0% found this document useful (0 votes)
10 views6 pages

IT Pre Board Model 2

The document provides a comprehensive overview of various computer science concepts, including the differences between analog and digital computers, the purpose of I/O devices, and the definition of a DBMS. It also discusses memory hierarchy, types of system software, authentication techniques, and network topologies. Additionally, it addresses the applications of multimedia in business and the process of DNS resolution.

Uploaded by

pokhrelrupak948
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views6 pages

IT Pre Board Model 2

The document provides a comprehensive overview of various computer science concepts, including the differences between analog and digital computers, the purpose of I/O devices, and the definition of a DBMS. It also discusses memory hierarchy, types of system software, authentication techniques, and network topologies. Additionally, it addresses the applications of multimedia in business and the process of DNS resolution.

Uploaded by

pokhrelrupak948
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Very short answer question

1. Differentiate between digital and analog computer.

S.No. ANALOG COMPUTER DIGITAL COMPUTER

Analog computers works with continuous Digital computers works with discrete
values or these types of systems process values or these types of systems process
01. continuous data. discrete data.

Speed of analog computers is less than the Speed of digital computers is more than the
02. digital computers. analog computers.

2. What is the purpose of I/O devices?

The purpose of I/O devices is to communicate with a computer.

3. What is device driver?

A device driver is a specialized software program that enables communication between the operating
system (OS) and hardware devices.

4. How can you calculate the total number of cables in full mesh topology?

The formula for calculating number of connections in full mesh topology is [n(n - 1)] / 2.

5. Expand:

a) HTTP: Hypertext Transfer Protocol

b)SMPT: Simple Mail Transfer Protocol

6. Define Multimedia.

Multimedia refers to the integration of multiple forms of content, such as text, audio, images, video, and
interactive elements into a single digital platform or application.

7. What is a DBMS?

A Database Management System (DBMS) is a software that enables users to define, create, maintain,
and control access to databases.

8. What is encryption?

Encryption is a method of securing data by converting it from a readable format (plaintext) into an
unreadable format (ciphertext).

9. Define search engine.

Search engines are programs that allow users to search and retrieve information from the vast amount
of content available on the internet.
10. Define CPU Registers.

A CPU register is a small and temporary storage containing a set of data holding places that are part of
the computer processor.

Short answer question.

12. Describe the different levels of the memory hierarchy.

Registers

Registers are small, high-speed memory units located in the CPU. They are used to store the most
frequently used data and instructions.

Cache Memory

Cache memory is a small, fast memory unit located close to the CPU. It stores frequently used data and
instructions that have been recently accessed from the main memory.

Main Memory

Main memory, also known as RAM (Random Access Memory), is the primary memory of a computer
system. It has a larger storage capacity than cache memory, but it is slower.

Secondary Storage

Secondary storage, such as hard disk drives (HDD) and solid-state drives (SSD) , is a non-volatile memory
unit that has a larger storage capacity than main memory.

Magnetic Disk

Magnetic Disks are simply circular plates that are fabricated with either a metal or a plastic or a
magnetized material.

Magnetic Tape

Magnetic Tape is simply a magnetic recording device that is covered with a plastic film. Magnetic Tape is
generally used for the backup of data.

13. What are the different types of system software? Explain each type.

Operating System

An operating system (OS) is a type of system software that manages a computer’s hardware and
software resources. It provides common services for computer programs.

Programming Language Translator

Programming language translators are programs that translate code written in one programming
language into another programming language. below are examples of programming language translator.

Device Drivers

Device drivers are a class of system software that minimizes the need for system troubleshooting.
Firmware

These are the operational programs installed on computer motherboards that assist the operating
system in distinguishing between Flash, ROM, EPROM, and memory chips.

Utility Software

System Software and application software interact through utility software. A third-party product called
utility software is created to lessen maintenance problems and find computer system defects.

14. Differentiate between TCP and UDP.

15. What are the different applications of multimedia in business?

PowerPoint Presentations
PowerPoint is now the standard in work due to its simplicity and ease of use. PowerPoint allows you to
combine images from the Internet or personal cameras with text and graphic design elements to create
striking presentations that can be shared with clients, in-house or your employees.

Website Development

Website design is a complex business that seamlessly integrates content, images, and logos with site
navigation. This is especially important for businesses who want sites that reflect their core values and
character. Website design skills include managing the project, choosing the right art, working with the
code developers, designing the site, and incorporating responsive design elements.
On-Demand Video
Part of Internet marketing is using YouTube for business purposes. This includes creating a channel and
posting videos about company products, services, or news events. Both on YouTube and the company
website, these videos increase viewers’ time on the site and serve as additional information for YouTube
searchers.

16. What is the biggest obstacle to implementing a truly smart city, and how can it be overcome?

Smart City Residents’ Lack of Tech Skills

The next hurdle for smart city planners is the general level of technology skills of smart city residents. Is
their skill enough to efficiently operate or access the benefits of these initiatives? Fortunately, it’s
possible to implement educational programs to address this problem.

The transition into new methods of operation can be made easier with proper education through in-
person meetings with government officials, physical printouts, and accessible education through the
internet and social media.

Long answer question

18. Define Authentication. Explain the different types of authentications techniques.

Authentication is the process of verifying the identity of a user or information. User authentication is the
process of verifying the identity of a user when that user logs in to a computer system.

Single-Factor authentication: – This was the first method of security that was developed. On this
authentication system, the user has to enter the username and the password to confirm whether that
user is logging in or not. Now if the username or password is wrong, then the user will not be allowed to
log in or access the system.

Two-factor Authentication: – In this authentication system, the user has to give a username, password,
and other information. There are various types of authentication systems that are used by the user for
securing the system. Some of them are: – wireless tokens and virtual tokens. OTP and more.

Multi-Factor authentication system,: – In this type of authentication, more than one factor of
authentication is needed. This gives better security to the user. Any type of keylogger or phishing attack
will not be possible in a Multi-Factor Authentication system. This assures the user, that the information
will not get stolen from them.

20. What happens if a DNS server receives a query for a domain name that it has never seen before?

Step 1 - Domain Name Resolution Request

When the user enters any specific domain name (eg. www.geeksforgeeks.org) in the web browser, the
browser sends the DNS resolution request to the local DNS server.

Step 2 - Local DNS Resolver

It mainly checks its cache for the IP address corresponding to the domain name. If the IP address is not
cached, then the resolver forwards the request to the root DNS servers.
Step 3 - Root DNS Servers

The route DNS servers have the information regarding the top-level domain servers like .com, .org,
and .net. If the resolver does not have the IP address, it queries the root DNS servers to get the
authoritative DNS server from the specific top-level domain DNS server.

Step 4 - TLD DNS Server

Next, the resolver reaches out to the appropriate TLD DNS server, which doesn’t have the exact IP
address either but knows where to find the authoritative DNS server for the specific domain.

Step 5 - Authoritative DNS Server

Finally, the resolver contacts the authoritative DNS server for example.com, which holds the definitive IP
address for the domain. The authoritative server responds with the IP address back to the resolver.

Step 6 - IP Address Response

When the Authoritative DNS server receives the query, it responds to the DNS resolver with the IP
address for the domain name.

Step 7 - Response to Client

The local DNS server sends the IP address back to the client's web browser.

Comprehensive Questions.

22. What is computer network? Classify the computer network on the basis of architecture. Explain the
different types of Network topology in brief.

A computer network is a system that connects multiple computers and other devices to share
information and resources. These connections can be established using various methods such as cables,
Wi-Fi, or other communication technologies.

Peer-to-Peer Architecture

In the P2P (Peer-to-Peer) network, “peers” generally represent computer system. These peers are
connected to each other with help of Internet. Files might be shared directly without requirement of
central server among these systems on the network. It can be said that each of computers on P2P
network usually becomes file server even as client also.

Client/Server Architecture

CSN (Client/Server Network) is type of computer network in which one of centralized and powerful
computers (commonly called as server) is hub to which many of personal computers that are less
powerful or workstations (commonly known as clients) are connected. It is type of system where clients
are connected to server to just share or use resources. These servers are generally considered as heart of
system.
Network Topology:

Point to Point Topology

Point-to-point topology is a type of topology that works on the functionality of the sender and receiver.
It is the simplest communication between two nodes, in which one is the sender and the other one is
the receiver. Point-to-Point provides high bandwidth.

Mesh Topology

In a mesh topology, every device is connected to another device via a particular channel. Every device is
connected to another via dedicated channels. These channels are known as links. In Mesh Topology, the
protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host Configuration Protocol),
etc.

Star Topology

In Star Topology, all the devices are connected to a single hub through a cable. This hub is the central
node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an
intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an
active hub.

Bus Topology

Bus Topology is a network type in which every computer and network device is connected to a single
cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the
backbone fails the topology crashes.

Tree Topology

Tree topology is the variation of the Star topology. This topology has a hierarchical flow of data. In Tree
Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are used.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy