0% found this document useful (0 votes)
559 views

Computer Aptitude

Uploaded by

Navya Arora
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
559 views

Computer Aptitude

Uploaded by

Navya Arora
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 75
Computer Awareness Scanned by CamScanner Scanned with CamScanner Computer Fandamentals [A computer ix » programmable machine, The principal characteris of Computer is that Tesponds to spect set of iuiucons ns welldeined tanner and it can exeeme a preordsed tof instveions. Basic Computer Organisation Alem sper psf the flleing fe Bsc pe ‘ation 1 inpting The proces: of enerng data and insrctons into the computer ma 2, Storing Saving data and instructions to make them readily available for inal or edvonl processing, as and when required. for converting raw inpub In this chapter, we cover all the basic concepts of computer system suchas - computer omanisation, storage devices, types of ‘computes, history of computers, computer Soret ‘eneraton. A vast vaioy [ecosty] ‘of questions areasked in Soot ‘the exam from this chaptec Pegi fio JI [roman eration sraoae— 7 Unt /Y'| Soa ‘pots sof toner tot J) sess tow i ‘esvacone and dat atmaie) | “~~ ees ro on forecl errcend bbe corwolet ‘central Processing Unit (CPU) 3. Processing Performing arithmetic operations add, subtract, multiply, divide, ele. or logical operations (comparisions like equal to, less than, {greater than, etc) on data (0 convert them into usefl information. Scanned by CamScanner Scanned with CamScanner 4, Qutputting The process of producing useful formation resi or the wer, eh as 9 printed report or visual display. 5. Controlling Dirceting the manner and sequence in which al of the above operations are performed. Computer organisation displays the five major building locks (functional unis) of a digital computer system. “These five units corresponds to Ue five basic operations, pecformed by all computer systems. Input Unit ‘The following functions are performed by an inp uit 1 It accepts (or reads) the instructions and data from the outside worl. 2.1 converts these instructions and data in computer acceptable form. 3, It supplies the converted instructions and data to the computer system for further processing. Output Unit The fllowing fanctons are performed by an output unit 1. Itaccepts the results produced by the computer, ‘which are in coded form, and hence, eanrot be easily understood by us. It converts these coded results to human acceptable (readable) form 3. It supplies the converted results to the outside world. Storage Unit ‘The specific functions of the storage unit are to hold 1. The data and instrvction required for processing received from input devices. 2. Intermediate results of processing. 3. Final results of processing, before these results are released to.an output device. The storage unit ofall compulers is comprised of the following neo pes of storage Primary Storage “The primary storage, sso known as main memory, is used to hold pieces of programme instructions and data, intermediate results of processing and recently produced results of processing, of the jobs which the Computer system is eurcently working on Computer Awareness Secondary Storage a Scare secondary Horge Smack ones TMS primary storage, and it can retain in for we, when the computer system is switched offer sence Arithmetic Logic Unit (aLu) “The ALU of a computer system isthe place, whe Schl exeeulion ote atacdons er pac fe me Se tng ‘opeation Tor be eee ae faleobtions are performed and all compete (Gecisions) are made in the ALU. The dea set {hsvvetions, stored in the primary srage ‘bene em cd a ers ce tre ALU, where processing takes place. No proteing done in. "he primary Songs ont. Tnemeda reoults generated inthe ALU are temporarily tran feck us the primary storage, ual needed ter Control Unit (CU) It does not perform any actual processing on the data, the control unit acts as a central nervous system, forthe other components of the computer system, It manages * and coordinates the entire computer system. It obtains structions from the programme stored in main memory, interprets the instructions, and issues signals which cause other units of the system to execute ther, Central Processing Unit (cpu) “The CU and the ALU of a computer system are join town asthe CDU. Iki the brain of 2 coripler stem ‘All major clelations and comparisons are made ine the CFU, and the CPU is responsible for activating and Controlling the operations of eer uni of the computer gystem, F concept about Bit, Byte and Words + it Abtisthe mon bavcinfomatonunic sed meompungad Inlomlon theory Auagebitissoneoraser aoueor atte 2 ‘schon OFF Fite A nbblen be compunng comer the aggrernoen thet ia theearesnteen( 2) posible volves, Bytesand Ocets.Therermocte swap teestoans becuieny eis mony wed i the Bett of computer ecwciing whet Computestath deren hyemach mgr havetocemmurere ‘modem byte slmotenesnably mens eghe Bi. ‘Words The em word al for 3 ura pepo bes whch apd rmtancu by recess cl» ac ace Th Steal wards tha CPU- pce Many teens werd cs EBS Scanned by CamScanner Scanned with CamScanner Computer Fundamentals Now IEC Standard bt Bt) oer ne 8 | ates, kobe ra | tozeis lb we | toons bone finan We | tozeies ictyteeemsy | 48 | tocobmes regpbt sti | roca ots ebony | me | icashoayees tmegabye cemay | oe | roo0kiintos sigan cot | 1000 megapts sibye (onan SB | 102k mentyes saapyetceemay | ce | sco0mesabytes tent, Tet | 000 gens tebinje (onan) we | ta2ngbbyes teratyroteceimay | 18 | tocaggatytes petabt Pot | roc0terais pedoyetinay) | pis | rocerebbynes potabyieaeeimay | PB | roodieabyees fant Bot | 1000 paste emDyte (onan) We petites abo (Secin) 1000 potas Storage Device Although memory is technically any form of electronic sorage, it is used most often dently fas, temporary forms of storage. When, the information kept in memor the CPU ean access it much moze quickly, Whether, comes from permanent storage (the hard drive) oc input (Whe keyboard), most data goes in- Random Access ‘Memory (RAM) frst. The CPU then stores pieces of dain it will need to access, often in a cache, and maintains certain special instructions inthe register ‘Storage devices ar divided into too types (i) Primary storage devices (i) Secondary storage devices. Primary Storage Devices Various primary trae deve an given Une 1. Random Access Memory Commonly known by Ii acronym RAM, tsa iype of computer Storage whose contents cin be sccesied in any (fandom) order. Its usually that RAM ean be both writen wo and ead from, in contrast (0 Read Only Memory (ROM) 2.Read Only Memory Read Only Memory (ROM) is used as a storage medium in computers. eeaose it eannot (sil) be weiten fis main se Hein the dstrbution of femvare (aftvare ats very closely related to hardware, and not likly to eel frequent uppradiog 3. Programmable Read Only Memory A Programmable Read Only Memory (PROM) fs foom of digital memory where the zing a ach bit isTocked by a fee orate. Blowing fuse opens 2 connection while blowing an ante closes 3 Connection (hence the name). 4. Erasable Programmable ROM An Erasable Programmable Read Only Memory (EPROM) isa, type of computer memory hip that relainsits dala when Its power supply iz switched off. Once programmed, an EPROM can be erated only by ‘exposing ito strong uluavolet light 5. Electrically Erasable Programmable ROM Electrically Erssable Programmable Read ‘Only Memory (EEPROM is the user modifiable conly memory which can be erased ond reprogrammed (wsiten to) repeatedly through the application of higher then normal electecal vollage. A special fem of EEPROM isthe flash memory. 6. Dynamic RAM Dynamic Random Acces ‘Memory (ORAM) is a. type of random access ‘memory Which stores each bit of dala in a separale ‘xpacitor The number of electrons stored in the ‘apacitor determine whether, the biti cansidered Tor 0. As the expacior leske electrons, the {information getelxt event, unless the charge is refreshed periodically. 2. Synchronous DRAM Synchronous | DRAM. (SDRAM) is a generic mame for variois"binds of Dymamie Random Access Memory (DRAM) that sre synchronised with the clock apecd that the mroprocessor is optimised. Tie tends to increase the aumber of instructions that the processor ean perform in a given ime. Secondary Storage Devices Various sceondry storage devices are pee elo J. Tape Drive A tape drive, ako known as a streamer is a storage device that reads and ses dts seed om a magna ape ‘ypieally used for archiving large volumes of data. They ave not the fastest form of data SHorage, a8 they are sequential, but ate long Tasting and cost efficient. 2 Floppy Disk kis a data storage device that is composed of a crear piece of thin, exible ( Toppy) magnetic storage medi encased ins aqutre or rectangular plastic walled. Floppy disks are ead and writen by a opp disk drive, Scanned by CamScanner Scanned with CamScanner A. Hard Disk A hard disk is 9 nonvolatile data storage device that stores dain on a magnetic Surface layered onto disk platters. This fs the most ely used iF data storage. 4. CDROM The CD-ROM (an abbreviation Compset Disc Real Only Memory) is a al data storage me the for romvolatil o me phys! format. Tse re allo compact tine, Jealable by compoter with » CD-ROM thse A CD-ROM is a flat, metalized plastic dlise with information encoded an it in a spiral, from entre 1 the ouside edge. A. standard CD.ROM can hold about 700 megabytes of data oF about 80 minntes of sudo. 5, DVD It is an optical dise storage media format that ean he used for data storage, including movies Jy quality video and sound. DVDs with resemble compact discs; theie physical ie the same 12cm or the mini 8 em but they are encoded ina diferent format and ata much higher density. DVDs are made from 2 0.6 mm thick disc of polyearbonate plastic coated with a much thinner {eefletve) aluminium layer. Two. such dives are lued together to form a 12 mm doublosided dise A single layer DVD can store 4.7 GB, which is round seven times as much a standard CD-ROM. Input Devices ‘Some inpst devices used in computer system are given below Audio Input Devices * Microphone An acoustic sensor that provides input by converting sound into electrical signals Text Input Devices + Keyboard A device to inputtext and characters by depressing buttons (referred to as keys or buttons). Pointing Devices Some pointing devices are given blow + Mouse A pointing device that detects two dimensional motion relative to its supporting surface. + Optical Mouse Uses light to determine mouse motion. Computer Awareness «Trackball A. pining ovice consnig prs ot Ha hee ge ay detects rotation about two axis, et ta, tnereen Senses the es preing dy the display. Pressing eety om Ligie Pen Msapén shaped dor objects ona display screen. Settee Dar Coe Render A bar cde sa sto ier ties ta opesn er of cole readers are used to input data from brenda ‘Most products in shops have har codes on then, Dar code reaclers work by shining a beam, nan thetines tat make phen coc ance oat that is reflected back, "| Gaming Devices Some goming devices are gioen blow + Joystick A control device that contsts of » hhandheld stick that pivots around one end, to detect angles in two or dee dimensions and reports angle or direction to the device itis contoling + Game Pad. Aband held game controller tat les ‘on the digits especiaYy thumbs) to provide input + Game Controller A specific type of contller specialized for certain gaming purpotes. Image, Video Input Devices This ype of input devices ore given Below 1. Image Scanner A device that provides input by analysing images. printed text, handwriting of 38 object. 2, Web Cam A video camera used to provide inal inpot that can be easily transferred over te internet 43, Digital Camera Pictures taken ‘wing 2 dt ‘camer. are slored imide ils memory ad ca be transfered to a computer by conneding Be camer toit 4. Optical Character Recognition (OCR) Ussiy abbreviated to OCR, involves computer sofware designed to translate images of typewiten tet (usually captured by. a scarner) machine-editable text, of 10 tanslte pictures of Gharaclers into a standard encoding scheme representing them in ASCH or Unicode. One of the leading OCR software avaiable inthe ‘market is Seansoft Omni Page. — Scanned by CamScanner Scanned with CamScanner Computer Fundamentals 7 5. Magnetic Ink Character Recogni + CRT (Cathode Ray Tule) disp cognition athe Ray Tab) dapay (MICR) MUCK i + spec! ind of Opteat * LED (Lig Ciyatal Digg) ae of 2010 Gharcter Recogniion (OER technology tet oe LCD (Liquid Cysal Dipl) a9 of 2000 soph main ae ge neal a the. primary saat py Tor penal facilitate the processing of cheques” Almost all compitess: shoqsesinchade MICR character atthe boom of + LED (Ligh Emitng Die) daplny the cheque lean ont nom a E13 + OLED (Oigonie Light Emiting Diode) IOS790, 123150: 124500 123450300 ‘spay Magnetic Ink Character Recogriton | © Optical Mark Recognition (OMR) OMRisa Programming Languages iethod of computed input fom (aly) paper , Roa ee “There are wo major types of programming languages. thetacthatSeer a cingeed rom OCR BY These are Low Level Languages (ELL) am High Level ihe man energie neg One Teage fata) Low il lopaes ae oe ‘peneil bubble exam. divided into machine language and assembly language. - Low Level Languages (Ltt) Output Devices “The ermfow evel means csenes oie way in which Some ouput dvs wed n computer item oe given Belew the machine has been built. Low level languages re L Printer A device tat produces permaneot Machine orienfed and require extensive knowledge of humanreadable text of cone dolemenn'y computer hardware and its configuration Pale will ive theusera hard copy ofthe rent Machine Language Machine language is the only ‘of computer's processing. Tanguage tha is directly understood by the computer I. Painters are uwsally categorised under two doesnot needs any translator programme. We azo eal ‘categories impact or non-impact printers. it machine code and itis writlen ae strings of I's (one) ands (ero) When tis sequence of codes ed tothe Computer it ecognics the eodes and converts i into ; Slecrcl signals needed to run ig 4 programme reget Bean EaPar bho and chareetespuction may ook ie this 1OLOOOHION trate pines and doy wheel print Assombly Language The set of symbols and etre mimpact Printers Nowispact printing ("=the sembly language and a ransator programme Sean ening etiam EROS sSrequied to trandte de szembly engage chine Fear ee ers rapon tevingtotihe paper, | apguge. This wanstor programme iced asters Pak cans Seca nina he paper ov heat ands considered to bea second generation language. te hapa of carte, sample of nonimpact High Level Languages (HLL) Bema pies + Hier lve! anges te spe angus ha we ish and mattematical symbols ike +, / et. 4. Plotter Plotiersare used to print graphical output cil area . fo pape. It interprets computer commands and f0F #8 programme constucti tmakesline drawings on paper singmulicoloured + Higher level languages are problem oriented Sutomated pens [iseapableofprodecing graphs, languages because the instructions ace suitable for dtravings, chars, maps et. solving a paseulae problem. eg, COBOL (Common 5. Speakers Typically spur ofdevices(2channes) Business Oriented Language) mostly suitable Tor ‘hich convert electrical signals into audio. busines oienfed language where ther very lle eg seta hear PrOCEsng and hoge oiput There are mathenateal leadphones fora single user are Siented Languages tke FORTRAN (Formula the audio, Translation) and BASIC {Qegianers All-purpose 6. Monitor An clecironie visual display with textual Symbolic Instruction Code) where very large and graphical information rom the compe. procesingis required. 2. Impact Printers Impact printers transfer the age on to paper through a printing mechanism Scanned by CamScanner Scanned with CamScanner Software Seaqence of inst canbe nnerstond doct ‘s vents veal describe the they ate to be nsed. whieh it compiiter [scaled n computer te aufvare refers to the Ret of peoeedres, and associated rogeamnes, and how Types of Software Software are divided into to tyes 1. System Software It is 9 sct of one or more one, sige ty con the operation ad Eni he cence afc sytem. Ipafrms onc or moto the lle nls ‘= Supports the development of other app! ‘= Supports the exccution of other apy software. ‘+ Monitores the effective use of various hardware resources, such as CPU, memory peripherals ele. = Communicate with and controls the operation Of peripheral devices such as printer disk, tape The mort commonly known tyes of system softoare are + Operating System Every computer has an perating system software, which takes care of the effective and efficient utilisation of all the hhardware and software components of the + computer system, + Programming Language Translators These are “system software, which transform the instructions prepared by programmers in a programming language into form which can be interpreted and executed by a computer system. * Communication Software In a network environment communication software enables transfer of data and programmes from one computer system to another. Utility Programmes These {also known as ulliies) area set of programmes, which help Computer Awareness Users in systein_ maintenance taaky performing tasks of routine nature, tO in fi fot pectic take ya hrc ‘et Tern commonly brn epliatio fn ny + Word Processing roening slate Sables wri compensa freeing ding wt forming,” ring. reticulate, document 5 and printing + Spreadshect Sofware Aspen Sear 3 nmerea a amy oan ahe allows us to create a Kind. of eomeuenss inige, A manval ledger tra bok Paget tnd eee; which ecountanauae eo 'eccord of nancial, asacons’ PAE preparing fine datements + Database Software A dante coleionot feted data sored and wened Senet ‘Mloratonretteal purpose A data base softvaze tease of on o mse Trogrames,abich, bie aro cient Sxtbse ainsi (od delete and up ot {eco smd ongarte dats deed eto + Graphics Sofware A grphie sfwae peace ts to uo s combo apien Bt realing eating, lowing, stoning. rely sd Pinng dewghs, dewing ples, gph ad ything ete that ca be dete ne toon manners + Personal Assistance Software A personal Sslsance snftare ‘lows to we Frome Computers for aoring’ and esi peter informason® snd plang. ad managing or schedules, conc ancl ad inventory of inportant em, + Edueaton Sofware Education sft Allows us computor sir to be med 8 teaching and learning tool. i Scanned by CamScanner Scanned with CamScanner Computer Fundamentals History of Computer Abacus isa Latin word that possibly originated from th hast origins in the Grek words bax or abskon (meaning table or table) which in urn, we seme word bq, meaning sand, Historical Overviow of Computer Yor = Tran Tam any | Sim ie tea | Oaerwen eset rece tor | Graartenteine etre tet es oc tear | boner Eadstontawessarsine swat | choco btocvesren teres te02 | vermont sy Adstontce _[Ravatnracscongpend Aayamarsen tno | Howsunacnamouceremperray inte! worse | Ootsn tem anest 2 arse Coop vo | weacaninny ox eanesturecniyte ato) twee | crsove, sous santana) Se penne Cons sae | Stoner stimm 2A ease noe Sse arte Compe veo | ter sdoatnusn rome cen Des arate np) tas | eames onc cmc asm conse) t= | Sttoroceal ames we tse | icone fee ne tos | leewsen evan tise | chetrmyeanetentins eos cro ten | cocerae con. tose | Semtemcnrarctanantine fesse tee | heen osser ton | over reser tm | oedoptin congo re tow | Sencar ese tm | out Copan fisocs wet | toucormy rarewen ime | sosecanny ncn cise tame | tecccorny fssanouepecee tor | tmscrestce tow tree | doowausasse coms 1997 tet eal 1999 Ave Pentium zo | we esac eee mo zea | orton ton 2004 ‘Richard Staliman June ‘2006 ‘Mecrosutt Corporation actors _ 7 jo Opeth Sn ar |e nin Dae yen mele iesor ones Scanned by CamScanner Scanned with CamScanner ce 10 OMputer Avrarengss Types of Computers Various types of computer are described below 1. Microcomputer Microcomputer isa the lowest end of he computer range tn tems of sped and capacity. Ils CPU ina microprocessor. The fist microcomputers were buil of 8-bit microprocessor chips tye of microcomputer are IBM PC, PC-AT. ‘hips. Exampiey 2. Mint Computer ‘This i slesigned Wo support more thn one user ata time. It poststes george e, pees ats higher speed. Tee compue ised in moldwser sytem n which varios wersean ease, tizme. They are alo uved as servers in Lneal Atex Networks (LAN). tame 3. Mainframes Msinfames are nsed in ongonisaions such ar banks and insurance companies, top umber oftansactlon online. They cequie computers with very lage disks to lore several erates gi ‘and transfet data from disk to main memory at several hundred megabytes/sec. of data “The procesing power needed from such computers hundred million transactions per second. 4. Supercomputers They ate the fastest and most expensive machines. They have high proces ‘compared to ather computers. They have also mulli-processing technique. "BF Procesing sped ‘One ofthe ways in which supercomputers are built s by interconnecting hundreds of microprocessor, have a large main memory of around 16 GB and a zecondary memory of 1000 GB. rocesior Itshoutd 5. Work Stations They ate alzo desktop machines. They are however, more powerful proviiag proceso sits res date PO. Nal yang man mena of wean 0NBto eG and ed ss . The standard operating system of wock stations UNIX and ts derivatives such an (SUN) and HP UX (HP). . ‘AUX ((B44) Soa Scanned by CamScanner Scanned with CamScanner Computer Fundamentals wa ; couse ope] | mscortan sia] yon) ueans | paoiwpinanang| “rompantetl| wou covweneg ick] sacteean| Savors] Seumtonmcoucs| ""aaoei| wart] anno ‘ues : ewan B04 wawistnenco tines] Suma! spot elimgesixo nocbo| eajsua'eg] Sieve corso] pms swaishs, * amen oyna neg tories] sea'Susauel| spicae Seiasnteaumadea| " eeeann| sewer voesuea| sovsns| posses sonow aus sve snr | squozs seorgea Aquosepureonn| _vaseuen) ome Tamara] pene] td veertory wis iyendo] sds | sopsgatems |g | aeay uogemon soynduog Jo suope10u0D Scanned by CamScanner Scanned with CamScanner Computer Awarengy, 12 sangucs ao pieyoea| Bruae| cows sanyo tal : earn ovoo's Oe auto, Tees| sicpaasvoces| -nethy Suse a 'bedwea| | scuowars pouseeurs| onpse og reeuts| woe NEI MED] oso "Nel Tiedy viei| ‘becwoy vial| _ siopuonsofeyi russ syuace reduce ‘ Sasveresieee ‘aenupe | " psnog| ‘sioauta| soassonid a5: epeevsuineuing atesn seindog soup nope | foes nol “sropuyisn| SHeposrI| oun pa ubaRien | Legesen 210 28h SOasN| ‘soos sxdu odin abus| ay6us| _Boura Apine9| acann scuny| Gur Aessun9) Su ongnese| yuo. acqeyen| na sens herds 51__Kessuep| vasassbmiciumpsrihee —_Ayevan|iou _ Apiuos| exe unipant cu heau09) eT eee 204] ey hu hieava5 no. fresesop| 20 sou tit Wo Su hez0ua9| rani eu ABD eG (woo 6 sabre hewva9 | 29/0 Je_spseu) 0019] sans saindwo2sadng Scanned by CamScanner Scanned with CamScanner Let us Practice 4s How mony ede per aceon nen 1 GH? (©) 1000000 (©) 1000000000 {@) 100000 2, Which isnot an output device? (2) Monitor Painter (©) Speater 13 Wowse 3. Where does your PC store your programmen when the power is off? (0) Dram (0) Hard dick (@) Cacho (6) Monitor 4. The capacity of 35 inch Moppy disk is (9) 140M5 @ \0se 91408 @ Va1G8 5. Which of the following is firet generation of computer? (a) EDsac sov1400 (6) Coc teoe 3 iceane 6. Dot matric isa type (2) tape ©) pier fen bn 7. Which cleetronie component was use in first generation? {@) Vacuum mbes (0) Teansistors (6) (Cenips (@ Alotinese 8. The blinking symbol on the computer sereen is called the (@) mouse (©) fogo (©) hang (0 cvesor 9, The personal computer industry was started by (@) Microsot ©) Apple (@) Compaa (@ Wo 10. Programmes stored in ROM are ealled (@) Haraiare (©) imate (6) Somware {@) Alot tse LL. Which ofthe following term is rotated with scanners? (2) Laser (o) TWAN (6) Caniiege () Mecta 12, Primary memery stores (2) cata (©) programmes (e) results (@) Alot me above Asetofinstruetions telling the computer what todo inenlled (2) moror ()instetr (2) compte (2) progarene M4, Which of he following ie use ae primary storoge levis? (0) Magneieonuat POM 18) op ek {o Atotinese 1B, Whereis your BIOS stored? (0) Dan (e) sora © Fos (0 Ha dek 16. Which ts not an input device? (0) Keyboard (0) Mentor {6} Touch screen (@ tse 1% Which device can understand difference between, : data and programmes? (0) np die () Oupa device (©) Memory (0) Meroprocsssor 38. Whichis the fastest? (0) Haga Pan @ Fomw (@ Coane 19, Thomumber of pixels displayed ona sereen is known ae the secen () resolution ©) estou doptn (6 toteshrte {8 srg see 20, Instructions and memory address are represented y (e) erwaceccode ——_—&) binayeode {2} brary word (6) poy ot BL. Which of the (allowing is nat atypical peripheral part? (ef US (2) Pata {6 sera 00 22, Whatisthelatest write onc optical storage media? (0) Dai paper (0) Magno otal dk {6 womek (a conomdee 23, Which technology is used in empaths? {0} Necharical (Becta! Gi Beatoreyreic (er 2A, Which othe following memories needs ees? 1) Ona fo aaa a seu (@ Mtnese Scanned by CamScanner Scanned with CamScanner 14 25, What kind of a dot pitch (dp) monitor 1s better to ave? {Mediu (0) Hones (@ Lower (6) Nove ottnese 26. What is the noine of the computer terminal whieh ives paper printout? {o) Display screen {@) Hard copy lewninat 27, What iseache memory? ak (@) Extra memory used fr evetiow trom your hard {EDA place to sore eect Information the passwords {e) tis same as your hod disk eve {eh Fast memory used for data hats accessed olen {) Soll copy terminal (@) Piotr 28, What is PCI? {@) Akind of printer 1B) Atype ol microprocessor {@) Apo! system bus. 1a Aninauloutput device 29, What does CPU stand for? _ {@) Computer Processing Unit (@) Cental Processing Unit (6) Cental Programming Unit (2) Computer Programme Unit 30. What does ROM stand for? {a) Random Oniy Memory (b) Read Only Memory {Road On Momory (2) None of the above 81. What does GUI stand for? (@) Genuine Unit vention (0) Groptical Uses imagination Computer Awareness 92. ALU Is {@) Ray Logic Unit) Ate Lege Ua, {@) Application Logic Unit (3) Hone of woes |. FORTRAN is (2) File Tancation (0) Fontat {@) Formula Tranclation (8) Floppy Nanas |. The most important advantage of video dig, {o) compactness (©) potent capac, Pps aa 36. ACupse Disk CD) Ie data soot ote {0} magnetic ©) optical me (6) clectical (0) eectrosmechaniay ‘36, The IC chip, used in computers, is made of saa cacy ooo ssn 1. Wha igs rerepresentive ofall boty ountage oo oT Bans a3 ‘98. The act of retrieving existing data from me called mote (0) Readout (0) Read tom (6) Read @ Alot bese 89. A computer programme that converts an entie program inte machine language is called alan (2) orci (0) simulator © compier (@) commander 40. The two kinds of main memory are (0) pimary and sacondery (0) encom and sequent See S ecrrecro 8 ee Answers 40) 2 30 4 SB) AG) 8) 18.) nO 2O BO “4H BO BO TH We Ba me Ne 2G BO we) BE Blo) Me) MWe) Be) wo) Hi RO BE ¥E) BE} He) Me) BE BE) we Scanned by CamScanner Scanned with CamScanner Namber System CHAPTER Capsule Inthis chapter we eover various types of number sytem such a8 digital, binary, octal, hevadecimal and their conversion, This chapters very impotent from the poial ol view of entrance eram, A number system is basicaly as exteral representation of data inta internal data and vice-ersa, Number system basically means the presentation of number with limited number of symbols. Various types of muraber ster are deeibed Below Decimal System Basically the decimal system wes the en symbol 0,12, 94 5, 67,8 9: Soy base is 10, = by {1235}19 ‘The base ofthis number is 10, So, it wil be known asthe decimal number. Any smumober which has the base as 10 hat aumber willbe called as decimal number. ‘The ase ofthe number system i defined asthe numberof distinc symbols used to represent numbers the system. ee (24559 {thas the base or radix as 10, So, we can say that ths isa decimal number system, Binary System Ifa number system has only two syachols then its base i 2. So, such a system is called as Binary number system. Thete are represented by only two numbers i.e Oand 1. eb (11001, ‘This i knowa as binary number system, 110001 ‘The right most bi is ealled as Least Significant Bit (LSB) and the left most bit is called as Most Significant Bit (MSB), Scanned by CamScanner Scanned with CamScanner 16 Octal System {In octal number system, it has the base or radix of 8. t ranges from 0 107.2, total numberof digits is 8 oF we can say 0, 1,2, 3,1,5, 6,7 So, thas the base of 8 0 itis called as octal number system. ep, (127), Hexadecimal System In hexadecimal system, the base or radix is 16, It means it ranges from 01015, i.c.0, 1,2,3, 4, 5,6,7,8,9, 10, 1h, 12,13, 1,15. has numbers Oto 9 and then 4, B, C,D, E, F 0-9, 10, 1, 12,13, 14 15 ABCDEF (285D)¢ Conversions of Number System Conversion of some number sytem to other number sem is epuiettcos™ ie me Decimal to Other Number Systems 1 Decimal to Binary System (Integer Past) As we ‘know that binary system has the base of 2. So, what ‘we do is that we use the remainder method io convert decimal to binary. Beease binary hs the base 230 ‘weuredvideby Das folows. Exe 1. Convert 255} totinay fom sol 2 [oso tense : 2 [et 2 [oo 2 [sero 2 fine 2 [ao 2 [eo 2 po 7 te Now we witethe resume lop sb ehoum atone (on00001 ie So eeBhg 1000001 2 Decimal to Binary (Fraction Par) Now, you wil beable to convert decimal to binary number sysiem, but there is another number Ze, the fraction which is converted in binary system through other ‘method. ee Computer Awareness ‘The fraction past of decimal number is binary system by just we muy the faction ro ‘2 il the complete integer comes (without teh the same number repeats. (number from wie started to multiply), Bx 2, Coavest!02g fo binary fom. Sol. Acbasectbinaryis2. $0, nveted ig fom ve Integer ow-08 0 4x2=08 0 08x2=18 1 tptobotom ooxeei2 4 + 0222-04 0 Uepsidonstatsociy (02)49 = (00110 Wns eam, wo mB De Ho at 2 Iori sos od one tan pt penas et tomumbers om op oboe 3, Decimal to Octal (niger Pat Ae we kno cca she base ov rad of oye ecinalto eal by minder method dang Ex 8. Convert (392859 to cctal form, Sol. Aecaing to remainder theorem (18566 (9206149 = (114556 4. Decimal to Octal (Fraction Part) To conver decimal to octal (fraction part) what we dos tka multiply the fraction part by 8 till the complete integer gets. Bx 4. Convert (22303125)yq 0 octl form. Sol. Fst, convert the non rational pan int act orn ty be render mee afeas_ 7 es is com, Second wo ane eration! pt by mei acon pate —_— Scanned by CamScanner Scanned with CamScanner Number System Fraction loteger oonIas.8-0290 02:0 0 0208220) 0002 WODr2ST49~ (Ce, 23 001259 G7 5 Decimal fo Hexadecimal (eget Tai) As we how thathewadeial hese o taf HS to fonvert decimal to heer we il we the ‘ive or remainder eho by didnt Be 5. Convert (8234), 0 hexodecinal form. Sel, Because neradccnal fas te boca ot 16, co die the ruby 16 16 feoat 0-04 16 [su_2 6 20 le 02 Ae oro, tne numbers af 2 0,2, 10, £0 28 we knowin esadecinalianges om O10 18 anda: ong stam hom Ato F. So, aecoring to ths 239) (2Al 6. Decimal to Hexadecimal (Fraction Patt) To convert the decimal (factional pat) into headedmal form we jut me the muluplcaon sethod in which multiply the atonal pa by 1 {een the bas or ra of hexadecimal 16) Bx 6, Comer (2063259 nt exons form Sol Fest conver nontactona pa ino heradecenl fxm by sing disin meteor remaeeer metbou. oa 16 [2069 _15-4F 16 [1752 hoe (2A ‘Seca, convest the actions par int heradesinal em the mutation metho, Fraction tnteger ozsxt6-36 06 3 aG«16-86 06 ° ‘iow he Pexadecmal erm al Qian umber (PBB 225) 0 =(22E9he Binary to Other Number System 1. Binary to Decimal (Integer Part) Binary number ‘ean be converted to decimal number syslem by Imuliplying each binary digit wilh ils fespectve possi hen sing al ce 7 Be, Convert {110% nt decal form. Sol, ton, my each bin da ih 85 rept pos andivenoudaeae, 1104 2210 a0 tates o.2-0 bea 3 s. (010m; = (39 2, Binary to Deeimal (Fraction Pan) Binary faction ne nec othe decimal cambes om BY tulip each digit by their respective postion eqanepowen tebe) sd then ding al of them, Ex 8. Convert 0.1101, hl decnalform So Fractonpants o1tont ater erse teats teat eet tot ata Oi ae = 8437519 101M = 980739 Ex 9. Convert 101110001 to decal form. So Festa inogerpn Ieteger pat f01te 1429+ Ou2? a tx2! e142 sososze tent Fraction pan = 016001 starts One? 0x2 24 On daz 11601 =}e0+0%: } ° Ze a = « osmes (ortoaon = asa 2 Binary to Ocal Integer Part) inary numbers canbe tener etal name ton by toe neo + Dy converting the binary mvumber first ato the Acimal number system and then converting the ‘number obtained (decimal arsbe) inte octal number sytem. + By grouping nto thee bit digs to produce a single ‘octal number proceeding kom leat significant bit to ‘ost significa Scanned by CamScanner Scanned with CamScanner 18 Bx 10. Convert (210100101); toctolform. aig cog Les + + gor oS (tere Ho sh ina ereserton 6, 10s oad foreets) Herc, 10100; <4 Binary. to. Octal Fraction Fat) To change the Einny tection into octal sytem we fs cane Heron of binxy nto dca form and then ‘icra convert Une dcial ov ito octal orn. MeTeam convert binuy to acl by grouping ito ce ig to produce. a single octal’ number proceeding from Ito ight. ‘Re 11, Const (110111001 10001) hbo. So E14 114 QO4-05 BOS + + t + + byt bog ene 10 11101000145 5. Binary to Hexadecioal (aeger ar) To convert binary sumber info Reradecinal number, should betes converted ino groups of four bis and then these groups can be converted directly into their hexadecimal numbers. Ex 12. Convert (1110100010111100), into hexadecimal Sol. Osideititogrepsot Abs 1610 100010111100 Tosche is, we use the folowing method 2421 ese ae toe suber ae below wich 1 occurs Wee "Wit number and below vie O occurs we lO. em |e | ae a mo | i | ton 1100 taxes tas ings Oca sftxes Oxdefieoe teas sa2eont foxzeont fiszetat [oxester 844424 0/e+0+0+0/a00+201| a+ 4s000 4 8 " 2 £ 8 8 € So, 1 190rr00010F91100, = €88C)ig 6. Binary to Hexadecimal (Fraction Pat) To convert binary fraction part itas the same way as of integer part In this, fraction partis converted into a group of Tour bit and then converted to hexadecimal number. In this fraction part, the grouping slats from the very ext it afer the deal and proceeds towards the right. Os Computer Awarene, 3 Bx 18, Conot (3107710011011101.011001 ‘exadecimal number system tog Sel Fe sean tee 9 20 comet ith umber system. . ei eee tlt 421 [8 424719, ror |iroo lrioy liye 84 440+ 1]8+4+0+0/ Be ae oeilayy rn! 3 13 ag [otter v 1 1 ri ° « > ° (00006 ou ah te tacton Fa s01101 eee ti] e ted nortfoors s+os241| ov oszes " 3 1 ‘ a a a8 : Se, (iotncor¥0. sore «(PCH 89g Octal to Other Number System 1. Octal to Decimal (Integer Part) To conven he octal number to its decimal equivalent, each dips rmuliplied with it respective position and hen ae} fo getthe result Ex 14. Convert (349}q to decimal form. Sol, (ty 340+ a's One 2B x6t6 x86 951 . 192 4924 96203 0,49) = 2359 2. Octal to Decimal (Fraction Part) To conve be ‘actional pact to its decimal equivalent, ach dgtis multiplied with its respective. poston (i, the negative powers of the base 8) and then added (ogether to get the setual real Ex 15. Convert (628.235) nto deciel form Sol Fest. ake aniiege pan 427 nae ane 7He? 2426861647 =75641667 =279 al Scanned by CamScanner Scanned with CamScanner Number System 3 "Now. ake tocten pv (0 235) Pema aee? Sear? 2as20s 312 oxoe610 3 So, (27-2954 (279306540) yy Octal to Binary (Integer Pan) To conver the atat ber to binary number, it hast be frst converte {nto decimal form sod then converte ni binary Bx: 16. Convert (263) to binary form Sol, 4 Fist conver te above neat 22a san hy Buel 2128+ 924 95 62h Now, conve is deena number to bia mute ea Bi ; (1orco01m, So, Chg =(153 9» 01000r Octal to Binary (Frsction Part) To convert the ” ‘octal number (ration) tots binary, then it has to be ‘converted first into decimal and then converted into its bizary form. Bz 17. Convert{35650)q to binary form. Sol. Fest take anitege pan shy =9e6P 58's Gna? 2192 + 404 6= 2389 (ov101170% Nom se acon pat (050), = 58°" + 0+: 9 Fricton Integer deesee- 125 02 1 o2a2=0s0 0% ° Ome2=10 000 1 a 50, (y= (N62) = (110119010 Hexadecimal to Other Number System 1. Hexadecimal to Decimal ‘fo convert this each Sight ofthe hexadeciml aumbie mulipied with ts respective pasion and then added fo get the result Be 18. Conver (E280, lo deinalfom. Shoe’ 2 oo eau 2 2 pet eves 42a 1F eoer6! ber? ss vct0054 2 «2556 05168 1844 5794 5124 120611 = SE570059 $0, (2g = TIS 2. Hoxadocimal to Rinary Form To convert this fist convert the number int its decimal equivalent and then convert into binary equipment. Ex 19. Comert (C38, ito tinoryform. Sol, co oae4 Cow 3 ond wr2e1 6 a1 6 11166 116? 8152 + T68+ 175616 (005TH 9 — (etoecorstorroo0n So, (29g « (000011101 000%: 81 (CBB g = 00970 = (uoworoNe00n: Scanned by CamScanner Scanned with CamScanner 20 Complement of Number sumberin two types of complements of nny umber i sey a any bse. pal ie i {1 numbers. 1's and 2's for any nun 10's complement for dlecin Dimary numbers. 9's and 10's Complement of Decimal Numbers ‘0's complement jst sublenct individual digi fom 10's eorplement 1 added to least 8 digit of 9's eamploment. Bee 20. Find9 sont 10° compleaent of deol number 1265.45, Sol. Sconyiemert = 0724.54 (eubtmetng eoch it m9) 10's complment = 0734 54 or was 1 ode toleaststgnicant digit o's comolerment) 2's and 1's Complement of Binary Numbers Jal'scomplement just exchange I with O and O with 1 Hac autor In 23 complement, 1 added tothe lesst UBaRant igi of Fs complement of rat binary umber Bx 21. Fad t5 and 2 complement of the binry number {roror00% 1001), So recompiemont = O101010-0110 ton ToaTE oT Arithmetic Operation in Binary System ‘All the arithmetic operation (addition, subtraction, ‘uliplication and division) in. binary’ system are Performed in de same way asin decimal number system. These are discussed below Addition Rules 040-0, 0+1=1,1+0=1, 14120 with I cay over Computer Avarenes, s Bee 22, ddg(110101) anatnor119, Sol, Decal M0105 sso az Tae 1100100 equa 100 in deca ye, Subtraction Rules 0-020, 1-0-1, 1-1=00 Bx 28. Subtract \NO1111 fom 701011, Sol, Geary Declmat 010! 53 ston a7 more {110} equivalent 19 Gin dacmal stam, reborn, Exe 24, Moliply(101101, with (1107 Sol. woo 1101 THe como» oro wor10 «+ Toor Division Rules Division for binary numbers can be caried out by fellowing the same roles asthere as decimal stem, Bx 25. pividel1 1000111 by 101 Sol. 401) 1100081 (01 20 100F 108 oO Scanned by CamScanner Scanned with CamScanner Let us Practice 1. The deciraal form of (15) in oe ws @u wn 2 The equation (SHChe =(2) =(VIp, value of x and y (9) x= 11010011100, y= 3274 (e) z=orrrortoinnt y~3260, ion (139 =(eh, valu of ¥ (2) ttoot101 (@) tooocor (@) ro00c010 ( rooceo9t 4. The equation, (AOI, = (2p the value of is (1504 1585 (@ 1505 (3 9s 5. In equation (B26), =(xho, value of xis (a) 2754 @) 3854) 1258 (6) 2054 G. In equation, (2A8jg = (29 (yg, value of and y 7. The 9's complement of 6297.82 ig (2) 53781.16 (wy 4237.17 (@ 5376217 (o 5285117 8. The 10's complement of 835.83 is (@ 7165. @) 719186 (226483, (768.17 9. The sand 10 complement of 3168.23 ace (@) 6052.73 and enn2-74 (@) 54224 and 540224 (6) 6831.76 and 6831.7 (6) 6831.75 and 6631.87 10, The equation (EF yg =(2), =(y)y, value of x and y {@) s=or1or1000108 ©) s=ooommoMt y=157 @ z=010108110110, (@ z=0110t00Ht0r1 11, {0° denotes that LED ig on (binary 1 and the dark circle" denotes that LED is of (binary 0), What's fhe decimal equivalent of the binary number a 12. In datk ciclo“? denotes that LBD eon tbinory 1) ‘and the’0' denotes that LED ig off (binary 0) so, the Selina! valwo of 00.00.) ix 0) 402 20 aon (a 210 Ineqation 210040 (3p vols oF te (07 (eave a an (a) sor? M4 In heradesimol fer, the value of Cis 10 on an, fom 1, Inoquston2thg = 14 = then Sie 20 ea gos {8 Hone ottase 16. Value f 1249 (aly, value of ia (0) 228 205 (6) 20 (9 2263 1%, The ration (068) equel to (0) 010, porond, {© Goonony {@) None of he above 18. ‘The hexadecimal equivalent of (11101000; is, (a) o7 wae ea a6 19. The hevadecimal equivalent of (110111003012001 is (a) cose 2c {9 soec 3 oce8 20, The desi equivalent of GOA} is (a) 386 oe 58 fa 58 21, The octal equivalent of (12.259 is. (a) 432 4129 Ma tea £2, The hexadesimalequvolentof 128) is tat 0) @ wom (6) 25 22, The decimal equivalent of (110100) is (50 ose os ioe 24, The decimal equivalent of 11101106 © 12 9 20 ee eg Scanned by CamScanner Scanned with CamScanner a Computer a, T Aware 22 + reness, {38. The octal Form of 42303125} fs. The binary equvatent of 20h0 1% (oy s2302 ©) 20300 a) 1101110 s01101 fe) 79402 (0) cargo fg nner 14, The hexndeciaal fore of(1202)q in i 26. The binary eau fan 00 (028g | {0} 0.11001 136, ‘The value ofz in the expression 65tyy a2, oo ae 125015 ) 1213 wn
) <>) (or aestion bo elutes Hallows the fw porte fortes cach ther before etblshing a ee Fresion betecen hem, ropes wept) 6, Presentation Layer The presentadon layer mcrae f [rare provides foci to covert mesg da into a form TSIeS | [Pecmsonnte | | “Tape Which is meaning to the communiaing essen ons pplication layer ene wee matics] 7. Application Layer The applialion ayer provides Gres eaoos_| ines icy ta daly repped the ond ek of the Seon essen, petwork. Its a collection of riseeliancous protocols i eee {tise for vanous commonly weed applietions, such as a, pe Bes, | slectrnic mal, ile transfer, remote login, emote job ' ow Ease ‘entry, and schemas for distributed databases. sere | tetas| me THES, | Ne prone piety cree) The TCP/IP Model te | esstammma | aie] TCPMP te based on a fourlyereference model All xin Gas] | protocae that belong to the TCP/IP Protocl site are ase {rie| located inthe top tee layers ofthis model. At showin Tat —,| ronsapoees | oat the falloving iluststion, each Iyer of the TCP/IP ren ay mode} corresponds to one or more layers of the ; evemtsyer Open’ Systeme Interconnection (OSI) ray felerence model” proposed by the International ‘Layers interfaces and protocols nthe OSt model Standards Orgesimtion (0). L'Physical Layer The physical layer i responsible fortnmamiing aw biaucams beveen we node. [ingeae) _ renee ‘a ivmay conver the sequence af binary digts into |e” | (ER) jctae igoal light signals or cecomagneie CE) Gar) (OS) Signals, depending on wheter the wo nodes are on "fama ] Tec creat Rberopte creat or micowsve? [ime | OIG) (Se) 2) fads cea rept. SS oe 2 DatarLink Layer Since the physical layee is only a leeds btm, he da Tek aet me faralos iio omen sothal enor decion snd [ Ramet [ereow Jnreall Tee [au] Eonerton canbe ped indepndenty foreach | PS itame Theda ayer perform ow contol ef tomer oc tw ses tae a der {EPI moth pote os na veel rcevr by sending esa SeRiibante esterases ‘The ypes of services peomed and protecss wed at sxe toch fyer wits te TCD/IE mode re desbed in Fen ae gets more dene loving ble Scanned by CamScanner Scanned with CamScanner 28 Computer Awareness {ToP/IP Mode! ~ Des Protocols Tare i a Te FIP. SUP BT — as GRIF sion pesos an fo Pape | Te Ta FP TET ~ Poptaten | rnc Free renee oe ere Undone oer mptesion lls i | Prowies communicafon s0ss109 ‘benaeen TGP, UOP, RIP rapa) ei Dens nn sw ls and au ote COMPO Sapa [ke tac a cn, Se a | AG, A TEES, Sts amatonturcund stowage Osagore ey ssn i Peeme rat ot 8 a TF Specites detais of Ferwark, | Ethernet. Token Ang, FOOL X25, Fave Tn | Specs is aw das sey se EIT 1 = Mes | Rectepicemcuecstesyinseceyrnomeances | 0222.05, The Internet 5, The World Wide Web The World Wide Wa, (called WWW or W3 in shor! is the most popular i i tH HH “The internet is a huge network of computers, which Tinks many ilferent types of computers allover he world, Iisa networt of networks, which share 2 omimon mechanism for “addressing. (identying) computers, and a common sel of communication protocols for communications between two computers Dn the network Basic Services of Internet Aruerne provides varius series tower wich oe explained dela 1. Electronie Mail The clctonic_mail_ service (Kxown as E-mail in shor allows an internet user 10 senda mall mexge) to another internet serio any arto the world fn anese esl me manner 2, File Transfer Protocol The File Transfer Protocol service (knows 8 FTP in hor) allows sn otemet seer to move aie om one computer tosnather on the internet A fle may contain any type of cigtal fnformationtext document, image actwork, move, ound, software cc 5. Telnot The telnet service allows an nteme wer to log in to another computer somewhere on the interne This acon i ao ealed remote login. 4. Usenet News The wenet sevice allows a group of intemet wes to exchange er wicradeas information on some commen topic. Scvera) nich ‘soups exiton he interne and ar clled newsgroups promising method of accessing the internet, 6. Web Page, Web Server and Web Client Hypertext documents on the interne re know at WebPages. The WWW uses the cient server made and an Internet Protocol called. Hyper Text ‘Transfer Protocol (HTTP in shor} for nterston treween the computers on the internet Any on the internet, which wes the HTTP protocol, is called Web Server, and. any Eomputer, which ean sccess tht server i called & ‘Web Client. 7, WWW Browsers To be used as a web client, a computer needs to be loaded with a special sofae tool, which isknown as WWW browser or browser inshod). Uses of the Intemet COntecconmitn rede pomvon| asin Sintra gene init scone spportsenice nine expe IP Address. i vay hos andrew on ahe tenes ew cher ‘neo ramer and ost ter The combrcon ene Pnwipteatwomacinesonthemcemethive the tere ate A Scanned by CamScanner Scanned with CamScanner Let us Practice AL The data link layer is used for ()poRdog a welldafned conieo Interac to the . reson yee {1 equaing the tow of data so thal sow rece oe ‘ol swamped by tact senders (©) deaing wih transmission emors (6) Atolthe above ‘re used to identify a user who returns to 1 webeite. (0) Cookies (6) Progins © Sompss (0 asPs ‘8. What is the ndaress given toa computer connected toa network called? (6) System Acaress. (8) S*SIO (6) Process 10 () wAdsress 4. The... data mining technique derives rules from real-world eate examples. (0) ne Sscover (0) signal processing 0) neva nets (@) eosebased reasoning ‘5 Which device is used in analog transmission to boost he signals? (2) Repeater (2) Arpltor fe Hud @ Mutiplexer 6. All of the following are basic principles of networks except {ol esch computer must have 9 network cad [p)inere must be commuricatons media connections Denseon ie network hardware deoe (@ each computer rust have sofware that suppons te ‘movement onlormaton (there rust be atleast one costing device Which of the fllowing iret is used as a memory device in computers? (2) Reciier 1) Fipfep © Comparator {@) Alenuaior 8. The unit of frequency is (@) Herz (©) Owes (9 Wet {@) None otinese 8. How is power supplied to low power device? (a) Tvougha power eable @}Fiom an extemal poner supely {€] Drecty kom te computers power supply (9 Through the USB cable AO, Magnetic Medias an example of. (0) physealiayer (eat tnkiayer (6) nemo ayer (©) epplcaion yer layer. AL Which of the following is 9. general purpeso prgeamming language, designed by Sub ‘Mievoayrtoms, and well uted for use on the wel (0) Yasar 9 dava sent (a css. (0) Soca 12, Whieh entegory of Unshiclded Twisted Pair (UTP) cable ie sed oly for voice transmiesion? oy cm 2 CATT tents (@ cata 13, A commdication processor that connects dissimilar networks by providing the translation from one set of protacol fo another is (0) tvidge gateway (6) router (@ modem 14, Networking is an example for (a) texowcashaing ——@)esoutce avait fort (© easy access ( Alotthese 15, Granting an outside organisation access to Internet web pages is offer implemented using a (0) {@) exvanet -"" * (snare (©) internet (8) nader 16."The device used to convert analog data into digital signals alled {a} router (6) malhertoares 7. Yau can install a) (9) telephone (6) coaee ‘on a network ifyou want to share broadband eonncctin. (9) outer (0) modem 1) node (@) cable 18, Process-to-process delivery is related to (6) data in layer (0) netwoc ayer (6) rasan ayer (a atatinese 19, A proxy server is wsed for which of the following? {a1 To provide secur aginst unauitonsed users (0) process cient requess fr web pages {To process chen requess for database access {eo prerde TORI 20. Telnet works at which lyer of TCPAP model (a) Nemerktojer (0) Session ayer [6 Applcatontsyer (6) Transpo ayer 21, Ina ring topology, the computer in possession ofthe an transmit data. (2) packet ©) oa {@ Secessmettod (0) Laken signals travel through the optical fibers, (2) Unt (© Rocio (9 Microwave (@ Becomagnetc waves 2 a Scanned by CamScanner Scanned with CamScanner 30 Computer Awareness 28, The following areal compating devices, except '30, Hub oporates at which lager of OSI Model? fo) motebook computes (a) Physical Layer (0) Data LnkcLnyer (0) colar telephones {6} Transport Layer (8) Application Layer {@) cipal scones 31. Endtoend exnnectivity is provided from host ty {@) personal digital assistants host in 4, Servers are computers that provided resources to in) nemo yee (eet og Sther computer connected t08 {2 data bk yer {B venopor ayer (a) network (©) maintrame ‘32, The application layer of a network {e) supercomputer (0) dient {q)exlabishes, maintains and termnates vital ruts 25. The software that allows users to surf internet is hese of aohrare Deng non he: computer called afs) mectto me raNore (a) search engine fo) intemet service provider {c) defines the user's port ne net 1 sen cekcion (Boe {Gatotieabore 26, What is MAC address? 138, Which topology Feature is 9 pointo-point. tine (a) I adeess (0) Sotware adtess cennfiguration. (3 Router dress (@) Hardware adress (e) Mesh (Ring 27, Which term identifies speciic computer on the (2) Sta (ayant inese Veband the main pogeaf the entire site? ‘Ma Devices on one network can communicate with (e) URL (0) Web te acres Jesces on another network via a (c) Hyperlink: {@) Domain name (a) ile server (0) printer server 128. The radio broadcast is an example of (o)utity server (0) gateway (a) tateupiex (0) ha uptex 435. Thecomminteation mode that supports data in bath {© singlex {8 Nowe oftese “iretions atthe same Kime is 29, The design ofthe network is called the network =~ (a) simplex (2) aretece © sever oe ee ul simplex ° mission bid (@) multiplex: Answers 1 20) 38) SH FO) TO BG 3 (a)- 10.(@) 42 20 am ne Bo BO Fe Be Be Bie 1 Be Be) AG) BO) GO) HL) BL 30. (a) Xe 2e BO 6 EO) Scanned by CamScanner Scanned with CamScanner Operating System ‘An operating system consists of a set of programmes which controls, co-ordinates land supervires the activities ofthe various components of a computer system. Its Function isto link between the computer hardware and the user. CHAPTER. Capsule Types of Operating System ris pe of operating tem anegcn blew Multiuser Operating System refers to computer syslems tat support bvo or more simultaneous user. All mainfeames and. minicomputers are mulduser systems, but. most personal computers and workstalons are not Another term for muluer i time sharing In this chapter, we cover all the topies related to ‘operating system suchas Iorms c operating system, scheduling, memdey menegement. disk ‘operating system. This chapter wll help you to get the good marksin the entrance exam, Multitasking Operating System isthe ability to execute mote than one task atthe same time wherever, only one CPU is involved, Multiprocessing Operating System 11 is the use of two or more Central Processing Units (CPUs) within a single ‘computer system. The term also refers tothe ability of a system to support more than one pracessor and/or the ability to allocate tasks between them. Multithreading Operating System ‘Computers have hardware suppor io efficiently execute multiple threads. These ate distinguished from mulliprocesing systems (suchas malt-core systems) in that the threads have to share the resources ofa single core and the computing units, the CPU caches and the Translation Lookaside Buffer (TLB). ‘Multithreading aims to increace utilisation ofa single core by using threadlevel as ‘well as instruction-level parallelism. Scanned by CamScanner Scanned with CamScanner _ 32 Batch Processing Operating System This operating environment is termed as batch processing because the input data are collected Batches of files and ate processed in batches by the programme, Multiprogramming Operating System fogramming is a rudimentary form of parallel ng in which several programmes are run atthe fame tie on auniprocesson Time-sharing Operating System Lis the sharing of a computing resource among many vusers by means of multiprogramming and mult tasking. Multiple jobs are executed by the CPU witching between them, but the switches occur so frequendy that the users may interact with each program itis running. Real-Time Operating System Another special form of operating system is real time ‘system. A real time system isused in environment where a large number of events, mostly external to the ‘computer system must be accepted and processed in short time of within certain deadlines. Operating System Services ‘Various services are provided by operating system (othe user and programs. ‘The following are the operating system services 1. Program Execution The purpose of a computer systems i to allow the user to exccute programmes. So, the operating systems provides ah envizonment ‘where the user ean conveniently ran programmes. 2. 1/0 Operations Each programme requires an input and produces outpot. This involves the use of LO, So, the operating systems by providing 1/0 akesit convenient for the uters to Fun programmes. 3, File System Manipulation The output of 2 programme may need to be written into new files or input taken from some files. The operating systems provides this service. 4. Communications There are instances where processes need to communicate with each other to exchange information, It may be between processes running on the same computer or running on the diferent computers. Computer Awareness « rorbutesion hart patte yong Scheduling Scheduling refers o the way by which processes a Seeding ce ippually many more procerses running on the available Pt. "this assignrnent is carried out by software kng paascheduler and dispatcher. The wheelers concerned mainly wth i esis OSrrhn manly LT i cerlnmntnntitn 6 Reanim Amora etme et CPU Scheduling Algorithms Various. schedotng “ilgritim, to decide which of the dectonding requests ot be llected resources, re gien below 1. First In First Out Also known as First Come Fiat Served (FCES), i the simplest scheduling algorthn, FARO stmply queves processes in Uhe order at they sive in Ue ready queue. 2. Shortest Remaining Time With ths seatepy the Sheeler arranges process with the leat estimated processing time remaining tobe next in the quexe 4. Fixed Priority Preemptive Scheduling The operating system assigns & fixed priority rank © every process, and the scheduler arranges. the processes in the ready queue in order of ther Priority, Lower prinsty processes gt interrupted by {ncoming higher prionty processes. 4. RoundRobin Scheduling The scheduler asigns 1 Txed time unit per process, and cycles through them 5, Multilevel Queue Scheduling This is wsed for situations in which processes are easly divided into different groups. eg, a common division iz made between foreground (interactive) processes and background (batch) processes. These two types of processes have different response-ime requiremen's 5nd so may have different scheduling needs. Scanned by CamScanner Scanned with CamScanner Operating System Kemel ‘ohh aol helm and dee den she peng ‘odes te mo he fel cet cnr te omen dior doae atone ered “craogexmemen aetaroarmesnibeRAM it demic whch egret aceite ch har ene et Memory Management A multiprogramming operating system Kernel must be reaponsble for managing ll sysemy memory which comreily in wse by progenies. Tas ena tt a programme docs not interfere with memory sen Sse by. another programme. Exch prograrga have independent aces to memory. Memory Protection + His a way to control memory access rights on ‘computer and is a part of most modem operating systems, + The main purpose of memory protection isto prevent 1 process from accessing memory thal has not been ated tot. + ‘This prevents a bug within a proces from affecting other processes, or the operating system isl Methods of Memory Protection Various methods of memory protection are given blow 1, Segmentation Segmentation refers lo dividing © computer's memory into segments The 286 archecre amu segeniaon ete, ‘which are helpful for using protected memory on ths Brchitecire. ” Protection Keys A_ protection key mechanism divides. physies) memory ‘up into blacks of = particular sie (eg. 2 KB}, exch of which has an Bstocioted numeriedl vals called a protection key. Exch process also has 2 protecion hey value associated with it (On a memory acces the hardware checks thatthe current process's protection key matches the value stocated with the memory block bing accessed if rot, an exception occurs 4. Simulated Segmontaion Sinulon ie we of 2 moi programme to ierpret the machin code introetone see soda Such a sone Simultor can provide memory proteton by wing 3 Symi octet ey ieee res and leag of each insrcton ta el te Before scaly exeeg om. 3 Paging In computer operating systems, paging is one of the riemory-management schemes by which a computer can slore and retriove data from secondary storage for In the paying memory-management scheme, the operating system cetrieves data from secondary storage insamesize blocks called pages. The main advantage of paging is that it allows the physical addvess space of a process to be non-contiguous. Fragmentation necessary. If this happens gradually, hheavily fragmented which ean potentially cause performance problems. Defragmentation Tn the contest of* oaitining fle ptm defragmentation isa process at reduces the amount fragmentation. 1. does tis by py ping the content of he instoage eed cane Hs note io tinker tonignss ein flagnenl 1 alo attempts to ereate larger regions of free space using compaction (9 interrupt the return of fragmentation. Segmentation Fault ‘A segmentation fault often shortened to segfaul) or bus ‘errors generally an allempt to access memory that the ‘CPU cannot physically addressed. It occurs when the hardware notfies a Uni, like operating system about 2 ‘memory access vielation. ‘Thea the OS kemel sends a signal to the process which ‘coused the exception. By default the process receiving the signal dumps core and terminates. The default signal handler can ako be overridden to eustomise how the signal ishandled. Virtual Memory Separtion of wser logical memory from physiat memory it einige orn presser mee an rman. meny. "Vital metry ea mem mangement scheme which allows the xecuion of & arly loaded proces, Scanned by CamScanner Scanned with CamScanner ca) Th term vival memory is worms the ability to adress a storage spare much lnrger han that available in the primary storage ofa compuler system. Veaunerexy Neal ec) Mon ‘rst Memory Advantages of Virtual Memory ‘+ Avvery large vitual address space is made available to ‘program, so the size ofa process is no longer limited by the sizeof the physical memory. ‘Since, each user now needs less physical memory t0 ‘hin, mhore user can be now nun atthe ime time. + Less 1/0 is required to load or swap a process in ing aust memory sechnigue usualy pment by demand Bgng When demand paging wie ne preemptive lading, ‘aks place Papng only cus 3 the ee ofthe a eyes andeaxbefoe panicalr. when dere popngisusn a propo wl baphserectionsthnoneo pages dein RAM Pages ae copied fom the executable en RAM th fe ome the executing code telrences they nua in ven to RE fave Page Replacement “he page replacement sloritim all shot to sleet vs page that mst be sapped out om the rin temory 10 that new page required by CPU could be Troost into memory. Varies poe replacement elgritis ee iebel 1. FIFO page replacement The. simplest plc et ft oF Ou (TPO) Mori whet spe ee oldest page choosen 2. Optimal page replacement This algorithm replace the page that will not be used for the longest period of time. be replace, the Computer Awarenes; 4. LRU page replacement When page is renee LRU fleas! Recon Used Sa ‘ema os cen ne ga Page Fault age fais lrvar or sate te hoc, ae eer toa page Unt hs not been Reser Sosa ae ‘Swapping ; ‘When the physical memory in the sytem runs ota process nerds 10 hiring a page into memory then the Sperating system snust decide what to do. Imus fin Phare the physieal pages in the system between i Hrocesses running inthe system, therefore it may need Io remove one oF more pages from the system to make roam forthe new page 1 be brought ina memory. Thrashing ‘proces ssid to be thrashing when iis pending tna tine tn pging (eed is generating tof pes faults) thon executing, Threshing causes low CFU tition The process which are thrashing quee op forte paging device. Degeeafmstegarmng Trashing ‘The CPU schedule sees the empty ready queve and ties to increase the degree of muliprogramming by introducing more processes in the system, These new processes cause more page faults and increase he lenglh of the queue for the paging device. Memory Allocation Managing the sharing of primary memory and ‘minimising memory access time are the base goals of the memory manage. While various diferent sitet are uted (9 allocate space to processes competing for ‘remony, thie ofthe mot popular ore Best fi, Wor fia Fin ficohich ar explained ble 1. Best Fit The allocator places a proces in he snot block of unallocated memory in which it. : Scanned by CamScanner Scanned with CamScanner Operating System 2. Worst Fit The metnory manager pacers paces ‘helayget Hoc of unallocated memory state 3 Fits Fit There may be many hein the mene sole operating sytem, begins lesen pe ‘Bemory and allocates merry rom te rd fale counters ge eno tosataly the neque Disk Operating System (00s) + The main factions of DOS are to manage dk fe, aloe sytem resouteesacontag wie eqchee + Basically, DOS is dhe medium through which the wet + and extemal devices attached to the system, ‘communicate wih the system, Directory Structure in DOS ‘The names ofall the files created in disk are stored in is dcectory. Directory is just like a file folder, contain all the logically Yelsted files. DOS files are rarchical or an inverted tree like 1. Single level directory Is he snpls deco vires AID fle ave cooated these Actor. The major dhadvaniage to stg Teel directory is the confusion of fle names between Silferent users 2. Two level directory inthis a separ fle i ‘created for each user. a 35 3, Tree level directory This ta cteate their own subse thee files accordingly. cecal a [= [x1] isi [con | ro [rood "GL Tsk ‘Sige evel deetorystctro clure allows users ‘and to organise sate (Te ‘aecoy | TE see ale TT LRTY) ‘wo evel decry stacore 5E55 seet | Bn reat) PS See] wax] oe] [Fea] tx [ome] [ > | © [mee =le[=] GIL bbS bbs ‘Teer dectry stueure Let us Practice 1. This the module thot gives control ofthe CPU tothe process selected by the short-term scheduler (@) cepatcter (0) spook (bute (G1 Nove otheso 2.1 is an cxacation of a se of programs on a computer without manual intervention (a) rea iene processing (b) boten processing (©) onine processing (None ine above 3, Ibis 9 rundimentary form of porllel processing it ‘which several programmes arerunatthesome time on a uniprocessor (0) meshing (0) seheosing (©) etipcogeomming (@ muniasning 4. Inwhich technique alarge mumber of users interact ‘concurrently with a single computer to, share a ‘computer resource? (9) CPUSchesuing ——) Marogramming (© Mumaskng, (@ Tinesraing| 5. Process (bregma in hag ee! anguage kept on (0) comer of man memory (© apoganmewanen {1 ajebm secondary merry 6. The operating system services ialare (0) programming exceuion 12) Wopestons (c) Ne sytem rariptasion (@ Atelne above Scanned by CamScanner Scanned with CamScanner zc 36 7. Which refers to the way procestes are assigned to trun on the available CPU'S? (a) Scheduing () Processing (6) Time sharing (6) Non ol hose 8. Which technique is use to minimise resource starvation? {a) Switching (©) Paging {6 Svapping {@) Scheduton alosihmes ‘9, First In First Out is also known as (0) LFS (b) Fos (a Fors {@) Hone of hse 10, In which strategy the scheduler arranges processes ‘with the last estimated processing Lime remaining twbe next inthe queue? ta) FFs (@ FIFO 11. FPPS stands for (2) Final Prority Post Scheduing {) Fret Poenly Past Sepeduing (G) Faxed Prenty Preempiwe Scheduing {6) Final Prony Preempive Schosiog 12, The scheduler assigns a fixed time unit per process ‘and eyeles taroigh them in... seheduling. (a) FCFS, (0) FPS: (ase (0) Roun opin 13, Which scheduling sed for situations in which processes are easily divided into different groups? (a) Mutievelqueue fo) Round Rabin {eo FPS (@ Fors 14, The process to prevents 2 bug within a process from. affecting ather processes, or the operating system iteelt {@) memory atecaton (6) memory pretesion 15, Which cefers to dividing a computer's memory into mse {o) Round-Robln (©) memory detection (6) Nonoetinese segments? {a} Segmentation (©) Stanation (6) Pageg () None oftnese 16. The memory address space is divided into equal small pieces, ealled (2) stows (6) segments (@) pooes {@) None of rese 17, Which is use of monitoring programme to interpret the machine code instruction of same eomputer? {a} Seqmeneaton (& Pageg (9 Simulation {) None ofthe above Computer Awarena, 18.A computer enn store ani retriew 4 eam secondary storage for use in main metmery hy {0 agg (©) segrmaion (6) serutaton (6) tone ot za 19. Demand paging 6. technique of {a) segmentation (©) swapping {e) prevention (0) pone teplaconenn 20, ‘Te page free que i lis of pape feamen thn ay tnnilale for essignment after a (0) sunning (0) pogo fot 9 mora {a} None ot nen ‘21, Pogee are swapped out and then necestelenusing Frequent faulta is enlled (0) wating © pon {6} segmeniaion (0) Weecing 22, Which is» process that reduces tho amonnt ot Fragmentation? (a) teocheg (2) cementation (6 e290 (8 dakgneriien 23, A term bus error is known ax (a) teaching {0 sepmontion tat {8 pogotaul {None ofthe above 24, Many operating system can trick programmes nly tusiag memory seattered around the hard disk and AM os if it is one continuous chunk of memory, caked (2) pryicalmemory (2) cache fe) wmuotimerary. . (6) poe 25.8 fe'o trap to the software raised by hardware when a program accesses a page tha it ‘mapped in the virtual address space, but not leaded ‘in physteal memory. {@) stanton (0) trashing (@) eetragmentation —_(¢) page fut 26. If the swapping, algorithm Is not efficient then 2 condition occurs knawn as (a) paging () Iraehng {6) screcutng {(@)None cline above 27. The three most popular strategies used to alectt space to processes competing far memory are (a) best It wovst test (6) batter fa, ky, second it (€) pon tose i hed {) None ol he above er Scanned by CamScanner Scanned with CamScanner Operating System 28, i ena eres 2 mo aac (©) Operating system (©) Aoptication sottwate 9. The primary purpose of an operating system is {3 fo kep systems programmes enployed {0 make The me (orf9 make Ihe most eter se of the compel 19 toatorpeope tuo ne compu (Ghtomakeconputerscaserovee ws he pera computer en ben tore and ster perc 19 Som naoen ect Sarumwanrns Ginclneee -_teuifrns one Inlet anther interface, a 30, (@)Progeanee (0 Sotware (aData (6) None of nese -~ system is built directly onthe hardware. (2) Enveonent Sofware {€) Operating (6) Nane ottrese 38. Multiprogramming system 7 1 anterface conaite of things like program ‘counter ister, Interrupts and terminals, (2) Hordaare )Sotware (erat (atone of nese share characteristics with both hardware ‘and software, {2) Operating system (aoa ey) Sotware (a None of hese is used in operating system to separate mechanism from policy. {0} Sil level impemertaion (©) Two leet impemeniaion (6) Mutieveimpieresiaion (None one above 87. The operating systema creates... physical eomputer, (ol vias space (@ viuat memory vis the first programme run on enmputer ‘when the eomputer boots up. (@Spsiemsotware (0) Operating system {@)Syslemoperations (Novel nese 29. Swapping (a) works best wth any sralparitions (2) alows many programs fo use memory simulianeously {@)atoas each progam in un iouse ine memany 1 from the (2 vidual computers (@ None otnese 38. {@ oes rot werk th vetsyng (@)ae easier to develop than single programe apstem nae ooraming 49, What is the name of the latest server operating (@) execute eachicb taster ‘systom developed by Microsoft? (6) execute more jobs in the same tine period (2) Wiedous NT (2) Windows 2000 (@ sre used ony one eige matrame computes (Ween xP () Wedowrs 2008, Answers Lo) 20) 3) km 88) kk) HO CO) BE) KE) Be) we Me) WE) Ie we} 2) 2) BO} AQ BO wo) A WO} wwe we) ORE RE KO SO RO TO} mE BE ML} Scanned by CamScanner Scanned with CamScanner Database Management System (DBMS) CHAPTER Capsule Database Management ‘System (OBES) isthe root ‘of computer awareness section In exams, questions {rom this chapter ave ashed on architecture hoy, data models, relational algebra ‘concurrency controle. Database Management System (DBMS). Data Models + A model isa represent associations. Ie is an al pects of an organisation and ignore the accidental properties. «+ Data model can be defined as an integrated collection of concepts for describing ‘and manipulating data, relationships between data, and constraints on the datain an organisation. ation of realty, ‘real world” objects and events, and their (ostration thet concentrates on the essential, inherent Components of Data Model A data mode comprises of tree components + A steuctural par, consisting ofa st of rules according to which databases canbe consiructed. + manipulative part, defining the types of operation that are allowed on the dat + Posibly a set of integrity rules, which ensures that the data is accurate. Categories of Data Model ‘There have been many data models proposed in the literature. They fall into thre broad ealegories + Object Based Data Models + ‘Physical Data Models + Record Based Data Models ‘The object based and record based data models are used to describe data atthe oncepial and exteral level the physical data model sued to describe dat Scanned by CamScanner Scanned with CamScanner

You might also like