0% found this document useful (0 votes)
94 views71 pages

Computer Science Class 9, Chapter 1 Complete Solution

It's computer

Uploaded by

abbasbangash8960
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
94 views71 pages

Computer Science Class 9, Chapter 1 Complete Solution

It's computer

Uploaded by

abbasbangash8960
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
CF sirguruacadiemy Select the suitable answer for the following Multiple choice questions. 1. What computing machine was capable of taking input from punch cards and storing data in memory? a)Abocus biAnalytical Engine ¢)Tabulating Machine @) Differential Analyzer What technology replaced vacuum tubes in second-generation computers? a) Transistors by Integrated Circuits les) €) Microprocessors 4) Magnetic tapes, iii, Which computer generation introduced the use of Integrated Circuits (ics)? Sees seem ty. Which of the following isan example of anatural system? a) Telephone network by Human body c) Database d)Automobile C) sirguruacademy ¥. Which component of the microprocessor controls the working of input/output devices and storage devices? a)Arithmetic Logic Unit (ALU) (_b)Controt Unit (CU) c) Memory Address Register (MAR) d) Data Register (DR) vi, Which type of memory retains data even when the computer is turned off? a)RAM (eRon >) )Cache 4) Register vii, What és the main purpose of Cache. ory? ste pro mation ¢) Control input/output devices 6) Perform arithmetic operations vili, What is the smatiest unit of memory in a digital computer? a) Kilobyte b) Bit c) Byte 6) Megabyte Which memory type uses laser beams tor a) RAM (0) Optical memory €) Cache memory 6) ROM C) sirguruacademy. x. In Von Neumann architecture, where are instruction data and program data stored? C) In the processor's registers d) lithe cache memory xi, What ts the primary function of the buses ina computer's memory system? b) Display graphics : on of the Presentation Layer in the OSI model? a) Establishing connections between computers b) Converting data into a standard format ) Deciding the physical path of data 4) Sending data in both directions simultaneously Cj sirguruacademy, xiii. In which network topology is data transmission unidirectional, like radio or television broadcasts? c) Mesh Topology Impact printers: bs 7 Advantages: Cheap, reliable, can print on multiple copies. ary Disadvantages: Noisy, slow, poor print quality. Non-impact printers: Advantages: Quiet, fast, high quality prints. Disadvantages: More expensive, can be sensitive to paper. Scape hay oO sirguruacademy nr a » Ae s xii. Define "protocol" in the context of data communication. ‘ oO sirguruacademy Answer: A protocol is a set of rules or standards that govern how data is transmitted between electronic devices. It ensures that devices can understand and communicate with each other effectively. Think of it as acommon language for computers. Examples of protocols include HTTP (for web browsing), TCP/IP (for internet communication), and FTP (for file transfer). Cy sirguruacademy ars 2 a xiii. Define simplex, half-duplex, and full-duplex modes of communication with one example § each. , 4 so oO sirguruacademy Answer: iat * i? Simplex: Data flows in one direction only (e.g., TV broadcast). Half-duplex: Data flows in both directions but not at the same time (e.g., walkie- talkie). Full-duplex: Data flows in both directions: t time (eg, phone call). oO sirguruacademy “ ae xiv. What are start and stop — bits, and where are they used { in data transmission? ye EE eo} sirguruacademy Answer: Start and stop bits are signals used in serial data transmission to indicate the beginning and end of a data packet. Start bits: Marks the start of a data packet Stop bits: Mark the end of a data packet They help to ensure that data is transmitted and received correctly by synchronizing the timing of the data flow. tC sirguruacademy xv. How does a switch differ eo hub ina network? | Answer: "8 * Aswitch directs data only to the specific device it is attended for, making the network more efficient. A hub on the other hand, sends data to all devices on the network, which can lead to network traffic and slower petra oO sirguruacademy —_— 2 y ie ; xvi. How does asynchronous transmission differ from synchronous ‘ qi transmission, and in what situations are they typically used? Oo sirguruacademy Answer: Asynchronous transmission sends data one byte or character at a time with start and stop bits to indicate each packet beginning and end. It is used for intermittent data transfers, like typing ona keyboard. Synchronous transmission send data in a continuous stream with a clock signal to keep timing consistent. It is used for continuous data transfers, like in network communications or large file transfers. oO sirguruacademy ae > xvii. Explain t the concept of a peer- to- -peer network a and its limitations compared to a client/server network. — oO sirguruacademy Answer: A peer-to-peer (P2P) network has all computers share resources equally without a central server. Limitations include harder management, reduced scalability, and potential performance, issues as each computer handles both providing and using resources. In contrast, a client/server network uses a central server for better management, scalability, and performance. Oo sirguruacademy xviii. Compare and contrast the star and ring network topologies. Answer: connects all devices toa central hub or switch. If one device fails, the rest continue to work. It's easy to manage and expand but relies on the central hub. Oo sirguruacademy 3 a Ring topology connects devices in a circular fashion. If one connection fails, it can disconnect the entire network. It's harder to manage and expand but can he efficient for data transmission. Comparison: Star topology is more reliable and easier to maintain, while ring topology can be erica but is more vulnerable to disruptions. OC sirguruacademy xix. Why is mesh topology considered the most reliable but also the most expensive to implement? Answer: Mesh topology is considered the most reliable because every device is connected to every other device, so if one connection fails, others can still maintain the network. However, it is also the most expensive to implement due to the high number of cables and connections required. CJ sirguruacademy xx. What is the role of the Application Layer in the OSI model? Answer: Application Layer in the OSI model provides network services directly to end- user applications. It handles tasks like data translation, encryption, and communication between software programs and the network. (>) sirguruacademy Q3. Write long answers of the following questions. * They used vacuum tubes. * They were slow in speed and memory was very small. * Machine language was used in these computers. * For example, ENIAC (Electrical Numerical Integrator and Computer) ¢ Transistors were used in these computers. * Transistors reduced the size of computer and increased the speed and memory of computers. * Assembly language was used in these computers. ¢ For example, UNIVAC (Universal Automatic Computer) II (>) sirguruacademy * These computers used IC (Integrated Circuits) chips. *IC chips improved speed and memory of computers. * Keyboard and monitors were = used in them. SL * For example, IBM System/360 === — |») sirguruacademy _ J « Microprocessor was used in microcomputers. * They are very fast, have large storage capacity and use advanced input/output devices. * They support modern programming languages such as C++, Java, etc. ¢ For example, Core i3, i5, i7 computers. (>) sirguruacademy * Artificial Intelligence (Al) is used in these computers. * Al minimizes the need to write programs. * They allow users to enter commands in any natural language like English. ° For example, robots and expert systems. \> sirguruacademy Answer: There are many types of systems in our world. Some are natural (found in nature), and others are artificial (made by humans). Understanding these systems helps us solve problems, protect the environment, and improve technology. sirguruacademy Natural Systems (Found in Nature) These systems work on their own, without human help. They are balanced, adapt to change, and exist in the environment. Examples : | cosystems: Forests, oceans, grasslands. e8 Weather System: Rain, wind, temperature. ee. \ Systems: Earthquakes, mountains. stems: Rivers, lakes, water cycle. Soar System: Sun, planets, moons. \ Systems: Human body, coral reef. [> sirguruacademy Artificial Systems (M These systems are created by humans to solve problems or make life easier. They need planning and maintenance. Examples : Communication Systems: Telephone, internet. Ipformation Systems: Software, databases. Transportation Systems: Cars, trains, airplanes. Lnerey Systems: Power plants, solar panels. Manulactunoe Systems: Factories, robots. Healthcare Systems: Hospitals, medical devices. ade by Humar WY Why It Is Important It helps us study systems properly. It helps protect nature and manage resources. It improves technology and human life. (>) sirguruacademy : (Characteristics) Fifth-generation computers are based on Artificial Intelligence (Al). These computers can think, learn, and solve problems like humans. These computers can perform many tasks at the same time using parallel processing. (>) sirguruacademy They can understand and reply in human language using NLP. These systems work like human experts in fields like medicine or engineering. These computers use voice recognition and gesture controls to interact easily. (>) sirguruacademy Challenges & Impacts on Soc 1. Job Loss: Automation might replace human workers in many jobs. 2. Better Efficiency: Tasks can be done faster and with fewer errors. 3. Ethical Concerns Issues like privacy, bias in Al, and decision-making need attention. 4. Improved Healthcare Al can help in early disease detection and treatment. 5. Education & Skills: People will need new skills to work with Al. [> } sirguruacademy _ and how 1. 5-0): Device that sends the data like a computer or phone. 2. Device that receives the data. 3. Me >: The actual data being transferred like text, image, or video. 4.>»>'>. 0: Rules that decide how data is sent and received. Examples: TCP/IP, HTTP. diu he physical path like cables or wireless signals. Specific frequency or path used for data transfer. 7.0) 000) Oe ooo: They convert data for transmission and back to readable form. TT (>) sirguruacademy How They Work Together 1. Sender encodes data and follows the protocol. 2. Data is sent through the selected medium and channel. 3. Receiver receives the signal. 4. Receiver decodesthedatausingthe _. g : Q ) same protocol. OT AN ge 5. Receiver processes and uses (A QB , 8) Q)\- the data. (>) sirguruacademy An A communication device is used to send data from one place to another in a telecommunication system. The most common communication devices are Hub, Switch, Router, and Gateway. (>) sirguruacademy A hub is a basic device used in LAN to connect many devices together. It sends the received data to all connected devices. It is not intelligent — it does not know where to send data, so it sends a a a a to all. (>) sirguruacademy A switch is smarter than a hub. It reads the address on the data packet and sends it only to the correct device. This saves bandwidth and improves performance. (>) sirguruacademy A router connects two or more networks, like your home network and the internet. It decides the best path to send data to the right destination. (>) sirguruacademy A gateway connects networks that use different communication rules (protocols). It changes the format of data to make it readable for the receiving network. (>) sirguruacademy Answer: Network topology means how devices (nodes) are connected with each other in a network. There are four common topologies: Bus, Star, Ring, and Mesh. (>) sirguruacademy All devices are connected through a single cable called a bus. Advantages Good for small networks. Easy to add devices. Less cable needed. Limitations If the cable breaks, the whole network stops. Hard to find problems. Not good for large networks

You might also like