0% found this document useful (0 votes)
4 views

computer_science_short_questions

The document is a compilation of short questions and answers covering various topics in computer science, including information technology basics, data communications, computer architecture, and emerging technologies. It provides definitions, comparisons, and explanations of key concepts such as system software, data security, and artificial intelligence. Each chapter addresses specific areas of computer science, offering insights into their applications and significance.

Uploaded by

135790ibraheem
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

computer_science_short_questions

The document is a compilation of short questions and answers covering various topics in computer science, including information technology basics, data communications, computer architecture, and emerging technologies. It provides definitions, comparisons, and explanations of key concepts such as system software, data security, and artificial intelligence. Each chapter addresses specific areas of computer science, offering insights into their applications and significance.

Uploaded by

135790ibraheem
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Computer Science Short Questions

CHAPTER 1: Basics of Information Technology


1. Why we need training of users for a new system?

Training helps users understand how to effectively use a new system, enhancing productivity and

minimizing errors.

2. Enlist any four data gathering techniques.

- Surveys

- Interviews

- Observation

- Document Analysis

3. Define system software.

System software is the software that manages computer hardware and provides a platform for

running application software.

4. Compare system software with application software.

System software manages hardware and system resources, while application software performs

specific user tasks.

5. Describe coding phase in SDLC.

The coding phase involves translating the design into actual code using programming languages.

6. Why is important to test a system before use?

Testing ensures the system is functioning correctly and meets user requirements, preventing

errors in production.

7. Define Bit and Byte.

A bit is the smallest unit of data in computing, representing a binary value (0 or 1). A byte is a

group of 8 bits.

CHAPTER 2: Information Network


1. Write the purpose of Gateway.

A gateway connects different networks and translates communication between them.

2. Write down two differences between ISDN and DSL.

- ISDN provides digital transmission over phone lines; DSL provides high-speed internet over

existing phone lines.

- ISDN is mainly used for voice and data; DSL is primarily for internet access.

3. Which two topologies are combined to make tree topology?

Star and bus topologies are combined to create a tree topology.

4. What is workgroup computing?

Workgroup computing allows users to collaborate and share resources within a small team or

department.

5. What is the function of the presentation layer in the OSI model?

It formats and presents data for the application layer, ensuring proper communication between

different systems.

6. How is tree topology constructed?

Tree topology combines multiple star topologies connected to a linear bus backbone.

7. What is the form of data on the network layer of OSI?

The network layer transmits packets of data from the source to the destination.

8. State the purpose of telecommunication.

Telecommunication facilitates long-distance communication through various means like phone,

internet, and satellite.

9. Define collaborative computing.

Collaborative computing enables multiple users to work together on shared tasks using

technology.

10. Define the Internet.

The Internet is a global network connecting millions of private, public, academic, and government

networks.
11. Define the gateway and router.

A gateway connects different networks, while a router directs data packets between networks.

CHAPTER 3: Data Communications


1. Differentiate between Asynchronous and Synchronous.

Asynchronous communication does not require both parties to be online at the same time;

synchronous requires real-time communication.

2. How is data represented in Computer?

Data in computers is represented in binary form, using 0s and 1s.

3. Differentiate between baseband and Broadband.

Baseband transmits digital signals over a single channel; broadband transmits multiple signals

over different frequencies.

4. List two features of Modem.

- Converts digital data to analog for transmission.

- Provides error detection and correction.

5. Write two characteristics of analog signals.

- Continuous signals that vary in amplitude and frequency.

- Can represent a range of values.

6. Define bandwidth.

Bandwidth is the maximum data transfer rate of a network or Internet connection.

7. What is parallel data transmission?

Parallel data transmission sends multiple bits simultaneously over multiple channels.

8. Compare serial and parallel transmission.

- Serial sends data one bit at a time, while parallel sends multiple bits simultaneously.

- Serial is slower but more reliable over long distances; parallel is faster for short distances.

9. Define Synchronous data transmission.

Synchronous data transmission sends data at regular intervals, using a clock signal to synchronize
the sender and receiver.

10. What is asynchronous transmission?

Asynchronous transmission sends data without a clock signal, using start and stop bits to indicate

the beginning and end of data.

CHAPTER 4: Application and Uses of Computer


1. Explain the term computer-aided manufacturing process.

Computer-aided manufacturing uses computer software to control machine tools and automate

manufacturing processes.

2. Define the role of E-Commerce in our daily life.

E-Commerce enables online buying and selling of goods and services, making shopping more

convenient.

3. Write any two advantages of ATM in banks.

- Allows 24/7 access to cash.

- Enables quick transactions without the need for bank staff.

4. Write two benefits of computer-aided learning.

- Provides interactive learning experiences.

- Offers personalized education based on individual needs.

5. Write two uses of computers at home.

- For online banking and bill payments.

- For entertainment like gaming and streaming movies.

6. How are computers used in marketing?

Computers enable digital marketing strategies such as social media advertising and email

campaigns.

7. Describe electronic banking.

Electronic banking allows users to conduct financial transactions via the Internet.

8. How are robots used in industry?


Robots automate repetitive tasks, increasing efficiency and precision in manufacturing.

9. Explain CAD.

Computer-Aided Design (CAD) uses software to create detailed drawings and models for various

industries.

10. Differentiate between CAD and CAM.

CAD focuses on designing products; CAM focuses on using computer software to control

manufacturing processes.

CHAPTER 5: Computer Architecture


1. What is the use of Memory Address Register?

The Memory Address Register stores the address of the memory location to be accessed for

reading or writing data.

2. Define bus interconnection.

Bus interconnection allows different components of a computer to communicate and transfer data.

3. Write the use of expansion bus.

An expansion bus connects additional hardware components to the computer, allowing for

upgrades and expansions.

4. List four general purpose registers.

- Accumulator

- Data Register

- Address Register

- Instruction Register

5. What is the role of main memory in a computer system?

Main memory stores data and instructions that the CPU needs for processing tasks.

6. Why is ALU necessary for a computer system?

The Arithmetic Logic Unit (ALU) performs mathematical calculations and logical operations

essential for processing data.


7. What is an interrupt?

An interrupt is a signal that temporarily halts a CPU's current process, allowing it to address a

higher-priority task.

8. Describe the role of the I/O unit.

The Input/Output unit facilitates communication between the computer and external devices like

keyboards and printers.

9. Define Cache memory.

Cache memory is a small, high-speed storage area that stores frequently accessed data to speed

up processing.

10. Describe the function of the input/output unit.

The input/output unit manages data exchange between the computer's internal components and

external devices.

11. What is DMA? Define it.

Direct Memory Access (DMA) allows peripherals to access memory independently of the CPU,

improving performance.

12. What is Stack pointer register?

The Stack Pointer Register keeps track of the top of the stack in memory, helping manage

function calls and local variables.

13. Name two segment registers.

- Code Segment Register

- Data Segment Register

14. Differentiate between Source code and Object code.

Source code is the human-readable code written by programmers, while object code is the

machine-readable code generated after compilation.

CHAPTER 6: Security, Copyright and The Law


1. Give two biometric methods to prove your identity to log on a system.
- Fingerprint scanning

- Facial recognition

2. Define Data Security.

Data security involves protecting data from unauthorized access and corruption throughout its

lifecycle.

3. List names of two biometric methods.

- Iris recognition

- Voice recognition

4. What is a privacy issue?

Privacy issues arise when personal data is collected, used, or shared without consent.

5. What is a computer virus?

A computer virus is malicious software designed to replicate itself and infect other files.

6. How does a boot sector virus work?

A boot sector virus infects the master boot record, executing whenever the computer starts.

7. Write about Password briefly.

A password is a secret word or phrase used to authenticate a user and secure access to systems.

8. What is a logic bomb?

A logic bomb is malicious code that triggers under specific conditions, causing harm to the system.

CHAPTER 7: Windows Operating System


1. Define the Windows Operating System.

Windows OS is a popular operating system developed by Microsoft, used for personal computers

and servers.

2. List four versions of Windows Operating System.

- Windows 10

- Windows 8

- Windows 7
- Windows XP

3. Explain the desktop environment in Windows.

The desktop environment is the main user interface, allowing users to interact with applications

and files.

4. How do you manage files and folders in Windows?

Files and folders can be managed using File Explorer, which allows users to create, delete, and

organize files.

5. What is the Control Panel in Windows?

The Control Panel provides access to system settings and configuration options.

6. Explain the role of Task Manager.

Task Manager allows users to monitor running applications and processes and manage system

performance.

7. What is a shortcut in Windows?

A shortcut is a link to a file, folder, or application that provides quick access.

8. How can you install software in Windows?

Software can be installed using installation files or through the Microsoft Store.

CHAPTER 8: Database Management System


1. Define Database Management System (DBMS).

A DBMS is software that enables the creation, management, and manipulation of databases.

2. What are the advantages of using DBMS?

- Data integrity

- Data security

- Efficient data management

3. What is SQL?

SQL (Structured Query Language) is a standard programming language used to manage and

manipulate databases.
4. Differentiate between primary key and foreign key.

A primary key uniquely identifies a record in a table, while a foreign key establishes a relationship

between two tables.

5. What is normalization?

Normalization is the process of organizing data in a database to reduce redundancy and improve

data integrity.

6. Define data model.

A data model defines how data is structured and how relationships between data are handled.

7. What is a relational database?

A relational database stores data in tables that can be linked based on related data.

8. Explain data integrity.

Data integrity ensures that data is accurate, consistent, and reliable throughout its lifecycle.

CHAPTER 9: Emerging Technologies


1. What is Artificial Intelligence (AI)?

AI refers to the simulation of human intelligence processes by machines, especially computer

systems.

2. Define Machine Learning.

Machine learning is a subset of AI that enables systems to learn and improve from experience

without being explicitly programmed.

3. Explain the Internet of Things (IoT).

IoT refers to the network of interconnected devices that communicate and exchange data over the

Internet.

4. What is Blockchain technology?

Blockchain is a distributed ledger technology that securely records transactions across multiple

computers.

5. What are the benefits of Cloud Computing?


- Scalability

- Cost-effectiveness

- Accessibility

6. Define Cybersecurity.

Cybersecurity involves protecting computer systems and networks from digital attacks, theft, and

damage.

7. What is Augmented Reality (AR)?

AR enhances the real world by overlaying digital information or images on it through devices like

smartphones and AR glasses.

8. Explain Virtual Reality (VR).

VR is a simulated experience that can be similar to or completely different from the real world,

typically achieved through VR headsets.

You might also like