0% found this document useful (0 votes)
13 views

1st Chap Notes

Uploaded by

aqeel.apss612
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

1st Chap Notes

Uploaded by

aqeel.apss612
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Unit 1 COMPUTER SYSTEMS

UNIT 1:
COMPUTER SYSTEM
EXERCISE NOTES

Prepared by: Ms. Kishwar Sultana 1


Unit 1 COMPUTER SYSTEMS
1. What is the function and significance of Napier’s bone in early computing?
Ans: John Napier developed Napier’s bones. A manually operated calculated device. It
used 9 separate strips (bones) marked with numerals to multiply and divide.
Significance:
It was the first machine to calculate using the decimal point system.
2. How does Charles Babbage’s Difference Engine differ from the Analytical
Engine?

Sr.No Difference Engine Analytical Engine


1. In the early 1820s, Charles Babbage Charles Babbage created another
created the Difference Engine. calculating machine, the Analytical
Engine, in 1830.
2 It was a mechanical computer that It was a mechanical computer that
could do basic computations. It was a took input from punch cards.
steam-powered calculating machine.
3. It was used to solve numerical It was capable of solving any
problems. mathematical problem and storing
data in memory.

3. What is the primary goal of fifth generation computers?


Ans: The main goal of fifth generation of computers is to develop devices that can
understand natural languages and have thinking power. This is a big challenge for
computer developers and programmers to design such systems and software for
them.
4. Name three types of memory mentioned on the motherboard in the von Neumann
architecture?
In Von Neumann architecture, the memory unit consists of RAM, Cache memory and
registers.
Cache Memory:
It is fast and also directly accessible by the CPU.
RAM:
It is split into partitions. Each partition consists of an address and its contents (both in
binary form). These address uniquely identifies every location in the memory.
Registers:
Registers are high speed storage areas in the CPU. All data must be stored in a
register before it can be processed. Examples are MAR, MDR, AC, PC etc.

Prepared by: Ms. Kishwar Sultana 2


Unit 1 COMPUTER SYSTEMS
5. Differentiate between volatile and non volatile memory?

Sr. No Volatile Memory Non- Volatile Memory


1. It is temporary memory, that requires It is permanent memory, that can
power to maintain the stored retained the stored information even
information. when powered off.
2. Examples of such memory are RAM, Examples of non volatile memory
cache memory and registers. include ROM, flash memory,
magnetic storage devices, optical
disks and blue ray disk.
3. Volatile memory is typically used for Non volatile memory is typically used
storage of programs and data that as secondary storage for long-term or
are currently being executed by the future use.
computer.
6. Show memory hierarchy with the help of diagram.
In computing memory refers to the physical devices used to store programs or data on
a temporary or permanent basis for use in computer.

7. why is the word size of a processor important, and how does it effect the
computer’s performance?
Word size refer to the number of bits that a computer’s CPU can process or
manipulate in a single instruction or operation.
Importance of Word size:
The word size of CPU is a fundamental characteristic that affects its performance and
capabilities. For Example, a CPU with a 32 bit word size can process data in 32 bit
chunks, while CPU with a 64 bit word size can process data in 64bit chunks.
Effect of Word sized on Computer’s performance:
Ans: A larger word size generally allows CPU to handle larger integers, perform more
Prepared by: Ms. Kishwar Sultana 3
Unit 1 COMPUTER SYSTEMS
complex arithmetic operations and address larger memory spaces.

8. What is pipelining, and how does it improve the efficiency of CPU?

Ans: In a pipeline, multiple instructions are in different stages of execution


simultaneously. Many modern CPUs use pipelining to increase efficiency. This allows
for better utilization of the CPU’s resources and faster execution of instructions.

9. Imagine you are building a custom computer for a friend. give three
considerations you would take into account when choosing the type and size of
memory for this computer.
i. A computer that has a bigger word size can transfer more bits into the
microprocessor at a time for processing and this improves the processing speed
of the computer.
ii. Larger RAM
iii. High Speed Cache memory: The purpose of using cache is to improve the
processing speed of computer.

10. You are a computer technician tasked with updating an older computer
with a slow CPU? How might you improve its performance without replacing the
entire CPU?
Ans: Computer performance can be improved by following steps:
i. Delete Old Programs
ii. Limit Programs that startup automatically
iii. Clean & delete old files
iv. Upgrade RAM
v. Clear browsing history & cookies
vi. Check for Viruses

11. Your school is planning to purchase new printers for the computer lab.
Give three advantages and disadvantages of impact and non-impact printers to
help them make a decision.
Impact Printer Non-Impact Printer
Definition Impact printer uses electro- Non-Impact printer prints
mechanical mechanism which without striking the paper.
causes the character shape to
strike against the paper and leave
an image of the character on the
paper.
Types Dot matrix printer is the most There are two types of non-
commonly used impact printer. Impact printers which are inkjet
and laser printers.
Advantages  The printing speed varies from  Non-Impact printer is faster
50 to 500 cps {characters per and has very high print
second). quality.
 Their printing is very cheap  Inkjet printers are used in all
sectors such as homes and
Prepared by: Ms. Kishwar Sultana 4
Unit 1 COMPUTER SYSTEMS
simple businesses.
 Laser printers are perfect for
large scale businesses.
Inkjet and laser printers.
Disadvantages  print quality is poor. They  Non-Impact Printers are
produce lot of noise while more expensive
 printing. These printers are still
in use for printing invoices, bank
statements, utility bills

.
12. Define protocol in the context of data communication.

Ans: A protocol is a set of rules that governs data communications. It represents an


agreement between the communicating devices. Without a protocol, two devices are
connected but may not communicating with each other.

13. Define simplex, half deplex and full duplex modes of communication with
one example each.

Simplex Half Duplex Full Duplex


In Simplex mode, the In half-duplex mode, the In full-duplex mode, the
Receiver communication communication takes communication takes place in
takes place in only one place in both the directions both the directions at the
direction. In this mode but not same time. In this mode, both
Communication is at the same time. The sender and receiver can send
unidirectional, i.e. the signal can only be sent or and receive the data
communication can only take received at one time. simultaneously.
place in one direction and it is
not possible for the receiver to
send data back.
For example, data being sent A common example of For example when two
to an electronic notice board this type of communication computers communicate with
found in train stations and is the use of walkie-talkies each other to send and receive
Airports. where each of the some data. It is the fastest bi-
persons communicating directional mode of
must indicate when they communication.
have finished speaking.
Radio and television Half-duplex transmission is One common example of
broadcast signals are also used also in transaction- full-duplex communication is
examples of simplex oriented systems, for two people are communicating
transmission. example communication by a telephone line, both can
between a computer and talk and listen at the same
credit card machine. time.

14. What are start and stop bits and where are they use in data transmission?

Prepared by: Ms. Kishwar Sultana 5


Unit 1 COMPUTER SYSTEMS
Ans: Start and Stop bits are used in asynchronous transmission. These bits provide
timing {synchronization) for the connection between the sender and the receiver. The
start bit tells the receiver that a character is coming and stop bit indicates that the
transmission of character has ended. This type of transmission is ideal for slow-speed
communication when gaps may occur during transmission. Example of asynchronous
transmission is keyboard data transmission.

15. How does a switch differ from a hub in a network?

Hub Switch
Hub is a connectivity device used in LAN. Switch is a networking device that
It connects multiple LAN devices on one performs the same job as the hub but are
network and makes them act together as a considered as intelligent than hub.
single network.
A hub is non-intelligent device and sends It gathers information about the date
output to all the devices on the network. packet and forwards it to only the node it
is intended for.
A hub has multiple input/output ports, in A data packet is a basic unit of
which an input in one port results in it communication over a computer network.
being an output in all the other ports, When data is transmitted, it is broken
except the port where it was input. down into packets which are reassembled
to the original form once they reach the
destination.

16. How does asynchronous transmission differ from synchronous


transmission, and in what situations are they typically used?

Asynchronous Transmission Synchronous Transmission


In asynchronous transmission, the time In synchronous transmission, the time interval
interval between two characters is between two characters is always the
variable and not fixed. same.
The computer devices can exchange In this method two communicating devices are
information at their own rate, slow or fast.
synchronized and they continue to send
Start and stop bit are used. characters in order to remain synchronized,
even if there is no data to be transmitted. A
special “idle” character is sent when there is
no data for transmission. It does not require
transmission of start and stop bits.
Asynchronous transmission is slower. Synchronous transmission is faster.
This type of transmission is ideal for The best example of synchronous
slow-speed communication when gaps transmission is the data transmission between
may occur during transmission. Example devices in network communications links.
of asynchronous transmission is
keyboard data transmission.

Prepared by: Ms. Kishwar Sultana 6


Unit 1 COMPUTER SYSTEMS
17. Explain the concept of peer-to-peer network and its limitations compared to
a client/server network.
1. In Peer-to-Peer networks, every computer is capable of playing the role of client,
server or both at the same time. In this network each computer on the network is
referred to as peer.
2. A peer computer on your desktop can share files and printers with other computers
and it can simultaneously access other shared resources on the network.
3. Peer-to-peer networks tend to be relatively smaller than client server network. Most
of these networks fall to range between two and ten computers. Large peer-to-peer
networks become difficult to manage, because so many network administrators
control sharing and maintaining shared resources.

18. Compare and contrast the star and ring network topologies.

Star Topology Ring Topology


Features  I tis suitable for both small and  Each node is directly connected
large networks. to the ring.
 Easy to install and wire.  Easy to install and wire.
 Easy to detect and remove  Data on the network flows in
faults. one direction.
 Failure of cable does not stop  Not costly to implement.
functioning of the entire network.
Limitations  Failure of the hub causes the  If the ring is broken at any point,
entire network to go down. the entire network stops
 Expensive topology to functioning.
implement.  Slower than other network
 Lengthy cable with a hub is topologies.
required.

19. Why is mesh topology considered the most reliable but also the most
expansive to implement?

Ans: In mesh topology, each node is directly connected to all the nodes.it is most
reliable network topology. Data can be routed around failed computers or busy ones.
But it is most expensive topology to implement because setup and maintenance is very
difficult in mesh topology.

20. What is the role of application layer in OSI model?

Ans: Application Layer provides services to end-user. It interacts with the operating
system or application software whenever the user wants to send files, read messages
or perform other network related activities.

Prepared by: Ms. Kishwar Sultana 7


Unit 1 COMPUTER SYSTEMS
LONG QUESTIONS:
Q1. Describe the evolution of computer generations from the first generation to the
fourth generation, highlighting the key technological developments and their impact on
computing. (Refer NBF book Page no. 9 to 11)

Q2. Discuss the importance of categorizing and understanding different types of


systems, both natural and artificial, and provide examples of each type. (Refer NBF
book Page no. 12 to 15)

Q3. Explain the characteristics and potential challenges associated with fifth generation
computers that aim to understand natural languages and possess thinking capabilities.
What are the implications of such advancements in computing on society? (Refer NBF
book Page no. 11 to 12)

Q4. Explain the fundamental components of network communication, and how do they
work together to facilitate data transfer? (Refer NBF book Page no. 39 to 40)

Q5. Describe the roles of common communication devices like hubs, switches, routers,
and gateways in data communication. How do they contribute to the functionality of a
network? (Refer NBF book Page no. 42 to 43)

Q6é. Discuss the advantages and limitations of different network topologies, including
bus, star, ring, and mesh. When should each topology be used in a network design?
(Refer NBF book Page no. 48 to 49)

Q7. What is the OSI model, and how does it help in understanding the process of data
communication? Explain each of the seven layers and their functions? (Refer NBF book
Page no. 51 to 52)

Q8. Explain the evolution of the Internet from its origins to the modern-day global
network. What major technological advancements contributed to its growth? (Refer NBF
book Page no. 52 to 53)

Q9. Discuss the advantages and disadvantages of the Internet, considering factors like
global connectivity, information access, privacy concerns, and digital addiction. (Refer
NBF book Page no. 54)

Q10. Explore common applications of the Internet and their impact on various aspects
of society, including communication, education, business, entertainment, and research.
(Refer NBF book Page no. 54)

Prepared by: Ms. Kishwar Sultana 8

You might also like