Q. 5 (A) : Write a short note on storage devices of computer.
Answer :
Examples of Storage Device
Magnetic Storage Device – one of the most popular types of storage used.
- · Floppy diskette – A normal 3 ½ inch disk can store 1.44 MB of data.
- · Hard drive – An internal hard drive is the main storage device in a computer. An external hard drive is also known as removable hard drive. It is used to store portable data and backups.
- · Magnetic strip – Magnetic tape drive stores video and audio using magnetic tape, like tape and video tape recorders.
- · Super disk – A disk drive and diskette that can hold 120 MB and 240 MB of data.
- · Cassette tape – A magnetic storage device used for audio recording and playback.
- · Zip diskette – Like a floppy diskette but more advanced.
Optical Storage Device – uses lasers and lights as its mode of saving and retrieving data.
- Blu-ray disc – A digital optical storage device which was intended to replace the DVD format.
- CD-ROM disc – An optical storage device that is read-only or cannot be modified nor deleted.
- CD-R and CD-RW disc – CD-R is a recordable disc that can be written to once, while CD-RW is a rewritable disc that can be written to multiple times.
- DVD-R, DVD+R, DVD-RW and DVD+RW disc – DVD-R and DVD+R are recordable discs that can be written to once, while DVD-RW and DVD+RW are rewritable discs that can be written to multiple times. The difference between the + and – is in the formatting and compatibility.
Flash Memory Device – is now replacing magnetic storage device as it is economical, more functional and dependable.
- Memory card – An electronic flash memory device used to store digital information and commonly used in mobile electronic devices.
- Memory stick – A memory card that is removable.
- SSD – Solid State Drive – A flash memory device that uses integrated circuit assemblies to save data steadily.
- USB flash drive, jump drive or thumb drive – A small, portable storage device connected through the USB port.
- Online and Cloud – is now becoming widespread as people access data from different devices.
- Cloud storage – Data is managed remotely and made available over a network. Basic features are free to use but upgraded version is paid monthly as a per consumption rate.
- Network media – Audio, Video, Images or Text that are used on a computer network. A community of people create and use the content shared over the internet.
Paper Storage – method used by early computers for saving information.
- OMR – stands for Optical Mark Recognition – A process of capturing marked data of human from forms like surveys and tests. It is used to read questionnaires with multiple choices that are shaded.
- · Punch card – A piece of hard paper used to contain digital information coming from the perforated holes. The presence or absence of holes in predetermined positions define the data.
Q. 5 (B) : Explain the concept of primary key and foreign key in RDBMS.
Answer :
Primary Keys
In order for a table to qualify as a relational table, it must
have a primary key.
The primary key consists of one or more columns whose data
contained within are used to uniquely identify each row in the table. You can think of them as an address. If the rows in a table were mailboxes, then
the primary key would be the listing of street addresses.
When a primary key is composed of multiple columns, the data
from each column is used to determine whether a row is unique.
In order to be a primary key, several conditions must hold
true. First, as we mentioned, the columns
must be unique. To clarify, we’re
referring to the data within the rows, not the column names themselves. Also, no value in the columns can be blank or
NULL.
When defining a table you specify the primary key. A table
has just one primary key, and its definition is mandatory.
The primary key for each table is stored in an index. The index is used to enforce the uniqueness
requirement. It also makes it easy for
foreign key values to refer back to corresponding primary key values, as we
will learn about in the following section.
Foreign Keys
A foreign key is a set of one or more columns in a table
that refers to the primary key in another table. There aren’t any special code,
configurations, or table definitions you need to place to officially “designate”
a foreign key.
In the diagram below look at the SalesOrderHeader
table. The column
SalesOrderHeader.CurrencyRateID is a foreign key since it is related to the
CurrencyRate.CurrencyRateID. This column CurrencyRate.CurrencyRateID is the
primary key of the CurrencyRate table.
Q. 5 (C) : Represent (43EF)16 into binary and (1349)10 into binary.
Answer
(43EF)16=(100001111101111)2
(1339)10=(10100111011)2
Q. 6 (A) : What is the difference between function and formula in Excel? Provide example.Explain the working of the functions with example: count, max, if, sqrt in worksheet.
Answer
Formula
All formulas must start with the equals sign. =1+2+3
Function
Functions are typed alongside parenthesizes, where in the arguments if any are listed in between. To use functions in a formula, for example
=COS(3.14) will return the calculated cosine. =NOW() returns the current time. =SUM(1+2+3) *2 will multiply the sum by 2
COUNT
The COUNT function counts the number of cells that contain
numbers, and counts numbers within the list of arguments. Use the COUNT
function to get the number of entries in a number field that is in a range or
array of numbers. For example, you can enter the following formula to count the
numbers in the range A1:A20:
=COUNT(A1:A20)
Syntax
COUNT(value1, [value2], ...)
The COUNT function syntax has the following arguments (argument:
A value that provides information to an action, an event, a method, a property,
a function, or a procedure.):
value1 Required. The
first item, cell reference, or range within which you want to count numbers.
value2, ... Optional.
Up to 255 additional items, cell references, or ranges within which you want to
count numbers.
Example
=COUNT(A2:A8) |
Counts the number of cells that contain numbers in cells
A2 through A8. |
3 |
=COUNT(A5:A8) |
Counts the number of cells that contain numbers in cells
A5 through A8. |
2 |
=COUNT(A2:A8,2) |
Counts the number of cells that contain numbers in cells
A2 through A8, and the value 2 |
4 |
MAX
Returns the largest value in a set of values.
Syntax
MAX(number1,
[number2], ...)
The MAX function syntax has the following arguments (argument: A value
that provides information to an action, an event, a method, a property, a
function, or a procedure.):
Number1, number2, ... Number1 is required,
subsequent numbers are optional. 1 to 255 numbers for which you want to find
the maximum value.
|
|
IF
Description
The IF function returns one value if a condition you
specify evaluates to TRUE, and another value if that condition evaluates to
FALSE. For example, the formula =IF(A1>10,"Over 10","10 or
less") returns "Over 10" if A1 is greater than 10, and
"10 or less" if A1 is less than or equal to 10.
A |
B |
C |
Data |
||
50 |
23 |
|
Formula |
Description |
Result |
=IF(A2<=100,"Within budget","Over
budget") |
If the number in cell A2 is less than or equal to 100, the
formula returns "Within budget." Otherwise, the function displays
"Over budget." |
Within budget |
SQRT
Returns a positive square root.
Syntax
SQRT(number)
Example
|
Q. 6 (B) : Compare the Windows operating system with Linux operating system.
Answer
Sr. No. | Key | Linux | Windows |
---|---|---|---|
1 | Open Source | Linux is Open Source and is free to use. | Windows is not open source and is not free to use. |
2 | Case sensitivity | Linux file system is case sensitive. | Windows file system is case insensitive. |
3 | kernel type | Linux uses monolithic kernel. | Windows uses micro kernel. |
4 | Efficiency | Linux is more efficient in operations as compared to Windows. | Windows is less efficient in operations. |
5 | Path Seperator | Linux uses forward slash as path seperator between directorioes. | Windows uses backward slash as a path seperator. |
6 | Security | Linux is highly secure as compared to Windows. | Windows provides less security as compared to Linux. |
Q. 7 (A) Explain the following terms:
[i] )
Auto correction in MS-Word
Answer :
AutoCorrect
AutoCorrect is a useful tool in Word for applying specific
formatting or spelling for certain phrases often used in your text. Word pays
attention to how you habitually type corrections and imitates your habits to
make future typing easier on you. Learn how to take advantage of AutoCorrect
and adjust the settings to your preferences with the following articles
In Word 2007, 2010, 2013, 2016, 2019 and 365, there is no
AutoCorrect Options showed in the Ribbon. Without Classic Menu for Excel
2007/2010/2013/2016/2019 installed, it is not so intuitive to get this
function, so you have to customize the Ribbon manually to get it
- Click File Tab, and click “Options” item.
- Click the Customize Ribbon in the Word Options window, and then, you will see Customize the Ribbon in the right pane. Choose Commands Not in the Ribbon by clicking the arrow, and then use the scroll bar to search for the AutoCorrect Options.
- When finally find out the Option, click Add to add it into the Ribbon, and then click OK to finish the step.
Q.7 (A) [ii] : Disk defragmentation
Answer
Disk defragmentation
Defragmentation, also known as “defrag” or “defragging” is
the process of reorganizing the data stored on the hard drive so that related
pieces of data are put back together, all lined up in a continuous
fashion. You could say that
defragmentation is like cleaning house for your server or PC, it picks up all
of the pieces of data that are spread across your hard drive and puts them back
together again.
Why is defragmentation important? Because every computer
suffers from the constant growth of fragmentation and if you don’t “clean
house”, your server or PC suffers.
How Fragmentation Occurs
Disk fragmentation occurs when a file is broken up into
pieces to fit on the disk. Because files are constantly being written, deleted
and resized, fragmentation is a natural occurrence. When a file is spread out
over several locations, it takes longer to read and write. But the effects of fragmentation
are far more widespread.
Effects of Fragmentation on Computer Performance
Many users blame computer performance problems on the
operating system or simply think their computer is “old”, when disk
fragmentation is most often the real culprit. The weakest link in computer
performance is the disk. It is at least 100,000 times slower than RAM and over
2 million times slower than the CPU. In terms of computer performance, the disk
is the primary bottleneck. File fragmentation directly affects the access and
write speed of that disk, steadily corrupting computer performance to unviable
levels. Because all computers suffer from fragmentation, this is a critical
issue to resolve.
Problems caused by fragmentation include:
Performance:
· Slow backup times – even failing to complete in their backup window
· Unnecessary I/O activity on SQL servers or slow SQL queries
· Slow boot-up times
System Reliability:
· . Crashes and system hangs
·
File corruption and data loss
·
Boot up failures
·
Aborted backup due to lengthy backup times
Longevity, Power Usage, Virtualization, and SSD:
- Premature Server or PC system failure
- Wasted energy costs
- Slower system performance and increased I/O overhead due to disk fragmentation compounded by server virtualization
- Write performance degradations on SSDs due to free space fragmentation. Read about Write Amplification Factor (WAF) in Do SSDs degrade over time?
Performance Gains from Eliminating Fragmentation:
- Reduced timeouts and crashes
- Shorter backups
- Faster data transfer rates
- Increased throughput
- Reduced latency
- Extended hardware lifecycle
- Increased VM density
SQL Server Performance
One of the biggest hardware bottlenecks of any SQL Server is
disk I/O. And anything that DBAs can do to reduce SQL Server’s use of disk I/O
will help boost its performance. Some of the most common things DBAs do to
reduce disk I/O bottlenecks include:
Q. 7 (A) [iii] Cell reference
A cell reference refers to a cell or a range of cells on a
worksheet and can be used in a formula so that Microsoft Office Excel can find
the values or data that you want that formula to calculate.
In one or several formulas, you can use a cell reference to
refer to:
- Data from one or more contiguous cells on the worksheet.
- Data contained in different areas of a worksheet.
- Data on other worksheets in the same workbook
Q. 7 (A) [iv] Webcam
Answer :
A webcam is a camera that connects to a computer. It
captures either still pictures or motion video, and with the aid of software,
can transmit its video on the Internet in real-time. The picture is of a
Logitech Webcam C270, an example of a webcam.
Today, most webcams are either embedded into the display
with laptop computers or connected to the USB or FireWire port on the computer.
Q. 8 (A) : What is the need of Database Management System? Give three examples of popular Database Management System.
Answer
Proper database management systems help increase
organizational accessibility to data, which in turn helps the end users share
the data quickly and effectively across the organization.
A management system helps get quick solutions to database
queries, thus making data access faster and more accurate. End-users like
salespeople will have enhanced access to the data, enabling a faster sales
cycle and a more sound decision making.
Consistent Data That Complies With Regulations
Data inconsistency occurs when different versions of the same data exist in different places in an organization. By using a proper management system and data quality management tools, you can be sure that an all-encompassing view of your data is shared throughout your organization.
In addition, data management systems provide a better
framework for the enforcement of data privacy and security policies. More
effective management means better transparency and mitigated risk of breaching
regulations
Increase In Productivity Of The End User
Deploying a database management system, assuming positive
end-user adoption, will always result in increased productivity for the users.
Data management systems empower the end users to make quick and informed
decisions that can contribute to the success or failure of an organization in
the long run.
Quick Decision Making
With better data management systems and procedures comes
higher quality information.
Example
- SQL Server by Microsoft
- Oracle
- MySQL
Q. 8 (B) : Compare Compiler, Interpreter and Assembler.
Answer
Q. 8 (C ) : What is the difference between SPAM and VIRUS?
How do you avoid each of the two in your system?
Answer
Virus
A virus is a program which can self-replicate and insert
itself into other applications on your computer. They vary in the amount of
damage they can do, from simply slowing your computer down so much it becomes
almost unusable to the worst scenario, which is destroying data, disabling
software and deleting files.
Spam
Spam is unsolicited or junk email that clogs up your email
inbox. The best way to deal with spam is not to open it or reply to it. Use
your spam filter and if you are using a email site such as Gmail, be sure to
report the spam, as every piece reported is added to a database. Be aware of
which websites you enter your email address on, make sure the site states they
will not sell your details onto a third party. When you sign up to some
legitimate sites they will try to opt you in to as many advertising emails as
possible, simply un-tick all the opt-in boxes.
Here are eight ways you can avoid being the victim of a computer virus:
- Don't start your computer when there is a USB (thumb) drive or other type of removable media in a port or driver, especially if that media came from someone you don't know or trust 100%. Why? Because if there is a virus on that media, it will load onto your hard drive when you start up.
- Think twice before opening any attachment that comes in an email. Ask yourself, "Do I know the sender?" If the answer is "yes," are you sure their email address is correct? Were you expecting the attachment?
- If you receive an email from a stranger, either mark it as spam immediately or delete it without opening the email. If there's an attachment, do not open the attachment under any circumstances!
- If you receive an email with an attachment from someone you do know—but that you weren't expecting—inspect it closely. Check the spelling of the sender's name and examine the message carefully for spelling errors, which is often a tipoff that it's not genuine. (Even if a message you weren't expecting is error-free and seems legitimate, you may want to check with the sender to make sure he or she sent it.)
- Learn how to disable and enable macros, which are instructions saved in spreadsheet and word processing programs. A macro isn't bad, unless someone who wants to infect your computer puts one there.
- Make sure you have an antivirus program running on your computer, and keep it updated. It will identify and remove viruses in your memory, storage media and any incoming files. Most importantly, an antivirus program automatically scans files you download from the Internet, email attachments and open files.
- Think about installing a software or hardware firewall. A router is an example of a hardware firewall. Microsoft includes a personal software firewall in its operating system.
- Keep your guard up! There are websites that publish lists of the latest known virus alerts and virus hoaxes.
Q. 9 (A) : Discuss the various layouts of a slide of Power-Point presentation.
Answer
Title Slide layout
The title slide layout is very
important. It is a preview of the upcoming content for the rest of your
presentation. Quality cover shows your audience how carefully your project has
been handled. The most obvious benefit of using a title slide is informing
listeners of what they will see and learn. Consider a title slide as a cover of
a book or report. The cover mask gives the tone, the graphic chart and the
artistic direction of the slideshow.
In a title slide layout the
editable parts are usually the background image, the title, subtitle and some
optional elements such as the date, or the name of the presenter.
Table of content Slide Layout
A table of contents will give your
audience an overview of your Powerpoint presentation. It must be clear and
precise in order to facilitate the general understanding of the subject.
The editable elements of a Summary
slide layout are the titles of the different parts of your presentation as well
as the number of the corresponding pages. Even though the table of contents is
at the beginning of the slideshow, it will be the last one written.
Simple Text Content Slide layout
Simple Content slide layout includes the title of the slide,
a subtitle, and a central text box. All these elements are editable.
Two Text Content Slide layout
The twocontent slide layout is a variant of the previous
mask. The main advantage of dividing the text into two blocks is to make
reading more smooth and enjoyable, especially if the text is long.
The editable elements are the title, a possible subtitle and
the two text blocks.
Q. 9 (B) : Write notes on classification of memory.
Answer :
Main Memory– Main memory has the disadvantage of
high-cost and low-capacity storage. But its advantage or facility is the high
speed of data transfer. The control unit can be able to directly communicate
with the main memory. Main memory can be generally classified into
random-access memory (RAM) and read-only memory (ROM). It is a volatile memory.
Due to the absence of power, the content of this memory will be lost.
Secondary Memory– Secondary memory is also frequently
known as auxiliary memory. The control unit can’t directly communicate with the
secondary memory. It is a non-volatile memory.
Primary Memory
Random Access − In a random access technique, it can
be possible to access a memory location in any order. For example, one can read
from the 4000locations in the order of 1500, 1210, 3060, 1640, 1352, and so on.
Second, it takes a similar time to read from a memory location irrespective of
its position. In a RAM, the access method is random, and its name, in fact, is
derived based on the method of access.
Read Only Memory (ROM) – ROM consists of a number of
memory locations wherein each location typically 8-bits are stored like a RAM.
A ROM also uses random access method just like a RAM. The advantage of ROM is
that it is non-volatile in nature. That means, though the power supply to theROM
is switched off, the information in the ROM will not be lost. However, only
reading operation is possible from a ROM location. Thus, in a computer, ROM is
used for storing information which is not lost when power is switched off.
Q. 9 (C ) : Explain the use of information technology in Railway reservation system.
Answer :
Passenger Reservation System (PRS)- Each day, over 10
lakh passengers are booked at 11,127 PRS counters at 3,107 locations and over 6
lakh passengers through Internet booking. Tickets worth about Rs 85 crore are
sold daily.
Enhanced E-Ticketing / NGeT System for Indian Railways-Next
Generation E-ticketing System was inaugurated by Hon'ble MR on 13th Aug, 2014.
Unreserved Ticketing System (UTS)-Approximately 2
crore passengers are booked daily in the UTS, which covers more than 90% of all
unreserved tickets. Tickets worth about Rs 55 crore are sold daily at 10,763
counters at 5,798 locations. Tickets are also issued from more than 1,000
self-service Automatic Ticket Vending Machines (ATVMs) installed in stations
with high volumes of ticket sales.
National Train Enquiry System (NTES) and Integrated
Coaching Management System (ICMS)- These applications provide train running
information and monitor the coaching stock and running of more than 8,500
passenger-carrying trains daily.
IR Portal with Retiring Room booking and Complaint
Management System-Almost 39,000 retiring room bookings are being made each
month at 75 stations through the Internet and station counters, earning over Rs
1 crore monthly.
Complaints in trains or at stations can also be logged and
tracked through the portal. Retiring Room Application is now running at 82
stations.
SMS Gateway- More than 1.5 lakh SMSs are being sent
daily to passengers to inform them about change in their reservation status.
A USB drive is a small,light,ultra-portable storage device compatible with Windows,Mac,and Linux.
ReplyDelete