Updated Imp Questions
Updated Imp Questions
o SRAM (Static RAM): Faster than DRAM and doesn’t need constant re-
freshing, but it's more expensive.
Hard Disk Drives (HDD): Use magnetic storage to store large amounts of data
relatively cheaply.
Solid-State Drives (SSD): Use flash memory to store data without moving parts,
making them faster and more durable than HDDs.
Optical Discs: Include CDs, DVDs, and Blu-ray discs, which store data optic-
ally. Typically used for media storage and software distribution.
USB Flash Drives: Portable storage that uses flash memory, suitable for transfer-
ring data between computers.
Memory Cards: Used mainly in mobile devices and cameras, these are compact
flash-based storage.
Cache Memory:
Cache memory is a small, ultra-fast type of volatile memory located inside or close to the
CPU. It temporarily holds data and instructions that the CPU is likely to reuse. Cache
memory is divided into levels based on proximity to the CPU:
L1 Cache (Level 1): Closest to the CPU core, very fast but with limited capacity.
L2 Cache (Level 2): Slightly larger and slower than L1, usually located on the
CPU or in a separate chip.
L3 Cache (Level 3): Larger than L2 and shared among CPU cores, providing ad-
ditional buffering between the CPU and main memory.
Virtual Memory:
Virtual memory is a section of the hard drive or SSD allocated to act as an extension of
RAM. When RAM is full, the operating system moves data from RAM to virtual
memory (in a process called paging), allowing the system to handle larger workloads
than the available physical memory.
Flash Memory:
Flash memory is a non-volatile type of memory found in SSDs, USB drives, and
memory cards. It retains data without power and is often used in portable storage
devices. Flash memory can be reprogrammed and erased electrically.
Technology Used: Vacuum tubes were used for circuitry and magnetic drums for
memory.
Characteristics:
Primary Use: Used primarily for scientific calculations, military operations, and
basic data processing.
Limitations: Frequent overheating, high maintenance, and very limited comput-
ing power compared to later generations.
Characteristics:
Primary Use: Widely used in business, finance, and scientific research due to
improved cost-efficiency.
Technology Used: Integrated circuits (ICs), also known as microchips, were in-
troduced, combining multiple transistors onto a single silicon chip.
Characteristics:
Characteristics:
Example: Apple II, IBM PC, Intel 4004 (the first microprocessor).
Primary Use: Computers became common in homes, offices, and educational in-
stitutions, used for a wide range of applications including word processing,
spreadsheets, gaming, and communication.
Characteristics:
o Emphasis on developing machines that can learn, reason, and make de-
cisions.
3 What Is The Waterfall Model & List The Stages Of The Waterfall Model In Order?
The Waterfall Model is a linear and sequential approach to software development, intro-
duced by Dr. Winston W. Royce in 1970. This model is often referred to as a “tradi-
tional” approach to software development because each phase in the process must be
completed before moving on to the next. The Waterfall Model is popular for projects
where requirements are well-understood from the beginning and unlikely to change. It is
commonly used in fields like construction and manufacturing, where tasks follow a
structured sequence and changes mid-process can be costly.
Linear and Sequential: Each phase depends on the deliverables of the previous
one.
Visibility and Clarity: Each phase has specific deliverables and milestones,
making it easy to track progress.
2. System Design
3. Implementation (Coding)
o Description: In this phase, the actual code for the system is written based
on the design documents. Developers build the system's core functions
and integrate various modules to meet the specifications outlined in the
requirements and design stages.
5. Deployment
o Deliverables: The final product deployed for real-world use, along with
installation guides and training materials.
6. Maintenance
Objective: Identify the purpose of the program, the problem it aims to solve, and
what users need from it.
Activities Involved:
o Define functional requirements (what the program should do) and non-
functional requirements (e.g., performance, security).
2. Feasibility Study
Activities Involved:
o Assess the technical requirements and whether the organization has the
necessary resources and expertise.
3. System Design
Objective: Plan the architecture, user interface, and detailed design of the pro-
gram.
Activities Involved:
o Of
Outcome:Has some
4. Coding / Implementation
Objective: Write the actual code that will form the program based on the design
specifications.
Activities Involved:
o Break down the program into smaller parts and assign them to different
developers if working in a team.
o Regularly review code and integrate it with other parts of the program.
5. Testing
Objective: Ensure the program works as expected and identify any bugs or is-
sues.
Activities Involved:
o System Testing: Test the entire system to verify that all requirements are
met.
o User Acceptance Testing (UAT): Have end-users test the program to en-
sure it meets their needs.
Outcome: A verified and validated program, ready for deployment, with issues
identified and resolved.
6. Deployment
Activities Involved:
o Monitor the deployment for initial feedback and resolve any immediate
issues.
Objective: Ensure the program remains functional and relevant over time.
Activities Involved:
o Corrective Maintenance: Fix bugs and issues that arise during real-
world use.
o Adaptive Maintenance: Make changes to keep the program compatible
with new hardware, software, or regulatory changes.
Outcome: A well-maintained program that continues to meet user needs and re-
mains reliable.
Different program development methodologies help organize and guide these steps.
Common ones include:
Waterfall Model: Follows a linear, sequential approach. Each step must be com-
pleted before moving to the next.
Scrum Framework: A specific Agile method that uses regular meetings (stand-
ups) and short sprints to facilitate ongoing feedback and rapid iteration.
5
b. Explain The Difference Between Data Definition Language (DDL) And Data Manipulation
Language (DML)?
6
b. Explain How Databases Are Used In The Banking Sector For Transaction Processing?
8 Explain in detail about System Software And Application Software With Examples?
9 Describe how Agile development differs from the Waterfall model in terms of flexibility and
iteration?
10 Explain the functions of Operating Systems?
b. Discuss The Purpose Of The GRANT And REVOKE Commands In Controlling Access To A
Database?
21. What is the term for the ability of a computer to process data quickly?
Answer: b) Speed
Speed is one of the most crucial characteristics of a computer, allowing it to process
large volumes of data and perform complex calculations in mere seconds. This capab-
ility is central to computing technology, enabling applications in various fields such
as data analysis, scientific research, and real-time operations. The speed of a computer
is primarily determined by its processor and memory capacity.
22. Why is the ability to store large amounts of data considered an important
characteristic of computers?
Answer: d) It provides easy access to information.
The storage capability of computers allows users to save vast quantities of data and
retrieve it when necessary. This feature enables long-term data retention, ensuring in-
formation is available for analysis, decision-making, and reference over time. In fields
like business, healthcare, and research, large data storage capacity helps maintain or-
ganized, accessible information.
23. Which of the following is NOT a classification of computers?
Answer: d) Electric computers
Computers are commonly classified based on size, power, and application: supercom-
puters for large-scale calculations, mainframe computers for centralized data pro-
cessing, and personal computers for individual use. The term "electric computers" is
not used as a classification, as all computers inherently rely on electrical power.
24. What type of computer is primarily used for complex scientific calculations?
Answer: c) Supercomputer
Supercomputers are designed to handle intensive calculations required for scientific
research, weather forecasting, and simulations. They possess significant computa-
tional power and are built to process massive amounts of data at high speeds, making
them suitable for fields like climate modeling, particle physics, and molecular bio-
logy.
25. What is the primary feature of Fifth Generation computers?
Answer: c) Development of artificial intelligence
The fifth generation of computers is focused on incorporating artificial intelligence
(AI) to enable computers to make decisions, understand human language, and process
complex patterns. This generation emphasizes parallel processing, expert systems, and
advanced AI applications, distinguishing it from previous generations focused mainly
on hardware improvements.
26. What was a major disadvantage of the First Generation of computers?
Answer: c) They generated a lot of heat
First-generation computers used vacuum tubes, which consumed substantial electrical
power and generated significant heat. This excessive heat often led to malfunctions,
requiring cooling systems and making these computers expensive and challenging to
maintain.
27. Which type of memory is volatile and loses its data when the power is turned
off?
Answer: a) RAM
Random Access Memory (RAM) is volatile memory that requires a continuous power
supply to retain data. When the computer is turned off, any data stored in RAM is
lost, unlike non-volatile memory types such as ROM, which retain data even without
power.
28. What is the primary purpose of application software?
Answer: b) To perform specific user tasks
Application software is designed to help users complete specific tasks, such as word
processing, data analysis, or graphic design. This type of software is user-focused and
allows individuals to perform various functions beyond managing hardware, which is
the role of system software.
29. What is one major drawback of the Waterfall model?
Answer: c) It is difficult to implement changes after the development process be-
gins
The Waterfall model is a linear approach to software development, where each phase
must be completed before moving to the next. This rigidity makes it challenging to
address changes or unexpected issues that arise mid-project, leading to difficulties in
accommodating new requirements after development starts.
30. Agile methodology primarily focuses on
Answer: b) Flexibility and iterative progress
Agile methodology emphasizes iterative development, flexibility, and continuous
feedback. It allows teams to adapt to changing requirements, engage stakeholders
throughout the process, and deliver functional software in incremental cycles, con-
trasting with the rigid structure of models like Waterfall.
31. Markup languages are primarily used for
Answer: b) Designing and structuring web content
Markup languages, such as HTML and XML, are used to structure and format web
content. They provide a way to define the layout, formatting, and organization of con-
tent on the web, enabling consistent display across different devices and browsers.
32. Which of the following is a decision symbol in a flowchart?
Answer: c) Diamond
In flowcharts, the diamond symbol represents a decision point where a question or
condition is evaluated, leading to different paths based on the outcome. It is a key
component for visualizing conditional logic in process workflows.
33. Which of the following is NOT a function of an operating system?
Answer: d) Application development
Operating systems manage resources, schedule tasks, and interface with hardware, but
they are not responsible for developing applications. Application development is a
separate activity performed by programmers using various development tools and en-
vironments.
34. A real-time operating system (RTOS) is designed for
Answer: b) Immediate processing of tasks
Real-time operating systems (RTOS) prioritize prompt, predictable responses to
events, which is crucial for systems requiring immediate processing, such as embed-
ded systems in medical devices, automotive control systems, and industrial automa-
tion.
35. Which type of operating system is used in embedded systems?
Answer: b) Real-Time OS
Real-Time Operating Systems (RTOS) are commonly used in embedded systems to
ensure timely and deterministic responses to inputs, making them suitable for critical
applications where timing is crucial, such as aerospace, medical, and automotive
devices.
36. Which operating system is primarily used for Apple devices?
Answer: d) mac OS
macOS is the operating system developed by Apple specifically for its range of
desktop and laptop devices. Known for its robust security, user-friendly interface, and
seamless integration with Apple’s ecosystem, macOS is widely used in Apple’s com-
puting products.
37. Which of the following is NOT a typical application of a database manage-
ment system?
Answer: b) Real-time video streaming
Database management systems (DBMS) are primarily used for storing, managing, and
retrieving structured data in applications like banking, library management, and air-
line reservations. Real-time video streaming, however, relies more on media servers
and content delivery networks rather than a traditional DBMS.
38. Which type of DBMS is designed to store and manage data that is structured
as rows and columns?
Answer: c) Relational DBMS
Relational Database Management Systems (RDBMS) store data in tables consisting of
rows and columns, facilitating easy querying and data manipulation through SQL
(Structured Query Language). Examples include MySQL, Oracle, and Microsoft SQL
Server.
39. Who is responsible for defining the structure of a database and ensuring its
performance?
Answer: b) Database administrator
A Database Administrator (DBA) is responsible for the design, structure, and per-
formance optimization of databases. DBAs ensure data integrity, manage database se-
curity, and handle performance tuning to maintain efficient operations within an or-
ganization.
40. Which of the following is an example of a casual user of a database?
Answer: b) A customer using an online shopping site
A casual user of a database interacts with the system to retrieve information or per-
form basic tasks without accessing the database's underlying structure. For instance, a
customer on an e-commerce site accesses product information through a user-friendly
interface without directly interacting with the database.