Information Technology Tools and Network Basis

Question & Answer



Question : 1
What do you mean by word Computer, Explain it with its features.


Answer :

Question : 2
What is Computer Ethics?


Answer :

Computer ethics deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.



Question : 3
What is Software Piracy? How does shareware deal with software piracy?


Answer :

Software piracy is used to describe the act of illegally using, copying or distributing software without ownership or legal rights.

Shareware is a good way to market software. It allows consumers to evaluate an application prior to making a purchase decision. They can easily determine if it meets their business or personal needs, which usually results to a satisfied customer.



Question : 4
Why do you think in developing countries like India, it is difficult to stop software piracy?


Answer :

Software piracy is hard to stop for several reasons:

  1.  It’s not a violent crime, so eliminating the criminals by killing them is not really an option. As such, the only remaining option is a legal approach - charging them with a crime and threatening them with prison if they don’t quickly agree to a guilty plea.
  2.  Software piracy is very easy. If you want your software to work without internet connection, then you need to put the entire code and all the data into the hands of a users; consequently, any anti-piracy measures have to be in their hands as well, making it possible for smart coders to reverse-engineer your code, find the part which performs verification of “license to use”, and remove or twist that part so that the software works without a license.
  3.  Sharing cracked software is ludicrously easy and hard to detect.
  4.  There are millions of people involved in this. Quite literally, not only your prisons, but your court-rooms as well are not big enough to realistically charge everyone. So you have to prioritize who you will go after.
  5.  Experts still can’t agree to what extent is piracy harmful. There were numerous cases where a pirated version of something was instrumental in making it popular, which not only later led people to buy a legal copy, but generated interest in a sequel, which then became massive hit.
  6.  People who can afford buying movies and games generally do so; people who cannot afford it will either pirate them, or not get them at all.
  7.  The price tag associated with a legal software is generally high.


Question : 5
What are the different ways of stopping Software Piracy?


Answer :

The different ways to stop software piracy are:

  • Educate your staff on the licensing requirements of your software purchases
  • Conduct a self-audit of your software licenses
  • Acquire any licenses needed for full compliance
  • The most widely used method is the license key; code that is built into an application to require a valid key to unlock the software. 


Question : 6
How does Spamming affect economically?


Answer :

Spamming remains economically viable because advertisers have very little or sometimes no operating costs beyond the management of their mailing lists, and it is almost impossible to hold senders accountable for their mass mailings. On the other hand it costs huge to the sender and may sometime even get dubbed.



Question : 7
How can spamming be reduced?


Answer :

 By using these precautions you can greatly mitigate what spam you do receive and prevent most spam from ever happening.

  • Be careful where you enter your email at.
  • Create or use disposable email addresses for websites you do not trust.
  • Never open spam when you receive it.
  • Keep your computer virus and malware free.
  • If your friends are sending you emails sent to a large recipient list, request that they use BCC instead of TO or CC, so that other recipients cannot see your email address; or request they stop including you if you do not want to receive the emails.
  • Do not list your email address on your website or anywhere the public can access it.


Question : 8
How is phishing and pharming performed to perform Cybercrime?


Answer :

Phising is a fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Pharming is the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.



Question : 9
What are the different types of Cybercrimes?


Answer :

The different types of cyber crime are:

  • Financial fraud crimes
  • Cyberterrorism
  • Cyberextortion
  • Cyberwarfare
  • Computer as a target
  • Computer as a tool 


Question : 10
How are Hackers different from Crackers?


Answer :

Hackers are those computers experts which breaks into computers to check any vulnerably so that no one can misuse the services. These are really intelligent and smart persons who use there ability to protect the community from cyber crimes and computer thefts.

Whereas, Crackers are those peoples who use there knowledge to do computer crimes for gaining popularity among peoples and to earn fast money. They break into computer networks for their enjoyment and cause harm to them. These persons does not have real knowledge and know something about using the particular software to break into computers.



Question : 11
What is volatile memory?


Answer :

 RAM is known as Volatile Memory because when we switch off the computer its data is vanished.



Question : 12

Define each of the following:

(a) byte

(b) kilobyte

(c) megabyte

(d) gigabyte

(e) terabyte



Answer :

 (a) byte: This is the unit of memory in computer. 1 byte = 8 bits

(b) kilobyte: This is the unit of memory in computer. 1 kilobyte = 1024 bytes

(c) megabyte: This is the unit of memory in computer. 1 megabyte = 1024 kilobytes

(d) gigabyte: This is the unit of memory in computer. 1 gigabyte = 1024 megabytes

(e) terabyte: This is the unit of memory in computer. 1 terabyte = 1024 gigabytes.



Question : 13
State the basic units of computer. Name the subunits that make up the CPU, and give the function of each of the unit.


Answer :

Basic units of computer are Input Unit, Central Processing Unit and Output Unit. Sub unites of CPU are Arithmetical Logical Unit(ALU), Control Unit (CU) and Memory Unit(MU).



Question : 14
What is the function of memory? What are its measuring units?


Answer :

The computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs. Before a program can run, the program is loaded from some storage medium into the memory. This allows the CPU direct access to the program. Its measuring units are byte, kilobyte, megabyte, gigabyte, terabyte etc. 



Question : 15
Why is primary memory termed as "destructive write" memory but "non-destructive read" memory?


Answer :

The primary memory is called destructive write because the data enter here are temporary. That‟s why your RAM gets cleared after every restart. 



Question : 16
What is the role of CPU of a mobile system?


Answer :

A mobile processor is found in mobile computers and cellphones. A CPU chip is designed for portable computers, it is typically housed in a smaller chip package, but more importantly, in order to run cooler, it uses lower voltages than its desktop counterpart and has more sleep mode capability. A mobile processor can be throttled down to different power levels or sections of the chip can be turned off entirely when not in use. Further, the clock frequency may be stepped down under low processor loads. This stepping down conserves power and prolongs battery life.



Question : 17
What is SoC? how it is different from CPU? Why is it considered a better development?


Answer :

A system on a chip (SoC) combines the required electronic circuits of various computer components onto a single, integrated chip (IC). SoC is a complete electronic substrate system that may contain analog, digital, mixed-signal or radio frequency functions. Its components usually include a graphical processing unit (GPU), a central processing unit (CPU) that may be multi-core, and system memory (RAM). 

Because SOC includes both the hardware and software, it uses less power, has better performance, requires less space and is more reliable than multi-chip systems. Most system-on chips today come inside mobile devices like smartphones and tablets. These are considered a better development because of their small size and speed capability. 



Question : 18
What are various categories of software?


Answer :

Software are classified into following categories –

(i) System Software

a. Operating System

b. Language Processor

(ii) Application Software

a. Packages

b. Utilities

c. Customized software

d. Developer Tools



Question : 19
What is the difference between an interpreter and a compiler?


Answer :

Interpreter: Interpreter is a type of system software that translates and executes instructions written in a computer program lini-by-line, unit by unit etc. It is slower in execution because each time when you run the program translation is required.

Compiler: Compiler is another type of system software that translates and executes instructions written in a computer program in one go. Once compiled program need not to translate again so it works faster. 



Question : 20
What is application software? Why it is required?


Answer :

Application software is the set of programs necessary to carry out operations for a specific task. Such as for word processing there are many application software like MS-Word, Wordpad etc. These software are required to perform special task using the computer like painting, recording, typing, data handling etc. 



Question : 21
Briefly explain the basic architecture of a computer.


Answer :

Computer organization refers to logical structure of a computer describing how its components are connected to one another, how they affect one another‟s functioning and contributes to overall performance of computer. Computers follow the „IPO‟ principal i.e. Input Process Output (That means a certain input is processed to Generate specific output) 



Question : 22
What is the function of CPU in a computer system? What are its sub units?


Answer :

`The central processing unit (CPU) of a computer is a piece of hardware that carries out the instructions of a computer program. It performs the basic arithmetical, logical, and input/output operations of a computer system. The CPU is like the brains of the computer - every instruction, no matter how simple, has to go through the CPU. So let's say you press the letter 'k' on your keyboard and it appears on the screen - the CPU of your computer is what makes this possible. The CPU is sometimes also referred to as the central processor unit, or processor for short. So when you are looking at the specifications of a computer at your local electronics store, it typically refers to the CPU as the processor. Its sub units are:

(i) Control Unit

(ii) Arithmetical and Logical Unit (ALU)

(iii) Memory Unit



Question : 23
What functions are performed by the control unit?


Answer :

The CU controls and guides the interpretation, flow and manipulation of all data and information. CU sends control signals until the required operations are done properly by ALU and memory. Another function of CU is the program execution. It means carrying out all the instructions stored in the program. CU gets program instruction from the memory and executes them one after the other. CU acts as a supervisor by controlling and guiding the operation taking place. 



Question : 24
Distinguish between CPU and ALU?


Answer :

Difference Between ALU and CPU is that arithmetic logic unit (ALU), another component of the processor, performs arithmetic, comparison, and other operations. While Processor also central processing unit (CPU), interprets and carries out the basic instructions that operate a computer.

The main difference between CPU and ALU is that the CPU is an electronic circuit that handles instructions to operate the computer while the ALU is a subsystem of the CPU that performs arithmetic and logical operations. 



Question : 25
What is the function of output unit in a computer system?


Answer :

Input devices are the hardware that give computers instructions. Output devices relay the response from the computer in the form of a visual response (monitor), sound (speakers) or media devices (CD or DVD drives). The purpose of these devices is to translate the machine's response to a usable form for the computer user. 



Question : 26
Distinguish between internal and external memory.


Answer :

Internal memory is usually chips or modules that you attach directly to the motherboard. Internal Memory is a circular disc that continuously rotates as the computer accesses its data. External memory often comes in the form of USB flash drives; CD, DVD, and other optical discs; and portable hard drives. 



Question : 27
What are RAM and ROM? How are they alike? How are they different? What are PROM, EPROM, EEPROM?


Answer :

A ROM chip is a non-volatile storage medium, which means it does not require a constant source of power to retain the information stored on it. A RAM chip is volatile, which means it loses any information it is holding when the power is turned off. Both of them are known as primary memory as they can directly work with CPU.

  • Read Only Memory (ROM)
  • Programmable Read Only Memory (PROM)
  • Erasable Programmable Read Only Memory (EPROM)
  • Electrically Erasable Programmable Read Only Memory (EEPROM)


Question : 28
What are major functional components of a mobile system?


Answer :

 Major functional components of a mobile system are-

(i) Mobile Processor

a. Communications Processing Unit

b. Application Processing Unit

c. GPU (Graphics Processing Unit)

(ii) SoC (System on a chip)

(iii) Display Subsystem

a. Display Screen

b. Touch Sensitive Interface

c. Touch Sensitive Keyboards

(iv) Camera Subsystem

(v) Mobile System Memory

a. RAM

b. ROM

(vi) Storage

(vii) Power Management Subsystem



Question : 29
What is the role of Power Management Unit in a mobile system?


Answer :

This subsystem is responsible for providing power to a mobile system. The mobile systems work on limited power provided through an attached battery unit. This system has a battery management system that works with a battery charger and a battery unit and provides power to the mobile system in required form.

It also contains a collection of different functions like battery charging, monitoring and supplying many different voltages these systems require. It also contains software controlled turn-on and turn-off feature to optimize the power consumption and battery life. 



Question : 30
What is GPU? How is it useful?


Answer :

Graphics Processing Unit assists the CPU by handling the visuals, other graphically-rich applications. In short, GPU handles all graphics-related chores of a mobile CPU. 



Question : 31
What is system software?


Answer :

The software that controls internal computer operations is called system software. It manages all the resources of a system. Its example is Operating System. 



Question : 32
Discuss the role of utility software in the context of computer performance?


Answer :

Discuss the role of utility software in the context of computer performance?



Question : 33
What is the importance of an OS?


Answer :

An operating system is a program which acts as an interface between a user and the hardware. It manages all the resources of the computer system. It provides and environment to the user to work with. All the application are installed after the operating system is installed. It manages memory, processing, storage, memory etc. 



Question : 34

What is the utility of these software?

(a) disk fragmentor

(b) backup software



Answer :

(a) disk fragmentor: A file is fragmented when it becomes too large for your computer to store in a single location on a disk. When this happens, your computer splits the file up and stores in pieces. You can use fragmented files, but it takes your computer longer to access them.

(b) Backup software: This utility program facilitates the backing-up of disk. Back-up means duplicating the disk information so that in case of any damage or data-loss, this backed-up data may be used.



Question : 35

What is the need for secure passwords?



Answer :

A password that is difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access. A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password contains letters in both uppercase and lowercase. Strong passwords also do not contain words that can be found in a dictionary



Question : 36

What is Authentication and Authorization? Why are these two used together?



Answer :

Difference between Authentication and Authorization. Both the terms are often used in conjunction with each other in terms of security, especially when it comes to gaining access to the system. Authentication means confirming your own identity, while authorization means granting access to the system.



Question : 37

What are denial-of-service or Sweeper attack?



Answer :

A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.



Question : 38

What do you understand by PC intrusion?



Answer :

Intrusion - Computer Definition. To compromise a computer system by breaking the security of such a system or causing it to enter into an insecure state. The act of intruding—or gaining unauthorized access to a system—typically leaves traces that can be discovered by intrusion detection systems.



Question : 39

What is a spam? Why has it become a big Internet issue?



Answer :

Spam email is a form of commercial advertising which is economically viable because email is a very cost-effective medium for the sender. If just a fraction of the recipients of a spam message purchase the advertised product, the spammers are making money and the spam problem is perpetuated.



Question : 40

What are malware? What type damages can they cause to your computer?



Answer :

"Malware" is short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand-alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.



Question : 41

What type damages can be caused by viruses to your computer?



Answer :

Damages caused by Viruses:

– Damage or Delete files.

– Slow down your computer.

– Invade your email programs.



Question : 42

What are different types of threats to computer security?



Answer :

A Threat is a potential violation of security. When a threat is actually executed, it becomes attack. Those who execute such actions, or cause them to be executed are called attackers.

Some common threats the average computer user faces everyday are:

1. Viruses

2. Worms

3. Trojans

4. Spyware

5. Adware

6. Spamming

7. PC Intrusion:

8. Denial of Service

9. Sweeping

10. Password Guessing

11. Phishing



Question : 43

What is Computer virus? How can it affect your computer?



Answer :

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.



Question : 44

How is backup utility useful? Is it necessary to take backup of data?



Answer :

Backup is a very helpful utility. You can backup your data with that and whenever your data is corrupted by any virus or Trojans your data will remain safe.

It is not necessary to backup your until or unless you have something really important stuff in your machine.The backup depends on your wish if you want to make backup, go on for it and if you don't leave it. But if you have something very useful for you in future then its better to take backup.



Question : 45

What is a virus? What is anti-virus software?



Answer :

A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more



Question : 46

What are the usage rules for effective use of social networking sites?



Answer :
  • Social media is everywhere these days, from personal to professional front. Social media has made it too difficult to remain entirely anonymous these days.
  • Whatever you do online, leaves a permanent foot print, called digital foot print.
  • Once posted these becomes part of public domain and hence are visible to anyone who looks for it.
  • Thus appropriate usage of Social media is very important and you must be aware that it may pose problems later if not used appropriately.
  • You should conduct yourself in a responsible way so that you can enjoy using it.
  • Be Authentic.
  • Use a Disclaimer.
  • Don‘t pick fights Online.
  • Don‘t use fake names or pseudonyms.
  • Protect your identity.
  • Always take publicity test when post something.
  • Respect your audience.
  • Respect other's sentiments.
  • Monitor comments.


Question : 47

Why are privacy settings of a social networking site so important?



Answer :

Privacy settings, present in most of the major social networking sites can be used by the user to adjust the visibility of their profile or of certain information on the profile. As a result, this could eliminate a certain amount of unwanted disclosures and upgrade the level of privacy of the profile.



Question : 48

What is digital footprint? Why is it so important?



Answer :

A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. A "passive digital footprint" is a data trail you unintentionally leave online.

It is not a matter of gathering one person‘s online activity. The main concern is what the person is doing. If he or she is going to a dark path then the online activity is the first thing that will provide a glimpse of it. The matter is serious and digital footprint is going to provide the fullest information on it. Apart from gathering information the digital footprint provides knowledge on what the person likes and how well the orientation of his mind is. If you find that your friend and beloved family member is posting something obnoxious and disgraceful in a continuous manner then you can stop him from going to the dark path. In this technical society a digital footprint can give you full information of what the person is thinking. Regardless of all thoughts of getting diverted from the prime goal, one person should keep a track of all the information of his online activity. Nowadays, when technology has become too much available and influencing all the activities in a regular manner, keeping it at a side and thinking without the influence of it has become impossible that is why analysis of your digital footprint is highly necessary. This will provide you valuable information on what you are doing and what should be avoided by you.



Question : 49

What is identity fraud?



Answer :

Identity fraud is the use by one person of another person's personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person.



Question : 50

What is cyber bullying and cyber stalking?



Answer :

Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.

Cyber bullying or cyber harassment is a form of bullying or harassment using electronic means. Cyber bullying and cyber harassment are also known as online bullying. It has become increasingly common, especially among teenagers. Cyber bullying is when someone, typically teens, bully or harass others on social media sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative labels (i.e., hate speech). Bullying or harassment can be identified by repeated behavior and an intent to harm. Victims may have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, including being scared, frustrated, angry, and depressed.



Question : 51

What is private browsing? Why is it considered a better way of browsing the Internet?



Answer :
  • Anonymous browsers allow users to view websites without revealing personal information of user.
  • It can be sued as a tool for governments, journalists and every security conscious surfers.
  • A popular solution to this is- Private Browsing.
  • Incognito browsing open up a version of the browser that will not track your activity.it is particularly useful if you are entering sensitive data like bank details into your browser.
  • Proxy works as a middleman between your computer and the website you want to access. Now the tracking website will get the IP address of proxy site.
  • Virtual Private Network (VPN) this is a method to add security and privacy to private and public networks, like WiFi hotspots and Internet. It is originally meant for business employees working offsite to gain access to shared drives or networks.


Question : 52

What are cookies? How are they used by websites to track you?



Answer :

cookies are small pieces of information websites can store in your browser. Cookies can be –

1. First Party Cookies- These are the cookies that store your own log in id, password, and auto fill information etc.

2. Third Party Cookies: These are the cookies that websites store to know about your search history and web browsing history so as to place advertisements as per your interests.



Question : 53

How do websites track you online?



Answer :

Whenever you visit a website, your web browser may reveal your location via your device‘s IP address.

  •  It can also provide your search and browsing history etc. which may be used by third parties, like advertisers or criminals.
  •  This way website track you. Tracking is generally used by advertising networks to build up details profiles for pinpoint adtargeting.
  •  This information is compiled through your web usage patterns, and which websites generally use for tracking you. This generally includes-
    •  IP Address
    •  Cookies and tracking scripts etc.
    •  HTTP Referrer
    •  Super Cookies
    •  User Agent


Question : 54

What should you do to protect your identity on Internet?



Answer :

The things we can do to protect our identity on Internet.

  •  Most common solution to this is Private browsing or Anonymous browsing.
  •  Confidentiality of information.
  •  Appropriate usage of social networking sites.


Question : 55

What is cyber safety?



Answer :

Using internet with care and responsibility is called Cyber Safety so that we can keep our personal information safe.



Question : 56

Describe the role of Operating System as a resource Manager.



Answer :

A computer system has many resources (hardware and software), which may be require to complete a task. The commonly required resources are input/output devices, memory, file storage space, CPU etc. The operating system acts as a manager of the above resources and allocates them to specific programs and users, whenever necessary to perform a particular task. Therefore operating system is the resource manager i.e. it can manage the resource of a computer system internally. The resources are processor, memory, files, and I/O devices. In simple terms, an operating system is the interface between the user and the machine.

Operating System Management Tasks

1. Processor management which involves putting the tasks into order and pairing them into manageable size before they go to the CPU.

2. Memory management which coordinates data to and from RAM (random-access memory) and determines the necessity for virtual memory.

3. Device management which provides interface between connected devices.

4. Storage management which directs permanent data storage.

5. Application which allows standard communication between software and your computer.

6. User interface which allows you to communicate with your computer.



Question : 57

What is cloud computing?



Answer :

cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics, intelligence and more—over the Internet (―the cloud‖) to offer faster innovation, flexible resources and economies of scale. You typically pay only for cloud services you use, helping lower your operating costs, run your infrastructure more efficiently and scale as your business needs change.

Cloud computing is a big shift from the traditional way businesses think about IT resources. Here are seven common reasons organizations are turning to cloud computing services.



Question : 58

What are the advantages of parallel computing?



Answer :

Parallel computing is a type of computation in which many calculations or the execution of processes are carried out simultaneously. Large problems can often be divided into smaller ones, which can then be solved at the same time. It refers to the simultaneous working of multiple processors to solve a computational problem. Its advantages are –

(i) It saves time and the cost too.

(ii) It makes easier to solve larger or complex problems.

(iii) It provides efficient use of underlying hardware.

(iv) It can utilize the resources available remotely.



Question : 59

What is process scheduling?



Answer :

The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy.

Process scheduling is an essential part of a Multiprogramming operating systems. Such operating systems allow more than one process to be loaded into the executable memory at a time and the loaded process shares the CPU using time multiplexing.



Question : 60

What are process scheduling queues?



Answer :

The OS maintains all PCBs in Process Scheduling Queues. The OS maintains a separate queue for each of the process states and PCBs of all processes in the same execution state are placed in the same queue. When the state of a process is changed, its PCB is unlinked from its current queue and moved to its new state queue.

The Operating System maintains the following important process scheduling queues −

  •  Job queue − This queue keeps all the processes in the system.
  •  Ready queue − This queue keeps a set of all processes residing in main memory, ready and waiting to execute. A new process is always put in this queue.
  •  Device queues − The processes which are blocked due to unavailability of an I/O device constitute this queue.



Question : 61

How does OS manage all the running processes?



Answer :

Process managements involve the execution of various tasks such as creation of processes, scheduling of processes, management of deadlock, and termination of processes. It is responsibility of operating system to manage all the running processes of the system. Operating system manages processes by performing tasks such as resource allocation and process scheduling. When a process runs on computer device memory and CPU of computer are utilized. The operating system also has to synchronize the different processes of computer system.

A process consists of set of instruction to be executed called process code. A process is also associated with some data that is to be processed. The resources that a process required for its execution is called process components. There is also a state that is associated with a process at a particular instant of time called process state. Similar to these concepts, there are number of concepts associated with the process management function of an operating system. Some of those concepts are given as following.

  •  Process State
  •  Process Control Block (PCB)
  •  Process Operations
  •  Process Scheduling
  •  Process Synchronization
  •  Interprocess Communication
  •  Deadlock


Question : 62

What is the role of memory manager and I/O manager of OS?



Answer :

Memory management is a form of resource management applied to computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and free it for reuse when no longer needed. This is critical to any advanced computer system where more than a single process might be underway at any time.

I/O Manager:One of the important jobs of an Operating System is to manage various I/O devices including mouse, keyboards, touch pad, disk drives, display adapters, USB devices, Bit-mapped screen, LED, Analog-to-digital converter, On/off switch, network connections, audio I/O, printers etc.

An I/O system is required to take an application I/O request and send it to the physical device, then take whatever response comes back from the device and send it to the application. I/O devices can be divided into two categories −

Block devices − A block device is one with which the driver communicates by sending entire blocks of data. For example, Hard disks, USB cameras, Disk-On-Key etc.

Character devices − A character device is one with which the driver communicates by sending and receiving single characters (bytes, octets). For example, serial ports, parallel ports, sounds cards etc



Question : 63

What is parallel computing?



Answer :

Parallel computing is a type of computation in which many calculations or the execution of processes are carried out simultaneously. Large problems can often be divided into smaller ones, which can then be solved at the same time. It refers to the simultaneous working of multiple processors to solve a computational problem.



Question : 64

How is parallel computing different from serial computing?



Answer :

Serial Computing: A processing in which one task is completed at a time and all the tasks are run by the processor in a sequence. In real time example, people standing in a queue and waiting for a railway ticket. In this case, one person can get a ticket at a time. Suppose there are two queues of people and one cashier is handling both the queues then one person can get a ticket at a time from both queues. Similarly, processor get lists of tasks and each task is completed at a time and all other tasks wait till the first one completes. This type of processing is also known as sequential processing.

Parallel Computing: A type of processing in which multiple tasks are completed at a time by different processors. Note that in parallel processing there is more than one processor involved. In real time example, there are multiple queues of people standing to get railway tickets. In this case, each queue is handled by multiple people, so multiple people will get tickets at a time. Similarly, in the operating system, there are multiple queues of tasks and multiple tasks are completed by different processors at a time.



Question : 65

What are the advantages of parallel computing?



Answer :

Parallel computing is a type of computation in which many calculations or the execution of processes are carried out simultaneously. Large problems can often be divided into smaller ones, which can then be solved at the same time. It refers to the simultaneous working of multiple processors to solve a computational problem. Its advantages are –

(i) It saves time and the cost too.

(ii) It makes easier to solve larger or complex problems.

(iii) It provides efficient use of underlying hardware.

(iv) It can utilize the resources available remotely.



Question : 66

What is PCB? What is its role?



Answer :

While creating a process the operating system performs several operations. To identify these process, it must identify each process, hence it assigns a process identification number (PID) to each process. As the operating system supports multi-programming, it needs to keep track of all the processes. For this task, the process control block (PCB) is used to track the process‘s execution status. Each block of memory contains information about the process state, program counter, stack pointer, status of opened files, scheduling algorithms, etc. All these information is required and must be saved when the process is switched from one state to another. When the process made transitions from one state to another, the operating system must update information in the process‘s PCB.

A process control block (PCB) contains information about the process, i.e. registers, quantum, priority, etc.

Pointer – It is a stack pointer which is required to be saved when the process is switched from one state to another to retain the current position of the process.

Process state – It stores the respective state of the process.

Process number – Every process is assigned with a unique id known as process ID or PID which stores the process identifier.

Program counter – It stores the counter which contains the address of the next instruction that is to be executed for the process.

Register – These are the CPU registers which includes: accumulator, base, registers and general purpose registers.

Memory limits – This field contains the information about memory management system used by operating system. This may include the page tables, segment tables etc.

Open files list – This information includes the list of files opened for a process.



Question : 67

Name at least four early calculating devices.



Answer :

1) Abacus : Abacus was discovered by the Mesopotamians in around 3000 BC. An abacus consisted of beads on movable rods divided into two parts. (Fig-1) Addition and multiplication of  numbers was done by using the place value of digits of the numbers and position of beads in an abacus.


The Chinese further improved on the abacus so that calculations could be done more easily. Even today abacus is considered as an apt tool for young children to do calculations. In an abacus, each row is thought of as a ten’s place. From right to left , row no-1 represents the one’s column and the second column represents ten’s place. The third column represents the hundred’s place and so on. The starting position of the top beads (representing the value of five) is always towards the top wall of the abacus while the lower beads (representing the value of one) will always be pushed towards the lower wall as a starting position.

2) Napier’s Logs and Bones : The idea of logarithm was developed by John Napier in 1617. He devised a set of numbering rods known as Napier’s Bones through which both multiplication and division could be performed. These were numbered rods which could perform multiplication of any number by a number in the range of 2-9. There are 10 bones corresponding to the digits 0-9 and there is also a special eleventh bone that is used to represent the multiplier. By placing bones corresponding to the multiplier on the left side and the bones corresponding to the digits of the multiplicand on the right , the product of two numbers can be easily obtained.

3) Pascaline : Blaise Pascal, a French mathematician invented an adding machine in 1642 that was made up of gears and was used for adding numbers quickly. This machine was also called Pascaline and was capable of addition and subtraction along with carry-transfer capability. It worked on clock 


work mechanism principle. It consisted of various numbered toothed wheels having unique position values. The addition and subtraction operations was performed by controlled rotation of these wheels.

4) Leibnitz’s Calculator : In 1673 Gottfried Leibnitz, a German mathematician extended the capabilities of the adding machine invented by Pascal to perform multiplication and division as well. The multiplication was done through repeated addition of numbers using a stepped cylinder each with nine teeth of varying lengths.





Question : 68

Explain booting process and its types.



Answer :

Concept of Booting

When the computer is switched on, a copy of boot program is brought from ROM into the main memory. This process is called booting. The CPU first runs a jump instruction that transfers to BIOS (Basic Input output System) and it starts executing. The BIOS conducts a series of self diagnostic tests called POST (Power On Self Test). These tests include memory tests, configuring and starting video circuitry, configuring the system’s hardware and checking other devices that help to function the computer properly. Thereafter the BIOS locates a bootable drive to load the boot sector. The execution is then transferred to the Boot Strap Loader program on the boot sector which loads and executes the operating system. If the boot sector is on the hard drive then it will have a Master Boot record (MBR) which checks the partition table for active partition. If found, the MBR loads that partition’s boot sector and executes it.

Booting Process is of two types – Warm and Cold

Cold Booting: When the system starts from initial state i.e. it is switched on, we call it cold booting or Hard Booting. When the user presses the Power button, the instructions are read from the ROM to initiate the booting process.

Warm Booting: When the system restarts or when Reset button is pressed, we call it Warm Booting or Soft Booting. The system does not start from initial state and so all diagnostic tests need not be carried out in this case. There are chances of data loss and system damage as the data might not have been stored properly.



Question : 69

Define analog computers



Answer :

An analog computer works on varying physical quantities. The data input to a computer is continuous in nature irrespective of the variations in input and the results are obtained after comparison.


For example, meter scale, thermometer etc.



Question : 70

What is a digital computer?




Answer :

A digital computer accepts data in the binary form:


Zero (0) means OFF or low signal

One (1) means ON or high signal

It gives results in terms of digits. All personal computers and laptops are digital in nature.


For example, digital watches, calculators etc.




Question : 71

Define mainframe computers



Answer :

Answer

Mainframe computers are large computers with huge storage capacities. These computers are generally used in large industries, banking organizations, advanced scientific research centers, etc.



Question : 72

What is meant by C++ (as a computer language)?



Answer :
  • C++ is an object oriented programming (OOP) language.
  • This high-level language is derived from C language and it applies object oriented features of Simula 67.
  • C++ is more popular among software professionals as it allows the user to perform long operations efficiently in short forms.


Question : 73

What is an assembler?



Answer :

Assembler is a software which is used to convert a program written in assembly level language into a machine level language. It helps a computer to perform its basic operations



Question : 74

Differentiate between Machine Level and Assembly Level Languages



Answer :
Machine Level Languages
Assembly Level Languages
Instructions are given as strings of binary digits (0s and 1s)
Instructions are given in terms of Mnemonics.
No OP-Code is required
Mnemonics are further coded into OP-Code.
It takes more time in coding instructions
It takes less time in coding instructions.
No translator is required for execution.
A translator is required for execution.


Question : 75

Differentiate between High-level and Low Level Languages



Answer :


High-level LanguagesLow-level Languages
These languages are used to write programs in simple English and by using alphabets and numbers
These languages are used to write programs with the combination of 0s and 1s.
They are machine independent languages.
They are machine dependent languages.
They are easy to learn
They are difficult to learn.
Modification of programs is easy.
Modification of programs is time-consuming.




Question : 76

Differentiate between the Compiler and Interpreter



Answer :
Compiler
Interpreter
It converts the entire program into its machine code at once
It converts the entire program into its machine code line by line
It displays the errors of the entire program only after compilation.
It displays the errors of one line at a time during the conversion to its machine code
The control moves to the next line irrespective of any errors in the previous line.
The control doesn't move to the next line until the previous line is error-free.


Question : 77

What are the limitations of machine level languages?



Answer :

The limitations of machine level languages are:

  1. The process of generating binary codes is very time consuming.
  2. There is always a chance of making mistakes during the conversion into binary codes.
  3. It is a machine-dependent language.


Question : 78

Enlist three features of the second generation of computers.



Answer :

Three features of the second generation of computers are as follows:

  1. Transistors were one of the main components used in the circuit of these computers.
  2. The computers were smaller in size as compared to the first generation computers.
  3. The processing speed of these computers increased from milliseconds to microseconds.


Question : 79

What are the advantages of high-level languages?



Answer :
The advantages of high-level languages are-

  1. They are machine independent languages.
  2. They are easy to learn and help to develop programming logic.
  3. Programs in these languages can be easily modified.


Question : 80

State two limitations of the first generation of computers.



Answer :

Two limitations of the first generation of computers are:

  1. These computers were difficult to operate.
  2. They needed heavy air-conditioned systems because of the tremendous amounts of heat generated by the vacuum tubes.



Question : 81

Give three features of the third generation of computers.



Answer :

Three features of the third generation of computers are:

  1. The use of integrated circuit technology reduced the size of these computers.
  2. These computers could do fast calculations.
  3. Their capacity to hold data and information was more due to improved secondary storage devices.


Question : 82

Resizing a table



Answer :

Increasing or decreasing the size of a table as per requirement is known as resizing a table. A table can be resized length-wise or width-wise depending upon the data item.



Question : 83

Merging and splitting of cells



Answer :

Merging cells means to combine cells by converting one or more cells into a single cell.

Splitting cells is the reverse of merging cells. It happens when a particular cell is divided into a number of small cells.



Question : 84

Cell alignment



Answer :

Cell alignment defines the position of data/text placed within the boundary of a cell.

There are two different types of alignment of text within a cell:

Vertical alignment — It arranges the text in an upright direction in the selected cells. It is further categorized as Top, Center and Bottom.

Horizontal alignment — It arranges the text within the same level of the selected cells. It is further categorized as Align Text Left, Align Text Right, Center Text and Justify.



Question : 85

Creating a table 



Answer :

To create a table, follow these steps:

Step 1: Place the cursor on the document where you want to create a table.

Step 2: Click the 'Insert' button available on the menu bar.

Step 3: Select 'Table' and then 'Insert Table' from the drop-down list.

Step 4: Enter the number of columns and rows in the 'Insert Table' window.

Step 5: Click 'OK'. The table will be created.



Question : 86

What is a Slide?




Answer :

A slide is an electronic page that is displayed on a computer screen with multimedia effects. Slides are used to communicate information to the audience



Question : 87

Custom Animation



Answer :

Custom animation allows us to add different visual effects to a slide. Through animation effects, we can make our slide-show more interactive.



Question : 88

Action buttons



Answer :

Action buttons are communicative buttons which can be added on the slides to perform various actions during the slide show. For example: Forward, Home, Sound, End etc.

Action buttons become active during the slide show. Sound to an action button is optional.



Question : 89

What is Slide Master?



Answer :

A slide master is the topmost slide in the order of slides that provides common information to all the slides in a presentation.

The common information can be regarding the theme and slide layouts of a presentation. This may include the background, color, fonts, effects etc.



Question : 90

Slide Transition




Answer :

Slide transition is a special effect applied to slides when we display the next slide during a slide show. It determines how the current slide switches to the next. There are three types of slide transitions:

  1. Subtle
  2. Exciting
  3. Dynamic Content


Question : 91

Slide Show



Answer :

A slide show is an electronic presentation displayed on the computer screen with multimedia effects. It is a collection of slides arranged in a systematic order to communicate information about a particular topic.




Question : 92

Explain any two functions of an Operating system



Answer :

Two functions of an Operating system are:

Processor Management — The OS (Operating System) ensures that each process/application receives enough time from the processor to function properly. It also tries to utilize as many processor cycles as possible for the real time work.

Memory Storage and Management — The OS (Operating System) manages the sharing of internal memory among the multiple applications. It also ensures that one process should not consume the memory allocated to another process. An OS has to make efficient utilisation of different types of memory (RAM, Cache, etc.) within the system, so as to ensure proper execution of every process.



Question : 93

What are the advantages of GUI over CUI?



Answer :
GUI (Graphical User Interface)
CUI (Character User Interface)
GUI interface is much attractive and appealing.
CUI interface is relatively less appealing.
GUI is easier to learn and more user-friendly due to the presence of various graphical elements like icons, menu, buttons, etc.
CUI is a text based interface and hence is not as user friendly as GUI.
With GUI, a user does not have to learn complicated commands.
A user is required to memorize many commands to operate and control a CUI.
GUI users have Windows that allow a user to work, view, control, and manipulate multiple programs and folders at the same time.
CUI does not offer the same ease and ability to work with multiple programs at once on one screen.
GUI supports the use of both a mouse and keyboard to control and navigate through your system.
CUI supports the use of a keyboard only.
In GUI, the user mostly gets immediate visual feedback of the action he is doing. For example, the user can see immediately that a file is successfully moved from one directory to another. In CUI, there is no obvious feedback. If we consider the same example, one or more additional commands will have to be issued to confirm the file transfer action.
In GUI multiple tasks can run simultaneously at a time.
Only one task can be executed at a particular point of time in CUI.




Question : 94

What are the advantage of (PoS) Point of Sale



Answer :
  • POS eliminates human errors and save money in the long term.
  • POS monitors your sales records and alerts you when stock is running low.
  • POS keeps accurate record of daily transactions and report about the volume of the stock.
  • POS makes it easy for you to look up past transactions.
  • POS is faster from authorizing a credit card transaction to printing a customer receipt.
  • POS reduces the chances of user errors because the software checks to ensure that the information entered is accurate and correct.
  • POS allows you to add promotions and discounts on the products.


Question : 95

What is PoS (Point of Sale)



Answer :

The abbreviation of POS is “Point of Sale”. POS is a system which refers to any place where a transaction can happen, whether it is, for a product or service. In other words, POS is the place, where your customer makes a payment for products or services at your store. In a store, a POS is where, the checkout happens, orders are processed and bills are paid. It can be in a physical store, where POS terminals and systems are used to process card payments or a virtual sales point such as a computer or mobile electronic device.

 POS System A POS System is the overall hardware and software system used for billing in a POS Store.

Note:- Card readers have also become an integral part of a POS system.

Hardware Components of a POS System

POS system typically contains following hardware:-

  • display unit- to show the billing
  • keyboard/touchscreen device- to select products and enter data
  • Barcode scanner -to scan billed objects
  • Printer -to print the receipt
  • Cash register – for storage of cash obtained during sales

software interface- to complete the process 



Question : 96

Write the advantages and disadvantages of Internet Banking



Answer :

Advantages of Internet Banking

  • The customers get permanent access to his/her bank anytime and anywhere.
  • An online account is simple to open and easy to operate.
  • Transactions are safe and highly secure.
  • It is fast and efficient.
  • Immediate funds transfer helps the user in time of urgent need.
  • It saves valuable time of the users.

Disadvantages of Internet Banking

  • Requirement of Internet connection.
  • Security of transactions is a major issue.
  • Password security is a also a big issue.
  • Your banking information may be spread out on several devices, making it more at risk.
  • Inconvenient to make deposits


Question : 97

Define Operating System (OS) and describe any three functions of operating system in detail. 



Answer :

An Operating System (OS) acts as an intermediary between the user of a computer and computer hardware. The purpose of an operating system is to provide an environment in which a user can execute programs in a convenient and efficient manner.

An OS is a software program that controls the internal activities of the computer hardware and provides user interface. Application programs need to interact with the operating system for using hardware resources.

OS is the first program loaded (copied) into the computer’s main memory after the computer is switched on. Thus, one of the primary functions of operating system is to provide an interface between the user and hardware. Examples of Operating systems are Linux, Unix, Windows etc.

 


Main Functions of OS:

  • Process Management: different processors perform different tasks.
  • Memory Management: allocates the main memory and secondary memory as per requirement by program and data.
  • Input/ Output Management: manages and coordinates different input and output devices.
  • File Management: manages different file operations (such as reading from/writing to the files, rename, copy, paste, hide files etc).
  • Security Management: establishes data security and integrity. 


Question : 98

 what is Linux and what are its basic features?



Answer :

Linux is one of popular version of UNIX operating System. It is open source as its source code is freely available. It is free to use. Linux was designed considering UNIX compatibility. Its functionality list is quite similar to that of UNIX. Some popular versions or distributions of Linux OS are Ubuntu, Fedora, Linux Mint, openSUSE, PCLinuxOS, Debian etc.

Components of Linux System

Linux Operating System has primarily three components

Kernel − Kernel is the core part of Linux. It is responsible for all major activities of this operating system. It consists of various modules and it interacts directly with the underlying hardware. Kernel provides the required abstraction to hide low level hardware details to system or application programs.

System Library − System libraries are special functions or programs using which application programs or system utilities accesses Kernel's features. These libraries implement most of the functionalities of the operating system and do not requires kernel module's code access rights.

System Utility − System Utility programs are responsible to do specialized, individual level tasks 

Basic Features

Following are some of the important features of Linux Operating System.

Portable − Portability means software can works on different types of hardware in same way. Linux kernel and application programs supports their installation on any kind of hardware platform.

Open Source − Linux source code is freely available and it is community based development project. Multiple teams work in collaboration to enhance the capability of Linux operating system and it is continuously evolving.

Multi-User − Linux is a multiuser system means multiple users can access system resources like memory/ ram/ application programs at same time.

Multiprogramming − Linux is a multiprogramming system means multiple applications can run at same time.

Hierarchical File System − Linux provides a standard file structure in which system files/ user files are arranged.

Shell − Linux provides a special interpreter program which can be used to execute commands of the operating system. It can be used to do various types of operations, call application programs. etc.

Security − Linux provides user security using authentication features like password protection/ controlled access to specific files/ encryption of data. 

Architecture

The architecture of a Linux System consists of the following layers −

Hardware layer − Hardware consists of all peripheral devices (RAM/ HDD/ CPU etc).

Kernel − It is the core component of Operating System, interacts directly with hardware, provides low level services to upper layer components.

Shell − An interface to kernel, hiding complexity of kernel's functions from users. The shell takes commands from the user and executes kernel's functions.

Utilities − Utility programs that provide the user most of the functionalities of an operating systems. 



CCC Online Test Python Programming Tutorials Best Computer Training Institute in Prayagraj (Allahabad) Online Exam Quiz O Level NIELIT Study material and Quiz Bank SSC Railway TET UPTET Question Bank career counselling in allahabad Best Website and Software Company in Allahabad Website development Company in Allahabad