Sunday, 2 August 2020

Descriptive Answer : NIELIT IT Tools and Business Systems (July 2018)

Q. 5 (A) :  Write a short note on storage devices of computer.
Answer : 

Examples of Storage Device

Magnetic Storage Device – one of the most popular types of storage used.

  • ·         Floppy diskette – A normal 3 ½ inch disk can store 1.44 MB of data.
  • ·         Hard drive – An internal hard drive is the main storage device in a computer. An external hard drive is also known as removable hard drive.  It is used to store portable data and backups.
  • ·         Magnetic strip – Magnetic tape drive stores video and audio using magnetic tape, like tape and video tape recorders.
  • ·         Super disk – A disk drive and diskette that can hold 120 MB and 240 MB of data.
  • ·         Cassette tape – A magnetic storage device used for audio recording and playback.
  • ·         Zip diskette – Like a floppy diskette but more advanced.

Optical Storage Device – uses lasers and lights as its mode of saving and retrieving data.     


  • Blu-ray disc – A digital optical storage device which was intended to replace the DVD format.
  • CD-ROM disc – An optical storage device that is read-only or cannot be modified nor deleted.
  • CD-R and CD-RW disc – CD-R is a recordable disc that can be written to once, while CD-RW is a rewritable disc that can be written to multiple times.
  • DVD-R, DVD+R, DVD-RW and DVD+RW disc – DVD-R and DVD+R are recordable discs that can be written to once, while DVD-RW and DVD+RW are rewritable discs that can be written to multiple times. The difference between the + and – is in the formatting and compatibility.

Flash Memory Device – is now replacing magnetic storage device as it is economical, more functional and dependable.      


  • Memory card – An electronic flash memory device used to store digital information and commonly used in mobile electronic devices.
  • Memory stick – A memory card that is removable.
  • SSD – Solid State Drive – A flash memory device that uses integrated circuit assemblies to save data steadily.
  • USB flash drive, jump drive or thumb drive – A small, portable storage device connected through the USB port.
  • Online and Cloud – is now becoming widespread as people access data from different devices.
  • Cloud storage – Data is managed remotely and made available over a network. Basic features are free to use but upgraded version is paid monthly as a per consumption rate.
  • Network media – Audio, Video, Images or Text that are used on a computer network. A community of people create and use the content shared over the internet.

Paper Storage – method used by early computers for saving information.    

  • OMR – stands for Optical Mark Recognition – A process of capturing marked data of human from forms like surveys and tests. It is used to read questionnaires with multiple choices that are shaded.
  • · Punch card – A piece of hard paper used to contain digital information coming from the perforated holes. The presence or absence of holes in predetermined positions define the data.

Q. 5 (B) : Explain the concept of primary key and foreign key in RDBMS.
Answer : 

Primary Keys

In order for a table to qualify as a relational table, it must have a primary key.

The primary key consists of one or more columns whose data contained within are used to uniquely identify each row in the table.  You can think of them as an address.  If the rows in a table were mailboxes, then the primary key would be the listing of street addresses.

When a primary key is composed of multiple columns, the data from each column is used to determine whether a row is unique.

In order to be a primary key, several conditions must hold true.  First, as we mentioned, the columns must be unique.  To clarify, we’re referring to the data within the rows, not the column names themselves.  Also, no value in the columns can be blank or NULL.

When defining a table you specify the primary key. A table has just one primary key, and its definition is mandatory.

The primary key for each table is stored in an index.  The index is used to enforce the uniqueness requirement.  It also makes it easy for foreign key values to refer back to corresponding primary key values, as we will learn about in the following section.

Foreign Keys

A foreign key is a set of one or more columns in a table that refers to the primary key in another table.  There aren’t any special code, configurations, or table definitions you need to place to officially “designate” a foreign key.

In the diagram below look at the SalesOrderHeader table.  The column SalesOrderHeader.CurrencyRateID is a foreign key since it is related to the CurrencyRate.CurrencyRateID. This column CurrencyRate.CurrencyRateID is the primary key of the CurrencyRate table.

Q. 5 (C) : Represent (43EF)16 into binary and (1349)10 into binary.
Answer


(43EF)16=(100001111101111)2

(1339)10=(10100111011)2


Q. 6 (A) : What is the difference between function and formula in Excel? Provide example.Explain the working of the functions with example: count, max, if, sqrt in worksheet.
Answer


Formula 

A formula is statement written by the user to be calculated. Formulas can be as simple or as complex as the user wants. A formula can contain values, references to cells, defined names, and functions.

All formulas must start with the equals sign. =1+2+3

Function 

A function is a piece of code designed to calculate specific values and are used inside formulas. Functions to sum values, calculate a trigonometric cosine, and to calculate the current time are built into excel. Additional functions can be defined using Visual Basic.

Functions are typed alongside parenthesizes, where in the arguments if any are listed in between. To use functions in a formula, for example

=COS(3.14) will return the calculated cosine. =NOW() returns the current time. =SUM(1+2+3) *2 will multiply the sum by 2


COUNT

The COUNT function counts the number of cells that contain numbers, and counts numbers within the list of arguments. Use the COUNT function to get the number of entries in a number field that is in a range or array of numbers. For example, you can enter the following formula to count the numbers in the range A1:A20:

=COUNT(A1:A20)

Syntax

COUNT(value1, [value2], ...)

The COUNT function syntax has the following arguments (argument: A value that provides information to an action, an event, a method, a property, a function, or a procedure.):

 

value1  Required. The first item, cell reference, or range within which you want to count numbers.

value2, ...  Optional. Up to 255 additional items, cell references, or ranges within which you want to count numbers.

Example

=COUNT(A2:A8)

Counts the number of cells that contain numbers in cells A2 through A8.

3

=COUNT(A5:A8)

Counts the number of cells that contain numbers in cells A5 through A8.

2

=COUNT(A2:A8,2)

Counts the number of cells that contain numbers in cells A2 through A8, and the value 2

4

 

MAX

Returns the largest value in a set of values.

Syntax

MAX(number1, [number2], ...)

The MAX function syntax has the following arguments (argument: A value that provides information to an action, an event, a method, a property, a function, or a procedure.):

Number1, number2, ...  Number1 is required, subsequent numbers are optional. 1 to 255 numbers for which you want to find the maximum value.

 

1

2

3

4

5

6

7

8

9

A

B

Data

10

7

9

27

2

Formula

Description (Result)

=MAX(A2:A6)

Largest of the numbers above (27)

=MAX(A2:A6, 30)

Largest of the numbers above and 30 (30)

 

IF

Description

The IF function returns one value if a condition you specify evaluates to TRUE, and another value if that condition evaluates to FALSE. For example, the formula =IF(A1>10,"Over 10","10 or less") returns "Over 10" if A1 is greater than 10, and "10 or less" if A1 is less than or equal to 10.

A

B

C

Data

50

23

Formula

Description

Result

=IF(A2<=100,"Within budget","Over budget")

If the number in cell A2 is less than or equal to 100, the formula returns "Within budget." Otherwise, the function displays "Over budget."

Within budget

 

SQRT

Returns a positive square root.

Syntax

SQRT(number)

Example

A

B

Data

-16

Formula

Description (Result)

=SQRT(16)

Square root of 16 (4)

=SQRT(A2)

Square root of the number above. Because the number is negative, an error is returned (#NUM!)


 

Q. 6 (B) : Compare the Windows operating system with Linux operating system.

Answer

 
Sr. No.KeyLinuxWindows
1Open SourceLinux is Open Source and is free to use.Windows is not open source and is not free to use.
2Case sensitivityLinux file system is case sensitive.Windows file system is case insensitive.
3kernel typeLinux uses monolithic kernel.Windows uses micro kernel.
4EfficiencyLinux is more efficient in operations as compared to Windows.Windows is less efficient in operations.
5Path SeperatorLinux uses forward slash as path seperator between directorioes.Windows uses backward slash as a path seperator.
6SecurityLinux is highly secure as compared to Windows.Windows provides less security as compared to Linux.

 Q. 7 (A) Explain the following terms:
                [i] ) Auto correction in MS-Word              

Answer :  

AutoCorrect

AutoCorrect is a useful tool in Word for applying specific formatting or spelling for certain phrases often used in your text. Word pays attention to how you habitually type corrections and imitates your habits to make future typing easier on you. Learn how to take advantage of AutoCorrect and adjust the settings to your preferences with the following articles

In Word 2007, 2010, 2013, 2016, 2019 and 365, there is no AutoCorrect Options showed in the Ribbon. Without Classic Menu for Excel 2007/2010/2013/2016/2019 installed, it is not so intuitive to get this function, so you have to customize the Ribbon manually to get it

  • Click File Tab, and click “Options” item.
  • Click the Customize Ribbon in the Word Options window, and then, you will see Customize the Ribbon in the right pane. Choose Commands Not in the Ribbon by clicking the arrow, and then use the scroll bar to search for the AutoCorrect Options.
  • When finally find out the Option, click Add to add it into the Ribbon, and then click OK to finish the step.

Q.7 (A) [ii] : Disk defragmentation

Answer

Disk defragmentation

 

Defragmentation, also known as “defrag” or “defragging” is the process of reorganizing the data stored on the hard drive so that related pieces of data are put back together, all lined up in a continuous fashion.  You could say that defragmentation is like cleaning house for your server or PC, it picks up all of the pieces of data that are spread across your hard drive and puts them back together again.

 

Why is defragmentation important? Because every computer suffers from the constant growth of fragmentation and if you don’t “clean house”, your server or PC suffers.

 

How Fragmentation Occurs

 

Disk fragmentation occurs when a file is broken up into pieces to fit on the disk. Because files are constantly being written, deleted and resized, fragmentation is a natural occurrence. When a file is spread out over several locations, it takes longer to read and write. But the effects of fragmentation are far more widespread.

 

Effects of Fragmentation on Computer Performance

 

Many users blame computer performance problems on the operating system or simply think their computer is “old”, when disk fragmentation is most often the real culprit. The weakest link in computer performance is the disk. It is at least 100,000 times slower than RAM and over 2 million times slower than the CPU. In terms of computer performance, the disk is the primary bottleneck. File fragmentation directly affects the access and write speed of that disk, steadily corrupting computer performance to unviable levels. Because all computers suffer from fragmentation, this is a critical issue to resolve.

 

Problems caused by fragmentation include:

 

Performance:

 

·       Server and PC slows and performance degradations
·         Slow backup times – even failing to complete in their backup window
·         Unnecessary I/O activity on SQL servers or slow SQL queries
·         Slow boot-up times

System Reliability:

 

·         . Crashes and system hangs
·         File corruption and data loss
·         Boot up failures
·         Aborted backup due to lengthy backup times

Longevity, Power Usage, Virtualization, and SSD:

  • Premature Server or PC system failure
  • Wasted energy costs
  • Slower system performance and increased I/O overhead due to disk fragmentation compounded by server virtualization
  • Write performance degradations on SSDs due to free space fragmentation. Read about Write Amplification Factor (WAF) in Do SSDs degrade over time?

Performance Gains from Eliminating Fragmentation:

  •  Better application performance
  • Reduced timeouts and crashes
  • Shorter backups
  • Faster data transfer rates
  • Increased throughput
  • Reduced latency
  • Extended hardware lifecycle
  • Increased VM density         

SQL Server Performance

One of the biggest hardware bottlenecks of any SQL Server is disk I/O. And anything that DBAs can do to reduce SQL Server’s use of disk I/O will help boost its performance. Some of the most common things DBAs do to reduce disk I/O bottlenecks include:

Q. 7 (A) [iii] Cell reference

A cell reference refers to a cell or a range of cells on a worksheet and can be used in a formula so that Microsoft Office Excel can find the values or data that you want that formula to calculate.


In one or several formulas, you can use a cell reference to refer to:

  • Data from one or more contiguous cells on the worksheet.
  • Data contained in different areas of a worksheet.
  • Data on other worksheets in the same workbook

Q. 7 (A) [iv] Webcam

Answer :

A webcam is a camera that connects to a computer. It captures either still pictures or motion video, and with the aid of software, can transmit its video on the Internet in real-time. The picture is of a Logitech Webcam C270, an example of a webcam.

 

Today, most webcams are either embedded into the display with laptop computers or connected to the USB or FireWire port on the computer.

Q. 8 (A) : What is the need of Database Management System? Give three examples of popular Database Management System.

Answer

Proper database management systems help increase organizational accessibility to data, which in turn helps the end users share the data quickly and effectively across the organization.

A management system helps get quick solutions to database queries, thus making data access faster and more accurate. End-users like salespeople will have enhanced access to the data, enabling a faster sales cycle and a more sound decision making.

Consistent Data That Complies With Regulations

Data inconsistency occurs when different versions of the same data exist in different places in an organization. By using a proper management system and data quality management tools, you can be sure that an all-encompassing view of your data is shared throughout your organization. 

In addition, data management systems provide a better framework for the enforcement of data privacy and security policies. More effective management means better transparency and mitigated risk of breaching regulations

 Increase In Productivity Of The End User

Deploying a database management system, assuming positive end-user adoption, will always result in increased productivity for the users. Data management systems empower the end users to make quick and informed decisions that can contribute to the success or failure of an organization in the long run.

 Quick Decision Making

With better data management systems and procedures comes higher quality information.

 A database management system helps in providing a framework to facilitate data quality initiatives. In turn, higher quality information helps in making better, faster decisions in an organization.

Example

  • SQL Server by Microsoft
  • Oracle
  • MySQL


Q. 8 (B) : Compare Compiler, Interpreter and Assembler.

Answer



 Q. 8 (C ) : What is the difference between SPAM and VIRUS? How do you avoid each of the two in your system?

Answer

Virus

A virus is a program which can self-replicate and insert itself into other applications on your computer. They vary in the amount of damage they can do, from simply slowing your computer down so much it becomes almost unusable to the worst scenario, which is destroying data, disabling software and deleting files.

Spam

Spam is unsolicited or junk email that clogs up your email inbox. The best way to deal with spam is not to open it or reply to it. Use your spam filter and if you are using a email site such as Gmail, be sure to report the spam, as every piece reported is added to a database. Be aware of which websites you enter your email address on, make sure the site states they will not sell your details onto a third party. When you sign up to some legitimate sites they will try to opt you in to as many advertising emails as possible, simply un-tick all the opt-in boxes.

Here are eight ways you can avoid being the victim of a computer virus:

 

  1. Don't start your computer when there is a USB (thumb) drive or other type of removable media in a port or driver, especially if that media came from someone you don't know or trust 100%. Why? Because if there is a virus on that media, it will load onto your hard drive when you start up.
  2. Think twice before opening any attachment that comes in an email. Ask yourself, "Do I know the sender?" If the answer is "yes," are you sure their email address is correct? Were you expecting the attachment?
  3. If you receive an email from a stranger, either mark it as spam immediately or delete it without opening the email. If there's an attachment, do not open the attachment under any circumstances!
  4. If you receive an email with an attachment from someone you do know—but that you weren't expecting—inspect it closely. Check the spelling of the sender's name and examine the message carefully for spelling errors, which is often a tipoff that it's not genuine. (Even if a message you weren't expecting is error-free and seems legitimate, you may want to check with the sender to make sure he or she sent it.)
  5. Learn how to disable and enable macros, which are instructions saved in spreadsheet and word processing programs. A macro isn't bad, unless someone who wants to infect your computer puts one there.
  6. Make sure you have an antivirus program running on your computer, and keep it updated. It will identify and remove viruses in your memory, storage media and any incoming files. Most importantly, an antivirus program automatically scans files you download from the Internet, email attachments and open files.
  7. Think about installing a software or hardware firewall. A router is an example of a hardware firewall. Microsoft includes a personal software firewall in its operating system.
  8. Keep your guard up! There are websites that publish lists of the latest known virus alerts and virus hoaxes.

Q. 9 (A) : Discuss the various layouts of a slide of Power-Point presentation.

Answer 

Title Slide layout

The title slide layout is very important. It is a preview of the upcoming content for the rest of your presentation. Quality cover shows your audience how carefully your project has been handled. The most obvious benefit of using a title slide is informing listeners of what they will see and learn. Consider a title slide as a cover of a book or report. The cover mask gives the tone, the graphic chart and the artistic direction of the slideshow.

In a title slide layout the editable parts are usually the background image, the title, subtitle and some optional elements such as the date, or the name of the presenter.

Table of content Slide Layout

A table of contents will give your audience an overview of your Powerpoint presentation. It must be clear and precise in order to facilitate the general understanding of the subject.

The editable elements of a Summary slide layout are the titles of the different parts of your presentation as well as the number of the corresponding pages. Even though the table of contents is at the beginning of the slideshow, it will be the last one written.

Simple Text Content Slide layout

Simple Content slide layout includes the title of the slide, a subtitle, and a central text box. All these elements are editable.

Two Text Content Slide layout

The twocontent slide layout is a variant of the previous mask. The main advantage of dividing the text into two blocks is to make reading more smooth and enjoyable, especially if the text is long.

The editable elements are the title, a possible subtitle and the two text blocks.

 

Q. 9 (B) : Write notes on classification of memory.

Answer :


Main Memory– Main memory has the disadvantage of high-cost and low-capacity storage. But its advantage or facility is the high speed of data transfer. The control unit can be able to directly communicate with the main memory. Main memory can be generally classified into random-access memory (RAM) and read-only memory (ROM). It is a volatile memory. Due to the absence of power, the content of this memory will be lost.

Secondary Memory– Secondary memory is also frequently known as auxiliary memory. The control unit can’t directly communicate with the secondary memory. It is a non-volatile memory.

Primary Memory

Random Access − In a random access technique, it can be possible to access a memory location in any order. For example, one can read from the 4000locations in the order of 1500, 1210, 3060, 1640, 1352, and so on. Second, it takes a similar time to read from a memory location irrespective of its position. In a RAM, the access method is random, and its name, in fact, is derived based on the method of access.

Read Only Memory (ROM) – ROM consists of a number of memory locations wherein each location typically 8-bits are stored like a RAM. A ROM also uses random access method just like a RAM. The advantage of ROM is that it is non-volatile in nature. That means, though the power supply to theROM is switched off, the information in the ROM will not be lost. However, only reading operation is possible from a ROM location. Thus, in a computer, ROM is used for storing information which is not lost when power is switched off.

Secondary memory − Whenever there is a need to have the huge amount of information that is possible to store in the main memory. In this case, it is stored in the secondary memory. This type of memory is characterized with the help of virtues of large capacity for storage and low cost per bit of storage. But its drawback is its very low speed for access. The control unit is not capable to directly access secondary storage. Hard disk, floppy disk, and magnetic tape are good examples of secondary memory


Q. 9 (C ) : Explain the use of information technology in Railway reservation system.

Answer :

Passenger Reservation System (PRS)- Each day, over 10 lakh passengers are booked at 11,127 PRS counters at 3,107 locations and over 6 lakh passengers through Internet booking. Tickets worth about Rs 85 crore are sold daily.

Enhanced E-Ticketing / NGeT System for Indian Railways-Next Generation E-ticketing System was inaugurated by Hon'ble MR on 13th Aug, 2014.

Unreserved Ticketing System (UTS)-Approximately 2 crore passengers are booked daily in the UTS, which covers more than 90% of all unreserved tickets. Tickets worth about Rs 55 crore are sold daily at 10,763 counters at 5,798 locations. Tickets are also issued from more than 1,000 self-service Automatic Ticket Vending Machines (ATVMs) installed in stations with high volumes of ticket sales.

National Train Enquiry System (NTES) and Integrated Coaching Management System (ICMS)- These applications provide train running information and monitor the coaching stock and running of more than 8,500 passenger-carrying trains daily.

IR Portal with Retiring Room booking and Complaint Management System-Almost 39,000 retiring room bookings are being made each month at 75 stations through the Internet and station counters, earning over Rs 1 crore monthly.

Complaints in trains or at stations can also be logged and tracked through the portal. Retiring Room Application is now running at 82 stations.

SMS Gateway- More than 1.5 lakh SMSs are being sent daily to passengers to inform them about change in their reservation status.

Download PDF Note

Back to Question Paper


1 comment:

  1. A USB drive is a small,light,ultra-portable storage device compatible with Windows,Mac,and Linux.

    ReplyDelete