We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
CF sirguruacadiemy
Select the suitable answer for the following Multiple choice questions.
1. What computing machine was capable of taking input from punch cards and
storing data in memory?
a)Abocus biAnalytical Engine
¢)Tabulating Machine @) Differential Analyzer
What technology replaced vacuum tubes in second-generation computers?
a) Transistors by Integrated Circuits les)
€) Microprocessors 4) Magnetic tapes,
iii, Which computer generation introduced the use of Integrated Circuits (ics)?
Sees
seem
ty. Which of the following isan example of anatural system?
a) Telephone network by Human body
c) Database d)AutomobileC) sirguruacademy
¥. Which component of the microprocessor controls the working of input/output
devices and storage devices?
a)Arithmetic Logic Unit (ALU) (_b)Controt Unit (CU)
c) Memory Address Register (MAR) d) Data Register (DR)
vi, Which type of memory retains data even when the computer is turned off?
a)RAM (eRon >)
)Cache 4) Register
vii, What és the main purpose of Cache. ory?
ste pro mation
¢) Control input/output devices 6) Perform arithmetic operations
vili, What is the smatiest unit of memory in a digital computer?
a) Kilobyte b) Bit
c) Byte 6) Megabyte
Which memory type uses laser beams tor
a) RAM (0) Optical memory
€) Cache memory 6) ROMC) sirguruacademy.
x. In Von Neumann architecture, where are instruction data and program data
stored?
C) In the processor's registers d) lithe cache memory
xi, What ts the primary function of the buses ina computer's memory system?
b) Display graphics
: on of the Presentation Layer in the OSI model?
a) Establishing connections between computers
b) Converting data into a standard format
) Deciding the physical path of data
4) Sending data in both directions simultaneouslyCj sirguruacademy,
xiii. In which network topology is data transmission unidirectional, like radio or
television broadcasts?
c) Mesh Topology
Impact printers: bs 7
Advantages: Cheap, reliable, can print on multiple
copies.
ary
Disadvantages: Noisy, slow, poor print quality.
Non-impact printers:
Advantages: Quiet, fast, high quality prints.
Disadvantages: More expensive, can be sensitive to
paper. Scape hayoO sirguruacademy
nr a
»
Ae s
xii. Define "protocol" in the
context of data communication. ‘oO sirguruacademy
Answer: A protocol is a set of rules or standards that govern
how data is transmitted between electronic devices. It
ensures that devices can understand and communicate
with each other effectively. Think of it as acommon
language for computers.
Examples of protocols include HTTP (for web browsing),
TCP/IP (for internet communication), and FTP (for file
transfer).Cy sirguruacademy
ars 2 a
xiii. Define simplex, half-duplex,
and full-duplex modes of
communication with one example §
each. , 4
sooO sirguruacademy
Answer: iat * i?
Simplex: Data flows in one direction only (e.g., TV
broadcast).
Half-duplex: Data flows in both directions but not at
the same time (e.g., walkie-
talkie).
Full-duplex: Data flows in both directions: t
time (eg, phone call).oO sirguruacademy
“ ae
xiv. What are start and stop —
bits, and where are they used {
in data transmission?
ye EEeo} sirguruacademy
Answer: Start and stop bits are signals used in serial
data transmission to indicate the beginning and end of
a data packet.
Start bits: Marks the start of a data packet
Stop bits: Mark the end of a data packet
They help to ensure that data is transmitted and
received correctly by synchronizing the timing of the
data flow.tC sirguruacademy
xv. How does a switch differ eo hub ina network? |
Answer: "8 *
Aswitch directs data only to the specific device
it is attended for, making the network more
efficient.
A hub on the other hand, sends data to all
devices on the network, which can lead to
network traffic and slower petraoO sirguruacademy
—_— 2 y
ie ;
xvi. How does asynchronous
transmission differ from synchronous ‘
qi
transmission, and in what situations are
they typically used?Oo sirguruacademy
Answer:
Asynchronous transmission sends data one byte or
character at a time with start and stop bits to
indicate each packet beginning and end. It is used for
intermittent data transfers, like typing ona
keyboard.
Synchronous transmission send data in a continuous
stream with a clock signal to keep timing consistent.
It is used for continuous data transfers, like in
network communications or large file transfers.oO sirguruacademy
ae >
xvii. Explain t the concept of a peer-
to- -peer network a and its limitations
compared to a client/server network. —oO sirguruacademy
Answer:
A peer-to-peer (P2P) network has all computers
share resources equally without a central server.
Limitations include harder management, reduced
scalability, and potential performance, issues as
each computer handles both providing and using
resources.
In contrast, a client/server network uses a central
server for better management, scalability, and
performance.Oo sirguruacademy
xviii. Compare and contrast the star and ring
network topologies.
Answer:
connects all devices toa
central hub or switch. If one device fails, the
rest continue to work. It's easy to manage
and expand but relies on the central hub.Oo sirguruacademy
3 a
Ring topology connects devices in a circular fashion.
If one connection fails, it can disconnect the entire
network. It's harder to manage and expand but can he
efficient for data transmission.
Comparison: Star topology is more reliable and easier
to maintain, while ring topology can be erica but is
more vulnerable to disruptions.OC sirguruacademy
xix. Why is mesh topology considered the most reliable
but also the most expensive to implement?
Answer: Mesh topology is considered the most
reliable because every device is connected to
every other device, so if one connection fails,
others can still maintain the network. However, it
is also the most expensive to implement due to
the high number of cables and connections
required.CJ sirguruacademy
xx. What is the role of the Application Layer in the OSI
model?
Answer: Application Layer in the OSI model
provides network services directly to end-
user applications. It handles tasks like data
translation, encryption, and communication
between software programs and the network.(>) sirguruacademy
Q3. Write long answers of the following questions.
* They used vacuum tubes.
* They were slow in speed and memory was very
small.
* Machine language was used in these computers.
* For example, ENIAC (Electrical Numerical
Integrator and Computer)¢ Transistors were used in these computers.
* Transistors reduced the size of computer and increased the
speed and memory of computers.
* Assembly language was used in
these computers.
¢ For example, UNIVAC
(Universal Automatic Computer) II(>) sirguruacademy
* These computers used IC (Integrated Circuits)
chips.
*IC chips improved speed and
memory of computers.
* Keyboard and monitors were
=
used in them. SL
* For example, IBM System/360 === —|») sirguruacademy _ J
« Microprocessor was used in microcomputers.
* They are very fast, have large storage capacity and use
advanced input/output devices.
* They support modern
programming languages such as
C++, Java, etc.
¢ For example, Core i3, i5, i7 computers.(>) sirguruacademy
* Artificial Intelligence (Al) is used in these computers.
* Al minimizes the need to write programs.
* They allow users to enter commands in any natural
language like English.
° For example, robots and
expert systems.\> sirguruacademy
Answer:
There are many types of systems in our world. Some are
natural (found in nature), and others are artificial
(made by humans). Understanding these systems helps
us solve problems, protect the environment, and
improve technology.sirguruacademy
Natural Systems (Found in Nature)
These systems work on their own, without human help. They are
balanced, adapt to change, and exist in the environment.
Examples :
| cosystems: Forests, oceans, grasslands. e8
Weather System: Rain, wind, temperature. ee.
\ Systems: Earthquakes, mountains.
stems: Rivers, lakes, water cycle.
Soar System: Sun, planets, moons.
\ Systems: Human body, coral reef.[> sirguruacademy
Artificial Systems (M
These systems are created by humans to solve problems or
make life easier. They need planning and maintenance.
Examples :
Communication Systems: Telephone, internet.
Ipformation Systems: Software, databases.
Transportation Systems: Cars, trains, airplanes.
Lnerey Systems: Power plants, solar panels.
Manulactunoe Systems: Factories, robots.
Healthcare Systems: Hospitals, medical devices.
ade by HumarWY Why It Is Important
It helps us study systems properly.
It helps protect nature and manage resources.
It improves technology and human life.(>) sirguruacademy
: (Characteristics)
Fifth-generation computers are based on Artificial Intelligence (Al).
These computers can think, learn, and solve problems like humans.
These computers can perform many tasks at the same time using
parallel processing.(>) sirguruacademy
They can understand and reply in human language using NLP.
These systems work like human experts in fields
like medicine or engineering.
These computers use voice recognition and
gesture controls to interact easily.(>) sirguruacademy
Challenges & Impacts on Soc
1. Job Loss:
Automation might replace human workers in many jobs.
2. Better Efficiency:
Tasks can be done faster and with fewer errors.
3. Ethical Concerns
Issues like privacy, bias in Al, and decision-making need attention.
4. Improved Healthcare
Al can help in early disease detection and treatment.
5. Education & Skills:
People will need new skills to work with Al.[> } sirguruacademy _
and how
1. 5-0): Device that sends the data like a computer or phone.
2. Device that receives the data.
3. Me >: The actual data being transferred like text, image, or video.
4.>»>'>. 0: Rules that decide how data is sent and received. Examples:
TCP/IP, HTTP.
diu he physical path like cables or wireless signals.
Specific frequency or path used for data transfer.
7.0) 000) Oe ooo: They convert data for transmission and back to
readable form.TT
(>) sirguruacademy
How They Work Together
1. Sender encodes data and follows the protocol.
2. Data is sent through the selected medium and channel.
3. Receiver receives the signal.
4. Receiver decodesthedatausingthe _. g : Q )
same protocol. OT AN ge
5. Receiver processes and uses (A QB , 8)
Q)\-
the data.(>) sirguruacademy
An
A communication device is used to send data from one place
to another in a telecommunication system.
The most common communication devices are Hub, Switch,
Router, and Gateway.(>) sirguruacademy
A hub is a basic device used in LAN to connect many
devices together. It sends the received data to all
connected devices.
It is not intelligent — it
does not know where
to send data, so it sends a a a a
to all.(>) sirguruacademy
A switch is smarter than a hub. It reads the address
on the data packet and
sends it only to the correct
device.
This saves bandwidth and
improves performance.(>) sirguruacademy
A router connects two or more networks, like your
home network and the internet.
It decides the best path to send
data to the right destination.(>) sirguruacademy
A gateway connects networks that use different
communication rules (protocols).
It changes the format of data to
make it readable for the
receiving network.(>) sirguruacademy
Answer:
Network topology means how devices (nodes) are
connected with each other in a network.
There are four common topologies: Bus, Star, Ring,
and Mesh.(>) sirguruacademy
All devices are connected through a single cable called a bus.
Advantages
Good for small networks.
Easy to add devices.
Less cable needed.
Limitations
If the cable breaks, the whole
network stops.
Hard to find problems.
Not good for large networks