computer_science_short_questions
computer_science_short_questions
Training helps users understand how to effectively use a new system, enhancing productivity and
minimizing errors.
- Surveys
- Interviews
- Observation
- Document Analysis
System software is the software that manages computer hardware and provides a platform for
System software manages hardware and system resources, while application software performs
The coding phase involves translating the design into actual code using programming languages.
Testing ensures the system is functioning correctly and meets user requirements, preventing
errors in production.
A bit is the smallest unit of data in computing, representing a binary value (0 or 1). A byte is a
group of 8 bits.
- ISDN provides digital transmission over phone lines; DSL provides high-speed internet over
- ISDN is mainly used for voice and data; DSL is primarily for internet access.
Workgroup computing allows users to collaborate and share resources within a small team or
department.
It formats and presents data for the application layer, ensuring proper communication between
different systems.
Tree topology combines multiple star topologies connected to a linear bus backbone.
The network layer transmits packets of data from the source to the destination.
Collaborative computing enables multiple users to work together on shared tasks using
technology.
The Internet is a global network connecting millions of private, public, academic, and government
networks.
11. Define the gateway and router.
A gateway connects different networks, while a router directs data packets between networks.
Asynchronous communication does not require both parties to be online at the same time;
Baseband transmits digital signals over a single channel; broadband transmits multiple signals
6. Define bandwidth.
Parallel data transmission sends multiple bits simultaneously over multiple channels.
- Serial sends data one bit at a time, while parallel sends multiple bits simultaneously.
- Serial is slower but more reliable over long distances; parallel is faster for short distances.
Synchronous data transmission sends data at regular intervals, using a clock signal to synchronize
the sender and receiver.
Asynchronous transmission sends data without a clock signal, using start and stop bits to indicate
Computer-aided manufacturing uses computer software to control machine tools and automate
manufacturing processes.
E-Commerce enables online buying and selling of goods and services, making shopping more
convenient.
Computers enable digital marketing strategies such as social media advertising and email
campaigns.
Electronic banking allows users to conduct financial transactions via the Internet.
9. Explain CAD.
Computer-Aided Design (CAD) uses software to create detailed drawings and models for various
industries.
CAD focuses on designing products; CAM focuses on using computer software to control
manufacturing processes.
The Memory Address Register stores the address of the memory location to be accessed for
Bus interconnection allows different components of a computer to communicate and transfer data.
An expansion bus connects additional hardware components to the computer, allowing for
- Accumulator
- Data Register
- Address Register
- Instruction Register
Main memory stores data and instructions that the CPU needs for processing tasks.
The Arithmetic Logic Unit (ALU) performs mathematical calculations and logical operations
An interrupt is a signal that temporarily halts a CPU's current process, allowing it to address a
higher-priority task.
The Input/Output unit facilitates communication between the computer and external devices like
Cache memory is a small, high-speed storage area that stores frequently accessed data to speed
up processing.
The input/output unit manages data exchange between the computer's internal components and
external devices.
Direct Memory Access (DMA) allows peripherals to access memory independently of the CPU,
improving performance.
The Stack Pointer Register keeps track of the top of the stack in memory, helping manage
Source code is the human-readable code written by programmers, while object code is the
- Facial recognition
Data security involves protecting data from unauthorized access and corruption throughout its
lifecycle.
- Iris recognition
- Voice recognition
Privacy issues arise when personal data is collected, used, or shared without consent.
A computer virus is malicious software designed to replicate itself and infect other files.
A boot sector virus infects the master boot record, executing whenever the computer starts.
A password is a secret word or phrase used to authenticate a user and secure access to systems.
A logic bomb is malicious code that triggers under specific conditions, causing harm to the system.
Windows OS is a popular operating system developed by Microsoft, used for personal computers
and servers.
- Windows 10
- Windows 8
- Windows 7
- Windows XP
The desktop environment is the main user interface, allowing users to interact with applications
and files.
Files and folders can be managed using File Explorer, which allows users to create, delete, and
organize files.
The Control Panel provides access to system settings and configuration options.
Task Manager allows users to monitor running applications and processes and manage system
performance.
Software can be installed using installation files or through the Microsoft Store.
A DBMS is software that enables the creation, management, and manipulation of databases.
- Data integrity
- Data security
3. What is SQL?
SQL (Structured Query Language) is a standard programming language used to manage and
manipulate databases.
4. Differentiate between primary key and foreign key.
A primary key uniquely identifies a record in a table, while a foreign key establishes a relationship
5. What is normalization?
Normalization is the process of organizing data in a database to reduce redundancy and improve
data integrity.
A data model defines how data is structured and how relationships between data are handled.
A relational database stores data in tables that can be linked based on related data.
Data integrity ensures that data is accurate, consistent, and reliable throughout its lifecycle.
systems.
Machine learning is a subset of AI that enables systems to learn and improve from experience
IoT refers to the network of interconnected devices that communicate and exchange data over the
Internet.
Blockchain is a distributed ledger technology that securely records transactions across multiple
computers.
- Cost-effectiveness
- Accessibility
6. Define Cybersecurity.
Cybersecurity involves protecting computer systems and networks from digital attacks, theft, and
damage.
AR enhances the real world by overlaying digital information or images on it through devices like
VR is a simulated experience that can be similar to or completely different from the real world,