0% found this document useful (0 votes)
118 views16 pages

Part 1 NOTES CHAPTER 1,2,3,4,5,6,8

Uploaded by

mcno00000000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views16 pages

Part 1 NOTES CHAPTER 1,2,3,4,5,6,8

Uploaded by

mcno00000000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Chapter # 1 Important Short Questions

1) What is data and information?


Data: - Data is a collection of raw facts and figures. Example Akram, Shareef 123.
Information: - Data after processing is called information. Example
Name: - Akram
Father’s Name: - Shareef
Roll # : - 123
2) Define Information Technology. (Group 2 Section 1 S.Q. How It make Global Village)
Information Technology is the technology that merge computing with high speed communication links
carrying data in the form of text, audio, video and image, from place to place over this global village.
3) Digital Convergence.
It is the technological merger of different industries through some electronic gadgets that exchange
information between them. Example is Computer, telecommunication.
4) Define Computer.w
Computer is an electrical machine that can be programmed to accept data, process it into useful
information and store it in a for later use.
5) Define software and hardware. / How hardware is different from software?
Software: - A set of instructions given to computer to perform certain task is called software. Software is
intangible part of computer. Example: - Microsoft Word, What’s app, window.
Hardware: - Hardware is tangible parts of computer. Hardware is useless without hardware. Example: -
Mouse, Keyboard, Hard disk, Monitor.
6) Define Application Software.
Application software is the software that has been developed to solve a specific problem. Example: - M.S.
Word, M.S. Excel, What’s app.
7) Define System Software.
Software that is used to control the usage and allocations of different hardware components and enables
the other application programs to execute. Example: - Operating System, Drivers, Utility Programs.
8) Define Utility Program?
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
Utility programs usually focuses on how the computer infrastructure operates.
9) List some components of computer.
The major components of computer are input devices, output devices, processor and storage devices.
Example: - Keyboard, Mouse, Hard disk, Display Screen.
10) What is the difference between bit and byte.
Bit: - Binary number 0 and 1 is called bit and is the basic unit for storing data in memory.
Byte: - A byte is the combination of 8 bits that can store a single character of data.
11) Define input devices.
Input devices are used for entering data and information into the computer. We can enter data directly or
indirectly
12) Define Trackball and how it works.
Trackball is a pointing device. It is a moveable on top of the stationery device and ball is rotated with palm
of the hand. It has buttons similar to mouse. Cursor is controlled by rotating the ball.
13) What is the purpose of function keys?
Function keys are from F1 to F12 and are used to perform special functions. Their functions depend upon
the software being used in the computer.
14) Define barcode.
Barcode is vertical zebra lines pasted on different products in departmental stores. It contains information
about products. It is also called Universal Product Code.
15) How barcode reader works.
Barcode reader is a photoelectric scanner that is used to read barcodes. It convert barcodes in digital form
and save in computer for further processing.
16) What is OCR?
It uses device that reads preprinted characters in a particular font and converts them to digital code.
Example is Utility bills and price tags.
17) List different tools and methods in Data Gathering Technique.
Data gathering techniques are used to collect detailed information about the system. These tools and
methods are as follows.
1) Written Documents 2) Interviewing 3) Questionnaires 4) Observations 5) Sampling
18) Define Plotter.
Plotter is used to produce high quality graphics in many colors and used in different fields like
architectural drawings, maps, flexes and graphs. It has two kinds 1) Flatbed Plotter 2) Drum Plotter.
19) Define Mouse and list two alternatives of mouse.
Mouse is an input device used to control cursor or pointer on screen. The mouse has two buttons on its
top. Mouse has 3 events right Click , Left Click and drag. Track ball and touch pad are alternatives of
mouse.
20) Define Touch pad.
Touch pad is a flat surface over which the user moves his finger. The movement of finger moves the
cursor on the screen. These buttons work like mouse buttons. It is common in laptops.
21) What is digital camera and it’s advantages?
Digital camera uses light sensitive processor chip to capture photo graphic images in digital form on a
memory card. It has following advantages.
1) It does not require any film processing.
2) The picture taken with it can be transferred to a computer system.
22) Define Screen Resolution Or Why resolution is important for display screen?
Number of pixels per inch are called resolution of screen. And it is important because all characters and
images appear on screen are made up of dot patterns. Higher number of pixels means sharper image.
23) What do you know about pen based system?
Pen based systems are used in graphical applications. It use software to recognize handwriting. Software
translate handwriting in to useable data.
24) What is light pen?
Light pen is device that is connected with computer via wire. The pen sends information to computer
when user touches pen on screen. It is used by engineers and graphic designers.
25) Difference between hardcopy and softcopy?
Hardcopy: - A printed form of electronic file is called hard copy. Printer is used to make hard copy.
Softcoy: - It refers to data that is shown on a display screen. It cannot be touched.
26) What is the purpose of testing?
In testing phase developers detect and remove the errors in the software. There is two type of testing
a)Unit testing b) System Testing. A system must be tested before delivering to customer. Software is
tested by entering sample data.
27) What is OMR?
OMR stands for Optical Mark Recognition. It use a light beam to scan input data to convert it into
electrical signals. The most well-known example is to read SAT and GRE test marks.
28) What is Imaging System?
Image scanner convert text, drawings and photographs in digital form and stores it into computer system for further
processing. It scans each image with light and breaks image into light and darks dots which are then converted in
digital form. This is also called raster graphics which means presenting image in matrix of dots.
Important Long Questions Chapter 1
1. Define Pointing Devices. Explain any three pointing devices.
2. What is display screen? Explain two types of display screen.
3. What is non impact printer? Discuss it’s types.(Group 2. L.Q.)
4. What is impact printer? Discuss it’s types.(Group 1 L.Q.)
5. What is software? Describe in detail different categories / types of software.(Group 1 Section 2 S.Q Package
Softwre)
6. What are Source data Entry devices? Explain any three.
7. Difference between Impact and Non Impact Printer.
8. Difference in system software and application software.
Chapter # 2 Important Short Questions
1) What is computer network?(Group 1 Section 1 S.Q.)
The connection between two or more computers that they can communicate with each other. A network
is made up of collections of computers. Most computers networks are created with wires or connection
can be wireless. Example LAN , MAN and WAN.
2) What is Workgroup Computing or Collaborative Computing?
A workgroup is a collection of individuals working together on a same task. Workgroup computing occurs
when all the individuals have computer connected to a network that allows them to share information
with each other.
3) What is Workgroup Computing or Collaborative Computing?
Groupware is software used for workgroup computing. It is used on a computer network.
4) Define Gopher.
It is an access and retrieval system covering a wide range of information from reference materials to
magazine articles to government documents and speeches.
5) What is an E-Mail and give two uses of Email.
Electronic mail is the exchange of messages and files from one computer to another through internet. It
has following two uses. a) E-Mail is very fast b) It is very cheap an inexpensive way to send messages.
6) What is Intranet?
An intranet is a privately owned, secure business network based on internet technology. It is developed
when companies want to share their internal information with their employees.
7) What is extranet?
When two or more intranets are connected together that enables collaboration among the companies
that own the separate intranets. Companies can apply security measures to provide limited access to the
employees of other organization using the extranet.
8) Explain working of router.
Router is a device that connects two or more similar or different networks. It consist of a combination of
hardware and software. Hardware can be black box device. It has two pieces of software. One is operating
system and other one is routing protocols.
9) Write the names of different LAN protocols.
Different LAN protocols are as follows:
a) Ethernet b) Token Ring c) ARC net
10) List two differences between FTP And HTTP?
FTP HTTP
FTP stands for file transfer protocol. It is also an internet HTTP stands for Hyper Text Transfer Protocol. It is the
software tool for transferring file s from one computer to protocol that is used for accessing web pages or
another. Process of sending files to remote computer is documents to and from the web servers.
called uploading and process of receiving files from
remote computer is called downloading.
11) What is MAN? Describe Metropolitan Area Network.
A metropolitan area network is a computer network covering area the size of a city. The purpose of a MAN is often to
bypass local telephone companies when accessing long distance service. Example is Mobile Phone Networks.
12) What is gateway?
A gateway is a collection of hardware and software resources that lets a computer communicate with a computer on
another different network.
13) Define LAN.
Local area network is a computer network that interconnects computers within a limited area such as home, school or
office building using communication media.
14) What is benefit of using / creating computer network?
Some important benefits of computer network are information & resource sharing. It also save our money and makes
communication easy.
15) Explain TCP/IP.
TCP/IP stands for Transmission Control Protocol / Internet Protocol. This protocol is used by every computer
connected with internet. Every computer on internet must have TCP/IP configured.
16) Differentiate between De-Facto and De-Jure Standards (Group 1 Section 1 S.Q.)
De-Facto Standard De-Jure Standard
De facto means by tradition or by facts. These standards De-Jure means according to law or regulations. The
were developed without any formal planning due to network governing bodies have properly approved these
historical development. SNA is example of De-Facto standards. These are developed by proper research. Few
Standard Governing bodies are ANSI and IEEE.
17) What is downloading and uploading?
Downloading: - The transfer of data from internet to our own personal computers is called downloading.
Uploading: - Transfer of data from our personal computer to the internet is called uploading.
18) Define Network Interface Card (NIC)?
Network Interface Card Connect each computer to the wiring in the network. NIC is a circuit board that fix in one of
the computer’s internal expansion slots. Some computers has built in NIC.
19) Define Ring Topology And what is the use of token?
In ring topology every computer is connected to next computer and last one is connected to first one. Thus the ring of
computers is formed. If one computer fails whole network will be affected.
While in ring topology signal is called token. It is like a ticket. Only one token is available on the network. When a
computer want to transmit data it first get the token and then it can transmit data. When the other computer receive
the token it releases the token back to the network. As only one token is available so there is no collusion occurs.
Disadvantage is slow data transfer rate.
20) Difference in ISDN And DSL. (Group 2 Short)
DSL(Digital Subscriber Line) ISDN(Integrated Services Digital Network)
Digital Subscriber Line uses standard copper telephone These lines are faster than dial up telephone lines. It is a
lines for the fast transmission. It is fast and easier to set of international communication standards for
install. software control of transmitting voice, video and data
over twisted pair lines. It has better than analog
connections.
21) What is bridge and its use in network.
Bridge is a device used to connect similar networks. It determines the signal and find out the location where it has to
be sent.
22) What is computer server Write two uses of server computer.
Server is a computer which provides network services to the other computer on network. Following are some uses of
server in network.
1) Processing Data 2) Sharing Software 3) Control over Hardware and network resources.
23) What is client server network model?
In this network model a computer work as server and other computer work as clients. Server computer manages and
controls all clients’ computer requests.
24) What is the use of repeater?
Repeater is a device that is used to boost signal. Communication media can transmit data to a limited distance.
Signals have to amplified in order to transmit further. Repeater helps to send signal beyond the limit of
communication media.
25) Define Telecommunication and state it’s purpose?
Telecommunication means communication at a distance by technological means, particularly through
electromagnetic waves or electrical signals. It helps word to do long distance communication over globe.
Important Long Questions Chapter 2
1. Explain components of Network.
2. Explain LAN, MAN And WAN.
3. Define Network Topology. Explain Bus/Star/Tree/Ring Topology with advantages and disadvantages with diagram.
(Group 2 Short Question Tree Topology(Section 1) / Group 2 Short Bus Topology Section 1 / Group 1 Section 1 Short
Star Topology / Group 1 Section 1 S.Q. Bus Topology Failure.y
4. Explain any four services / uses of Internet.
5. Write at least eight differences between LAN and WAN.
6. Explain OSI model with its layer.(Group 2 Presentation Layer Short Question Section 1 / Group 1 Section 1 S.Q.
Application Layer )
7. What is network standard? Discuss different types of network standards.
8. What is computer network? Explain different network models. What are the advantages and disadvantages of each
network model.
9. What is Network Protocol? Discuss different LAN protocols. (Section 1 Group 2 S.Q)
Chapter # 3 Important Short Questions
1) State two characteristics of analog signal.
Frequency : - Number of times wave repeats during specific time interval.
Amplitude : - The height of the wave within a given period of time is known as amplitude.
2) Define Signal.
Electromagnetic of light wave that represent data are called signal. There are two types of signals
(1)-Analog Signal (2) – Digital Signal (Section 1 Group 2)
3) Differentiate between baseband and broadband Transmission.(Section 1 Group 2)
Baseband: - It is a communication technique in which digital signals are placed onto transmission line
without change in modulation. Digital signals are also called baseband signals.
Broadband: - Broadband is a technique to transmit large amounts of data over long distances. It can send
data by modulating each signal onto a different frequency.
4) Write names of bounded and unbounded media.
Bounded media are Twisted Pair Cable, Coaxial Cable, Fiber Optic Cable.
Unbounded media are satellite, Microwave and Mobile Communication.
5) What is twisted pair wire?
It is the most commonly used communication media. It consists of several pairs of copper wire that are
twisted with each other to avoid electromagnetic interference. It has two types a. Unshielded twisted pair
cable b. Shielded twisted pair cable
6) Define ASCII code.
American standard code for information interchange. It was a 7-bit(Support 128 Characters) code and
later it become 8-bit code(Support 256 Characters). It was developed by ANSI (American National
Standard Institute.)
7) Data communication?
Transfer of data from one location to another through a communication medium is called data
communication. It is also called data transmission.
8) What is UNI Code?
Universal code is a 16-bit code and can represent up to 65536 characters. It can represent the characters
of all languages in the world. It replaced the ASCII code.
9) Define Modem Or how the modem works?
Modem is a device that convert digital signal into analog (Modulation) and convert analog signal into
digital form(demodulation) to send over telephone lines. It has 3 types a. External Modem b. Internal
Modem. C. Wireless Modem.
10) What is internal Modem and external modem?
Internal modem is a circuit board that can be installed inside the computer through an expansion slot. It
is slow and more difficult to setup.
External modem is connected with telephone line. It is attached with computer using serial cable to the
com1 or com2 ports. It has fast speed and it is more expensive.
11) Define digital signal.
A digital signal use on and off electrical pulses in discontinuous or discrete form. It represent data in
binary form.
12) What is fiber optic cable? Or Why fiber optic so fast?
A fiber optic cable consists of tubes of glass. It is fast because data are transmitted as pulses of light. It is
thin than human hair. There are no chances of data loss.
13) What is Asynchronous Transmission?
In Asynchronous transmission data is transmitted character by character. It is called start /stop bit
transmission. It is less efficient. It use flow control instead of clock.
14) Define bandwidth.
The amount of data that can be transmitted through the transmission medium within the given period of
time is called bandwidth.

15) Difference in Analog Signal And Digital Signal.(Group 1 Section 1 S.Q.)


a. Analog Signal is continuous electrical signal in the form of wave. This is called carrier wave.
b. Digital Signal uses on-off electrical pulses in discontinuous form. It represent data in binary form.
16) Differentiate between serial and parallel transmission.
a. In serial transmission data is send one bit at a time. In it characters are sent sequentially. It is
slower transmission.
b. In parallel transmission group of bits are sent at the same time over multiple wires.
17) Difference between Synchronous And Asynchronous Transmission.(Group 2 L.Q.)
Synchronous Transmission Asynchronous Transmission
In this data is sent before block by block. It uses In this data is sent character by character. It is
clock to control transmission of data. called start /stop bit transmission. It use flow
control instead of clock.

18) How does microwave system work? Or what is meant by microwave data transmission?
a. It uses line of sight transmission. It means signal travels in straight path. Microwave stations are
placed within 20 to 30 miles to each other.
19) What is encoder and decoder?
Encoder converts digital signal to a form which can pass through transmission medium. While decoder
converts the encoded signal in to a digital form.
20) Define Term EBCDIC data encoding scheme.
It stand for extended binary coded decimal interchange code. It is an 8 bit code. It can represent 256
characters. It was introduced by IBM.
21) How data represented in computer?
Computer works with binary number. Binary number may be 0 or 1. Data inside the computer system is
represented as electrical pulses. 1 indicate presence of pulse and 0 represent absence of pulse.

Important Long Questions Chapter 3


1. What is data transmission mode? Explain its three types with examples.
2. What is guided media? Write short notes of three types of guided media.
3. Define Unguided Media. Explain all types of unguided media.
4. What is data communication? Explain any four basic components of communication network.
5. What do you mean encoding of data? Explain coding schemes to represent data in computer.(Group1
L.Q.)
6. Define data transmission. Explain the types of data transmission.
7. Why we need to encode data? Also define an explain EBCDIC code and Unicode in detail.
Chapter # 4 (NOTES)
1) What is video conferencing?
It is a virtual meeting between two or more people located at different places. It uses cameras and
microphones. It saves time. It enables participants to see and hear each as they are in same room.
2) How can computers be used in marketing?
Marketing is a process of selling a product to the people. Marketing applications educate people about a
certain products, advertisement and pricing.
3) What is computer simulation? Or In which situation we use simulation?
It is a special type of computer model, which creates a virtual environment for a real world. It is used to
train people. It is used to train pilots. It helps pilots how to deal with a situation that would be dangerous
for them in a real world.
4) Define online education? Or What is online education?
Online education means e-learning or distance learning. A student can take classed by sitting at his home
with the help of computer and internet.
5) State purpose of ATM(Automated Teller Machine).
It stands for Automated Teller Machine. It is used in banks. Customer can pay his bills and withdraw
money without going inside the bank. Customers can use ATM for 24 hrs.
6) Define Desktop publishing.
It is used to make documents attractive with photos, graphics and other art work. It is used to publish
documents.
7) Define E-commerce(Electronic Commerce).
Electronic commerce is the process of buying and selling of products and services over the internet. Cost
of doing such business is much lower.
8) How is e-commerce useful in Modern Business?
With the help of e-commerce a businessman can interact with his customers all over the world easily. It
saves time. Cost of doing such business is much lower.
9) What is Airline System? Or how computer can be used in Airline system?
In airline system computers are used for ticket booking. Computers are also used to control airplanes and
their parts. Computers are also used to get information about different flights.
10) Explain weather forecasting. Or how computer is useful in weather forecasting?
Computers are used for weather forecasting. Weather forecasting depends on accurate collection of data
from different weather stations and satellites. Computers process this data and then forecast about
weather situation.
11) What is robot?
Robot is a programmable machine that move and perform different tasks. It is used in different industries.
For example it is used in car industry.
12) How robots are used in industry?
Robots are used in different industries. These are used to assemble and paint cars. These are used to do
space experiments. These are used to perform such tasks which are difficult for humans to do.
13) Define CAD(Computer aided design)(Group 1 L.Q.)
Computer aided designs are used to create designs for production purposes. These are used to design
new cars, bridges and buildings.
14) Define CAM(Computer aided Manufacturing). (Group 1 L.Q.)
Computer aided manufacturing is used to control all the parts of manufacturing process. This software
control the machinery. With the help of CAM production is available around the clock.
15) Define use of computer in hospitals or medical field.
Computers are widely used in medical field.
a. They are used to keep record of the patients.
b. They are used to perform different tests in laboratories.
c. Computers help doctors to diagnose diseases of patients.
d. Doctors can monitor their patients easily.
16) What is meant by online banking? What is e-banking? Or use of computers in banks.
It is also called cyber banking. This helps customers to access their accounts easily. Computers are used in
banks to keep record of customer. A customer can check his balance and can pay his bills. Customer can
also transfer amounts in different bank accounts.
17) Define DMS(Document Management System).
Document management system consists of different software that are used to prepare and format
documents. These applications are word processor, spreadsheet, desktop publishing and etc.
18) What is meant by office automation? List three systems used in office automation.
Office automation refers to the processing of data in offices with the help of computer. Computerized
systems used in an office are
a. DMS (Document Management System)
b. MHS(Message Handling System) It is used to send messages from one location to other via email or fax.
c. OSS(Office Support System) It is used to check activities of work group. Members of workgroup share
data with each other.
19) How computers help in stock exchange?
Now stock exchanges are computerized all around the world. These help customers to buy and sell shares
of companies. All trading is performed electronically with the help of computers.
20) What is word processing?
It is used to create and edit text based documents. These documents can be letters, reports or articles.
21) What is reprographic?
It is a process of creating multiple copies of a document.
22) What is Desktop Publishing?
It is used to make documents attractive with photos, graphics and other art work. It is used to publish
documents.
Important Long Questions Chapter 4

1) Use of computer in Medical Field.


2) How computer assistance simplifying our work.
Chapter # 5 Important Short Questions
1) Why ram or main memory is called volatile memory? Or What is volatile memory
Ram (Random Access Memory) is temporary memory. When the power is turned off, the information in
this memory is lost. Thus it is called volatile memory.
2) Why is ROM called non volatile?
Rom stands for read only memory. It stores data and instructions permanently. When the power is
switched off, the instructions stored in ROM are not lost. Therefore it is called non volatile Memory.
3) What is DRAM?
DRAM stands for Dynamic Random Access Memory, a type of memory used in most computers. Dynamic
random access memory must have an electric current to maintain electrical state.
4) What do you know about bus interconnection?
A computer system consists of CPU, main memory and I/O units. These components have to be connected
to transfer data from one component to another. The use of buses to connect different components is
known as bus interconnection.
5) Describe some activities of control unit. / Write functions of control unit.
Control unit direct the operation of computer system. Control unit fetches instructions from main
memory. It decode that instruction and control execution of that instruction.
6) Define I/O unit. Or define the role of I/O unit.(Group 2 Section 2 S.Q.)
I/O unit is very important component of computer. I/O unit controls the processor’s communication with
peripheral devices such as monitor and printer. I/O unit determines which interface to send or receive
data.
7) What does ALU do in computer? Or write down the purpose of ALU.
An arithmetic-logic unit is the part of computer processor that carries out arithmetic and logical
operation. ALU is divided in two units, Arithmetic Unit And Logical Unit.
8) Describe the role of main memory in computer System?(Group 1 Section 2 S.Q. How main memory
access data randomly)
RAM is the main memory of any system. It is directly readable by the central processing unit of a
computer system. Every computer system has a random access memory. It is installed in mother board. It
is also called working area of computer.
9) State computer architecture.
A computer is a combination of various components. These components perform different tasks. The way
in which these components work together and communicate with one another is known as computer
architecture.
10) What is SRAM?(Group 2 Section 2 S.Q. Cache / Group 1 Section 2 S.Q.)
Static random access memory cells are made from digital gates and each cell can hold its value without any need to
refresh the data as long as the power is supplied to it. No refreshing is required to SRAM. These chips are faster than
the DRAM also utilize less power. The SRAM chips is more expensive. These are also called cache memory.
11) Why does DRAM use more power?
DRAM stands for Dynamic Random Access Memory, a type of memory used in most computers. Dynamic random
access memory must have an electric current to maintain electrical state that is why it use more power than SRAM.
12) What are system buses?
The system buses are also called the internal buses. The system buses are the part of motherboard. These are used to
connect the main component of the computer motherboard such as processor and main memory as well as other
devices that are placed on the motherboard. Computer normally has system bus of 70-100 lines.
13) What is the function of DMA?
In this method processor issues the I/O command and then gets busy in some other useful task. The special hardware
gets the data from the I/O device and uses the system bus to place in the main memory. Processor does not have to
wait for the I/O operation to complete. The disadvantage of this scheme is that it is more complex and more
hardware is needed.
14) Define PROM.
PROM stand for programmable read only memory. This form of Rom is initially blank. The user or manufacturer can
write data and programs on it by using special devices. The user can write data and instructions on it once. If there is
any error in writing the error cannot be removed and Rom chip becomes unusable.
15) Describe cache memory. (group 2 Section 2 S.Q.)
Cache memory usually has a very small size as compared to the main memory in the computer but plays a very
important role in increasing the performance of a computer system.
16) How does bus width affect data transfer?
The width of the data bus determines the number of bits that can be transferred to or from in one operation. The
larger the data bus, the better the processor performance is.
17) What is zero address instruction format?(Group 1 Section 2 S.Q. 4 Names of address instructions)
An instruction that contains no address fields, operand sources and destination are both implicit. It may
for example enable stack processing: a zero address instruction implies that the absolute address of the
operand is held in a special register that is automatically incremented to point to the location of the top of
the stack.
18) Define the term compiler?
The program that translated a high level language program into machine language at once is called a
compiler. Once a program has been translated into machine code it can be loaded into the main memory
and executed by the CPU. The high level language version of the program is usually called the source code
and the resulting machine code program is called the object code.
19) Why does machine language program execute faster?
A type of language in which instructions are written in binary form. It is the only language that is directly
understood by the computer. It is the fundamental language of the computer.
20) List names of address or segment registers?
1. Code Segment 2. Data Segment 3. Extra Segment. 4. Stack Segment
21) Define Assembler?
Language translator that translates the program written in assembly language into machine code is called
assembler. An assembler performs the translation process in similar way as compiler. But assembler is the
translator program for assembly language, while a compiler is the translator program for high level
programming language.
22) State the purpose of cpu register.
CPU registers are small memory locations inside CPU. It is used to store data temporary. The read and
write speed in these memory location is very high. Registers are used to store different type of data. Each
register has a predefined functions.
23) What are interrupts.
In this scheme the processor issues the command to the I/O devices. When the devices get ready, these
generate an interrupt signal for the processor. On sensing the signal, the processor suspends all other
processing and performs the I/O operation. The disadvantage of this scheme is that it reduces the overall
performance of the process.
24) What is instruction set?
CPU provides its users with a number of instructions o that the users can perform different operation
supported by the CPU. The set of all instructions provided by a cpu commonly known as the instruction
set of that CPU. These instructions are used to solve different problems
25) State the use of parallel ports.
Parallel ports is used to connect devices that transfer many bits at a time. Printers connect to computer
using a parallel port.
26) State the use of Serial Port.
A serial port provides a connection for transmitting data one bit a t at time. A serial port connects your computer to a
device such a modem, which requires two way data communication, or to a device such as a mouse, which required
only one way of data transmission.
27) Define Stack?
A stack represents set of memory blocks. In which data is stored in and retrieved from these blocks in a n order. Last
in First Out(LIFO) The stack control register is used to manage the stacks in memory. Size of register is 2 to 4 bytes.
28) What are I/O instructions or State the purpose of I/O Instruction.
Every CPU provides if users with the operations of reading data from a peripheral (Input) device an writing data to a
peripheral(output) device. To use these operations programmer may use input and print commands provided by the
CPU.
29) What is program counter?
PC is a register in a computer processor. This register holds the address of the next instruction to be fetched for
execution. When this instruction is fetched, its value is incremented so that it still has the address of the next
instruction.
30) Describe three address instruction format.
Computer with three address instruction formats can use each address field to specify either a processor register or
memory operand. The advantage of the three address format is that it results in short programs when evaluating
arithmetic expression. The disadvantage is that the binary coded instructions required too many bits to specify three
addresses.
31) Brief about low level language.
Low level language is near to computer hardware and far from human language. Low level language two typed.
Machine Language and assembly language.
32) What is object code?
A program in machine language is called object code. It is also called object program or machine code. Computer
understands object code directly.
33) List three steps performed by processor to execute statement?
1. Fetch Instruction 2. Decode Instruction 3. Execute instruction
34) Define Operand Code?
The operand code specifies the operation to be performed by the computer such as ADD, Compare and etc.
35) What is stack pointer register? Or describe Stack pointer register function.
A stack is a set of memory blocks the data is stored in and retrieved form these blocks in an order. Last in First
Out(LIFO). The stack control register is used to manage the stack in memory. The size of this register is 2 to 4 bytes.
36) How control Unit works?
The control unit reads the instructions from the memory and decodes these instructions. This unit uses other
components of the computer to execute the instructions given to the computer.
37) Write functions performed By ALU?
The ALU part of computer that performs all arithmetic computations, such as addition and multiplication, and all
comparison operations. The ALU is one component of the CPU.
Important Long Questions Chapter 5
1. Define John Van Neuman design of stored program computer with the help of diagram. Also write the function of
each component briefly.(Group 1 L.Q. Computer Architecture and components)
2. Define Computer Bus. Explain three types of system buses.
3. What is RAM? Explain its types.
4. What is ROM? Write different types of Rom in detail.
5. Explain all types of instructions Formats
6. Explain fetch, decode execute cycle of CPU.
7. Define Language processor or translators and their use. Explain different types of language processors.
Chapter # 6 (NOTES)
1) Define Virus.
Virus is also called a worm. It is a destructive program that can disturb normal working of computer and
can delete our data. Virus attaches itself with other executable files and it is activated when these files are
accessed by the user.
2) Explain virus activation in computer.
When a virus start working, it is called activation of virus. Different viruses activated in different ways. For
example some viruses are activated on a certain date and some activated as user opens a program or file.
3) How can a virus damage the computer?
Virus can damage our data. It can remove software installed in computer. It can format and delete our all
data from hard disk. A virus can also affect network computers.
4) Define antivirus software and write down names of some antivirus software.
Software used to find and remove viruses from our computer are called system is called antivirus
software. It also protect our computer from new viruses and malwares. Names of some antivirus software
are Norton Antivirus, Avast, AVG, Mcafee, Nod32, Kaspersky and etc…
5) Give some causes of virus. (Group 2 Section 2 S.Q.)
Virus can may be transferred from one computer to other through emails, networks, removable storage
media and pirated software.
6) How virus spread through E-Mail?
Sometimes user download email attachments containing virus. When a user opens an infected email or
file the virus also loaded in memory and attached itself with other programs. Virus activated and start
damaging our data instantly.
7) Why it is necessary to update antivirus software periodically?
It is important to update antivirus software periodically because there is always a threat from new viruses.
When we update our antivirus new virus definitions are updated in our antivirus software, so it can
protect our computer from new viruses.
8) How can you safeguard against computer viruses?
We can protect our computer from viruses by taking following steps
(a) Update your antivirus regularly (b) Do not open unknown emails (c) Use antivirus software (d) Backup
you data regularly (e) Do not use free / pirated software
9) Define Security.
Steps taken to protect our computer from intentional, unintentional or accidental damage is called
security. It is the process of protecting our computer from unauthorized use.
10) What is data security? Or Why data security is important?(Group2 Section 2 S.Q. / Group 1 Section 2
S.Q)
Steps taken to protect our data are called data security. It is the most important issue in any organization.
A person may enter the network of the organization and gain unauthorized access to the data. And if this
person remove data that may be damage the business of the organization, this is why data security is
important.
11) What do you mean by data protection?
Some organizations gathered data about their employees and customers. Protection of data from
unauthorized access is the responsibility of the organization. Data belonging to a person should be hidden
from others persons. No one is allowed to access data without permission.
12) What is password?
Password is a secret word that is used to protect a computer system or program. It may consist of
numbers, alphabets or both.
13) What is biometric?(Group 2 Section 2 S.Q.)
Biological means of identification are called biometric. It includes fingerprints, eye retina, voice and face
recognition.
14) Define Software Piracy and what pirated software is?(Group 1 Section 2 S.Q.)
The process of creating illegal copies of software is called software piracy. And software without license is
called pirated software. It means illegal copy of genuine software.
15) What is an infected file?
A file containing a virus program is called an infected file.
16) Define backup and why it is important?
Process to create and store additional copies of our data is called backup. The backup is used to restore
the data after a system crashes due to any reason.
17) Define incremental and complete data backup.
Incremental backup means to creates a copy of only the data that is newly created or modified since the
last backup. And complete backup means to create copy of complete data available on storage media.
18) Who is hacker?
A person who gain unauthorized access to data is called hacker. Hacker is a highly skilled computer expert
capable of breaking computer security, and gain illegal access to our data.
19) What is privacy issue?
It means an individual has right to see the data kept about him. For this he has the right to submit an
application to view that data nay time.
20) What is copyright act?
Principal law governing software piracy is the copyright act 1976. According to this law software piracy is a
punishable crime involving huge amount of penalties.
21) What is redlof virus?
It is a polymorphic virus. It is written in visual basic script. It relies on Microsoft Active X components to
execute itself. It locate and infect folder.htt file.
22) How boot sector virus works?
It modifies the program in the boot sector and is loaded into memory whenever computer is turned on.
The virus attached with executable files eg. .exe, .com or .dll.
23) What is chernobal virus?
This virus deletes all the Microsoft office files and partition information from the disk. So the user is
unable to access the disk.
24) What is logic Bomb?
This virus activated at certain date or time. This virus is activated only when given condition become true.
25) What is Trojan horse?(Group 1 Section 2 S.Q.)
Trojan horse is a type of virus that hides itself in al legal program such as a game. When the infected game
runs on the computer the virus activated. An example of this virus is “FORMAT C”.
26) How pirated software damage our computer?
Pirated software contain viruses in them. Come companies intentionally add viruses in pirated Software.
The virus is automatically activated if the user uses the software without purchasing license.

Important Long Questions Chapter 6


1) What is virus? How virus activated? And write causes of viruses.
2) Define data security threats. Explain any four solutions to these threats.
3) Define legislation And Explain some important privacy Acts.
4) What is virus? Explain all types of viruses.
Chapter # 8 (NOTES)
1) Define Word Processor.
Word processor is application software that provides tools for creating all kinds of text based documents.
It enables you to add images, sounds, charts and graphics in your documents.
2) List some uses of word processor.
Word processor is used for
i. Preparing letters and Applications ii. Preparing notices. III. Preparing newspapers and magazines
3) Define word processing?
Word processing is the process of creating, editing, formatting, and printing text documents. It is used to
prepare newspapers, magazines and advertisement.
4) Define text editor.
Word processor that provides basic features for text editing is called text editor. WordPad and notepad
are examples of text editor.
5) Write two features of full featured word processors.(Group 2 Section 2 S.q. Spell Checking / Group 2
Section 3 4 Features)
Following are some features of word processor.
File management. ii. Spell checking iii. Mail merge iv. Macros
6) What is page formatting?
Page formatting refers to the size of the page, it’s orientation and header and footers. One can use
formatting options by following these steps Click File Menu-Click Pagesetup- Choose formatting
options.
7) Define Term Font?
Appearance of text in document is called font or typeface. You can change font of all selected text to
improve readability. Fonts are used to create text of different styles and sizes.
8) Define Header and footer in ms-word?
Header is the section of the document that appears in the top margin, while the footer is a section of the
document that appears in the bottom margin. Text entered in header and footer will appear on each page
of document.
9) Short cut keys for Cut, Copy, Paste, Search And Replace?
For Cut you use CTL+X key, copy key is CTL+C, key for paste is CTL+V, Search key is CTL+F and Replace key
is CTL+H.
10) Define Insertion Point?
A blinking vertical line that shows current location in the document is called Insertion point.
11) What is mail merge?
A mail merge is a method of taking a data from database or spreadsheet and insert it into documents
such as letters, mailing labels and name tags.
12) What is title bar and status bar?
The bar at the top of the word application is called title bar. It show the name of current open document.
The bar at the bottom of word application window is called status bar. User can see page number, total
pages and position of document here.
13) State the use of clipboard in MS word?(Group 2 Section 2 S.Q.)
Clipboard is used to temporarily store the information that has been cut or copied. It can store 24 items.
14) Define Character formatting?
The formatting applied to an individual character is known as character formatting. Important character
formatting are typeface, font size, color and font style.
15) What is word art option in ms-word? How can you insert it?
Word art option is used to create stylish texts in a variety of shapes. It convert text into beautiful graphics.
To use word art user need to click on Insert MenuClick on PictureSelect Word Art Option.
16) Define two typing modes in MS-Word? Differentiate between Insert and overtype mode.(Group 1
Section 3 S.Q.)
Insert mode is used to insert text in document. In overtype mode the new character replaces the existing
character.

17) Differentiate between undo and redo.(Group2 Section 2 S.Q.)


Undo command is used to remove the affect of the last action. If there is any error in typing we can use
undo command. While Redo Command is used to remove the affect on undo commands
18) Differentiate between Line spacing and paragraph spacing?
Line Spacing Paragraph Spacing
The white spaces between two lines are called line The white space before and after the paragraph is
spacing. It can be changed to increase the paragraph spacing. It is used to make an attractive
readability of the text in a document. document.
19) Differentiate between margins and indent of paragraph?(Group 2 Section 2 S.Q.)
Margin Indent
The white spaces on all sides of text on a page are The space between the page margin and text in a
called margins. These define boundaries of text on paragraph is called indent.
the paper.
20) What is paragraph formatting?
Formatting applied to paragraph is called paragraph formatting. It include, Text alignment, Tabs & Indents,
Line spacing and paragraph spacing.
21) Describe the term alignment.
Alignment is the position of text with respect to the documents left and right margins. Text can be aligned
left, center, right or justified.
22) What is WHYSIWYG?
It stands for what you see is what you get. This means that a document appears in the word processor
window exactly as it would be printed.
23) How macro in MS word is helpful for us?
A macro represents a series of keystrokes. These keystrokes may represent a text or commands. These
are define to save time for repeating the same task.
24) What is meant by page orientation?
The direction in which document is printed on paper is called page orientation. It may be Portrait Or
Landscape.
25) Compare serif and sans-serifs fonts?
Serifs fonts have shot decorative lines at the upper and lower ends of their characters. Sans-Serif fonts
do not have these decorative lines.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy