Class XI Q.Bank - Computer Science - All Chapters
Class XI Q.Bank - Computer Science - All Chapters
Class XI
Computer Science
Ans- it means a language can run equally on variety of platforms-Windows, Linux/UNIX, Macintosh,
N
R
(ii) List
P
S
(iii) Tuple
G
Ans: (i) An identifier must start with a letter or underscore followed by any number of digits
and/or letters.
(ii) No reserved word or standard identifier should be used.
(iii) No special character (Other than underscore) should be included in the identifier.
Q.5 What is the difference between an expression and a statement in Python?
Ans: A statement is an instruction that the Python interpreter can execute. We have only seen the
assignment statement so far. Some other kinds of statements that we‘ll see shortly
are while statements, forstatements, if statements, and import statements. (There are other
kinds too!)
An expression is a combination of values, variables, operators, and calls to functions.
Expressions need to be evaluated. If you ask Python to print an expression, the
interpreter evaluates the expression and displays the result.
Q.6 What are tokens in Python? How many types of tokens allowed in Python?
Ans: Tokens are the smallest unit of the program. There are following tokens in Python:
Reserved words or Keywords
Identifiers
Literals Definition of all tokens may come. Which is not given
Operators in this question bank.
Punctuators
Q.7 What are operators? What is their function? Give examples of some unary and binary
operators.
Ans: “Operators are those symbols used with operands, which tells compiler which operation is to be
done on operands.‖ in other words – ―operators are tokens that trigger some
computation/action when applied to variables and other objects in an expression.‖
Operators are of following types:
Unary operators like (+) Unary Plus, (-) Unary Minus, not etc.
Binary Operators like (+) addition, (*) multiplication, and etc.
(a) „\a‟ (b) “\a” (c) “Kumar\‟s” (d) „\”‟ (e) “it‟s”
Ans: (a) 50 (b) 50 (c) 56 (d) 50 (e) 53
This screenshot is the output of the above question.
Q.3 Which of the following are syntactically correct strings? State reason.
(a) ”Python is nice Language”
(b) „He called me “Friend!” when he came‟
(c) “Very Good‟
(d) „This is a good book‟
(e) “Namaste
(f) “I liked „Harry Potter‟ very much”
Ans: (a) Correct (b) Correct (c) Incorrect (d) Correct (e) Incorrect (f) Correct
Q.4 What is the error in following Python program with one statement?
print(“My name is : “, name)
suggest a solution
Ans: Error is : ―name 'name' is not defined‖. And the solution is to declare the variable-name before
this statement.
Ans: Output: 17 5
Q.6 What will be the output of the following code:
Ans: Output: Hari , you are 18 now but You will be 19 next year
Q.7 Write a Program to obtain temperature in Celsius and convert it into Fahrenheit using
formula –
C X 9/5 + 32 = F
D
Ans:
P
S
Ans: Output: 4 6 8
Q.9 WAP to read todays date (only date Part) from user. Then display how many days are
left in the current month.
Ans:
Q.10 WAP to print the area of circle when radius of the circle is given by user.
Ans:
Q.11 WAP to print the volume of a cylinder when radius and height of the cylinder is given
by user.
Ans:
Q.12 WAP that asks your height in centimeters and converts it into foot and inches.
Ans:
Q.1 Identify the data types of the following values given bellow –
3, 3j, 13.0, „12‟,”14”, 2+0j,19, [1,2,3],(3,4,5)
Ans: 3 – int 3j – complex 13.0 – float ‗12‘ – string ―14‖ – string
2+0j – complex 19 – int [1,2,3] – list (3,4,5) – tuple
Q.2 What will be the output of the following
(a)12/4 (b)14//14 (c)14%4 (d) 14.0/4 (e) 14.0//4 (f)14.0%4
Ans: (a) 3.0 (b) 1 (c) 2 (d) 3.5 (e) 3.0 (f) 2.0
Q.3 What will be the output of the following ?
Ans: 4
4.25
1
4
Q.4 What will be the output of the following ?
(a) bool(0) (b) bool(„0‟) (c) bool(int(„0‟))
(d) bool(str(0.0)) (e) bool(0j) (f) bool(0.0)
Ans: (a) False (b) True (c) False
(d) True (e) False (f) False
Q.5 What will be the output of the following ?
(a)87//5 (b)(87//5.0) == (87//5) (c) 87//5.0 (d) 17%5.0
Ans: (a) 17 (b) True (c) 17.0 (d) 2.0
Q.6 int(„a‟) produces error. Why?
Ans: This is because ‗a‘ is an invalid literal for int() with base 10.
Q.7 Write following expressions in Python.
√
(a) (b) √ (c) (d)
(i) Integers
N
a. Integers (signed)
R
b. Booleans
(ii) Floating-Point Numbers
(iii) Complex Numbers
Q.3 Why is Boolean considered a subtype of Integers?
Ans: Because Boolean Values False and True behave like the values 0 and 1, respectively. So
Boolean type is a subtype of plain integers.
Q.1 WAP to calculate compound simple interest after taking the principle, rate and time.
P
S
Ans:
G
N
R
Ans: -2
6561
Q.5 What will be the output of the following?
Ans: 4.0
Q.6 WAP to take value of x,y,z from the user and calculate the equation
D
Ans:
P
S
G
N
R
Q.7 WAP to take the temperatures of all 7 days of the week and displays the average
temperature of that week.
Ans:
Q.4 What are jump statements in Python? Name jump statements with example.
N
R
Ans: Python offers two jump statements to be used with in loops to jump out of loop-iterations.
These are break and continue statements.
Ans:
Q.6 What is the error in following code. Rewrite the correct code.
Correct
Code:
Q.7 Rewrite the following code fragment using while loop.
Ans:
Q.3 WAP to compute the result when two numbers and one operator is given by user.
Ans:
Q.6 WAP to check whether square root of a given number is prime or not.
D
Ans:
P
S
G
N
R
(ii)
Q.9 WAP to find the average of the list of the numbers entered through keyboard.
Ans:
Q.10 WAP to find the largest number from the list of the numbers entered through
keyboard.
Ans:
Q.11 WAP to find the 2nd largest number from the list of the numbers entered through
keyboard. (This program is from List Chapter)
Ans:
D
P
S
G
N
R
Ans: (a)
(b)
(c)
D
P
S
G
N
R
(d)
Q.2 Write a python script that traverses through an input string and prints its characters
G
Ans:
Q.3 Which functions would you chose to use to remove leading and trailing white spaces
from a given string?
Ans: Python String strip() function will remove leading and trailing whitespaces. If you want to
remove only leading or trailing spaces, use lstrip() or rstrip() function instead.
Q.4 Suggest appropriate functions for the following tasks –
(a) To check whether the string contains digits.
(b) To find the occurrence a string within another string.
(c) To convert the first letter of a string to upper case.
(d) To convert all the letters of a string to upper case.
(f) To check whether all the letters of the string are in capital letters.
(g) to remove all the white spaces from the beginning of a string.
Ans: (a) isalnum() (b) find() (c) capitalize()
(d) upper() (f) isupper() (g) lstrip()
Q.5 Find the errors -
s=”PURA VIDA”
Print(s[9] + s[9:15])
Ans: Here the error is : Sting index out of range.
Q.1 WAP to print following pattern without using any nested loop.
P
S
#
G
N
## Ans:
R
###
####
#####
Q.2 WAP to print the number of occurrences of a substring into a line.
Ans:
Q.3 WAP to check the given string is palindrome or not.
Ans:
Ans:
N
R
on variables interactively and help a programmer get to the root of the problem.
P
S
Q.6 What are main error types? Which types are most dangerous and why?
G
list.append(6)
S
(c) list.pop(0)
G
N
(d) list.sort()
R
(e) list=list*2
(f) list.insert(3,25)
Q.3 If a is [1, 2, 3], what is the difference (if any) between a*3 and [a, a, a]?
Ans: a*3 will produce [1,2,3,1,2,3,1,2,3], means a list of integers and
[a, a, a] will produce [[1,2,3],[1,2,3],[1,2,3]], means list of lists
Q.4 What is the purpose of the del operator and pop method? Try deleting a slice.
P
S
Ans: del operator is used to remove an individual item, or to remove all items identified by a slice.
G
>>>del List[index]
>>>del List[start:stop]
pop method is used to remove single element, not list slices. The pop() method removes an
individual item and returns it. Its syntax is –
>>>a=List.pop() #this will remove last item and deleted item will be assigned to a.
>>>a=List[10] # this will remove the ite at index 10 and deleted item will be assigned to a.
Q.5 What are list slices?
Ans: List slices, like string slices are the sub part of a list extracted out. Indexes can be used to
create list slices as per following format:
seq = L[start:stop]
Q.6 What do you understand by true copy of a list? How is it different from shallow copy?
Ans: A shallow copy means constructing a new collection object and then populating it with
references to the child objects found in the original. In essence, a shallow copy is only one level
deep. The copying process does not recurse and therefore won‘t create copies of the child
objects themselves.
True Copy means you can create a copy of a list using New_list=My_list. The assignment just
copies the reference to the list, not the actual list, so both new_list and my_list refer to the
same list after the assignment.
Q.7 Predict the output – Ans:
Or
This program is for 3 or 4 marks
output
D
P
S
G
N
R
OR
This program is for 3 or 4 marks
output
Or
This program is for 3 or 4 marks
output
Q.7 WAP that creates a third list after adding two lists.
Ans:
>>>T=() or >>>T=tuple()
P
S
>>>T=3, or >>>T=(4,)
Q.10 What is the difference between (30) and (30,)?
Ans: (30) is an integer while (30,) is a tuple.
Short Answer Type Questions
Q.1 How are Tuples different from Lists when both are sequences?
Ans: Tuples are similar to lists in many ways like indexing, slicing, and accessing individual values
but they are different in the sense that –
Tuples are immutable while lists are mutable.
List can grow or shrink while tuples cannot.
Q.2 Can tuples be nested?
Ans: Yes, tuples can be nested. e.g (1,2,3,(4,5,6))
Q.3 Discuss the utility and significance of Tuples.
Ans: Tuples are great for holding static data that you don't plan on modifying and changing a lot.
Tuples are four to seven times faster than lists. This means for every list item manipulated, four
to seven tuples could be manipulated within that time frame. This has huge advantages for
scientific work, as this allows for speedy data reading.
Q.4 How can you say that a tuple is an ordered list of objects?
Ans: A tuple is an ordered list of objects. This is evidenced by the fact that the objects can be
accessed through the use of an ordinal index amd for a given index, same element is returned
everytime.
Q.5 How can you add an extra element to a tuple?
Ans: We can add an extra element to the tuple as follows – >>>T = T +(9,) e.g.
Ans: True
S
G
N
R
Q.2 WAP that creates a third tuple after adding two tuples. Add second after first tuple.
Ans:
Q.3 WAP to calculate the mean of the numbers of the tuple.
Ans:
them in a dictionary whose keys are product names and values are prices. And also
P
S
Ans:
N
R
Q.2 WAP to create a dictionary named year whose keys are month names and values are
their corresponding number of days.
Ans:
Chapter – 10: UNDERSTANDING SORTING
Short Answer Type Questions
Q.1 What is sorting? Name some sorting Techniques.
Ans: In computer terms sorting refers to arranging elements in a specific order – ascending or
descending. Some sorting techniques are –
(i) Selection Sort
(ii) Bubble Sort
(iii) Insertion Sort
(iv) Heap Sort
(v) Quick Sort
Q.2 What is the basic principal of sorting in bubble sort?
Ans: The basic principal of bubble sort is to compare two adjoining values and exchange them if they
are not in proper order.
Q.3 Why do number-of-comparisons reduce in every successive iteration in bubble sort?
Ans: For the first iteration of the outer loop, when we are trying to place the largest element in its
correct position, N-1 comparisons takes place. For the second iteration of the outer loop, there
is no need to compare against the last element of the list, because it was put at its correct
position on the previous pass. Therefore, the second iteration requires only N-2 comparisons.
And so on.
Q.4 On which basis can you determine if an algorithm is efficient or not?
D
Ans: Efficiency of the algorithm is determined by its number of operations. More number of
P
S
operations means more CPU time. So the algorithm with less number of operations will be more
G
N
efficient.
R
Ans: A system on a chip (SoC) combines the required electronic circuits of various computer
P
components onto a single, integrated chip (IC). SoC is a complete electronic substrate system
S
that may contain analog, digital, mixed-signal or radio frequency functions. Its components
G
usually include a graphical processing unit (GPU), a central processing unit (CPU) that may be
N
R
Q.10 What do you understand by input unit? What is its significance? What does computer
system consist of?
Ans: Input unit is formed by the input devices(Keyboard, mouse, MICR, OBCR etc.) attached to the
computer. Input unit is responsible for taking input and converting it into computer
understandable form(the binary code). Some common input devices are:
(i) Keyboard
D
(ii) Mouse
P
S
(iii) Microphone
G
(iv) Scanner
N
R
(v) Webcam
(vi) Optical Bar Code Reader
(vii) Optical Mark Reader
(viii) Magnetic Ink Character Reader
(ix) Touch Pad
(x) Track Ball
(xi) Joy stick
(xii) Touch Screen
(xiii) Biometric Sensors. Etc.
Q.11 What is the function of CPU in a computer system? What are its sub units?
Ans: The central processing unit (CPU) of a computer is a piece of hardware that carries out the
instructions of a computer program. It performs the basic arithmetical, logical, and input/output
operations of a computer system. The CPU is like the brains of the computer - every instruction,
no matter how simple, has to go through the CPU. So let's say you press the letter 'k' on your
keyboard and it appears on the screen - the CPU of your computer is what makes this possible.
The CPU is sometimes also referred to as the central processor unit, or processor for short. So
when you are looking at the specifications of a computer at your local electronics store, it
typically refers to the CPU as the processor. Its sub units are:
(i) Control Unit (ii) Arithmetical and Logical Unit (ALU) (iii) Memory Unit
Q.12 What functions are performed by the control unit?
Ans: The CU controls and guides the interpretation, flow and manipulation of all data and
information. CU sends control signals until the required operations are done properly by ALU
and memory. Another function of CU is the program execution. It means carrying out all the
instructions stored in the program. CU gets program instruction from the memory and executes
them one after the other. CU acts as a supervisor by controlling and guiding the operation
taking place.
Q.13 Distinguish between CPU and ALU?
Ans: Difference Between ALU and CPU is that arithmetic logic unit (ALU), another component
of the processor, performs arithmetic, comparison, and other operations. While Processor also
central processing unit (CPU), interprets and carries out the basic instructions that operate a
computer.
The main difference between CPU and ALU is that the CPU is an electronic circuit that
handles instructions to operate the computer while the ALU is a subsystem of the CPU that
performs arithmetic and logical operations.
Q.14 What is the function of output unit in a computer system?
Ans: Input devices are the hardware that give computers instructions. Output devices relay the
response from the computer in the form of a visual response (monitor), sound (speakers) or
media devices (CD or DVD drives). The purpose of these devices is to translate the machine's
response to a usable form for the computer user.
Q.15 Distinguish between internal and external memory.
D
Ans: Internal memory is usually chips or modules that you attach directly to the
P
S
motherboard. Internal Memory is a circular disc that continuously rotates as the computer
G
accesses its data. External memory often comes in the form of USB flash drives; CD, DVD, and
N
R
D
P
S
G
N
R
stores in pieces. You can use fragmented files, but it takes your computer longer to access
P
S
them.
G
(b) Backup software: This utility program facilitates the backing-up of disk. Back-up means
N
R
duplicating the disk information so that in case of any damage or data-loss, this backed-up data
may be used.
plain English text) but can also contain any unicode characters (with some increase in file
P
S
size). UTF stands for Unicode Transformation Format. The '8' means it uses 8-bit blocks to
G
represent a character.
N
R
Q.3 How UTF-8 encoding scheme different from UTF-32 encoding scheme?
Ans: UTF-8: Variable-width encoding, backwards compatible with ASCII. ASCII characters (U+0000
to U+007F) take 1 byte, code points U+0080 to U+07FF take 2 bytes, code points U+0800 to
U+FFFF take 3 bytes, code points U+10000 to U+10FFFF take 4 bytes. Good for English text,
not so good for Asian text.
UTF-32 uses 32-bit values for each character. That allows them to use a fixed-width code for
every character. UTF-32 is opposite, it uses the most memory (each character is a fixed 4 bytes
wide), but on the other hand, you know that every character has this precise length, so string
manipulation becomes far simpler. You can compute the number of characters in a string simply
from the length in bytes of the string. You can't do that with UTF-8.
Q.4 What are ASCII and extended ASCII schemes?
Ans: The standard ASCII character set uses just 7 bits for each character. There are several
larger character sets that use 8 bits, which gives them 128 additional characters. The extra
characters are used to represent non-English characters, graphics symbols, and mathematical
symbols.
The extended ASCII character set uses 8 bits, which gives it an additional 128 characters.
The extra characters represent characters from foreign languages and special symbols for
drawing pictures.
Q.5 What is the utility of ISCII encoding schemes?
Ans: ISCII is a bilingual character encoding (not glyphs) scheme. Roman characters and punctuation
marks as defined in the standard lower-ASCII take up the first half the character set (first 128
slots). Characters for indie languages are allocated to the upper slots (128-255). T
Q.6 What is Unicode? What is its significance?
Ans: Unicode is a character encoding standard that has widespread acceptance. Microsoft software
uses Unicode at its core. Whether you realize it or not, you are using Unicode already! Basically,
―computers just deal with numbers. They store letters and other characters by assigning a
number for each one. Before Unicode was invented, there were hundreds of different encoding
systems for assigning these numbers. No single encoding could contain enough characters.1‖
This has been the problem we, in SIL, have often run into. If you are using a legacy encoding
your font conflicts with the font someone in another area of the world uses. You might have
an in your font while someplace else someone used a at the same codepoint. Your files are
incompatible. Unicode provides a unique number for every character and so you do not have
this problem if you use Unicode. If your document calls for U+0289 it will be clear to any
computer program what the character should be
Q.7 What are ASCII and ISCII? Why are these used?
Ans: ASCII uses a 7-bit encoding and ISCII uses an 8-bit which is an extension of ASCII. These are
encoding schemes to represent character set in s computer system.
Q.8 Compare UTF-8 and UTF-32 encoding schemes. Which one is most popular scheme?
Ans: UTF-8: Variable-width encoding, backwards compatible with ASCII. ASCII characters (U+0000
D
to U+007F) take 1 byte, code points U+0080 to U+07FF take 2 bytes, code points U+0800 to
P
S
U+FFFF take 3 bytes, code points U+10000 to U+10FFFF take 4 bytes. Good for English text,
G
N
UTF-32 uses 32-bit values for each character. That allows them to use a fixed-width code for
every character. UTF-32 is opposite, it uses the most memory (each character is a fixed 4 bytes
wide), but on the other hand, you know that every character has this precise length, so string
manipulation becomes far simpler. You can compute the number of characters in a string simply
from the length in bytes of the string. You can't do that with UTF-8.
Chapter – 3: BOOLEAN LOGIC
Very Short answer Type Questions
Q.1 Prove X. (X+Y) = X using truth table.
Ans: Proof:
X Y X+Y X.(X+Y)
0 0 0 0
0 1 1 1
1 0 1 1
1 1 1 1
Q.2 Give duals for the following –
(a) X+X‟Y (b) XY+XY‟+X‟Y (c) AB+A‟B (d) ABC+AB‟C+A‟BC‟
Ans: (a) X.X‘ + Y (b) (X+Y).(X+Y‘).(X‘+Y)
(c) (A+B).(A‘+B) (d) (A+B+C).(A+B‘+C).(A‘+B+C‘)
Q.3 What is tautology?
Ans: If the result of any logical statement or expression is always TRUE or 1 for all input
combinations, it is called tautology.
Q.4 What is Fallacy?
Ans: If the result of any logical statement or expression is always FALSE or 0 for all input
combinations, it is called fallacy.
Q.5 What is a truth table? What is its significance?
Ans: A truth table is a table which represents all the possible values of logical variables/statements
along with all the possible results of the given combinations of values.
D
P
Q.3 Obtain the Boolean Expression for the logic circuit shown bellow –
Ans: (X.Y‘)‘+(Z‘+W)
Q.4 Find the complement of the following Boolean function : F1=AB‟ + C‟D‟
Ans: Complement of F1 will be (A‘+B).(C+D)
Q.5 State and verify Involution law.
Ans: Involution law says that (X‘)‘ = X.
X X‘ (X‘)‘
0 1 0
1 0 1
Q.6 Prove algebraically X.Y + X‟.Z + Y.Z = X.Y + X‟.Z
Ans: L.H.S. X.Y + X‘.Z + Y.Z = X.Y + X‘.Z + 1.Y.Z
= X.Y + X‘Z + (X+X‘).Y.Z
= X.Y + X‘Z + X.Y.Z + X‘.Y.Z
= X.Y + X.Y.Z + X‘Z + X‘.Y.Z
= X.Y.(1+Z) + X‘.Z.(1+Y)
=X.Y + X‘.Z Since 1+Z= 1 and 1+Y = 1
Q.7 State and verify Absorption law in Boolean Algebra.
Ans: (a) X+XY = X (b) X(X+Y) = X
LHS = X+XY = X(1+Y) = X LHS = X(X+Y) = X.X + X.Y
= X + XY = X(1+Y) = X
Q.8 State DeMorgan‟s law of Boolean Algebra and verify them using truth table.
Ans: (a) (X + Y)‘ = X‘.Y‘ (b) (X.Y)‘ = X‘ + Y‘
Q.9 What do you understand by “logical function”? Give examples for logical functions.
D
P
Ans: Boolean algebra is the algebra of logic that deals with the study of binary variables and logical
S
operations. It was founded by the mathematician George Boole.Boolean variables are the
G
N
variables which have only two states i.e. true/ false or right/ wrong or on/off or 0/1. Boolean
R
The NAND Gate has two or more input signals but only one output signal. If all the inputs are 1
(i.e. High) then output signal is 0(low).
NAND and NOR Gates are known as universal gates because fundamental gates can be made
using them. And By using NAND and NOR Gates the cost and size of circuit gets reduced.
Ans:
G
N
R
(a) AND (b) OR (c) NAND (d) NOR (e) None of these
Ans: (b) OR
tokens in the source code and creates a symbol table with it.
P
S
The back end phase of compiler is Synthesis Phase. This phase of compiler parses the code
G
N
and generates syntax tree, analyzing the syntax of the source code.
R
No. once the role of compiler is over, Always required. Interpreter translates and runs
Always a compiler is no longer required to one instruction every time. So it is always
Required run the executable fuile. required in memory to run the code.
Compilation once done, stays always.
Recompilation not required if the Interpretation is required each time you have to
code(without any change) needs to run the code. The interpreter does not create
run again. The same executable file an executable and hence it is required every
Workload can be rerun without the compiler. time, the code is to run.
Q.3 What are the characteristics of compiler?
Ans:
Aspects Compiler
Input A Compiler takes an entire program as its input.
Output It generates intermediate object code from the whole program.
Memory Requires more memory during compilation.
Errors Displays lists of errors of entire program with line numbers and the error(s) in that line.
Always No. once the role of compiler is over, a compiler is no longer required to run the
Required executable fuile.
Compilation once done, stays always. Recompilation not required if the code(without
any change) needs to run again. The same executable file can be rerun without the
Workload compiler.
Q.4 What are the characteristics of Interpreter?
Ans:
Aspects Interpreter
Input It takes a single line of code or single instruction(such as loop) as its input.
Output It does not create any intermediate object code.
Requires less memory during interpretation as interprets single instruction/unit-of-code at a
Memory time.
Errors Displays the error of single line it is interpreting. Thus errors also appear one line at a time.
Always Always required. Interpreter translates and runs one instruction every time. So it is always
Required required in memory to run the code.
Interpretation is required each time you have to run the code. The interpreter does not
Workload create an executable and hence it is required every time, the code is to run.
D
Ans: A computer system has many resources (hardware and software), which may be require to
G
N
complete a task. The commonly required resources are input/output devices, memory, file
R
storage space, CPU etc. The operating system acts as a manager of the above resources and
allocates them to specific programs and users, whenever necessary to perform a particular task.
Therefore operating system is the resource manager i.e. it can manage the resource of a
computer system internally. The resources are processor, memory, files, and I/O devices. In
simple terms, an operating system is the interface between the user and the machine.
Operating System Management Tasks
1. Processor management which involves putting the tasks into order and pairing them into
manageable size before they go to the CPU.
2. Memory management which coordinates data to and from RAM (random-access memory)
and determines the necessity for virtual memory.
3. Device management which provides interface between connected devices.
4. Storage management which directs permanent data storage.
5. Application which allows standard communication between software and your computer.
6. User interface which allows you to communicate with your computer.
Q.6 What is cloud computing?
Ans: cloud computing is the delivery of computing services—servers, storage, databases, networking,
software, analytics, intelligence and more—over the Internet (―the cloud‖) to offer faster
innovation, flexible resources and economies of scale. You typically pay only for cloud services
you use, helping lower your operating costs, run your infrastructure more efficiently and scale
as your business needs change.
Cloud computing is a big shift from the traditional way businesses think about IT resources.
Here are seven common reasons organizations are turning to cloud computing services.
Q.7 What are the advantages of parallel computing?
Ans: Parallel computing is a type of computation in which many calculations or the execution of
processes are carried out simultaneously. Large problems can often be divided into smaller
ones, which can then be solved at the same time. It refers to the simultaneous working of
multiple processors to solve a computational problem. Its advantages are –
(i) It saves time and the cost too.
(ii) It makes easier to solve larger or complex problems.
(iii) It provides efficient use of underlying hardware.
(iv) It can utilize the resources available remotely.
Q.8 What is the basic flow of program execution?
Ans: the basic flow of program execution can be defined when a programmer create a program( the
source code), which needs to be converted into binary form so that computer can execute it.
This conversion is done by a software which is known as translator(compiler or interpreter).
D
Q.9 What is the difference between source code and object code?
P
S
Ans: Source Code refers to the original code written in a programming language by a programmer.
G
Object Code refers to the code converted into computer understandable form that a computer
N
R
Ans: Process managements involve the execution of various tasks such as creation of processes,
G
responsibility of operating system to manage all the running processes of the system.
Operating system manages processes by performing tasks such as resource allocation and
process scheduling. When a process runs on computer device memory and CPU of computer
are utilized. The operating system also has to synchronize the different processes of computer
system.
A process consists of set of instruction to be executed called process code. A process is also
associated with some data that is to be processed. The resources that a process required for its
execution is called process components. There is also a state that is associated with a process
at a particular instant of time called process state. Similar to these concepts, there are number
of concepts associated with the process management function of an operating system. Some of
those concepts are given as following.
Process State
Process Control Block (PCB)
Process Operations
Process Scheduling
Process Synchronization
Interprocess Communication
Deadlock
Q.17 What is the role of memory manager and I/O manager of OS?
Ans: Memory management is a form of resource management applied to computer memory. The
essential requirement of memory management is to provide ways to dynamically allocate
portions of memory to programs at their request, and free it for reuse when no longer needed.
This is critical to any advanced computer system where more than a single process might be
underway at any time.
I/O Manager:One of the important jobs of an Operating System is to manage various I/O
devices including mouse, keyboards, touch pad, disk drives, display adapters, USB devices, Bit-
mapped screen, LED, Analog-to-digital converter, On/off switch, network connections, audio
I/O, printers etc.
An I/O system is required to take an application I/O request and send it to the physical device,
then take whatever response comes back from the device and send it to the application. I/O
devices can be divided into two categories −
Block devices − A block device is one with which the driver communicates by sending entire
blocks of data. For example, Hard disks, USB cameras, Disk-On-Key etc.
Character devices − A character device is one with which the driver communicates by
sending and receiving single characters (bytes, octets). For example, serial ports, parallel
ports, sounds cards etc
Q.18 How is private cloud different from public cloud?
Ans: Public cloud: Public clouds are owned and operated by a third-party cloud service providers,
which deliver their computing resources like servers and storage over the Internet. Microsoft
Azure is an example of a public cloud. With a public cloud, all hardware, software and other
supporting infrastructure is owned and managed by the cloud provider. You access these
services and manage your account using a web browser.
Private cloud: A private cloud refers to cloud computing resources used exclusively by a single
business or organization. A private cloud can be physically located on the company‘s on-site
datacenter. Some companies also pay third-party service providers to host their private cloud. A
private cloud is one in which the services and infrastructure are maintained on a private
network.
Q.19 What is parallel computing?
Ans: Parallel computing is a type of computation in which many calculations or the execution of
processes are carried out simultaneously. Large problems can often be divided into smaller
D
P
ones, which can then be solved at the same time. It refers to the simultaneous working of
S
G
IP Address
S
HTTP Referrer
N
Super Cookies
R
User Agent
Q.4 What are cookies? How are they used by websites to track you?
Ans: cookies are small pieces of information websites can store in your browser. Cookies can be –
1. First Party Cookies- These are the cookies that store your own log in id, password, and auto
fill information etc.
2. Third Party Cookies: These are the cookies that websites store to know about your search
history and web browsing history so as to place advertisements as per your interests.
Q.5 What is private browsing? Why is it considered a better way of browsing the Internet?
Ans: Anonymous browsers allow users to view websites without revealing personal information of
user.
It can be sued as a tool for governments, journalists and every security conscious surfers.
A popular solution to this is- Private Browsing.
Incognito browsing open up a version of the browser that will not track your activity.it is
particularly useful if you are entering sensitive data like bank details into your browser.
Proxy works as a middleman between your computer and the website you want to access. Now
the tracking website will get the IP address of proxy site.
Virtual Private Network (VPN) this is a method to add security and privacy to private and public
networks, like WiFi hotspots and Internet. It is originally meant for business employees working
offsite to gain access to shared drives or networks.
Q.6 What is confidentiality of information? How do you ensure it?
Ans:
the influence of it has become impossible that is why analysis of your digital footprint is highly
P
S
necessary. This will provide you valuable information on what you are doing and what should be
G
N
avoided by you.
R
documents. The purpose of creating a computer virus is to infect vulnerable systems, gain
P
S
admin control and steal user sensitive data. Hackers design computer viruses with malicious
G
N
Antivirus software is a program or set of programs that are designed to prevent, search for,
detect, and remove software viruses, and other malicious software like worms, trojans, adware,
and more
Q.2 How is backup utility useful? Is it necessary to take backup of data?
Ans: Backup is a very helpful utility. You can backup your data with that and whenever your data is
corrupted by any virus or Trojans your data will remain safe.
It is not necessary to backup your until or unless you have something really important stuff in
your machine.The backup depends on your wish if you want to make backup, go on for it and if
you don't leave it. But if you have something very useful for you in future then its better to take
backup.
Q.3 What is Computer virus? How can it affect your computer?
Ans: A computer virus is a malicious program that self-replicates by copying itself to another
program. In other words, the computer virus spreads by itself into other executable code or
documents. The purpose of creating a computer virus is to infect vulnerable systems, gain
admin control and steal user sensitive data. Hackers design computer viruses with malicious
intent and prey on online users by tricking them.
Q.4 What are different types of threats to computer security?
Ans: A Threat is a potential violation of security. When a threat is actually executed, it becomes
attack. Those who execute such actions, or cause them to be executed are called attackers.
Some common threats the average computer user faces everyday are
1. Viruses
2. Worms
3. Trojans
4. Spyware
5. Adware
6. Spamming
7. PC Intrusion:
8. Denial of Service
9. Sweeping
10. Password Guessing
11. Phishing
Q.5 What type damages can be caused by viruses to your computer?
Ans: Damages caused by Viruses:
– Damage or Delete files.
– Slow down your computer.
– Invade your email programs.
Q.6 What are malware? What type damages can they cause to your computer?
Ans: "Malware" is short for malicious software and used as a single term to refer to virus, spy ware,
worm etc. Malware is designed to cause damage to a stand-alone computer or a networked pc.
D
So wherever a malware term is used it means a program which is designed to damage your
P
S
Ans: Spam email is a form of commercial advertising which is economically viable because email is a
very cost-effective medium for the sender. If just a fraction of the recipients of a spam message
purchase the advertised product, the spammers are making money and the spam problem is
perpetuated.
Q.8 What do you understand by PC intrusion?
Ans: Intrusion - Computer Definition. To compromise a computer system by breaking the security
of such a system or causing it to enter into an insecure state. The act of intruding—or gaining
unauthorized access to a system—typically leaves traces that can be discovered
by intrusion detection systems.
Q.9 What measures would you take to avoid -
(a)Virus attack (b) Spyware (c) Adware (d) Spam (e) PC Intrusion
Ans: (a), (b)& (c) (d)
(e)
Q.13 What is Authentication and Authorization? Why are these two used together?
Ans: Difference between Authentication and Authorization. Both the terms are often used in
conjunction with each other in terms of security, especially when it comes to gaining access
to the system. Authentication means confirming your own identity, while authorization means
granting access to the system.
Q.14 What is the significance of Firewall in a computer‟s security scheme?
Ans:
Q.15 What is Eavesdropping? What security measures can you take up to prevent it?
Ans:
six characters (and the more characters, the stronger the password) that are a combination of
G
N
letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-
R
sensitive, so a strong password contains letters in both uppercase and lowercase. Strong
passwords also do not contain words that can be found in a dictionary