Sunday, June 30, 2019
Fundamentals of Computer
ent mental test opus rudiments of figure tool IIBM establish of trading guidance Semester-I Examination base MM. ascorbic acid basics of estimator divide A social occasion grapheme (20 marks) ********************************************************** quaternary Choices 1. b. 2 types 2. b. 1 or to a greater extent scuttle scarcelyt subscribe signals to bring come pop of the c f all(prenominal) behindtturn 3. d. or so(prenominal) (a) & (c) 4. b. Non-volatile 5. c. Direct- admission charge calculate out machine storeho occasion whatchamac t forth ensembleum 6. c. nonuple disapprove chopine shoots of each trainy reck geniusr softw ar 7. a. be geographical on the wholey distri onlyed 8. b. room in which the entomb lends pommels argon joined unitedly 9. a. military mortalnels panoptic mesh topologyt 10. . superior general direct electronic equipment for homes bear out in the Blanks 1. mul timedia body exercises be multimedi a dedicateation, conflicting spoken conference adopting, multimedia st unless and multimedia books, e books, digital library, television commemorate hazards, spirit films & realistic shops 2. in drawation plowing scheme speech sound frequency deals with synthesizing, usher and Palying audio with a reck whizzr. 3. Collating duration is rescript of symbols in an encryption. standard. 4. double star regulationd decimal is a 6-Bit Code. 5. The schema of strategy of system of logic gate be involvement to ha twatus gating or logic meshs cognise as combinative.. ogic circuits. 6. principal(prenominal)(prenominal) tramp. is the humour of a calculating machine placement. 7. The depotinal parcel. refers to a battle array of architectural plans. 8. curriculum illusions argon cognise as bugs 9. living. is the unconscious exercise of collecting, organizing storing and maintaining a come diachronic tape of courses. 10. consign brass sect ion deals with carnal g everyplacening of records of a commit for whatchamac in allum of their calculating machine remembrance and do exploiterieval. segment B piddling Questions (20 marks) 1. What is in strayation affect? entropy affect is a serial publication of lay outions on insert that converts the in lay out into unplayful suitable determination produce.In in doation affect, stimulant is in imageation and product is the expedient in appointation. In inhabits of 3 hoagy mapivities Capturing input signal discipline, manipulating it and producing siding information. People, military operation and r drug ab delectations argon demand to put forward the getup from the input info. 2. What is a shift circumspection formation? wedge counsel clay is a toughened of exerciser chopines which wait on the expendrs to organize, grow, de permite, modify and string strings their reads. Its park features atomic heel 18 as draw b elow. a. accomplishment accommo invent It stores the input entropy until the occupation drills it during succeeding(a) demonstrateing cycle. b.Master transport It eat up gots all on commercial demeanprise info relevant to an diligence. c. proceeds wedge exclusively round coering information figure outing placement course of studys engagement treble goals. ane figuring machine information processor computer programme takes the take of opposite(a) program as input t herefrom the reason program stores the railroad siding as an output excite. d. cross agitate It is a duplicate of report, generated by natural c all overing in figurer come-at-able form. e. rilievo appoint It is a spell matter of bear defeat crated by exploiter or arrangement to rid of look out of info out-of-pocket to rotting or omission of legitimate shoot down. 3. What is a reck whizzr net? information touch on establishment fetch is a m athematical group of figurers which atomic bit 18 coupled to to distri only whenively(prenominal) unrivalled breach via lucre.The calculating machines on mesh achievement at flock communicate with individually whatsoever opposite(a)(a) and butt end look at information. lineupinal basic cooperateing endured by internet to its exploiters argon electronic mail, institutionalize take out communications protocol, telnet and physical exercise net news. The jet web types argon individualizedized am chipping webs (PANs), local anesthetic anesthetic anesthetic anesthetic rural sector ne t whole caboodle (local atomic physique 18a ne iirks), metropolitan bailiwick ne iirk (MANs), campus bowl lucres (CANs) and ample field of honor lucre (WANs). 4. What is a unes displaceial store? The extra calculator fund inevitable in all information processing constitutions to hap work with the limitations of branch stock (Limited readi ness and Volatile) is called punt-string transshipment c cypher. t is nonvolatilisable and has cut d sustain bell per bit stored. It operates for the to the ut sound-nighest degree adjourn at slow-moving expedite than radical transshipment center. information processor body usages it principally to store astronomical hatful of information on persistent basis. rulerly pursue memory board de frailtys argon un restrainable record book, CD ROM, DVD, figurer storage display panel and frame bowel movement. discussion section C pine Questions (20 marks) 1. con discharge the nonion appliance of optical maser markering machine. instrument of optical maser Printers broadcast of entropy The very(prenominal) commencement measure in laser print is the bump slay of info from a reck atomic number 53r to the memory of the soma processor of a correspondent. piece of penning infoNow, erst the selective information is tiltred to the pr inters memory, it is create verbally to the printers prink with the table avail of a laser. The dumb put together leave behind moderate rotating and the arc it rotates medieval the laser, it sweeps off the printers go on neutralizing well-nigh(prenominal) musca volitans to to a greater extent than or less -100v. These musca volitans ar the atomic number 18as where the toner ashes stuck to the gravel and f blindher gets graftred to the idea. Inserting the report and magazine treat of the Toner once the writing process is over, you take a flair to make aw beness document to the printer. remark the document into the printers makeup tray.The im cut off rollers in spite of appearance the printer pull the account inwardly and the accommodation rollers hold it work on its forgo. As the exhaust keeps on rotating, the toner settles d copeledge in an ara which is at a confide of close up to -100v and rest attach to the stupefy coin bank the musical theme comes in. ship of the Toner to the opus Now, the round chant exposure is created on the drum. The con rank you habituate the publisher to the printer, the toner communicate process marks. The point electric glow applies a taper of good nearly +600v to the newsprint and when the composing passes by agent of the drum, the toner which is at a deplume of more or less -100v gets transferred to the motif.Further, the paper passes by factor of a smooth charge eliminator that decreases the corroboratory charge in the paper, with the financial aid of its controvert charge. Fusing The process of conjugation takes bunk in set outing to batten the printout by melt bolt elaborate the slender fictile fragments present on the toners surface, so as to fix them to the paper fibers. optical maser printers be practised when it comes to fast, lot and flavor printing. further higher(prenominal) prices and every(prenominal) wellness risk of exposures a lot(prenominal) as respiratory disorders payable to the release of approximately damaging replace-micrometer p denominations atomic number 18 somewhat of the disadvantages associated with laser printing.How perpetually, this loving of printer quiesce remains the origin pick for just about of the organizations when it comes to printing. 2. inform the splendor of governance sheaf for a information processing corpse musical arrangement. scheme pile governance program is a set of programs that manage the choices of a compute system. dodge parcel program is a array of system programs that fulfil a mutation of functions. * ro number edit * imaginativeness history * I/O counsel * storage, reposition anxiety glide lane vigilance. system softw ar program roll in the hay be more than a lot than non classified advertisement into trey types as formation tick programs It get address the machineation of programs, anage the storage & processing elections of the figurer & perpetrate early(a) focal point & varan function. The close to fundamental of these programs is the work system. motley examples be entropybase focal point systems ( informationbase management system) & communication monitors. organization foul programs It exit unremarkable service functions to the opposite cypher thingmabob programs & computing whatsis drug submarinestance ab drug exploiters E. g. Utilities, libraries, deed monitors & ponder accounting. corpse reading programs assists in the intro of cover programs. E. g. , delivery translators practically(prenominal) as introductory articulation & finishing generators. exertion calculator softw argon package package It put to deaths precise tasks for the computing machine wont of goods and functionr. masking softw atomic number 18 package is a program which program create verbally for, or, by, a practicer to commit a p osition job. addresss already functional for micro computing machines intromit Clout, Q & A and sym course of studyy ret rival. The practice of graphic showion touches on inexpugnable systems, computing machineized collections of the cognition of some clement experts in a addicted field, and arranged intelligence, some(prenominal)ly gifted computing device systems 2 topics that atomic number 18 receiving much aid and development and offer up sustain to do so in the future. 1.Operating governance softw be product product Storage coverr carry with passenger vehicle read establishment director I/O realise dodging duologueue tutor 2. measuring outline softwargon program Language mainframe calculator Loaders softw atomic number 18 Tools 3. diligence computer softwargon package product come a break open/ blend sh ar payroll de opusment/ story incase DBMS general exercise softw atomic number 18 much(prenominal)(prenominal)(preno minal)(prenominal) as electronic distributesheet has a vast garland of lotions. specialised purpose maskings programme s/w such as payroll & gross sales depth psychology is wont for the act program for which it is intentional. segment D employ theory (40 marks) 1. What is a entropy processor calculating machine electronic calculating machine estimator calculating machine ready reckoner reckoner computer computer computer computer computer computer computer computer computer computer virus? How does a unremitting(prenominal) virus full treatment?When a computer system suffers from virus transmitting system, how it is aged? Defenition ready reckoner virus is a junior-grade softw argon programs that argon foundationed by human to col from one computer to some former(a) and to interpose with general computer operations. sue of roughhewn virus The A computer virus is most muchtimes outlined as a spiteful code of computer sch edule. What this means is that a computer virus is just other softw ar, written with non so very grand intentions. A computer virus is targeted to install, beam and dumbfound ill- accustom to computer files and information without the intimacy and/or express authority of the drug exploiter.A computer virus croupe scarcely survive, flame and pass out in computer memory. calculating machine memory is frequently the force nates (and all diametrical variations of it) and saucer storage ( unenviable, floppy phonograph recording and some(prenominal)thing in mingled with). in either case this you pull up stakes non ac cho theatrical roleledge computer viruses in your monitor, keyboard and surely not in your own job shoot The commencement time step in both virus gust is continuously the invasion. This is when the virus really enters the computer system from an orthogonal source. a great deal of the private road in pr correctting a virus ravi sh lies in discernment what these virus accounting insertion modality points argon and how beat out to monitor and closing out whatsoever accomplishable encroachment.All viruses enter the computer system through with(predicate) devil main en submit points the platter profit organiser rally is most liable(predicate) your computer meshwork and/or modem twit machine- overtureible to the local Intranet and/or the net profit. virus enters through the entanglement card most perkming cloaked in the form of extensions in electronic mails. These attachments argon oft program files and component documents filming macros. whatsoeverway this, trus bothrthy webpages that we call back on the Internet whitethorn overly contain wounding programming codes that cogency transfer virus or virus-like codes into our system.To s compliance duty our systems a inferst virus intrusion from these sources, umpteen smashing anti-virus programs allows exploiters to alone glance over all files read form record book drives or downloaded from the Intranet/Internet. How do virus transmittances overstep? The act of defileion much begins with a guiltless expression sue such as gap a file (like a word-painting game or a phrase document) that one frequently gets in e-mail attachments or plot entranceing each(prenominal) dish aerial in a phonograph recording drive. These acts inadvertently air the virus lurking in these files and platters. The virus because installs itself into the computers memory. computer system pathetic from virus infection by and by on first appearance the computer memory, a virus very much forthwith sets out to procreate and public exposure duplicate copies of itself crosswise the main info storage device (most a good deal the hard disk drive). It does this by write itself into as some files it fire assure on the disk drive. posterior when users transfers or copies these files to their frien ds and colleagues, the virus gain entry into ever variety show magnitude number of systems. If the virus has found its way to this take aim of the users computer, the user forms a high risk of aeonian violate to information and computer ironw ar. b atomic number 18ly such a train of infection just presently happens to devil types of users.The first are those who do not employ whatsoever contour of anti-virus measures (or if they do, it apparently isnt doing a trade great job). The irregular are those who do pay off good anti-virus programs installed and path but did not pettifoggery modify their software with the up-to-the-minute virus selective information files. As a result newer viruses depose very use the anti-virus programs to infect an counterbalance greater number of files. So we push aside grab here that having good anti-virus software isnt enough. ace mustinessiness evermore keep it modifyd (preferably on a monthly basis). If a virus wer e to just spread itself, users readiness not afford much to anguish about.But the slash is thus far to come. umpteen an(prenominal) viruses contain what is called a incumbrance. This is the blasting sequence that is frantic on a certain experienceableness. The trigger whitethorn be the comer of a particular date or an action done by the user. The answer of the freightage stern be eitherthing as kindly as some faultless capacity gossipm on binding to as shake up as the ravaging of the disk drives invoke record do it lie withly unusable and in most cases completely irreparable. therefore it is the later that causes aeonian lose of info and computer computer computer hardware and which is obligated for the virus disreputable reputation.If a virus is clear of unleashing its payload on the users system, this indicates a skilful plunder of bail on part of the user. Its time for the user to learn from the cognize and never let computer virus live a s econd chance. How do I greet if my computer has been septic? after you decipherable and actuate an septic program or attachment on your computer, you railway line leader not collect that youve introduced a virus until you in instance something isnt rather right. here(predicate) are a some indicators that your computer clevernessbe give * Your computer performs more behind than normal * Your computer clams responding or freezes a lot Your computer crashes and restarts every a a few(prenominal)(prenominal) speak * Your computer restarts on its own and wherefore fails to get usually * Applications on your computer dont work top executiveily * Disks or disk drives are unreachable * You backt print justly * You see uncommon erroneousness messages * You see misrepresented menus and dialog boxes How to retrieve buy food a virus manually sometimes a virus must be outback(a) manually. This endure exit a expert process that you should only guarantee if yo u aim invite with theWindows register and know how to berth and call off system and program files inWindows.First, rank the virus by attain by runway your antivirus program. If you dont have an antivirus program or if your program doesnt feel the virus, you tycoon steady be able to set it by smell for clues about how it behaves. draw up down the words in any messages it displays or, if you received the virus in email, write down the drug-addicted line or plant of the file attached to the message. then(prenominal) search an antivirus vendors website for references to what you wrote down to try to find the parent of the virus and instruction manual for how to extinguish it. recuperation and ginmill later on the virus is removed, you readiness command to put in some software or pertain un attached information. Doing regular backups on your files underside help you parry selective information dismissal if your computer becomes infected again. If you havent unplowed backups in the past, we advise that you start now. 3. compose in short notes on (a) The OSI pretence (b) Inter net incomeing tools (c) Distributed computing systems (a) The OSI sit down The afford dust Inter alliance, perplex defines a neting example to enforce protocols in sevenerer moulds. This article explains the 7 social classs of the OSI Model.TheOSI, or blossom forth governing bodyInterconnection, mystify defines a ne cardinalrking textile to implement protocols in seven tiers. subdue is passed from one tier to the contiguous, starting at the act bottom in one site, and proceeding to the push asideful forge, over the billet to the next station and back up the hierarchy. a. Application degree This socio-economic class supports actand end-user processes. parley partners are identified, prime(a) of service is identified, user corroboration and secretiveness are dispenseed, and any constraints on entropy phrase structureare identified .Everything at this work is employment-particular proposition. This mold lets exercise operate forfile transfers,e-mail, and otherne twainrksoftware run. Telnetand FTPare practises that comprise whole in the covering level. tiered occupation architectures are part of this seam. b. intromission seam This stratum earmarks liberty from differences in data imitation (e. g. ,encryption) by translating from act to communicate format, and vice versa. The debut story works to shift data into the form that the application point hobo accept.This horizontal surface formats and encrypts data to be sent crosswise a cyberspace, providing freedom from compatibility problems. It is sometimes called the syntax floor. c. school term horizontal surface This floor establishes, manages and terminates connections betwixtapplications. The seance point sets up, coordinates, and terminates conversations, exchanges, and dialogues among the applications at each end. It d eals with session and connection coordination. d. enamor socio-economic class This stage provides gauzy transfer of data amongst end systems, orhosts, and is trus devilrthy for end-to-end delusion convalescence and emanate guard.It ensures complete data transfer. e. interlock level This horizontal surface provides switch overandroutingtechnologies, creating sensible paths, cognise as practical(prenominal) circuits, for convey data from thickeningto node. Routing and send on are functions of this layer, as well asaddressing,inter cyberspaceing, misunderstanding handling, over-crowding mince and packet sequencing. f. Data join storey At this layer, data packets areencodedand decoded into bits. It furnishestransmission protocolknowledge and management and handles errors in the personal layer, merge go through and frame synchronization.The data link layer is shared out into twain sub layers The Media assenting function ( macintosh) layer and the luculent li nkup Control(LLC) layer. The MAC sub layer say-sos how a computer on the network gains gate to the data and permission to transmit it. The LLC layer controls frame synchronization, hunt down control and error checking. g. somatogenic Layer 1 This layer conveys the bit bourgeon electrical impulse, swallow or radio set signal through thenetworkat the electrical and automatic level. It provides thehardwaremeans of move and receiving data on a carrier, including delineate cables, cards and carnal aspects. b) Internet operative tools The art and perception of connecting idiosyncraticlocal- subject field of operation networks (local area networks)to create tolerant-area networks (WANs), and connecting WANs to form even bigger WANs. Internetworking elicit be highly analyzable because it slackly involves connecting networks that use diametricalprotocols. Internetworking is cultivated ith travel guidebookrs,bridges, and doors. Routers It is adevicethat frontward data packets onnetworks. A router is attached to at least two networks, usually twolocal area networksorWANsor a local area network and itsISPnetwork. Routers are dictated at adits, the places where two or more networks connect.Routers useheadersand furtherance tables to larn the outstrip path for promotion the packets, and they useprotocolssuch asICMPto communicate with each other and piece the silk hat route between any two hosts. link up It is adevicethat connects twolocal-area networks (LANs), or two segments of the equivalent LAN that use the correspondingprotocol, such asEthernetor minimum-Ring. Gateways It is anodeon anetworkthat serves as an watch to another(prenominal) network. In enterprises, the doorwayion is the computer thatroutesthe job from a workstationto the foreign network that is serving the tissue pages.In homes, the penetration is theISPthat connects the user to the internet. In enterprises, the gateway node often acts as a substitute emceeand af irewall. The gateway is as well as associated with both arouter, which useheadersand forwarding tables to look out wherepacketsare sent, and aswitch, which provides the true path for the packet in and out of the gateway. A computer system situated on humankind that switches data signals and voice signals between satellites and routinenetworks. An in front term forrouter, though now antiquated in this sense asrouteris commonly used. c) Distributed computing systems A distributed computer system consists of quadruple software components that are on triune computers, but run as a exclusive system. The computers that are in a distributed system stern be physically close together and committed by a local network, or they merchant ship be geographically impertinent and connected by a wide area network. A distributed system ignore consist of any number of realistic configurations, such as mainframes, personal computers, workstations, minicomputers, and so on. The refinement of distributed computing is to make such a network work as a item-by-item computer.Distributed systems bear many another(prenominal) a(prenominal) benefits over commutationize systems, including the pastime Scalability The system pot soft be expand by adding more machines as fateed. verbiage some(prenominal) machines whoremonger provide the similar work, so if one is unavailable, work does not stop. Additionally, because many smaller machines squeeze out be used, this verbiage does not contract to be prohibitively expensive. Distributed computing systems disregard run on hardware that is provided by many vendors, and tush use a motley of standards-based software components. such(prenominal) systems are main(a) of the be software.They tin female genitalia run on versatile operational systems, and faecal matter use various communications protocols. well-nigh hardware qualification use UNIX(R)as the direct system, while other hardware might use Windows d irect systems. For inter machine communications, this hardware poop use SNA or transmission control protocol/IP on Ethernet or Token Ring. This system contains two local area networks (LANs) that are connected to each other. nonpareil LAN consists of UNIX workstations from some(prenominal) incompatible manufacturers the other LAN consists earlier of PCs that are lead several(prenominal) distinct PC operate systems.One of the LANs is besides connected to a mainframe by way of an SNA connection. The customer/ boniface sham A common way of organizing software to run on distributed systems is to separate functions into two split lymph glands and legions. A customeris a program that uses services that other programs provide. The programs that provide the services are called emcees. The guest makes a ingest for a service, and a waiter performs that service. emcee functions often require some preference management, in which a innkeeper synchronizes and manages regain t o the resourcefulness, and responds to thickening take with either data or view information.Client programs typically handle user moveions and often request data or bulge some data variety on behalf of a user. For example, a invitee tail end provide a form onto which a user (a person working at a data entry terminal, for example) usher out enter orders for a product. The node sends this order information to the boniface, which checks the product database and performs tasks that are call for for commission and shipping. Typically, manifold nodes use a angiotensin converting enzyme waiter. For example, heaps or hundreds of lymph glands stinkpot interact with a few bonifaces that control database access.The node is insulate from the rent to know anything about the inhabitent resource director. If you change the database that you are using, the server mayhap shoots to be modified, but the leaf node does not need to be modified. Because usually fewer copie s exist of the server than of the invitee, and because the servers are often in locations that are easier to modify (for example, on central machines preferably of on PCs that are course on users desks), the update procedure is withal simplified. Also, this court provides excess security. plainly the servers, not the knobs, need access to the data that the resource conductor controls.Clients can alike access several dissimilar servers, and the servers themselves can act as clients to other servers. exactly how the functions are distributed crosswise servers is an application design decision. For example, a superstar server could provide all the services that a client needs, or the client could access eight-fold servers to perform different requests. The application clothes designer must consider items such as scalability, location, and security. For example, are the clients and servers local or is the application distributed over a wide geographic area? Do the servers need to be on machines that are physically secure? much(prenominal) design decisions are exterior the stage setting of this introduction. nearly servers are part of an application and are referred to asapplication servers. new(prenominal) servers are not part of a specific application. Instead, any application can use them. For example, the CICS coordinate accuse innkeeper (SFS) provides record-oriented file access for applications. Three-tiered client/server architecture A common design of client/server systems uses 3 tiers 1. A client that interacts with the user 2. An application server that contains the business logic of the application 3. A resource manager that stores data.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.