. Serial
Batch-Processing: Batch processing involves collecting transactions
together over some interval of time and then processing the whole batch. Serial
batch processing operating system can run only a single user program at a time.
These are simple systems generally used on mainframes that run in batch mode
and on single-user microcomputers. In another words, a system, in which a
number of similar items or transactions to be processed are grouped (bathed)
for sequential processing during a machine run. For example, suppose the
operators received one FORTRAN job, one COBOL job and another FORTRAN job. If
they ran them in that order, they would have to set up for FORTRAN (load the
compiler tapes), then set up for COBOL and finally set up for FORTRAN again. If
they ran the two FORTRAN programs as a batch, however, they could set up only
once for FORTRAN, saving operator time. The following diagram shows, how each
program is run before the next begins.
Figure
24.1: Serial-batch processing operating systems.
Advantages:
Ø
It allows a computer to be dedicated to a
specific use.
Ø
It is less complex.
Ø
There is only user at a time.
Ø
There is no possibility that multiple programs
will deadlock.
Disadvantages:
Ø
A long turnaround time is needed.
Ø
Batch systems are slow in both processing and
output.
Ø
In batch system the programs must be debugged
statically.
Examples: CP/M,
DOS, and Macintosh operating system are the example of serial batch-processing
systems.
2. Multiprogramming
Operating System: This system involves simultaneous handling of
multiple independent programs by interleaving or overlapping their execution.
Multiprogramming operating systems can execute several jobs concurrently by
switching the attention of the CPU back and forth among them. This switching is
usually prompted by a relatively slow input, output or storage request that can
be handled by a buffer, spooler or channel, freeing the CPU to continue
processing.
Figure
24.2: Multiprogramming operating systems
Advantages:
Ø
It increases CPU utilization.
Ø
It decreases total real time needed to execute a
job.
Ø
It maximizes the total job throughput (the
amount of work accomplished in a given time interval) of a computer.
Disadvantages:
Ø
It is fairly sophisticated and more complex than
serial batch processing operating system.
Ø
Multiprogramming operating systems must keep
track of all the fobs it is concurrently running.
Examples: UNIX, Pick and IBM VM
can be classified as multiprogramming operating system.
3. Time
Sharing Operating Systems: Time-sharing operating systems are time
driven multiprogramming systems that serve several users concurrently by
rapidly switching among them. With time-sharing systems, many users
simultaneously share computer resources. Each makes use of a tiny slice of CPU
time and then relinquishes the CPU to another uses. As the system switches
rapidly from one user to the next, user are given the impression that they each
have their own computer. Users are unaware that there are other users on the
system. Windows 95, 98, 2000, XP are the time-sharing operating systems.
|
||
|
||
JOB A
|
||
JOB B
|
||
JOB C
|
||
JOB D
|
||
JOB B
|
||
|
||
JOB A
|
||
|
||
JOB C
|
||
JOB D
|
||
JOB B
|
||
|
||
JOB A
|
||
JOB B
|
||
JOB C
|
||
JOB D
|
||
JOB B
|
||
|
||
|
Figure
24.3: Time sharing operating systems
4. Multiprocessing
Operating Systems: Multiprocessing operating systems can execute
several jobs simultaneously through the use of more than one processor.
Multiprocessing is the execution of several instruction in parallel fashion on
a single computer system having several central processing units. The example
of multiprocessing operating systems is SOLRIS.
Multiprocessing systems can be subdivided into four
general types, all of which have more than one processor; they are:
- Homogeneous Multiprocessors
- Non-homogeneous Multiprocessors
- Array Processor
- Pipeline Processors
|
Figure
24.4: Multiprocessing operating system
Advantages:
- The main advantage of multiprocessing systems is speed; since more than one CPU is available; jobs can be processed faster than they can with only one CPU.
- Multiprocessing systems are high-performance operating systems, implemented almost exclusively on mainframes and supercomputers.
- In this system CPU will more likely be available when it is requested.
Function
Of OS:
1. Process Management
2. Memory Management
3. Device Management
4. Storage Management
5. Application Interface
6.
User
Interface
—— ○ ——
25. What are the types of languages? Describe with
example.
Ans. to the question no: 25
Types of Languages:
The instruction
given to the computer must have a particular format. Computers are unable to
understand human language. There are several levels of format or language,
which a computer can understand. The interest of understanding computer
languages increases day by day. The programming languages are classified in
three types:
- Low-Level Languages
- High-Level Languages
- Fourth Generation Languages (Non-Procedural Languages)
There are, however, languages that are high-level
in nature but do not serve the purposes of traditional programming. These
languages are used for various other purposes. Two common types of such languages
are:
- Scripting Languages
- Special Purpose Languages
- Low-Level Languages:
In odd days
computers were very large and were not much reliable. Switches did programming
and there was no facility to use the program. This approach of computer programming
was completely a hardware technology. Next the approach of machine language
comes up. In this approach instruction set of the computer consists of some
numerical digits. This instruction set is used to build up a program. This code
is difficult to understand for human beings. Next assembly language was
introduced. In assembly language the numerical codes are replaced by suitable
names, which are understandable. This has made programming easier.
Ø
Machine language:
The machine language is written
in words comprising of 1s and 0s. Computers execute commands or instructions
fed into the memories in machine language. The program is entered through the
switches located on the front panel or the operator console. The switches are
manually set to correspond to the binary code of each instruction; they are
then stored in the program memory. After loading the program, the address of
the first instruction is manually loaded into the program counter from the
front panel. The program is then executed by pushing on start button.
Programming in machine language has the following disadvantages:
Ø
The program must be written entirely in machine
language (I.e., with 1s and 0s).
Ø
Manually setting the switches on the front
panel, corresponding to each instruction in the program, is a tedious and
cumbersome process and likely to introduce many errors.
Ø
Errors detection and correction is tedious and
consumers even more time.
Ø
Programs written in machine language for a
specific machine cannot be used for another type of machine. Rewriting the same
program for another machine is a laborious and time-consuming process.
Ø Assembly
Language:
Programming in
assembly language is easier than programming in machine language. The
programmer is required to write a source code for each instruction in the
program and the assembler translates it to machine languages. The programmer
maintains total control of the computer operation. Assembly language offers the
greatest degree of efficiency in operation and execution of programs. The followings
are the characteristics of assembly language:
Ø
Designed to overcome shortcomings of machine
languages
Ø
Create a more productive, user-oriented
environment
Ø
Earlier termed second-generation languages
Ø
Now viewed as low-level programming languages
Ø
Use of symbolic operation codes rather than
numeric (binary) ones
Ø
Use of symbolic memory addresses rather than
numeric (binary) ones
Ø
Pseudo-operations that provide useful
user-oriented services such as data generation
- High-level languages:
These types of languages are like English language.
But this is more structured. Actually this type of languages support
mathematical notations used in arithmetic expressions. There are some special
rules for writing programs in high-level languages. High-level languages are easy
to write, compile and suitable for error correction. The followings are some of
the high level languages:
Ø
FORTRAN (Formula Translation)
Ø
BASIC (Beginner’s All-purpose Symbolic
Instruction Code)
Ø
PASCAL
Ø
C/C++
Ø
Java
- Fourth Generation Languages (Non-Procedural Languages):
Scientists are
trying to develop computer languages like human languages. They have not been
successful but may be successful in near future. These languages have greater
built-in facility such as database query, searching, sorting and interfacing.
FoxPro, Oracle, MATLAB, etc. are some of the fourth generation languages.
—— ○ ——
26.
What is network? Why we use network? Illustrate the types of network.
Ans. to the question no: 26
Network:
A Computer
Network is an interconnected collection of autonomous computers in order to
share information. An autonomous computer is one whose start, stop and control
do not depend on any other computer. Or, Network is a group of computers
and other devices, such as printers and scanners, connected by a communications
link, enabling all the devices to interact with each other.
Two computers
are able to exchange information then they are called interconnected. This
connection between two computers may be using copper wire, telephone lines,
fiber optics, microwaves, and communication satellites.
Networks
can be small or large, permanently connected through wires or cables, or
temporarily connected through phone lines or wireless transmissions. The
largest network is the Internet, which is a worldwide group of networks.
We use
Networks for the following reasons:
- Resource sharing: Programs, equipment, and data available to anyone on the network can be shared without regard to the physical location of resource and the user.
- High reliability: Alternative sources of resource supply provide high reliability. For example, files could be placed on two or three computers, so if one of them is unavailable due to a hardware failure, the other copies could be used. In addition, for presence of multiple CPUs, if one goes down the other may be able to take over its work.
- Saving money: Resource sharing provides considerable saving money.
- Salability: Computer network provides ability to increase system performance gradually as the workload grows just by adding more processor in the network.
- Communication medium: A computer network provides a powerful communication medium among widely separated people. For example, it is easy for two or more people who live far apart to write a report using a computer network.
- Simultaneous Access:
Ø
In organizations, many people may need to use
the same data or programs. A network solves this problem.
Ø
Shared data and programs can be stored on a
central network server. A server that
stores data files may be called a file server.
Some
users may only be able to read data; others may be able to make changes to
existing files.
Managers
may assign access rights to users.
Figure 1 shows
the illustration of simultaneous access.
|
|||||
Figure
26.1: Simultaneous Access
- Shared Peripheral Devices:
Ø
Because peripheral (external) devices like
printers can be expensive, it is cost-effective to connect a device to a
network so users can share it.
Ø
Through a process called spooling, users can
send multiple documents (called print jobs) to a networked printer at the same
time. The documents are temporarily stored on the server and printed in turn.
- Personal Communication:
Ø
One of the most common uses of networks is for
electronic mail (e-mail).
Ø
An e-mail system enables users to exchange
written messages (often with data files attached) across the local network or
over the Internet.
Ø
Two other popular network-based communications
systems are teleconferencing and videoconferencing.
Figure 1 shows the
illustration of Personal Communication.
Figure
26.2: Personal Communication
- Easier Backup:
Ø
Networks enable users to easily back up (make
backup copies of) important data.
Ø
Administrators commonly back up shared data
files stored on the server, but may also use the network to back up files on
users' PCs.
Types of Computer Networks:
Ø Types
of Computer Networks Based on Transmission Technology:
There are two
types of computer networks based on transmission technology:
- Broadcast Networks: Broadcast networks have a single communication channel that is shared by all the computers on the network. All the others receive packets sent by any computer. An address field within the packet specifies for whom it is intended. Upon receiving a packet, a computer checks the address field. If the packet is intended for some other computer, it is just ignored.
Figure
26.3: Broadcast networks.
- Point-to-point Networks: Point-to-point networks consist of many connections between individual pairs of computers. To go from source to the destination, a packet on this type of network may have to first visit one or more intermediate computers.
Figure
26.4: Point-to-point networks.
Ø Types
of Computer Networks Based on Their Scale:
- Local Area Networks (LAN): Local area networks, generally called LANs, are privately owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations in company offices and factories to share resources and exchange information. The characteristics of LANs are:
- Its activities are limited in small area.
- The rate of data transfer is usually between 0.1 to 100Mega bits per second.
- The computers are connected in series combination.
- It is easy to establish and cheaper to construct a LAN.
Figure
26.5: A very simple LAN (Bus topology)
- Metropolitan Area Networks (MAN): A metropolitan area network, or MAN, is basically a bigger version of a LAN and normally uses similar technologies. It might cover a group of nearby corporate offices or a city and might be either private or public.
Figure
26.6: Metropolitan Area Network (MAN)
- Wide Area Networks (WAN): A wide area network, or WAN, spans a large geographical area, often a country or continent. It contains a collection of computers intended for running user programs called hosts or end systems. The hosts are connected by a communication subnet, or just subnet for short. The following benefits are available from WAN:
·
Various statistical data, newspapers, journals,
books, movies can be collected and used.
·
Letters can be sent to any place of the world by
electronic mail (e-mail) system.
·
Bulletin boards can be formed individually or
jointly.
·
Online shopping can be done.
|
|
|
|
|
|
|
|
|
|
Figure
26.7: Wide Area Network (WAN)
In addition to the individual
users' PCs (nodes), many networks use a central computer, called a server.
A server has a large hard disk
for shared storage. It may provide other
services to the nodes, as well.
In a file server network, nodes can
access files on the server, but not necessarily on other nodes. Server-Based
Networks are:
- Client/Server Networks:
Ø
In client/server computing, individual nodes
share the processing and storage workload with the server.
Figure
26.8: Client/Server Network.
- Peer-to-Peer Networks:
Ø
In a peer-to-peer network, all nodes have an
equal relation to one another.
Ø
Each node usually has access to some resources
on other nodes, so users can share files, programs, or devices on other users'
systems.
Ø
Some peer-to-peer networks use a server, but
some do not.
|
|
Figure
26.9: Peer-to-Peer Networks.
- Hybrid Networks: Hybrid networks are the combination of both Client/Server and Peer-to-Peer Networks. In a hybrid network, there is one or more server and central control, but individual computers still can share resources among themselves. Hybrid networks benefit from the presence of central control but also inherit the weakness of client-server networks. They enjoy the freedom of peer resource sharing.
Ø
Inter-networks:
Many computer
networks exist in the world, often with different hardware and software. People
connected to one network often want to communicate with people attached to a
different one. This desire requires connecting together different and
frequently incompatible networks. The connection is made by using computers
called getaways to provide the necessary transition both in terms of hardware
and software. A collection of interconnected networks is called an
inter-network or just Internet.
A common form of
Internet is a collection of LANs connected by a WAN.
The Internet
is a specific world wide Internet that is widely used to connect universities,
government offices, companies, and private individuals.
—— ○ ——
27.
What is network topology? Describe all types of network topology with example
of each.
Ans. to the question no: 27
The
Network Topology: The manner in which computers in a network are
geometrically arranged and connected is known as the Network Topology.
There are 6 kinds of network
topologies and these are:
1. Bus
Topology: In a Bus Topology, all the computes are connected to a common
transmission medium. As a result of this, only one pair of computes on the
network can communicate at the same time. Each computer has a unique address,
which is used when information is transmitted. When a data packet is sent out,
it propagates throughout the medium and is received by all computers. To
receive message, each computer continuously monitors the medium and copies
those messages that are addressed to it as the data packets go by. Since the
transmission medium in a bus is generally time-shared, there must ne some type
of control mechanism to prevent several stations from transmitting
simultaneously.
Figure
27.1: Bus Topology
Ø Characteristics
of Bus Topology:
- Network maintained by a single cable.
- Cable segment must end with a terminator.
- Uses thin coaxial cable (backbones will be thick coaxial cable).
- Extra stations can be added in a daisy chain manner.
- Standard is IEEE 802.3
- Thin Ethernet (10Base2) has a maximum segment length of 200 meter.
- Maximum number of connections is 30 devices.
- Four repeaters may be used to a total cable length of 1000 meter.
- Maximum number of nodes is 150.
- Thick Ethernet (10Base5) used for backbones.
- Limited to 500 meter.
- Maximum of 100 nodes per segment.
- Total of four repeaters, 2500 meter, with a total of 488 nodes.
Ø Advantages
of Bus Topology:
- Easy to implement and extend.
- Well suited for temporary networks that must be set up in a hurry.
- Typically the least cheap topology to implement.
- Failure of one station does not affect others.
- Easy to connect a computer or peripheral to a linear bus.
- Requires less cable length than a star topology.
- Easy to add stations.
- Works well for small networks.
Ø Disadvantages
of Bus Topology:
- Limited cable length and number of stations.
- Maintenance costs may be higher in the long run.
- Performance degrades as additional computers are added.
- Entire network shuts down if there is a break in the main cable.
- Terminators are required at both ends of the backbone cable.
- Difficult to identify the problem if the entire network shuts down.
- Not meant to be used as a stand-alone solution in a large building.
- No longer recommended.
- Limited number of devices can be attached.
- Sharing same cable slows response rates.
2. Ring
Topology: In a ring topology, consecutive computers are connected by
point-to-point links, which are arranged to form a single closed path. Data are
transmitted from node to node around the ring. The interface at each computer
has the ability to recognize packets destined to it.
Figure
27.2: Ring Topology
Ø
Characteristics of Ring Topology:
- No beginning or end (a ring in fact!)
- All devices of equality of access to media
- Single ring – data travels in one direction only, guess what a double ring allows!
- Each device has to wait its turn to transmit
5. Most common type is Token Ring (IEEE
802.5)
- A token contains the data, reaches the destination, data extracted, acknowledgement of receipt sent back to transmitting device, removed, empty token passed on for another device to use
Ø
Advantages of Ring Topology:
- Growth of system has minimal impact on performance
- All stations have equal access
- Data packets travel at great speed
- No collisions
- Easier to fault find
- No terminators required
Ø
Disadvantages of Ring Topology:
- Most expensive topology
- Failure of one computer may impact others or a break in the ring will bring it down
- It is complex to construct
- Requires more cable than a bus
3. Star
Topology: In a star topology, all computers are joined art a single
point called the hub.
Figure
27.3: Star Topology
Ø
Characteristics of Star Topology:
- Like the spokes of a wheel (without the symmetry).
- Centre point is a Hub.
- Segments meet at the Hub.
- Each device needs its own cable to the Hub.
- Predominant type of topology.
Ø Advantages
of a Star Topology:
- Easy to install and wire.
- No disruptions to the network then connecting or removing devices.
- Easy to detect faults and to remove parts.
- Can accommodate different wiring.
- Easy to add devices and new stations as the network expands.
- One cable failure does not bring down the entire network (resilience).
- Hub provides centralised management.
- Easy to find device and cable problems.
- Can be upgraded to faster speeds.
- Lots of support as it is the most used.
Ø Disadvantages
of a Star Topology
- If the hub or concentrator fails, nodes attached are disabled.
- More expensive than linear bus topologies because of the cost of the concentrators.
- A star network requires more cable than a ring or bus network.
4. Mesh
Topology: Mesh is a highly redundant topology with multiple connections
between each node. The multiple connections allow for more then one way
to reach any given node directly. A true mesh would have a direct
connection between every node and every other node.
Figure
27.4: Mesh Topology
Ø
Characteristics of Mesh Topology:
- Not common on LANs.
- Most often used in WANs to interconnect LANs.
- Each node is connected to every other node.
- Allows communication to continue in the event of a break in any one connection.
- It is “Fault Tolerant”.
Ø
Advantages of Mesh Topology:
- Improves Fault Tolerance.
- Communication can take place directly between any two nodes without an intermediary.
Disadvantages of Mesh
Topology:
- Expensive.
- Difficult to install.
- Difficult to manage.
- Difficult to troubleshoot.
5. Tree
Topology: A tree topology combines characteristics of linear bus and star
topologies. It consists of groups of star-configured workstations connected to
a linear bus backbone cable. Tree topologies allow for the expansion of an
existing network, and enable schools to configure a network to meet their
needs.
Figure 27.5: Tree Topology
Ø Advantages
of Tree Topology:
- Point-to-point wiring in order to individual segments.
- Supported by several hardware and software venders.
Ø Disadvantages
of Tree Topology
- The type of cabling used, limits overall length of each segment.
- If the backbone line breaks, the entire segment goes down.
- More difficult to configure and wire than other topologies.
6.
Wireless Topology: The wireless topology has been developed for mobile
computing. In a wireless topology, single or multiple machines can connect
through a single wireless access point.
Figure 27.6: Wireless
Topology
—— ○ ——
28. Describe Computer Virus.
Ans. to the question no: 28
Computer Virus:
Computer
Virus is a program that attempts to spread from computer to computer and
either cause damage (by erasing or corrupting data) or annoys users (by printing
messages or altering what is displayed on the screen). The elaboration of the
word VIRUS is Vital Information and Resources Under Siege.
History:
A program called
“Elk Cloner” is credited with being the first computer virus to appear “in the
wild” -- that is, outside the single computer or lab where it was created.
Written in 1982 by Rich Skrenta, it attached itself to the Apple DOS 3.3
operating system and spread by floppy disk.
The Anatomy of A Virus:
Basically a virus has three parts:
Ø
Replicator: In order to replicate
itself, a virus must be permitted to execute code and write to memory. For this
reason, many viruses attach themselves to executable files that may be part of
legitimate programs. If a user tries to start an infected program, the virus'
code may be executed first. Viruses can be divided into two types, on the basis
of their behavior when they get executed. Nonresident viruses immediately
search for other hosts that can be infected, infect these targets, and finally
transfer control to the application program they infected. Resident viruses do
not search for hosts when they are started. Instead, a resident virus loads
itself into memory on execution and transfers control to the host program. The
virus stays active in the background and infects new hosts when other programs
or the operating system itself accesses those files.
Ø
Concealer: Concealer hides the
virus from the eyes of users and anti-virus programs. Unless a virus is
detected, it cannot be removed. Today’s viruses use advance techniques to
camouflage them.
Ø
Payload: The payload of a virus
can be practically anything, but generally it refers to the damage a virus
causes. Virus opting for long life has no or very little payload so that the
users do not notice their existence. Other viruses, however, can format hard
disks, delete files, erases operating systems, show annoying messages, reboot
computer and even erase the BIOS ROM program.
Types of Viruses:
Ø
Boot Sector Viruses: These viruses
infect boot record of a floppy or hard disk. Boot viruses move the boot record
program elsewhere and copies them in boot sector. When the computer is started,
the virus copies gets loaded into main memory where it can hide and infect
other disks. Computer that tries to read an infected floppy disk also gets
infected. Example of boot viruses: Form, Disk Killer, PETTER, QRRY and Stone.
Ø
Program Viruses: This type of
virus infects executable program files, such as those with extensions like
.BIN, .COM, .EXE, .OVL, .DRV and .SYS. When an infected program is run, the
virus also gets executed. Example includes Sunday, June 12th, July
13th and Cascade
Ø
Stealth Viruses: These viruses
reside in memory and use certain techniques to avoid detection. They can also
conceal the changes they make. They often befool the operating system and user.
Example includes Frodo, Joshi and Whale.
Ø
Polymorphic Viruses: This kind of
viruses, uses garbling or encryption technique to mutate themselves so that
they appear different in each infection. Those viruses are more difficult to
detect. Examples of polymorphic viruses are Involuntary, Stimulate, Cascade, Phoenix, Evil, and Proud
etc.
Ø
Macro Viruses: A macro virus is a
fragment of code that infects the macros within a specific type of document
file, such as MS Word or Excel files. They also infect the templates so that
every new document gets infected. Any computer opening an infected Word or
Excel file will also fall victim. Example includes DMV, Nuclear, and Word
Concept.
Ø
Trojan Horses: A Trojan horse is
malicious but benign program that does not replicate when infecting a system
but used to open back doors or security holes so that hackers (virus writers)
can take control over the infected system or steal vital data. As an example,
QAZ helped hackers steal secret source codes at Microsoft web sites.
Ø
Worm: Worms are viruses that have
the capability to spread themselves over networks. Worms are commonly spread
over the Internet using email attachments. When a user opens an infected email,
the worm gets installed on the computer. The virus then collects email address
from the address book of mail program, and sends itself to those addresses. The
worm Blaster infected more than 1 million computers worldwide in August 2003.
Prevention of Viruses:
Computer virus can cause huge loss of data if sufficient measures are not
taken. As prevention is better than cure, computer viruses are to be prevented
from infecting computers. To stay free from viruses the following steps should
be followed:
Ø
Floppies from other users should be avoided.
Floppies are hosts of boot virus.
Ø
Any program downloaded from the Internet should
not be executed without checking for viruses in them.
Ø
Shareware games are known to be good carrier of
viruses. They should be run after virus inspection.
Ø
Worms are spread relying on the ignorance and
curiosity of email users. Email from unexpected sources should never be opened
or read.
Ø
Script (VB/Java) should be given minimum
privileges in Internet browser software. Installing any form of component
directly from the Internet should be avoided.
Removing Viruses:
Computers infected with viruses are cured with Antivirus programs. The
followings are some popular Antivirus software:
- McAfee Antivirus
- Norton Antivirus
- AVG Antivirus
- PC Cillin Antivirus
—— ○ ——
29. Draw a flowchart/Algorithm to sum all odd/even
numbers below 20/50.
Ans. to the question no: 29
Flowchart/Algorithm to sum
all odd numbers below 20:
- Start
- Statement 1
- Read ODD NUMBER, SUM
- Statement / operation 2
- If ODD NUMBER IS LESS THAN 20, go to step 3
- Print SUM
- END
Flowchart/Algorithm to sum
all even numbers below 50:
- Start
- Statement 1
- Read EVEN NUMBER, SUM
- Statement / operation 2
- If EVEN NUMBER IS LESS THAN 50, go to step 3
- Print SUM
- END
—— ○ ——
Press the most effective career option!
ReplyDeleteAlso visit my homepage - lawyer search engine optimization
Feel free to surf my homepage ; legal leads
Discover More
ReplyDeleteMy homepage - leads for lawyers
Here is my homepage ; lawyer leads
Bе іntelleсtual enough to sее that your ad does
ReplyDeletenot go οn aiг on a unsеemly show ; a Christian book going on аir on a show thаt іѕ about hаndling sexual isѕueѕ wοuld bе ridiсulous.
Intеrnаl or External Sound Mіxer
"All windows systems come with a internet sound mixer they all differ so you may need to review your manual or online sources to figure out how to enable or use it. In much the same way, two-way radio rental offers businesses and individuals substantial savings in money, time and resources that equipment ownership never will.
Here is my blog post :: visit the next post
If you consider that an online bingo players, many sites that will stimulate numerous of them
ReplyDeleteto generate loose net casino break from task and
visits to offer in the track down for a down payment in the past a definite date.
Each program will have a box with a checkmark, find the programs you'd like to uninstall and uncheck that box. The player guides Phen through 10 levels of dungeon gameplay, finding a whole host of weapons and other items as well.
Here is my site - videos von youtube downloaden
Also see my site - prosportstv.y0.pl
An interesting discussion is worth comment. I believe that you should publish more about this issue, it might
ReplyDeletenot be a taboo subject but generally folks don't talk about such subjects. To the next! Cheers!!
Also visit my blog post :: http://ferkaudahrexu.webs.com/apps/blog/show/21848246-the-prime-minister-the-cabinet-and-parliament-is-only-a-facade-to-conceal-the-true-power-of-britain-
my website: general.cic.co.ke
The most important thing to know when you are selling an account is where you are going to sell.
ReplyDeleteWIFI:Als Verbindungsmoglichkeiten ins Internet stehen Ihnen WIFI wireless lan zu Verfugung.
A Twitter app for Zune has been created and is
now available for download through Microsoft's Marketplace.
Review my web-site: youtube converter
Hеy! This is kinԁ of off topic
ReplyDeletebut I neeԁ somе аdvice frοm аn eѕtablished blog.
Is it very haгd to sеt up your οwn blog?
I'm not very techincal but I can figure things out pretty quick. I'm thinking about creating my οwn but I'm not sure where to begin. Do you have any tips or suggestions? Many thanks
Check out my page; simply click the up coming site
As we all know, looks can be deceiving, so I decided to try out
ReplyDeletethe question tool for myself. ''. The more doors you have the more chances of people finding it.
The only thing that cannot be "fixed" later is your blog and post titles.
Is professional search engine marketing
the thing that you need. Enough said. Domain Authority is influenced by:.
There are many tools online to help you research relevant keywords, such as the
Google Adwords Keyword Tool. The title is supposed to explain the article, and the title is what your readers see when they search for content.
People these days use the Internet for a varied purpose.
It is a sagacious process that has become even tougher with the
continuous changes in the algorithm of the major search engines especially Google.
The concepts make use of the current social networking sites, which
are very popular among the online audience. Effective SEO techniques for
Bloggers aren't any different. Immediately the word free caught my eye. Once you find the right and affordable SEO Company, it is essential to talk about your business objectives, target customers and future goals with the professionals to help them develop their strategies accordingly. Here are some examples of things that were once good moves that can now get you into trouble. In fact, soon, not using RDFa could put a site at a disadvantage. SEO is becoming the most rewarding career nowadays. And make the work flow smoothly, using good grammar at all times. com is one of the premier portals on the World Wide Web which has been formulated with the intention of providing SEO Hosting options for webmasters around the world who seek a way to ensure that their websites reach the top ranks of all major search engines.
my webpage More Material
While it is one thing to have a social media
ReplyDeleteprofile on an online community like Deviant - ART, it is a whole other thing entirely to have fitted it with an
effective SEO strategy. If the executives promise high traffic then understand you
are talking with a non-SEO person. It's a competitive world out there on the world-wide web, but SEO consulting can help you dramatically improve your odds of being found in the din and getting your message across. Working with an SEO expert in your country can help as SEO experts within the same country generally know how to optimize websites for a specific country's audience more
effectively. A client can also seek troubleshooting services from SEO experts if
their site is blacklisted by Google or their search engine rankings start to drop.
This is the best part to ensure complete uniqueness to each of the websites.
Domain Authority is influenced by:. There are many tools online to help you research relevant keywords, such
as the Google Adwords Keyword Tool. The businesses have understood the need to take
SEO services for attaining good search engine
placement. What are the advantages of article submission.
The final way that you can use your Deviant - ART profile for
SEO purposes is by being an active member of the community ' watch the work of others (especially if they are related to your business), encourage others to watch your work, comment on work, list other users as your friends. However, in general, SEO services involve using standard and compliant coding. Basically, if you create links to your website with "ink cartridges" or "printer cartridges" in the anchor text, it will help move your website up on the search results for those key words. Think wine, and keep the URL intact. Create a general, high-level category in which you want to manage all phrases'for example 'global,' 'online,' 'channel,' and so on.
Why. You need to try to find reputed SEO consultants.
However with passing time the complexity in this field
has increased and performing an SEO task is not a simple thing to do.
What is the magic formula. November 2012.
Feel free to surf to my web site :: http://makoto-tanaka.com
"Is there really no way to transfer my VC and Wii - Ware games from my Wii to another. Naturally the ideal situation is to be able to lose weight really fast with a little amount of discomfort. Each child is given 30 seconds to race to the pile and make as many matches as possible before time runs out.
ReplyDeleteHere is my homepage; gratis spiele
Also see my web site: kostenlos spiele spielen
Hi! Thіѕ is my fiгѕt visit
ReplyDeleteto your blog! We are a team of vοlunteers anԁ
starting a neω initiative in a community in thе samе niche.
Your blog provіded us uѕeful information to work оn.
You hаѵe dοne a marνellous job!
My webpage :: spiele spielen
Nice blog here! Additionally your web site rather
ReplyDeletea lot up fast! What web host are you the usage of?
Can I get your affiliate hyperlink for your host?
I wish my site loaded up as fast as yours lol
Visit my page; spiele spielen kostenlos
Hi there, after reading this amazing article i am also cheerful to share my
ReplyDeletefamiliarity here with colleagues.
my site ... Crysis 3 Game Key
But the the main thing is a lot of your personal data is out there whether it's health information, bank card details or even as the Albuquerque mishap shows courtroom files. So even at young ages and relatively low levels of the sport, goalies will have their helmets designed with various colors, prints and patterns, shapes or designs, and more. Official Picture of President Reagan by the Executive Office of the Presidency used under Public Domain. When it comes to bridging your skills gap in gaming world then you can do anything to prove yourself. In doing so, it becomes the only potential choice for best gaming PC under 500 bucks in the desktop category. But there is a magic formula. games for preschoolers. In an effort to counter the lack of support from Microsoft, an SVG plug-in for Internet Explorer was developed and supported by Adobe. A far cry from the land of milk and honey you may think. When you set out to influence another’s feelings for you, are you not interfering with that person’s free will.
ReplyDeleteAlso visit my page :: www.fontalpina.com/home/?q=node/88104/
my website > http://virtlantis.com/
Greetingѕ fгom Ohio! I'm bored to tears at work so I decided to check out your website on my iphone during lunch break. I enjoy the knowledge you present here and can't wаit
ReplyDeleteto take a look when I get home. I'm amazed at how fast your blog loaded on my cell phone .. I'm not еven using WIFI, just
3G .. Anyways, awеѕome blog!
My ωеb-ѕite :: youtube converter
Tennis balls, wiffle balls, ping pong balls, and golf balls can also be used.
ReplyDeleteYou will eventually run into the Download Location menu with two options: Wii System
Menu and SD Card. A Twitter app for Zune has been created and is now available for download through Microsoft's Marketplace.
Visit my site kostenlos spielen ohne anmeldung
The Federal Emergency Management Agency (FEMA) has made available to communities literature
ReplyDeletewhich provides guidance and technical information
educating communities on how to become disaster resistant in the face of
natural disasters. An alternate electrical power source reduces the probability that the
access technique will turn out to be inoperable via strength reduction and aid
conserve battery lifestyle. Both Intel and AMD contain information built in the
processor to allow the processor to be used efficiently with
mobile computing saving on battery life while giving the best performance.
Here is my weblog: internetradio
And then, you'll probably see that the battery's charge won't be as durable as before. However, it is still possible to insect the terminals and make sure there is no corrosion. Aside from these types of power packs, you can even choose the 8-cell and also 12-cell electric battery.
ReplyDeletemy web-site; mouse click the up coming internet site - bleacherreport.com
My webpage :: onlineradio
This act is recognized as "farming", whereby you create a character and promote it.
ReplyDeleteAfter deciding on the video games you want to sell, search for websites
that offer the facility. Games such as Bugsby the Reading System, The Tag Reader, Hot Dots Reading Comprehension Kits and 20Q
are a few of the many games available that serve this
purpose.
Feel free to visit my weblog; eriklj.multiply.com/journal/item/56/Painless-Games-Systems-Where-To-Go
The application also offers some freebies like ID3 tagger and audio
ReplyDeletetrimmer. However, the MP3 player doesn't have an impressive volume buttons and the quality of sound is also not good. Of course, this is just the public face of the flap between two not disinterested parties.
Take a look at my web site ... http://ljuatsiinasw.soup.io/post/302303900/Looking-For-Green-Energy-Information-Start-Here
My webpage > home-page
A motivating discussion is definitely worth comment.
ReplyDeleteI do think that you should publish more on this topic, it might not be a taboo
subject but generally people do not discuss such subjects.
To the next! Many thanks!!
Here is my blog :: minecraft flash game
Youг aгtіclе features
ReplyDeleteprоven neceѕsary to myself. Ιt’s veгy educational and
уou are naturally extremely well-infοгmed in this гegiοn.
You pοssess eхposеd my personal sight for you to ԁifferent views on this paгticular subjeсt along with interesting and solid written content.
Heгe iѕ my web page ... indimusic.tv
bookmarked!!, I like your site!
ReplyDeleteHere is my web site; virtapay money exchange
I loved as much as you will receive carried out right here.
ReplyDeleteThe sketch is tasteful, your authored subject matter
stylish. nonetheless, you command get got an shakiness over that you wish be delivering the following.
unwell unquestionably come further formerly again since exactly the same
nearly very often inside case you shield this hike.
my webpage - castleville guide
Right away I am going to do my breakfast, later than having my breakfast coming
ReplyDeleteyet again to read more news.
Here is my web site ... sharecash downloader