IT Pre Board Model 2
IT Pre Board Model 2
Analog computers works with continuous Digital computers works with discrete
values or these types of systems process values or these types of systems process
01. continuous data. discrete data.
Speed of analog computers is less than the Speed of digital computers is more than the
02. digital computers. analog computers.
A device driver is a specialized software program that enables communication between the operating
system (OS) and hardware devices.
4. How can you calculate the total number of cables in full mesh topology?
The formula for calculating number of connections in full mesh topology is [n(n - 1)] / 2.
5. Expand:
6. Define Multimedia.
Multimedia refers to the integration of multiple forms of content, such as text, audio, images, video, and
interactive elements into a single digital platform or application.
7. What is a DBMS?
A Database Management System (DBMS) is a software that enables users to define, create, maintain,
and control access to databases.
8. What is encryption?
Encryption is a method of securing data by converting it from a readable format (plaintext) into an
unreadable format (ciphertext).
Search engines are programs that allow users to search and retrieve information from the vast amount
of content available on the internet.
10. Define CPU Registers.
A CPU register is a small and temporary storage containing a set of data holding places that are part of
the computer processor.
Registers
Registers are small, high-speed memory units located in the CPU. They are used to store the most
frequently used data and instructions.
Cache Memory
Cache memory is a small, fast memory unit located close to the CPU. It stores frequently used data and
instructions that have been recently accessed from the main memory.
Main Memory
Main memory, also known as RAM (Random Access Memory), is the primary memory of a computer
system. It has a larger storage capacity than cache memory, but it is slower.
Secondary Storage
Secondary storage, such as hard disk drives (HDD) and solid-state drives (SSD) , is a non-volatile memory
unit that has a larger storage capacity than main memory.
Magnetic Disk
Magnetic Disks are simply circular plates that are fabricated with either a metal or a plastic or a
magnetized material.
Magnetic Tape
Magnetic Tape is simply a magnetic recording device that is covered with a plastic film. Magnetic Tape is
generally used for the backup of data.
13. What are the different types of system software? Explain each type.
Operating System
An operating system (OS) is a type of system software that manages a computer’s hardware and
software resources. It provides common services for computer programs.
Programming language translators are programs that translate code written in one programming
language into another programming language. below are examples of programming language translator.
Device Drivers
Device drivers are a class of system software that minimizes the need for system troubleshooting.
Firmware
These are the operational programs installed on computer motherboards that assist the operating
system in distinguishing between Flash, ROM, EPROM, and memory chips.
Utility Software
System Software and application software interact through utility software. A third-party product called
utility software is created to lessen maintenance problems and find computer system defects.
PowerPoint Presentations
PowerPoint is now the standard in work due to its simplicity and ease of use. PowerPoint allows you to
combine images from the Internet or personal cameras with text and graphic design elements to create
striking presentations that can be shared with clients, in-house or your employees.
Website Development
Website design is a complex business that seamlessly integrates content, images, and logos with site
navigation. This is especially important for businesses who want sites that reflect their core values and
character. Website design skills include managing the project, choosing the right art, working with the
code developers, designing the site, and incorporating responsive design elements.
On-Demand Video
Part of Internet marketing is using YouTube for business purposes. This includes creating a channel and
posting videos about company products, services, or news events. Both on YouTube and the company
website, these videos increase viewers’ time on the site and serve as additional information for YouTube
searchers.
16. What is the biggest obstacle to implementing a truly smart city, and how can it be overcome?
The next hurdle for smart city planners is the general level of technology skills of smart city residents. Is
their skill enough to efficiently operate or access the benefits of these initiatives? Fortunately, it’s
possible to implement educational programs to address this problem.
The transition into new methods of operation can be made easier with proper education through in-
person meetings with government officials, physical printouts, and accessible education through the
internet and social media.
Authentication is the process of verifying the identity of a user or information. User authentication is the
process of verifying the identity of a user when that user logs in to a computer system.
Single-Factor authentication: – This was the first method of security that was developed. On this
authentication system, the user has to enter the username and the password to confirm whether that
user is logging in or not. Now if the username or password is wrong, then the user will not be allowed to
log in or access the system.
Two-factor Authentication: – In this authentication system, the user has to give a username, password,
and other information. There are various types of authentication systems that are used by the user for
securing the system. Some of them are: – wireless tokens and virtual tokens. OTP and more.
Multi-Factor authentication system,: – In this type of authentication, more than one factor of
authentication is needed. This gives better security to the user. Any type of keylogger or phishing attack
will not be possible in a Multi-Factor Authentication system. This assures the user, that the information
will not get stolen from them.
20. What happens if a DNS server receives a query for a domain name that it has never seen before?
When the user enters any specific domain name (eg. www.geeksforgeeks.org) in the web browser, the
browser sends the DNS resolution request to the local DNS server.
It mainly checks its cache for the IP address corresponding to the domain name. If the IP address is not
cached, then the resolver forwards the request to the root DNS servers.
Step 3 - Root DNS Servers
The route DNS servers have the information regarding the top-level domain servers like .com, .org,
and .net. If the resolver does not have the IP address, it queries the root DNS servers to get the
authoritative DNS server from the specific top-level domain DNS server.
Next, the resolver reaches out to the appropriate TLD DNS server, which doesn’t have the exact IP
address either but knows where to find the authoritative DNS server for the specific domain.
Finally, the resolver contacts the authoritative DNS server for example.com, which holds the definitive IP
address for the domain. The authoritative server responds with the IP address back to the resolver.
When the Authoritative DNS server receives the query, it responds to the DNS resolver with the IP
address for the domain name.
The local DNS server sends the IP address back to the client's web browser.
Comprehensive Questions.
22. What is computer network? Classify the computer network on the basis of architecture. Explain the
different types of Network topology in brief.
A computer network is a system that connects multiple computers and other devices to share
information and resources. These connections can be established using various methods such as cables,
Wi-Fi, or other communication technologies.
Peer-to-Peer Architecture
In the P2P (Peer-to-Peer) network, “peers” generally represent computer system. These peers are
connected to each other with help of Internet. Files might be shared directly without requirement of
central server among these systems on the network. It can be said that each of computers on P2P
network usually becomes file server even as client also.
Client/Server Architecture
CSN (Client/Server Network) is type of computer network in which one of centralized and powerful
computers (commonly called as server) is hub to which many of personal computers that are less
powerful or workstations (commonly known as clients) are connected. It is type of system where clients
are connected to server to just share or use resources. These servers are generally considered as heart of
system.
Network Topology:
Point-to-point topology is a type of topology that works on the functionality of the sender and receiver.
It is the simplest communication between two nodes, in which one is the sender and the other one is
the receiver. Point-to-Point provides high bandwidth.
Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel. Every device is
connected to another via dedicated channels. These channels are known as links. In Mesh Topology, the
protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host Configuration Protocol),
etc.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is the central
node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an
intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an
active hub.
Bus Topology
Bus Topology is a network type in which every computer and network device is connected to a single
cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the
backbone fails the topology crashes.
Tree Topology
Tree topology is the variation of the Star topology. This topology has a hierarchical flow of data. In Tree
Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are used.