Pages

Wednesday, 19 August 2020

Descritive Answer : IT TOOLS & BUSINESS SYSTEMS Jan-2018 | NIELIT O Level

 Q. 5 (A) : Write the comparison Between Dot Matrix Printers & Laser Printers with respect to Print Quality, Speed, Noise and cost parameters.

Answer

Print Quality

A typical laser printer has a resolution of 1,200 dots per inch, or dpi. It achieves this level of detail through the use of microscopic toner powder, high-performance electronics and precision optics. Many laser printers have color capability at the same high resolution. Some dot matrix printers achieve 240 dpi by making repeated passes over the same printed area, though documents produced this way take at least twice as long to print as those printed at normal quality. As a dot matrix printer's output color depends on the ribbon, virtually none offer choices beyond black and red.

Speed

A typical desktop laser printer turns out about four full-color pages per minute; for black-and-white text, this rises to 25 pages per minute. Dot matrix printers are typically rated at between 200 and 600 characters per second, or about 50 pages per minute in draft mode. Some high-output dot matrix printers achieve 1,100 characters per second, or 100 pages per minute, although the print quality is low-resolution text.

Noise

Dot matrix technology prints by striking an inked ribbon with a column of metal pins. At the speeds required for printing, the pins move very rapidly, producing a loud buzz. Sound-deadening equipment covers reduce the noise to tolerable levels for office use. Laser printers are quiet by comparison. The paper-feed mechanism produces light clicking sounds, but no sound deadening is necessary for a laser printer. 

Costs

Laser and dot matrix printers have roughly comparable initial purchase prices: as of October 2012, dot matrix models run between $250 to $600, and you can find low-end laser printers for under $100, though most range between $150 to $600. The per-page cost for dot matrix printers is lower, at .15 to .2 cents per page; laser printers cost from 1 to 9 cents per page. Dot matrix printers use inexpensive ribbons and have little other maintenance; however, the toner cartridges used for laser printing figure heavily into operating costs.


Q. 5 (B) : How to turn off and activate automatic spelling checking and automatic grammar checking in MS Office programs?

Answer :

You're typing along, you make a mistake, and you see the wavy red underline.


You fix the mistake, but you've lost your flow, your idea. To avoid that distraction, you can turn spell check off, then check spelling manually when you're done writing. Here's how.

 

Click File > Options > Proofing, clear the Check spelling as you type box, and click OK.


To turn spell check back on, repeat the process and select the Check spelling as you type box.

To check spelling manually, click Review > Spelling & Grammar.


 

But do remember to run spell check. Spelling and grammar errors can seriously undermine what you're trying to say, especially when your boss, your teacher, or that person in HR sees them.

Q. 5 (C ) : What are the Storage Hierarchy? Which is the fastest memory in a computer system? Which is faster, cache or register and why?

Answer 

In computer architecture, the memory hierarchy separates computer storage into a hierarchy based on response time. Since response time, complexity, and capacity are related, the levels may also be distinguished by their performance and controlling technologies.[1] Memory hierarchy affects performance in computer architectural design, algorithm predictions, and lower level programming constructs involving locality of reference.

Designing for high performance requires considering the restrictions of the memory hierarchy, i.e. the size and capabilities of each component. Each of the various components can be viewed as part of a hierarchy of memories (m1,m2,...,mn) in which each member mi is typically smaller and faster than the next highest member mi+1 of the hierarchy. To limit waiting by higher levels, a lower level will respond by filling a buffer and then signaling for activating the transfer.

There are four major storage levels.

  • Internal – Processor registers and cache.
  • Main – the system RAM and controller cards.
  • On-line mass storage – Secondary storage.
  • Off-line bulk storage – Tertiary and Off-line storage.

Back to question paper


Q. 6 (A) : Intellectual property (IP) refers to creations of the intellect for which a monopoly is assigned to designated owners by law. What are the ways to protect IP rights?

Answer

Intellectual property (IP)

Intellectual property (IP) is a term referring to creations of the intellect for which a monopoly is assigned to designated owners by law. Some common types of intellectual property rights (IPR) are copyright, patents, and industrial design rights; and the rights that protect trademarks, trade dress, and in some jurisdictions trade secrets: all these cover music, literature, and other artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Intellectual property rights are themselves a form of property, called intangible property.

How to Protect Intellectual Property by Different Ways

Copyright ©

Copyright applies to the protection of tangible and intangible creative works. You own the copyright the moment you create something if you did not register it. However, it will be easier to validate your ownership, especially in a legal dispute, if you take your time to register your work.

Trademark ™

Businesses use symbols, designs, logos, and catchphrases as part of their marketing strategy and identity. It's these images and words that help a company connect to its customers; thus, these need to be protected from possible commercial saboteurs who might use or copy the designs for their own economic gain.

Patent ®

If you've invented a unique product, the machine or equipment, or chemical composition, you can also protect this IP by filing for a patent with the USPTO online. Patents carry legal protection that excludes others from making and distributing your invention unless you have given them the license. There are different types of the patent process, and the conditions or requirements depend on the product or 

invention so you'll need to carefully identify which category the IP fits best.

Q. 6 (B) ) A database is an organized collection of data. What is relational database? What are the usefulness of primary key, secondary key and stored procedure in relational database?


Relational database

A relational database is a collection of information that organizes data points with defined relationships for easy access. In the relational database model, the data structures -- including data tables, indexes and views -- remain separate from the physical storage, allowing administrators to edit the physical data storage without affecting the logical data structure.

The data tables used in a relational database store information about the related objects. Each row holds a record with a unique identifier -- known as a key -- and each column contains the attributes of the data. Each record assigns a value to each feature, making relationships between data points easy to identify.

Primary Key – A primary is a column or set of columns in a table that uniquely identifies tuples (rows) in that table.

 

Super Key – A super key is a set of one of more columns (attributes) to uniquely identify rows in a table.

Candidate Key – A super key with no redundant attribute is known as candidate key

 

Alternate Key – Out of all candidate keys, only one gets selected as primary key, remaining keys are known as alternate or secondary keys.

 

Composite Key – A key that consists of more than one attribute to uniquely identify rows (also known as records & tuples) in a table is called composite key.

 

Foreign Key – Foreign keys are the columns of a table that points to the primary key of another table. They act as a cross-reference between tables.

 Q 7 (A) : Write step-by-step procedure of Linux booting.

Answer :

Step 1: Power Supply & SMPS

 

One of the main component of a computer is SMPS(Switching Mode Power Supply). The primary objective of this component is to provide the perfect required voltage level to the motherboard and other computer components. Computer internals work in DC, however the power supply we have at home and other places are AC. SMPS converts AC to DC and maintain the required voltage level so that the computer can work flawlessly.

Step 2: Bootstrapping

 

Something has to be programmed by default, so that the CPU knows where to search for instructions.

Step 3: The Role of BIOS in booting process

 

The word booting comes from another word called bootstrapping. The computer knows how to bring itself up, when you press the start button, because of the instructions that are fed to a program called as BIOS. BIOS stands for Basic Input Output System. The most important use of BIOS during the booting process is POST. POST stands for Power on Self Test. Its a series of tests conducted by the bios, which confirms the proper functioning of different hardware components attached to the computer.

Step 4: MBR and GRUB

 

Now as you don't have any bootable CD in your CD ROM Drive, the bios will look at the second device from the boot order settings. The second device is your Hard Disk.

Step 5 Loading The kernel Image

Similar to GRUB, kernel is also loaded in stages. A linux kernel is responsible for handling Process management, Memory Management, Users, Inter process communication etc. I must say kernel is never used by a user. What the kernel does is to maintain a good environment for programs to run. Yeah we use kernel thrugh different programs.

Q.7 (B) : In the Linux file structure files are grouped according to purpose. What are groups and their purpose of file structure of Linux system?

Answer : 




1. / – Root

Every single file and directory starts from the root directory.

Only root user has write privilege under this directory.

Please note that /root is root user’s home directory, which is not same as /.

2. /bin – User Binaries

Contains binary executables.

Common linux commands you need to use in single-user modes are located under this directory.

Commands used by all the users of the system are located here.

For example: ps, ls, ping, grep, cp.

3. /sbin – System Binaries

Just like /bin, /sbin also contains binary executables.

But, the linux commands located under this directory are used typically by system aministrator, for system maintenance purpose.

For example: iptables, reboot, fdisk, ifconfig, swapon

4. /etc – Configuration Files

Contains configuration files required by all programs.

This also contains startup and shutdown shell scripts used to start/stop individual programs.

For example: /etc/resolv.conf, /etc/logrotate.conf

5. /dev – Device Files

Contains device files.

These include terminal devices, usb, or any device attached to the system.

For example: /dev/tty1, /dev/usbmon0

6. /proc – Process Information

Contains information about system process.

This is a pseudo filesystem contains information about running process. For example: /proc/{pid} directory contains information about the process with that particular pid.

This is a virtual filesystem with text information about system resources. For example: /proc/uptime

7. /var – Variable Files

var stands for variable files.

Content of the files that are expected to grow can be found under this directory.

This includes — system log files (/var/log); packages and database files (/var/lib); emails (/var/mail); print queues (/var/spool); lock files (/var/lock); temp files needed across reboots (/var/tmp);

8. /tmp – Temporary Files

Directory that contains temporary files created by system and users.

Files under this directory are deleted when system is rebooted.

9. /usr – User Programs

Contains binaries, libraries, documentation, and source-code for second level programs.

/usr/bin contains binary files for user programs. If you can’t find a user binary under /bin, look under /usr/bin. For example: at, awk, cc, less, scp

/usr/sbin contains binary files for system administrators. If you can’t find a system binary under /sbin, look under /usr/sbin. For example: atd, cron, sshd, useradd, userdel

/usr/lib contains libraries for /usr/bin and /usr/sbin

/usr/local contains users programs that you install from source. For example, when you install apache from source, it goes under /usr/local/apache2

10. /home – Home Directories

Home directories for all users to store their personal files.

For example: /home/john, /home/nikita

11. /boot – Boot Loader Files

Contains boot loader related files.

Kernel initrd, vmlinux, grub files are located under /boot

For example: initrd.img-2.6.32-24-generic, vmlinuz-2.6.32-24-generic

12. /lib – System Libraries

Contains library files that supports the binaries located under /bin and /sbin

Library filenames are either ld* or lib*.so.*

For example: ld-2.11.1.so, libncurses.so.5.7

13. /opt – Optional add-on Applications

opt stands for optional.

Contains add-on applications from individual vendors.

add-on applications should be installed under either /opt/ or /opt/ sub-directory.

14. /mnt – Mount Directory

Temporary mount directory where sysadmins can mount filesystems.

15. /media – Removable Media Devices

Temporary mount directory for removable devices.

For examples, /media/cdrom for CD-ROM; /media/floppy for floppy drives; /media/cdrecorder for CD writer

16. /srv – Service Data

srv stands for service.

Contains server specific services related data.

For example, /srv/cvs contains CVS related data.

Q. 8 (A) : By taking suitable example, explain how decimal number is converted into binary number.

Answer :

Steps for Decimal to Binary Conversion

Step – 1 Divide the decimal number which is to be converted by two which is the base of the binary number.

Step – 2 The remainder which is obtained from step 1 is the least significant bit of the new binary number.

Step – 3 Divide the quotient which is obtained from the step 2 and the remainder obtained from this is the second least significant bit of the binary number.

Step – 4 Repeat the process until the quotient remains zero.

Step – 5 The last remainder obtained from the division is the most significant bit of the binary number. Hence arrange the number from most significant bit to the least significant bit (i.e., from bottom to top).

 

This method can easily be understood by considering an example which is explained below.

For example – Consider the conversion of the decimal number 25 into its equivalent binary.



Q. 8 (B) : How to manage disk partitions on windows using inbuilt disk management tool.

Answer :

The easiest way to access Windows 7 Disk Management:

Right click "Computer"→ select "Manage" → Get the new control panel, open "Storage" and choose "Disk Management" in submenu, and then you will get the following Disk Management:



Other three ways to get Windows Disk Management in Windows 7

 

Click "Start" → "Control Panel" → "System and Security" → "Administrative Tools", then double-click the "Computer Management" → "Disk Management"

Click "Start". Type "diskmgmt.msc" in the text box and then click "Enter"

Click "Start" → "Control Panel", search "partition" in the Control Panel, and then choose Create and Format Hard Disk Partitions.

c) Explain the following terms:
[I] : System Software

Answer :

system software

System software is a type of computer program that is designed to run a computer’s hardware and application programs. If we think of the computer system as a layered model, the system software is the interface between the hardware and user applications. The operating system (OS) is the best-known example of system software. The OS manages all the other programs in a computer.

Other examples of system software include:

  • The BIOS (basic input/output system) gets the computer system started after you turn it on and manages the data flow between the operating system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer.
  • The boot program loads the operating system into the computer's main memory or random access memory (RAM).
  • An assembler takes basic computer instructions and converts them into a pattern of bits that the computer's processor can use to perform its basic operations.
  • A device driver controls a particular type of device that is attached to your computer, such as a keyboard or a mouse. The driver program converts the more general input/output instructions of the operating system to messages that the device type can understand.


8. c) Explain the following terms:

[I] : Application Software

 

One of the first things to understand about the term “application software” is that it is exceedingly broad. 

Application software is commonly defined as any program or number of programs designed for end-users. That’s it, in a nutshell.

In that sense, any end user program can be called an “application.” Hence the age-old saying: “there's an app for that.”

People often use the term “application software” to talk about bundles or groups of individual software applications, using a different term, “application program,” to refer to individual applications.

That’s because the word “program” correlates to a discrete, countable single unit, while the word “software” is often used to refer to more than one individual program.



8. c) Explain the following terms:

[III] : Application Software

 What is a Compiler?

A compiler is a program that translates a source program written in some high-level programming language (such as Java) into machine code for some computer architecture (such as the Intel Pentium architecture). The generated machine code can be later executed many times against different data each time.

An interpreter reads an executable source program written in a high-level programming language as well as data for this program, and it runs the program against the data to produce some results. One example is the Unix shell interpreter, which runs operating system commands interactively.

Note that both interpreters and compilers (like any other program) are written in some high-level programming language (which may be different from the language they accept) and they are translated into machine code. For a example, a Java interpreter can be completely written in C, or even Java. The interpreter source program is machine independent since it does not generate machine code. (Note the difference between generate and translated into machine code.) An interpreter is generally slower than a compiler because it processes and interprets each statement in a program as many times as the number of the evaluations of this statement. For example, when a for-loop is interpreted, the statements inside the for-loop body will be analyzed and evaluated on every loop step. Some languages, such as Java and Lisp, come with both an interpreter and a compiler. Java source programs (Java classes with .java extension) are translated by the javac compiler into byte-code files (with .class extension). The Java interpreter, called the Java Virtual Machine (JVM), may actually interpret byte codes directly or may internally compile them to machine code and then execute that code (JIT: just-in-time compilation).

Q. 9 (A) : What is a path? What is an absolute and relative path in Linux environment?

Answer :

Path

Alternatively known as the pathname, the current path or path is the complete location or name of where a computer, file, device, or web page is located. Below are some examples of different types of computer-related paths.

Absolute Path

An absolute path is defined as the specifying the location of a file or directory from the root directory(/).

To write an absolute path-name:

Start at the root directory ( / ) and work down.

Write a slash ( / ) after every directory name (last one is optional)

For Example : $cat abc.sql

Relative Path

Relative path is defined as the path related to the present working directly(pwd). It starts at your current directory and never starts with a / .

To be more specific let’s take a look on the below figure in which if we are looking for photos then absolute path for it will be provided as /home/jono/photos but assuming that we are already present in jono directory then the relative path for the same can be written as simple photos.

UNIX offers a shortcut in the relative pathname– that uses either the current or parent directory as reference and specifies the path relative to it. A relative path-name uses one of these cryptic symbols:

.(a single dot) - this represents the current directory.

..(two dots) - this represents the parent directory.

 Q. 9 (A) : What is a path? What is an absolute and relative path in Linux environment?

Answer :

Path

PATH is an environment variable on Unix-like operating systems, DOS, and Microsoft Windows, specifying a set of directories where executable programs are located. In general, each executing process or user session has its own PATH setting.

Absolute path

An absolute path is defined as specifying the location of a file or directory from the root directory(/). In other words,we can say that an absolute path is a complete path from start of actual file system from / directory.

cat /home/kt/abc.sql

Relative path

Relative path is defined as the path related to the present working directly(pwd). It starts at your current directory and never starts with a / .

/home/jono/photos

Q. 9 (B) : What is an array formula in Excel? By taking suitable data, explain sum operation on array of
data.

Answer :

An array formula is a formula that can perform multiple calculations on one or more items in an array. You can think of an array as a row or column of values, or a combination of rows and columns of values. Array formulas can return either multiple results, or a single result.

Syntax :

={formula}


={SUM(LEN(A1:A5))}

=SUMPRODUCT(LEN(A1:A5))


Q. 9 (C) : How Information Technology is going to impact Indian Railways?

Answer :

IT projects which have been carried out and benefiting Indian Railways 

1.      Unreserved Ticketing System: UTS started with a launch of a pilot project in 2002 at Northern Railway and today implemented to handle almost 6000 locations and 90% of the total ticket sold every day. This has facilitated not only availability of ticket at all time replacing SPTM but also management of unreserved travel data.


Passenger Reservation System: Reserved travel by Indian Railways is facilitated by the Passenger Reservation System (PRS) making a commencement in the year 1988-89. PRS provides reservation services to nearly   2.2 million passengers a day on over 2500 trains running throughout the country. The PRS Application CONCERT (Countrywide Network of Computerized Enhanced Reservation and Ticketing) is the world’s largest online reservation application, prepared and maintained by CRIS. There are 44- Quota, 8-trains, 9 – classes, 162-concession and 127-coaches that make the system very complex and makes CRIS proud of managing the system so effectively.


Control Office Automation: The train operation over Indian Railways is monitored and checked through a Control office located in each Division. The charting of train run was done by color pen and a scale with manual calculation of time, distance and other parameters. With automation implemented, the controller only feeds the timings of passing a station and charting is done automatically. All performance parameters involving punctuality, average speed, GTKM, NTKM and PKM etc. are worked out immediately.


Freight Operation Information System: The Indian Railways carry more than 1.1 Billion metric tons of payload per year with nearly 5000 freight trains daily.  The Freight Operations Information System (FOIS) was the first project, which CRIS embarked upon. In fact the creation of CRIS is a by product of this effort in the mid eighties. FOIS began as an diligence to track and monitor the movement of wagons, locomotives and unit trains. Now it is a complete management module for freight trains handling the billing and revenue collections as well.


Integrated Coaching Management System: There are about 50000 passenger coaches forming a train with assigned composition. ICMS had made this daily exercise very simple with all performance parameters related to coaching operation worked out quickly facilitating improvement strategy.
National Train Enquiry System: NTES are integrated with ICMS to interface with passenger to communicate him passenger related relevant information such as current running, schedule timings, departure and arrival etc. This served the passenger knowing the running of train online and can avoid wastage of time at the station waiting for train running late.


Crew Management System: The crew of the train consists of a Loco Pilot, Assistant Loco Pilot and Guard. Crew works a trains from station A to B and then works back the train involving interchange from one division/zone to another. CMS has facilitated complete data management on system from signing on to off and all information on click of the mouse. This involved huge networking of 10-15 crew lobbies in each Zonal Railways.


Software Aided Training School: No Information technology can work effectively unless the user is trained to keep up and use the assets.


There are many other software introduced at zonal railways such as Material Management information system, PRIME and AFRESH etc. looking after the material, personal and finance of the railway.


               Download PDF

No comments:

Post a Comment