Ch-01: Computer System - Short Question Answers - PDF
Ch-01: Computer System - Short Question Answers - PDF
Chapter
01 Computer System
SHORT QUESTION AND ANSWERS
1. What Is computer system?
Ans: A computer system is a combination of hardware and software components
that work together to perform various tasks. Hardware and software enable the
computer to process data, perform calculations, run applications, and deliver
results to the user.
2. How does software Interact with hardware in a computer system?
Ans: Software consists of a set of instructions that tell the hardware what to do.
Hardware executes these instructions to perform tasks as directed by the
software.
3. Describe the relationship of software and hardware.
Ans: The hardware cannot perform any task without software. Software cannot be
executed without hardware. Computer becomes useful when hardware and
software are combined.
4. Why Is a computer system considered essential in modern life?
Ans: A computer system is considered essential in modern life as it helps to perform
different easily and efficiently. It has revolutionized the way people live, work,
learn and interact with the world. It is used to solve real-word problems in
various fields of our life such as education, health
care, transportation and economics etc.
5. Why Is a computer considering a digital machine?
Ans: A computer is considered a digital machine because it processes data digitally
by converting the input into binary code that consists of Os and 1 s.
6. How does a computer system handle data from Input to output?
Ans: Data is first converted into binary form during input process. The binary data is
stored in computer memory called RAM. CPU reads the binary data from
memory and follows the instructions to process it. The results are converted
back to human-readable form after the processing. The results are presented
to the user via output devices.
1|P age
Computer Science Class-11
2|P age
Computer Science Class-11
system also consists of two digits 0 and 1. The binary digits 0 and 1 are
represented in computer using two states of a switch.
15. What is the purpose of the ASCII coding scheme?
Ans: The ASCII (American Standard Code for Information Interchange) coding
scheme is used to represent characters in binary form. It assigns unique binary
codes to different characters. It allows the computer to interpret and display
text. It provides a common way to encode characters such as letters, numbers
and symbols.
16. How many characters can a 7-bitand an 8-bit ASCII code represent?
Ans: A 7-bit ASCII code can represent 128 characters. An 8-bit ASCII code can
represent 256 characters.
17. What is binary number system?
Ans: Binary number system consists of two digits 0 and 1 and its base 2. Each digit or
bit in binary number system can be 0 or 1.
18. What is the meaning of the term bit?
Ans: The term bit stands for binary digit. It is the smallest unit to store data in the
memory. A bit can represent 0 or 1.
19. What is byte?
Ans: Byte is a collection of 8 bits. At least one byte is required to store any piece of
information in computer storage.
20. What is the difference between bit and byte?
Ans: A bit is the smallest unit of data represent a single binary digit 0 or 1. A byte
consists of 8 bits and represents a single character in the computer.
21. Write any three differences between digital and analog signals?
Ans: Digital signal is represented in a continuous waveform whereas analog signal is
represented in discrete values of 0s and 1s. Digital signal can have any value
within a range whereas analog signal has specific limited discrete values of 0s
and 1s. Digital signal can be affected by noise and interference whereas analog
signal is generally less affected by noise and interference.
22. What is digital logic and why is it fundamental to digital computing?
Ans: Digital logic is the foundation of digital computing. It involves representing and
manipulating information using two discrete states 0 and 1. It is fundamental
3|P age
Computer Science Class-11
4|P age
Computer Science Class-11
the output HIGH (1) only if all inputs are HIGH (1). The NOT gage reverses the
input. It give the output of HIGH (1) if input is LOW (0) and vice versa.
30. Explain the function of AND gate?
Ans: The AND gate preforms a logical multiplication operation. It produces HIGH
output only when all of its inputs are HIGH. The output is LOW when any input
is LOW.
31. Describe the operation of an OR gate?
Ans: An OR gate performs a logical addition operation. It produces a HIGH output
when any of the inputs is HIGH. The output is LOW only when both inputs are
LOW.
32. Describe the operation of a NOT gate?
Ans: The NOT gate performs a logical negation. The output of NOT gate is HIGH when
the input is LOW. The output of NOT gate is LOW when the input is HIGH.
33. What is the different between NAND and NOR gate?
Ans: NAND and NOR gates are inversions of AND and OR gates respectively. A NAND
gate gives LOW (0) only when all inputs are HIGH (1), otherwise it gives HIGH
(1). A NOT gate gives HIGH (1) only when all input are LOW (0), otherwise it
gives LOW (0). They are represented F = . and F = + respectively.
34. When is the output of an AND gate HIGH and LOW?
Ans: The output of AND gate is HIGH only if the inputs are HIGH. The output of AND
gate is LOW when one or more inputs are LOW.
35. When is the input of an OR gate HIGH and LOW?
Ans: The output of OR gate is HIGH if any of the inputs in HIGH. The output of OR
gate is LOW when all inputs are LOW.
36. How is the OR operation represented in a logic expression?
Ans: The OR operation is shown with a plus sign (+) between variables. For example,
the logic expression for 2-input OR gate of variables A and B is written as X = A
+B
37. What is difference between OR and AND gate?
Ans: AND gate gives a HIGH output only when both inputs are HIGH, whereas OR
gate gives an output of HIGH if at least one of the inputs is HIGH. AND gate
5|P age
Computer Science Class-11
Boolean expression: X = A
Truth Table: A X
0 1
1 0
39. What is the input of an inverter when 1 is given as the input?
Ans: The output of an inverter is 0 when the input is 1.
40. Determine the total number of possible input combinations for 3 input AND
gate.
Ans: The total number of possible input combinations are eight (23=8) for a 3-input
AND gate.
41. Give the two representations of an AND gate.
Ans: A and B are the input of signals and
X is the output signal.
Boolean expression: A.B (A AND B)
42. Write a truth table for 2-input AND gate.
Ans: A B X
0 0 0
0 1 0
1 0 0
1 1 1
43. Give two representations of an OR gate
Ans: A and B are the input signals and
X is the output of signs
Boolean expression A + B (A OR B)
6|P age
Computer Science Class-11
Output X =
47. Give two representations of a NOR gate
Ans: A and B are the input signals and
X is the output signal.
Boolean expression: ( + ) (NOT (A AND B)
48. Draw and label the symbol for three input AND gate and write its truth table.
Ans: A B C X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1
7|P age
Computer Science Class-11
49. Draw and label the symbol for three-input OR gate and write its truth table.
Ans: A B C X
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
X=A+B+C
50. Which digital circuits are built using logic gates for memory storage?
Ans: Flip-flops are latches are built using logic gates. A flip=flop is a digital circuit that
stores binary data. It is widely used in digital electronics to build memory
elements such as registers. A latch is another type of digital circuit that stores
binary data.
51. What is the role of logic gates in an Arithmetic & Logic Unit (ALU)?
Ans: The ALU is an important part of CPU that performs arithmetic and logical
operations. The logic gates are used to create circuits that perform these
operations. For example, a circuit made of logic gates can add binary numbers
that is a fundamental operation in computing.
52. How do logic gates help in clock synchronization for digital systems?
Ans: Logic gates in clock synchronization ensure all parts of digital system work
together at the same time. They control timing signals to coordinate the actions
of different components. It prevents timing errors and keeps the system
running smoothly.
53. What tasks are performed by logic circuits in Digital Signal Processing (DSP)?
Ans: Logic circuits perform various tasks in digital signal processing such as filtering,
modulation and demodulation. Filtering is the process of removing noise from
signal. Modulation is the process of converting the signal in a format that
suitable for transmission. Demodulation is the process of converting the signal
block to the original form at the receiver.
8|P age
Computer Science Class-11
54. Define home automation. How are logic gates used in home automation
system?
Ans: Home automation means using technology to control and automate various
household tasks such as turning lights on / off or adjusting the temperature.
The logic gates are used in home automation systems to process inputs from
sensors. This makes homes more efficient and convenient.
55. How logic gates can help to manage traffic?
Ans: Logic gates are used in traffic light control systems. They process inputs from
sensors to manage the flow of traffic. Logic gates ensure the correct sequence
of red, yellow and green lights. This helps prevent accidents and manage the
traffic smoothly.
56. How do logic gates assist in decision-making in robotics?
Ans: Logic gates are used in robotics to make decisions based on sensor inputs. They
help robots determine actions such as moving, stopping or picking up objects.
This allows robots to interact with the environment intelligently. Logic gates
ensure the robot operates correctly and efficiently.
57. How are logic gates used in security systems?
Ans: The logic gates are used in security systems to control access to certain areas.
They process input from keycards or codes. They activate alarms when sensors
detect unauthorized entry. Logic gates are also used to manage security
cameras to monitor and record activities.
58. How logic gates are used to improve the safety and efficiency in vehicle
operations?
Ans: Logic gates are used in automotive electronics for making quick and reliable
decisions control engine, open airbags and manage braking. They also manage
anti-lock brake system to prevent wheel lockup during braking. It improves
safety and efficiency in vehicle operations.
59. What is the use of logic gates in aerospace applications?
Ans: The logic gates are used to perform logical operations to control and manage
various systems in aircraft and spacecraft. They ensure that aircraft operate
safely and efficiently. They process signals from GPS and other sensors to
accurately determine the location of the aircraft.
9|P age
Computer Science Class-11
10 | P a g e
Computer Science Class-11
11 | P a g e
Computer Science Class-11
12 | P a g e
Computer Science Class-11
13 | P a g e
Computer Science Class-11
14 | P a g e
Computer Science Class-11
requirements. It is used to determine the most logical design and structure for
data flow and storage. It is also used to design user interface screen layout.
93. Design phase is considered as the “architectural” phase of SDLC. Give reasons.
Ans: The design phase is the architectural phase of system design because is used to
plan the system architecture and create detailed specifications based on
requirements. It is used to determine the most logical design and structure for
data flow and storage. It is also used to design user interface screen layout.
94. What is the use of Unified Modelling Language (UML) in the design phase?
Ans: A flowchart is a type of diagram that represents on algorithm or a process.
Flowchart is important for writing computer program because it helps to
understand the logic of problem solution. The program can be written easily in
any programming language after flowchart has been designed.
95. Define flowchart. Why flowchart is important for writing computer program?
Ans: A flowchart is a type of diagram that represents an algorithm or a process.
Flowchart is important for writing computer program because it helps to
understand the logic of problem solution. The program can be written easily in
any programming language after flowchart has been designed.
96. What are different flowchart symbols?
Ans: The flowchart symbols are used to show the steps of the algorithm. The oval
symbol represents Start and End. The parallelogram symbol represents input
and output. The rectangle symbol represents process. The diamond symbol
represents decision step. The connector symbol connects two or more flow
lines. The arrow shows the flow of flowchart steps.
97. What is the use of development / coding phase of SDLC?
Ans: The development/coding phase is used to execute the plan that is prepared in
design phase. The developers write the code for data flow process. They also
design the actual user interface screens. The code is written in programme
languages.
98. What is the purpose of testing / verification phase of SDLC?
Ans: The primary goal of testing is to assess specific attributes or capabilities of a
software or system. It ensures that it is developed according to the required
specifications. The results are compared with predetermined requirements.
15 | P a g e
Computer Science Class-11
16 | P a g e
Computer Science Class-11
17 | P a g e
Computer Science Class-11
system leaves the organization, the documentation can help the new analyst to
understand the system.
113. Define software developmental model. List two software development
models.
Ans: Software development model refers to fundamental activities and approaches
used in software development. It includes planning, designing, building, testing,
implementing and maintaining software systems. These processes provide
structured way to manage software projects. Two software development
models include waterfall model and agile model.
114. What is waterfall model? Why is it given this name?
Ans: The waterfall model is sequential or linear development approach. It is one of
the earliest and simplest process models used in software development. It is
given this name because development in this model flows downwards like a
waterfall through different phases.
115. When is Waterfall model a good choice for software development?
Ans: The Waterfall model is a good choice for software development when the
project requirements are well-defined and resources are available. It is suitable
for projects where a structured, step-by-step approach is beneficial.
116. What does corrective maintenance involve?
Ans: The corrective maintenance involves identifying and fixing errors or bugs that
were not detected during the initial development and testing phase of the
software lifecycle.
117. What is the goal of perfective maintenance?
Ans: The goal of perfective maintenance is to improve the working of software
product after it has been deployed. It may be based on the user feedback or
changing requirements etc.
118. What is Agile model in software development?
Ans: The Agile model is a flexible and iterative approach to software development.
It focuses on collaboration and customer feedback. Software is developed in
small and manageable units called iteration or sprints. The software is reviewed
and feedback is gathered at the end of each sprint. It allows frequent
reassessment and change in the software based on user feedback and changing
requirements.
18 | P a g e
Computer Science Class-11
19 | P a g e
Computer Science Class-11
20 | P a g e
Computer Science Class-11
message only to that device for which the message was sent. It improves the
efficiency of the data transfer in a network.
133. Define network topology. Write any three types of network topology?
Ans: The physical layout or arrangement of connected devices in a network is called
network topology. Three types of network topology are Bus, Ring and Star
topology.
134. Why is network topology important in network design?
Ans: Network topology is important in network design as it determines the layout of
computers and other devices in a network. It is the backbone of any networking
application. It describes how devices are interconnected and how data is
transmitted between them.
135. What is bus topology?
Ans: Bus topology is the simplest type of network. It supports a small number of
computers. In bus topology, all computers or devices are connected to a
common communication medium. This medium is known as bus or backbone.
136. Why terminators are used in bus topology?
Ans: When the signal reaches the end of the wire, it bounces back and travel up to
wire. The terminators are used at the end of a bus to absorb signals and stop
them to travel backwards.
137. What happens if a bus topology has too many computers?
Ans: Bus topology typically supports a small number of computers. The network of
bus topology becomes slower if it has too many computers in it.
138. What challenges can an organization face when using a bus topology?
Ans: An organization using a bus topology might face challenges such as limited
scalability and network performance degradation with increased traffic. A
failure in central cable can disrupt the entire network since all nodes share the
same communication line.
139. How does star topology work?
Ans: Each computer in star network communicates with the central device. The
sending computer sends the data the central device. The central device sends
data to the receiving computer. In this way, data is transferred from one
computer to another in star network.
21 | P a g e
Computer Science Class-11
140. How is a star topology suitable for the network that needs frequent changes?
Ans: The star topology is suitable for the network that needs frequent changes
because each device connected to a central hub or switch. It allows to add or
remove any device without disrupting the rest of the network.
141. What are the main advantages of using star topology in a network?
Ans: Star topology allows easy management and centralized of the network. The new
devices can be added easily without disrupting the existing network. If one
device fails, it does not affect the other devices on the network.
142. Why star topology is more reliable than bus or ring topology?
Ans: Star topology is more reliable than bus or ring topology. It allows the user to
remove or add a device without affecting the network. It is easier to
troubleshoot than other topologies. If one computer fails, it does not affect the
other computers in the network.
143. Differentiate between a bus topology and a star topology.
Ans: In a bus topology, all computers are connected to a common communication
medium called bus. A star topology includes a central device such as switch or
hub to connect all computers together. Star topology is more expensive to
implement than bus topology.
144. How does data transmission work in ring topology?
Ans: Each computer in ring topology receives data from the previous computer and
transmits it to next computer. The data is passed from one computer to other
until the destination computer receives it. The destination computer sends
acknowledgement to sending computer to indicate that the data has been
received.
145. What is the use of token ring protocol in ring topology?
Ans: The ring topology uses token ring protocol to control access to the network. A
special data packet called a token circulates continuously around the ring. A
device must possess the token before it can send data. It helps to prevent
collisions by ensuring that only one device can send data at a time.
146. How can you handle data collisions in a ring topology network?
Ans: Data collisions are generally handled in a ring topology using the token ring
protocol. It ensures that only one device can send data at a time.
22 | P a g e
Computer Science Class-11
24 | P a g e
Computer Science Class-11
25 | P a g e
Computer Science Class-11
165. How can a network administrator ensure that a network remains operational
during a server crash?
Ans: The network administrator can ensure continued operation by performing
redundancy testing and implementing effective load balancing and failover
mechanisms. They should simulate server crashes and verify that network
switches to backup systems without downtime.
166. What is cloud computing and how does it differ from traditional computing?
Ans: Cloud computing refers to an infrastructure that provides different computing
services over the internet. These services include data storage, databases,
servers, networking and software etc. Cloud computing is different from
traditional computing as it eliminates the need of storing everything on
personal computer. It allows the user to access pictures, music, files and
programs from any device via the internet.
167. Write some advantages of cloud computing.
Ans: The advantage of cloud computing is that it offers unlimited processing and
storage capacity. It provides access to applications and data anywhere in the
world via the internet. It also reduces the cost of buying computers and
peripheral devices.
168. Write some disadvantages of cloud computing.
Ans: The disadvantage of cloud computing is that the data is stored on remote
servers that can be a security and privacy concern. It requires reliable
broadband internet connection. It is not possible to access the data if there is
any problem with the internet connection.
169. What are the key characteristics of cloud computing?
Ans: The key characteristics of cloud computing including on-demand self-service,
broad network access, resource pooling, rapid elasticity, measured service and
security.
170. How does resource pooling in cloud computing benefit organizations?
Ans: Resource pooling in cloud computing offers shared servers and storage to serve
multiple customers at the same time. It means resources are shared and
managed efficiently. It leads to efficient utilization of resources, cost savings
and the ability to scale up or down as needed without wasting resources.
26 | P a g e
Computer Science Class-11
171. What are the three primary service models in cloud computing?
Ans: The three primary service models in cloud computing are infrastructure as a
Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
172. A company needs to develop an application without managing the underlying
infrastructure. Which cloud service model should they use and why?
Ans: The company should use Platform as a Service (PaaS). It provides a platform
that includes tools, services and frameworks for application development
without the complexity of managing the underlying infrastructure. It allows
developers to focus on writing code and developing the application.
173. What are the four deployment models of cloud computing?
Ans: The four deployment models of cloud computing are public cloud, private
cloud, hybrid cloud and community cloud.
174. If a company wants to use cloud resources but needs to ensure data is only
accessible within its organization, which deployment model should they
choose?
Ans: The company should choose a Private Cloud. A private cloud provides exclusive
cloud resources for a single organization. It offers more control and
customization over the infrastructure to ensure that data is only accessible
within the organization.
175. An organization is considering a hybrid cloud model. What advantage does
this model offer in terms of data management?
Ans: A hybrid cloud model offers the advantage of combining public and private
clouds. It uses the technology that allows data and applications to be shared
between public and private clouds. The organizations use public cloud for
performing certain tasks. They store the critical data and applications on private
cloud for fast access and security reasons.
176. Give some examples of cloud computing services provided by major
companies.
Ans: Some examples of cloud computing services include Amazon Web Services
(AWS), Microsoft Azure, Google Cloud Platform (GCP) and IBM cloud.
177. What is scalability in cloud computing?
Ans: Scalability refers to the ability of a cloud system or service to handle increasing
workloads. It is either done by scaling out or scaling up. The scaling out means
27 | P a g e
Computer Science Class-11
28 | P a g e
Computer Science Class-11
29 | P a g e
Computer Science Class-11
30 | P a g e
Computer Science Class-11
one computer to another. Virus cannot spread without a human action such as
running an infected program.
196. What is phishing, and how does it work?
Ans: Phishing is a type of social engineering attack where cybercriminals pretend as
trusted people or companies. It is used to trick people and get important
information such as usernames and passwords, credit card information or
personal details.
197. What is email phishing, and what are its common tactics?
Ans: Email phishing is an email that appears to be from a legitimate source such as
banks or social media platforms. It typically asks recipients to click on malicious
links or download infected attachments. It often has an urgent message asking
to update credit card or account information. It contains links that take user to
a fake website that is designed to steal login credentials, credit card information
or other sensitive data.
198. How can we avoid from phishing attack?
Ans: Do not click on links or download attachments from unsolicited or suspicious
emails. Always install reliable antivirus and anti-malware software on devices.
Ensure that operating system, antivirus software and web browsers are up to
date with the latest security patches.
199. How does a Denial of Service (DoS) attack differ from a Distributed Denial of
Service (DDoS) attack?
Ans: A DoS attack occurs when single device floods another computer or network
data or requests. It can make the target computer slow down or stop working
for legitimate users. A DDoS attack occurs when multiple devices work together
to flood a computer or network with data or request. It is more powerful than
DoS because it uses many sources and causes more severe disruptions.
200. What is ransomware and how does it typically affect its victims?
Ans: Ransomware is a type of malicious software that blocks access to computer or
files until a ransom is paid to the attacker. It causes financial loss to individuals,
organizations or businesses. It usually encrypts data that makes it unreadable
until ransom is paid to get a decryption key.
31 | P a g e
Computer Science Class-11
32 | P a g e
Computer Science Class-11
33 | P a g e
Computer Science Class-11
something the users has that can be unique code sent to the user’s phone, a
biometric identifier like a fingerprint.
215. How does Two-Factor Authentication (2FA) enhance security for online
accounts?
Ans: Two-Factor Authentication (2FA) enhances security by requiring two separate
forms of verification. Even if someone knows the password, they cannot access
the account without the second factor. It can be a code sent to user’s phone.
This additional step significantly reduces the risk of unauthorized access.
216. What is a firewall and what role does it play in network security?
Ans: A firewall is a security system designed to protect computer networks from
unauthorized access and malicious attacks. It acts as a barrier between a trusted
internal network and untrusted external networks such as internet. It monitors
and controls the incoming and outgoing network traffic. It uses a set of rules to
decide which traffic is allowed and which is blocked.
217. How do antivirus and anti-malware software protect a system?
Ans: Antivirus and anti-malware software can detect and remove malicious software
such as viruses, trojans and spyware etc. the software provides real-time
scanning of files and applications. It ensures that malware is not allowed to
execute on the system.
218. What is the purpose of encryption in cybersecurity?
Ans: The purpose of encryption is to transform plaintext into unreadable format
called cipher text. It makes data unusable for the unauthorized persons even if
they access it. The cipher text can only be deciphered with decryption key.
219. Why are regular backups and disaster recovery plans important in
cybersecurity?
Ans: Backup is the process of creating copies of data. The backup can be used if the
data is lost or damaged due to any cyberattack. A disaster recovery is a written
plan that describes the steps to restore the operations after a cyberattack. A
regular data backup and disaster recovery plans ensure that critical data is
restored quickly after a cyberattack.
34 | P a g e
Computer Science Class-11
35 | P a g e
Computer Science Class-11
36 | P a g e
Computer Science Class-11
37 | P a g e