You are on page 1of 78

Preface

ABOUT THE SUBJECT


Information Technology (IT) is defined as a term that describes any technology. It mainly deals with the designing,
development and study of information related to telecommunication computers. This study of Information
Technology helps us to produce, manipulate, process, store, retrieve, communicate disseminate information in
various forms to different persons and places. It is an application of computers and Internet. It enables a user to
store, retrieve, transmit and manipulate data or information. It defines set of tools, processes and methodologies
that helps in presenting information. Besides this, Information Technology also deals with topics like office
automation, multimedia and telecommunications systems.

Generally, the term Information Technology is used in performing enterprise operations as relevant to both
personal or entertainment technologies. The commercial as well as personal use of IT constitutes both computer
technology and telephony. Information Technology is used in various fields like,

v Science

v Engineering

v Business

v Commerce

v Education

v Governance

v Medicine

v Entertainment.

Since Information Technology has a tremendous impact on all aspects of life, it is essential to study the various
aspects of Information Technology. This study includes understanding the concept of Information Technology as
well as its scope, operating a computer, various input/output devices and types of memories, computer software,
operating system and various services of it.

ABOUT THE BOOK

This book provides theoretical and practical knowledge to the student about “Information Technologies-1” for B.Sc
III-Year V-Sem. It covers the complete syllabus of the subject prescribed by O.U. The content written in this book is
presented in a consistently readable and student friendly format so that student can prepare well for their both mid
and final exams. This book is beneficial because it gives complete up-to-date information about each topic and the
questions to be asked in the exams. This helps the student in getting a clear idea about the important questions in
each topic. This book has been prepared keeping student’s views, ideas and suggestions in mind. The main motivation
behind the publication of this book is to help the student to gain good marks and knowledge in the subject.
According to the examination pattern of B.Sc students, this book provides the following features:

v List of Definitions are provided before the units for easy reference.

v Every unit is structured into two main sections viz. Short Questions and Essay Questions with solutions
along with Learning Objectives and Introduction.

v Objective Type along with Very Short Answers are also given at the end of each unit.

v Three Model Papers are provided in order to help students to understand the paper pattern in the end examination.

v Important Questions are included to help the students to prepare for Internal and External Assessment.
The table below illustrates the complete idea about the subject, which will be helpful to plan and score good marks
in the end examinations.

Unit No. Unit Name Description


This unit includes topics like Introduction to Computers: What is a
Computer? Characteristics of Computers, Generations of Computers,

Introduction to Computers, Classification of Computers Basic Computer Organization,

Input and Output Devices, Applications of Computers. Input and Output Devices: Input Devices,
1.
Computer Memory and Output Devices, Soft Copy Devices, Hard Copy Devices, Computer
Processors Memory and Processors: Introduction, Memory Hierarchy, Processor
Registers, Cache Memory, Primary Memory, Secondary Storage
Devices, Harddisks, Optical Drives, USB Flash Drives, Memory Cards.
This unit includes topics like Computer Software: Introduction,
Classification of Computer Software, System Software, Applications
Software, Firmware, Middleware, Acquiring Computer Software.
Computer Software and
2. Operating Systems: Introduction, Evolution of OS, Process
Operating Systems
Management, Memory Management, File Management, Device
Management, Security Management, Command Interpreter, Windows,
Linux.

It is sincerely hoped that this book will be of great help to the students to excel in their examinations.

Suggestions for improvement of the text from our esteemed readers will be highly appreciated and incorporated in
our forthcoming editions.
Information Technologies-1
BSC III-Year V-Semester (OU)
[Generic Elect.-1]

Contents
Syllabus (As per (2016-17) Curriculum)
List of Important Deinitions L.1 – L.2
Unitwise Important Questions IQ.1 – IQ.4

MOdEL QUEStIOn PaPErS WIth SOLUtIOnS (as per OU Curriculum)


Model Paper-I MP.1 – MP.1
Model Paper-II MP.2 – MP.2
Model Paper-III MP.3 – MP.3

Unit-wise short & essay type QUestions with solUtions

Unit no. Unit name Question nos. page nos.


topic no. topic name

Unit - i introduction to Computers, input and Output


Devices, Computer Memory and Processors Q1 - Q26 1 - 28

Part-a ShOrt QUEStIOnS WIth SOLUtIOnS Q1 - Q12 2 - 4

Part-B ESSaY QUEStIOnS WIth SOLUtIOnS Q13 - Q26 5 - 24

1.1 Introduction to Computers 5

1.1.1 What is a Computer? Characteristics of Computers Q13 5

1.1.2 Generations of Computers, Classiication of


Computers Q14 - Q15 6

1.1.3 Basic Computer Organization, Applications of


Computers Q16 - Q17 9

1.2 Input and Output Devices: Input Devices, Output Devices,


Soft Copy Devices, Hard Copy Devices Q18 - Q19 12

1.3 Computer Memory and Processors 17

1.3.1 Introduction, Memory Hierarchy Q20 17

1.3.2 Processor Registers, Cache Memory, Primary


Memory Q21 - Q23 18

1.3.3 Secondary Storage Devices, Harddisks, Optical


Drives, USB Flash Drives, Memory Cards Q24 - Q26 22

IntErnaL aSSESSMEnt 25 - 28
Unit - ii Computer Software and Operating Systems Q1 - Q33 29 - 64

Part-a ShOrt QUEStIOnS WIth SOLUtIOnS Q1 - Q8 30 - 31

Part-B ESSaY QUEStIOnS WIth SOLUtIOnS Q9 - Q33 32 - 60

2.1 Computer Software 32

2.1.1 Introduction, Classiication of Computer Software Q9 32

2.1.2 System software, Applications Software Q10 - Q12 32

2.1.3 Firmware, Middleware Q13 38

2.1.4 Acquiring Computer Software Q14 39

2.2 Operating Systems 39

2.2.1 Introduction, Evolution of OS Q15 - Q16 39

2.2.2 Process Management Q17 - Q22 42

2.2.3 Memory Management Q23 - Q25 49

2.2.4 File Management Q26 - Q28 53

2.2.5 Device Management Q29 56

2.2.6 Security Management Q30 57

2.2.7 Command Interpreter Q31 58

2.2.8 Windows, Linux Q32 - Q33 59

IntErnaL aSSESSMEnt 61 - 64
Syllabus

UNIT-I

Introduction to Computers: What is a Computer? Characteristics of Computers, Generations of Computers,


Classification of Computers, Basic Computer Organization, Applications of Computers.

Input and Output Devices: Input Devices, Output Devices, Soft Copy Devices, Hard Copy Devices.

Computer Memory and Processors: Introduction, Memory Hierarchy, Processor Registers, Cache Memory,
Primary Memory, Secondary Storage Devices, Hard Disks, Optical Drives, USB Flash Drives, Memory
Cards.

UNIT-II

Computer Software: Introduction, Classification of Computer Software, System software, Applications


Software, Firmware, Middleware, Acquiring Computer Software.

Operating Systems: Introduction, Evolution of OS, Process Management, Memory Management, File
Management, Device Management, Security Management, Command Interpreter, Windows, Linux.
List of important Definitions Computer SCienCe paper-V

List of important Definitions

UNIT - I
1. Computer

A computer is an electronic device that can store, retrieve and execute the instructions provided by the user.

2. Input Devices

The devices that are used to insert the data into the computer are called the input devices.

3. Output Devices

Output devices are those devices using which, a computer can communicate with the users.

4. Memory

Memory is the internal storage of the computer that can store data or programs permanently or temporarily.

5. Cache Memory

Cache memory is a small memory present between CPU and main memory.

6. Primary Memory

Primary memory consists of data which is required to be manipulated immediately.

7. RAM

RAM stands for Random Access Memory. It stores programs and application data needed by the computer.

8. Secondary Storage Devices

Secondary memory (or) auxiliary memory is the slowest and cheapest form of memory. The data present inside these memo-
ries cannot be processed directly by the CPU.

9. PROM

Programmable Read only Memory (PROM) is a non volatile memory used as a storage for programs. They have less storage
capacity than ROM.

10. Ofline Storage Devices

Ofline storage devices refers to the devices where the data remain stored even if they are removed from the computer.

11. USB Flash Drives

USB lash drives are the storage devices that are removable, rewritable and small in size (less than 30g).

12. Memory Cards

Memory cards are very small storage devices that can store digital iles.

SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. L.1


Computer SCienCe paper-V information technoLogies-1

UNIT - II
1. Computer Software

Computer software is a collection of programs that directs the computer to perform some tasks.

2. System Software

A set of programs that is capable of controlling and supporting the computer system and its information processing activities
is called system software.

3. Application Software

It refers to a set of programs that written for a particular application.

4. Operating System

An operating system is a software or computer program that controls the computer hardware. It acts as an interface or an
intermediate between the user and hardware.

5. Process

Process is the fundamental concept of operating systems structure which is deined as a program under execution
Alternatively, it can also be deined as an active entity that can be assigned to a processor for execution.

6. Scheduling

Scheduling is deined as the activity of deciding, when processes will receive the resources they request.

7. Inter Process Communication (IPC)

Interprocess Communication(IPC) is deined as the communication between processes.

8. Deadlock

A situation in which a process waits indeinitely for requested resources and that resources are held by other process in a
waiting state. This situation results in disallowing the process to change its state which is called as deadlock situation.

9. File

A ile is grouping of similar records or related information together which is stored in secondary memory.

10. Command Interpreter

Command interpreter serves as a bridge between user and operating system. It operates upon the commands given by the
user and OS executes them by converting into system calls.

L.2 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


Model question papers with solutions Computer SCienCe paper-V

FACULTY OF SCIENCE
MODEL
PA P E R 1
B.Sc. (CBCS) V-Semester Examinations

Subject: COMPUTER SCIENCE


GE-1: Information Technologies-1
Paper-V
Time: 1½ Hours Max. Marks: 40

Note: Answer all questions from Part-A and Part-B.


Part - a ( 2 × 5 = 10 Marks )
(Short answer Type)
1. (a) List any four characteristics of a computer. (Unit-I, Page No. 2, Q2)
OR
(b) Write brief note on RAM and ROM. (Unit-I, Page No. 3, Q7)
2. (a) What is system software and application software? (Unit-II, Page No. 30, Q2)
OR
(b) Write about the attributes of ile. (Unit-II, Page No. 31, Q6)
Part - B ( 2 × 15 = 30 Marks )
(Essay answer Type)
3. (a) (i) What is computer? Explain in brief the signiicant characteristics of a
computer. (Unit-I, Page No. 5, Q13)
(ii) Explain the various applications of computers. (Unit-I, Page No. 11, Q17)
OR
(b) (i) Give a brief introduction on computer memory. Illustrate the hierarchy of
memory. (Unit-I, Page No. 17, Q20)
(ii) Explain in detail about primary memory. (Unit-I, Page No. 19, Q22)
4. (a) (i) Explain briely about the computer software. (Unit-II, Page No. 32, Q9)
(ii) Write short notes on,
(a) Firmware
(b) Middleware. (Unit-II, Page No. 38, Q13)
OR
(b) (i) Deine the following,
(a) Process
(b) Process control block
(c) Process state diagram. (Unit-II, Page No. 42, Q17)

(ii) Explain the paging concepts. (Unit-II, Page No. 51, Q24)
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. MP.1
Computer SCienCe paper-V inforMation technologies-1

FACULTY OF SCIENCE
MODEL
PA P E R 2
B.Sc. (CBCS) V-Semester Examinations

Subject: COMPUTER SCIENCE


GE-1: Information Technologies-1
Paper-V
Time: 1½ Hours Max. Marks: 40

Note: Answer all questions from Part-A and Part-B.

Part - a ( 2 × 5 = 10 Marks )

(Short answer Type)

1. (a) List the applications of computers. (Unit-I, Page No. 2, Q3)

OR

(b) What is USB lash drive? (Unit-I, Page No. 4, Q9)

2. (a) Deine irmware and middle ware. (Unit-II, Page No. 30, Q3)

OR

(b) Write in brief about Relative ile organization. (Unit-II, Page No. 31, Q7)

Part - B ( 2 × 15 = 30 Marks )

(Essay answer Type)

3. (a) (i) Discuss in brief about the various generations of computers. (Unit-I, Page No. 6, Q14)

(ii) Explain about input devices. (Unit-I, Page No. 12, Q18)

OR

(b) Write about the following,

(i) Processor registers

(ii) Cache memory. (Unit-I, Page No. 18, Q21)

4. (a) (i) Explain in detail about system software. (Unit-II, Page No. 32, Q10)

(ii) What is an operating system? Explain the functions of operating system. (Unit-II, Page No. 39, Q15)

OR

(b) (i) Explain FCFS, SJF, Priority, Round Robin scheduling algorithms. (Unit-II, Page No. 45, Q19)

(ii) Deine ile. Write about data hierarchy and ile attributes. (Unit-II, Page No. 53, Q26)

MP.2 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


Model question papers with solutions Computer SCienCe paper-V

FACULTY OF SCIENCE
MODEL
PA P E R 3
B.Sc. (CBCS) V-Semester Examinations

Subject: COMPUTER SCIENCE


GE-1: Information Technologies-1
Paper-V
Time: 1½ Hours Max. Marks: 40

Note: Answer all questions from Part-A and Part-B.

Part - a ( 2 × 5 = 10 Marks )

(Short answer Type)

1. (a) Write short notes on primary and secondary memory. (Unit-I, Page No. 3, Q6)

OR

(b) Deine memory cards. (Unit-I, Page No. 4, Q10)

2. (a) Deine OS. (Unit-II, Page No. 30, Q4)

OR

(b) What is command interpreter? (Unit-II, Page No. 31, Q8)

Part - B ( 2 × 15 = 30 Marks )

(Essay answer Type)

3. (a) (i) Explain the block diagram of a computer. (Unit-I, Page No. 9, Q16)
(ii) Explain about output devices. (Unit-I, Page No. 14, Q19)
OR
(b) Discuss in brief about,
(i) Secondary storage devices
(ii) Hard disk. (Unit-I, Page No. 22, Q24)
4. (a) (i) Explain in detail about application software. (Unit-II, Page No. 35, Q11)
(ii) Discuss in detail the different types of operating systems. (Unit-II, Page No. 41, Q16)
OR
(b) (i) Discuss about device management. (Unit-II, Page No. 56, Q29)
(ii) Explain about windows operating system. (Unit-II, Page No. 59, Q32)

SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. MP.3


UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V

IntroductIon to
UnIT computers, Input and
output devIces, computer

1 memory and processors

Learning Objectives

After studying this unit, a student will have thorough knowledge about the following key concepts,

 Deinition of Computer and its Characteristics.


 Various Generations and Classiication of Computers.
 Computer Organization and Applications of Computers.
 Various Input and Output devices.
 Memory Hierarchy, Processor Registers, Primary Memory and Secondary Memory.

intrOductiOn

The term “Computer” is derived from the word compute which means to calculate. It is an electronic device that
can store, retrieve and execute instructions provided by users.
A computer typically perform its processing by accepting input from users. This input is provided by using various
input devices like keyboard and mouse. The given input is then processed into some useful information by applying
some pre-deined rules and inally producing the output. This output is then displayed on screen using various
output devices like monitor and printer.
The components of computer system include input, output, CPU and memory. Memory can be either primary
memory (like RAM and ROM) and secondary memory (like magnetic tapes, magnetic disks and optical disks).

SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 1


Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1

part-a
short QuestIons wIth solutIons
Q1. Deine computer.
Answer :
A computer is an electronic device that can store, retrieve and execute the instructions provided by the user. The term
computer has been originated from the word ‘compute’ which means to calculate. It is a device used for collecting, storing and
processing the user information with higher speed and accuracy. A computer typically performs its work by accepting the input
from the user, processing the input into some useful information by applying some predeined rules (programs) and eventually
producing the output.
Q2. List any four characteristics of a computer.
Answer : Model Paper-I, Q1(a)

The four characteristics of a computer are,


1. Cost
The computers can be distinguished or classiied based upon their associated cost and size. A typical PC costs around 500
US dollars that its on a desktop table whereas supercomputers cost ranges from 500,000 to 350 million US dollars. The
mainframe computers are also expensive and may cost several hundred thousand dollars and can occupy a complete room.
2. Speed
A computer is capable of processing millions of instructions per second. Each computer has its own individual processing
speed. This speed depends upon the type of processor being used. A personal computer has a speed of 3 GHz or more
while, the super-computer offers the processing of information at a speed of 1.105 P lops. On the other hand the mainframe
computers have the speed of 18000 MIPS (Million Instructions Per Second).
3. Performance
Performance of the computer includes its processing speed, accuracy and reliability. It also varies depending on the type
of computer being used. The performance of a PC is low compared to a supercomputer which in turn offers signiicantly
high performance than a mainframe system. Super computers are considered to be the fastest because they are capable of
executing trillions of instructions per second.
4. Storage Capacity
Storage capacity of present generation computers is 500 GB. It allows storage of large volume of data (multimillion iles)
including documents, music, animation clips, movies etc., on a single location. Thus, eliminating an overhead involved
in maintaining thousands of paper iles.
Q3. List the applications of computers.
Answer : Model Paper-II, Q1(a)

The applications of computers are as follows,


1. Educational Institutions
Computers are incorporated in various educational institutions like schools and colleges for making easy learning. The computer
based learning allows students to gain immense knowledge about speciic topic. The development of computers helped the
students in preparing projects and essays, in performing mathematical calculations etc. Besides this, web based learning also
facilitates in obtaining information about various topics such as illing application forms, writing online exams etc.
2. Science
Computers are used by scientist in ield of research and development. It facilitates in analyzing of new theories, predicting
natural calamities like tsunami and earthquake.
3. Communication
Computers enable multiple users to transfer data from one system to another system. Internet is considered as a common
communication media that provides interactions among various users.
4. Business
Computers are used in various business organizations inorder to maintain records of their accounts, their inventory, proit
and loss. In addition to this, computers can also be used for conducting meeting among users residing on different remote
locations via web conferencing. Apart from this, computer and Internet also helps in carrying out online business.
2 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
Q4. Discuss various output devices.
Answer :
The following are the various output devices,
1. Display Screens
Display screens or monitors are output devices that not only display the programming instructions but also display
the data supplied as input. In addition to this, monitors also display the information generated after processing the
user-entered data.
2. Printers
Printers are hard copy output devices that print both information and data consisting of characters, symbols or
graphics on paper or some other durable surface like microilm. Some printers are text-speciic while others can
print graphics also.
3. Plotters
Plotters are used for creating vector images by using a pen which is attached to a computer. Because of this, plotters
are referred to as pen-based output device. Vector images are the images that are created by a series of straight lines.
Plotters are very much similar to printers except that they draw the lines using a pen.
Q5. Discuss in brief about cache memory.
Answer :
Cache memory is a small memory which is present between CPU and main memory. It has higher speeds compared to
other. Because of the high speeds that it offers, it is used mostly in the computers where the RAM is slower than the processor. The
memory area of this can be a part of main memory or a completely different storage device. This reduces the overall processing
time as the program is loaded less number of times into the processor from the storage. There are two main cache types. Memory
cache and disk cache. The memory cache is present in the high speed SRAM and it is very much useful as the same program, data
(or) instructions can be used again and again. Disk cache uses probability function to identify the page which can be accessed
after the current page. The page that is assumed to be accessed is retrieved and stored in disk cache in advance.
Q6. Write short notes on primary and secondary memory.
Answer : Model Paper-III, Q1(a)

Primary Memory
Primary memory consists of data which is required to be manipulated immediately. In addition to this, it also stores
the information about what is being processed by the processer. Primary memory is also known as main memory.
Types of primary memory are,
(i) RAM
(ii) ROM.
Secondary Memory
Secondary memory is the slowest and cheapest form of memory. It is not possible to process such memory directly
by the CPU.
Q7. Write brief note on RAM and ROM.
Answer : Model Paper-I, Q1(b)

RAM
RAM stands for Random Access Memory. It stores programs and application data needed by the computer. As soon
as the system starts, the operating system software and other data applications are loaded into the RAM. It is called random
access memory because the data and applications can be accessed in any sequence irrespective of the memory locations.
RAM is a volatile memory so it loses all its stored information when it gets disconnected from power.
ROM
Read only memories are those memories which do not loose their data, even though the power is turned off. Due
to this nature, these memories are also referred to as non-volatile memories. Hence by using ROMs, permanent storage of
data can be made.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 3
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
Q8. Write short notes on PROM. Q11. What are the advantages of lash drive?
Answer : Answer : Oct./Nov.-15, Q6

Programmable Read Only Memory (PROM) is a non The advantages of lash drives are as follows,
volatile memory used as a storage for programs. They have less
storage capacity than ROM. The data programmed on PROM is 1. Flash drives work well even after they are affected by
permanent and it cannot be altered or erased. These memories scratches and dust from the surroundings unlike CD’s
are empty when purchased. Data are programmed or written by and loppy disks.
special PROM programmers.
2. They are helpful in transferring the data from one place
PROM memory is a digital memory used in digital to another place.
electronic devices for storing data permanently. The various low
3. They are found to be compatible with any kind of
level programs like irmware uses PROM. PROMs are mostly
used in, personal computer.

1. Microcontroller 4. They are capable of storing the data that is more when
compared to a DVD.
2. Video games
5. They consume very less amount of power and are also
3. Radio Frequency Identiication (RFIO) tags
portable.
4. High-Deinition Multimedia Interfaces (HDMI)
Q12. Write short notes on ofline storage devices.
5. Implantable medical devices etc.
Answer :
Q9. What is USB lash drive?
Ofline storage devices refers to the devices where the
Answer : Model Paper-II, Q1(b)
data remain stored even if they are removed from the computer.
USB flash drives are the storage devices that are They are used for transferring data from one computer to another
removable, rewritable and small in size (less than 30g). It when there is no connectivity among the computers. They are
contains a small printed circuit board that contains circuit also used to take backups of critical data to avoid loss of data
elements and USB connector. They are involuted and protected
in case of system failure, natural disasters or security attacks.
within a plastic, metal or rubberized case. They extract power
They offer security as they are kept disconnected from the
from computers through external USB connection.
computers. Examples of ofline storage devices are optical disks
Uses of USB lash drive are as follows, (CD-ROM, DVD-R), loppy disks, lash drives, external hard
(a) Booting Operating System disks etc.
(b) Personal Data Transport
(c) System Administration
(d) Backup
(e) Music Storage and Marketing.
Q10. Deine memory cards.
Answer : Model Paper-III, Q1(b)

Memory cards are very small storage devices that can


store digital iles. They are protable i.e., they can be moved,
inserted into a computer, mobile phone and other gadgets. They
can store text documents, audio iles, video iles, pictures etc.
They make use of lash memory so that users can add, delete
copy the iles multiple times. They are less expensive and
small in size. Various types of memory cards are compact lash
memory, miniSD card, microSD card, memory stick, secure
dig memory card (SD) and multimedia card (MMC). They are
all time powered and nonvolatile. They are not consistent in
capacity. They vary in storage capacity by providing options
to the users. They are portable and lightweight but expensive.
4 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
part-b
essay QuestIons wIth solutIons
1.1 IntroductIon to computers

1.1.1 what is a computer? characteristics of computers


Q13. What is computer? Explain in brief the signiicant characteristics of a computer.
Answer : Model Paper-I, Q3(a)(i)
Computer
A computer is an electronic device that can store, retrieve and execute the instructions provided by the user. The term
computer has been originated from the word ‘compute’ which means to calculate. It is a device used for collecting, storing and
processing the user information with higher speed and accuracy. A computer typically performs its work by accepting the input
from the user, processing the input into some useful information by applying some predeined rules (programs) to it and eventually
producing the output.
Characteristics of a Computer
Following are the key characteristics/ features of a computer are,
1. Cost
The computers can be distinguished or classiied based upon their associated cost and size. A typical PC costs around 500
US dollars that its on a desktop table. Whereas supercomputers cost ranges from 500,000 to 350 million US dollars. The
mainframe computers are also expensive and may cost several hundred thousand dollars and can occupy a complete room.
2. Speed
A computer is capable of processing millions of instructions per second. Each computer has its own individual processing
speed. This speed depends upon the type of processor being used. A personal computer has a speed of 3 GHz or more while,
the super-computer offers the processing of information at a speed of 1.105 P lops. On the other hand, the mainframe
computers have the speed of 18000 MIPS (Million Instructions Per Second).
3. Performance
Performance of the computer includes its processing speed, accuracy and reliability. It varies depending on the type of
computer being used. The performance of a PC is low compared to a supercomputer which in turn offers signiicantly
high performance than a mainframe system. Super computers are considered to be the fastest because they are capable of
executing trillions of instructions per second.
4. Reliability
Reliability is one of the signiicant characteristic of a computer system. The performance of the system highly depends on
the reliability of the system in producing the results. A computer system of the present generation is much reliable in terms
of storage and processing. The results obtained by using a computer are much accurate and faster than the results obtained
manually.
5. Storage Capacity
Storage capacity of present generation computers ranges in Tera Bytes (TBs). It allows storage of large volume of data
(multimillion iles) including documents, music, animation clips, movies etc., on a single location. Thus, eliminating an
overhead involved in maintaining thousands of paper iles.
6. Versatility
A computer system is capable of handling multiple tasks simultaneously.
Example
A computer enables a user to run multiple operations like playing music and performing calculations concurrently.
Thus, due to this reason a computer is said to be versatile in nature.
7. Diligence
A computer can repeatedly perform large and complex calculations any number of times with constant speed and accuracy.
It does not suffer from human traits like fatigue, tiredness etc.
8. Accuracy
A computer system is capable of providing accurate results of computations. In other words, they ensure high degree of
accuracy in every task performed by them.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 5
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1

1.1.2 Generations of Computers, Classiication of Computers


Q14. Discuss in brief about the various generations of computers.
Answer : Model Paper-II, Q3(a)(i)

Computers are electronic devices which are developed to assist the users in performing dificult calculations as well as
other activities. Development of powerful computing devices, led to the invention of several other devices. However, it took
many years to develop the advanced computer.
Generations of Computers
The generation of computers refers to the stages of innovation or development done in the ield of computers. This in-
novation resulted in much smaller, less expensive, more powerful and reliable devices. There are ive generations of computers
depending on the type of processors installed in the machine.
1. First Generation (1940-1956)
v First generation computers were based on vacuum tubes technology.
v These machines were larger in size and used more space for installation.
v They used to generate a lot of heat as thousands of vacuum tubes were used. Because of this, air conditioning was
essential for these machines.
v The computational speed was fast i.e., in milliseconds.
v These machines were non-portable.
v They were not reliable and were highly susceptible to hardware failures.
v These machines were very expensive and consumed large amount of electricity.
v These machines lacked in versatility and speed.
v Every component of this machine needed to be assembled manually. Therefore commercial production of the irst
generation machines was very poor.
v They were machine-language dependent and hence it was very dificult to program and use them.
Examples
ENIAC, EDVAC and UNIVAC.
2. Second Generation (1956-1963)
v Second generation computers were based on transistors technology.
v These machines were comparatively smaller in size than the irst generation machines.
v They generated less amount of heat, but still air conditioning was required.
v The computational speed was very high (i.e., from milliseconds to microseconds).
v These machines were portable.
v They were reliable and were not susceptible to the hardware failures.
v Every individual component needed to be assembled manually to form a functional unit.
v They were assembly language dependent.
Examples
PDP-8, IBM-1401 and IBM-7090.
3. Third Generation (1964- Early 1970’s)
v Third Generation computers were based on Integrated Circuit (IC) technology.
v The speed of computation was very fast (i.e., from microseconds to nanoseconds)
v These machines were smaller in size when compared to other machines.
v These machines were portable as well as reliable.
v They used to generate very less amount of heat. Air conditioning was not mandatory but required in some cases.
6 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
v The cost of maintenance was very less, since these machines were not prone to hardware failure.
v They were high-level language dependent.
v They did not require manual assembling of individual components.
v The commercial production became easy and less expensive.
Examples
NCR 395 and B6500.
4. Fourth Generation (Early 1970’s - 1989)
v Fourth generation computers were based on microprocessor’s technology.
v These machines were very small in size when compared to other machines.
v These machines were very much cheaper.
v They were portable and reliable.
v They did not generate much heat, therefore air conditioning was not required.
v Maintenance cost was very less, since were not prone to any sort of hardware failure.
v The cost of production was very low.
v These machines were easier to use because of GUI and pointing devices.
v Interconnection among different computers resulted in better communication and resource sharing.
Examples
Apple II, Altair 8800 and CRAV-1.
5. Fifth Generation (Present and Beyond)
The following are the characteristics found in the ifth generation computers.
(i) Mega Chips
These computers use Super Large Scale Integrated (SLSI) chips. The usage of these chips results in the generation of
microprocessors. These microprocessors consist of hundreds and thousands of electronic components mounted on a single
chip. Fifth generation computers require large amount of storage space for storing information as well as instructions. The
usage of Mega Chip allows the memory capacity of computer to be approximately equal to the capacity of human mind.
(ii) Parallel Processing
In contrast to serial processing, parallel processing is used to execute several instructions simultaneously on a single
machine.
(iii) Artiicial Intelligence
Artiicial Intelligence (AI) refers to sequence of interrelated technologies that generally simulate and reproduce human
behavior which include thinking, speaking and reasoning. The different technologies present in artiicial intelligence are,
Expert System, Natural language processing, Speech and Voice recognition and Robotics.
Q15. Classify the computers on the basis of size and performance.
Answer :
A computer is a fast electronic device, which takes the input in the form of instructions, processes it and inally produces
the output. A computer can be classiied into various types depending on various parameters like speed, capacity, data transfer rate,
process etc. Based on the size parameter, a computer is classiied into the following four types,
1. Super computers
2. Mainframe computers
3. Micro computers
4. Mini computers.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 7
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
Types of computer
(based on size)

Super Mainframe Micro Mini


computers computers computers computer

1. Super Computers
Super computers are those computers which are designed with high speed processing capabilities and huge storage ca-
pacities. They are the irst largest general purpose computers that are capable of performing several billions of calculations per
second. The processing speed of these computers is very fast as they comprise of multiple CPU’s that are operated concurrently.
These computers generally occupy large rooms and are operated by many professional engineers.
Super computers are mainly used in,
(i) Weather forecasting
(ii) Nuclear energy research
(iii) Designing of machines, weapons, supersonic aircrafts etc.
Example
Some examples of super computers are CRAY, PARAM and PACE.
2. Mainframe Computers
Mainframe computers are second largest, ultra high performance computers. These computers are designed to fulill large
scale needs of business organization. These systems are capable of storing and processing huge amount of data. A mainframe
computer consists of following components.
(a) High speed computer processor
(b) Peripheral devices to support massive volume of data processing
(c) High performance online transaction processing systems
(d) Extensive data storage and retrieval system equipments.
Mainframes computers are used in large business organizations as well as in scientiic areas.
Example
Some examples of mainframe computers include IBMs ES000, VAX 8000 and CDC 6600.
3. Micro Computers
Micro computers are smaller in size, inexpensive general purpose digital computers. These computers consist of compo-
nents like microprocessors, storage unit, input channel and output channel mounted on a single chip. These computers can be
used by individual users in homes, educational institutions, small business organizations etc.
Example
Some examples of micro computers include IBM-PC pentium 100, Apple Macintosh, desktop, Laptops, hand-held com-
puters etc.
(a) Desktop Computers/Personal Computers
Desktop computers are used by individual users from a single location. These types of computers are affordable. These
computers are used in small business organizations, educational institutions, homes, railway department hospitals etc.
Personal computers consist of following components.
(i) Monitors
(ii) Keyboard
(iii) Mouse
(iv) Internal hard disk
(v) Other peripheral devices.
(b) Laptop
Laptops are smaller in size and portable computers. These computers are basically preferred while travelling. These
computers consists of rechargeable battery and donot require any external power supply.
8 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
(c) Hand-held Computers or PDA
Hand-held computers are very small in size and can be stored in a pocket. These computers use pen or electronic system
as an input device rather than keyboard. Handheld computers use small cards for storing data as well as program iles.
They styles bigger in size than a conventional calculator.
4. Mini Computers
Mini computers are a type of digital computers that are capable of storing more data than micro computers. These computers
are mainly designed with dual processor. The main purpose of these computers is to carry out auxiliary operations by connecting
to mainframes with speed and eficiency. They are considered as centralized store house or network server. Mini computers are
used in,
(i) Industries
(ii) Educational institutions
(iii) Research organizations
(iv) Small or medium business organizations.
Example
Some examples of mini computers are PDP11, IBM (8000 services) and VAX 7500.

1.1.3 basic computer organization, applications of computers


Q16. Explain the block diagram of a computer.
Answer : Model Paper-III, Q3(a)(i)

The following igure depicts the block diagram of a computer,


Central processing unit

Control
unit

Arithemetic
Input Output
logic unit
unit unit

Memory Data low


unit
Instruction
low

Figure: Block diagram of computer


A computer system comprises of following essential components.
1. Input unit
2. Central Processing Unit (CPU)
3. Output unit.
1. Input Unit
Input unit is responsible for inserting digitally coded data into a computer using various input devices. The various input
devices are keyboard, mouse, trackball, space ball, joystick, dials, digitizer, data gloves, image-scanners, voice systems and touch
panels. Keyboard and mouse are the most commonly used input devices for entering data into the computer.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 9
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
2. Central Processing Unit (CPU)
Central processing unit is considered as the brain of computer system.
Functions of CPU
(i) Interprets the operations
(ii) Coordinates the operations
(iii) Supervises the instructions
(iv) Controls all internal as well as external peripherals
(v) Controls the computer’s functions
(vi) Performs all calculations (Arithmetic and Logic)
(vii) Processes all user-entered data.
CPU performs data processing in binary format i.e., it understands data only if it is in the form of 1s and 0s. Whenever an input
is supplied, it is converted into binary digit format by counting, listing and rearranging the digits according to the program instructions.
Once the processing is done, the result is again translated back into characters or numbers that are easily understood by a human.
Components of CPU
(i) Arithmetic and Logic Unit (ALU)
(ii) Control unit
(iii) Memory unit
(iv) Registers.
(i) Arithmetic and Logic Unit
Arithmetic and Logic Unit (ALU) is responsible for performing all the arithmetical and logical operations. ALU gets the
input from the memory unit, processes it and sends back the result to the internal storage. Data is moved to and from the ALU
and internal storage, several times. After receiving the result, internal storage sends the data to the output device. In ALU,
an arithmetic unit performs all the mathematical operations like addition, substraction, multiplication, division etc. Where
as logic unit carry out logical operations depending on the instructions provided. It performs comparison between numbers,
letters or special characters.
(ii) Control Unit
This unit is responsible for controlling the sequence of operations. It takes its input from the primary storage unit, interprets
it and checks whether the program execution is done correctly or not. It is also responsible for controlling the input/output
devices and manages the entire functionality of other system’s components.
(iii) Memory Unit
This unit stores the intermediate results obtained during the calculations and provides the data to the users depending on their
requirements. The internal storage is also known as primary memory or main memory. Input to memory unit is supplied by an
input device. It stores the input until the computer processes it. After processing, the data is supplied as input, the processed
data as well as intermediate result is sent back to the memory unit. Once the processing is completed, the internal storage
transfers the result to an output device (i.e., monitor).
(iv) Registers
Registers are considered as special purpose, high-speed temporary memory components that are capable of storing different
types of information like data, instruction, addresses etc. It generally stores the information which is currently being used
by CPU. It performs its work by following the instructions of control unit that specify the way of accepting input, storing it,
transferring instructions and performing arithmetic and logical comparison. Whenever an instruction present in the register
is processed, it is immediately substituted by another instruction that needs to be processed.
3. Output Unit
Output unit is responsible for displaying the results generated by a computer to the users. This can be done by using output
devices. Output devices are those devices using which a computer can communicate with the users. These devices takes the result
which is in machine language from processor and translate these results in the form which can be easily understood by users. The
various output devices are monitor, printers, plotters etc.
10 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
Q17. Explain the various applications of computers.
Answer : Model Paper-I, Q3(a)(ii)

Applications of Computers
Computers are basically used in following application areas.
1. Educational Institutions
Computers are incorporated in various educational institutions like schools and colleges for easy learning. The computer
based learning allows students to gain immense knowledge about speciic topic. The development of computers helped the
students in preparing projects and essays, in performing mathematical calculations etc. Besides this, web based learning
also facilities in obtaining information about various topics (via internet browsing), illing application forms, writing online
exams etc.
2. Science
Computers are used by scientist in the ields of research and development. It facilitates in analyzing new theories, predicting
natural calamities like tsunami and earthquake.
3. Communication
Computers enable multiple users to transfer data from one system to another system. Internet is considered as a common
communication media that provides interactions among various users.
4. Business
Computers are used in various business organizations inorder to maintain records of their accounts, their inventory and about
proit and loss. In addition to this, computers can also be used for conducting meetings among users residing on different
remote locations via web conferencing. Apart from this, computer and internet also helps in carrying out online business.
5. Banking
Computers are used in banks to facilitate online banking. This helps in easy transfer of money from one account to another,
bill payments etc. Beside this, computers are also used for maintaining records of inancial transactions being performed
in bank.
6. Entertainment
Computers can be incorporated in entertainment industries for creating interactive graphics, animations and video games.
7. Government
Computers can also be used in various government departments like revenue, defense, industry, census, police etc., for
betterment of people. The term e-governance is extensively growing popularly in the world.
8. Health
Computers are used in hospitals so as to,
(i) Keep track of patients records and generating bills
(ii) Diagnose different diseases and ailments
(iii) Monitor the patients condition using various analog and digital devices
(iv) Examine the internal parts of the body.
9. Military
Computers are useful in designing weapons, targeting ballistic muscles and controlling access to atomic bomb etc.
10. Weather Forecast
Computers are used to analyze and forecast the weather.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 11
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1

1.2 Input and output devIces: Input devIces, output devIces, soft copy
devIces, hard copy devIces
Q18. Explain about input devices.
Answer : Model Paper-II, Q3(a)(ii)

Input Devices
The devices that are used to insert the data into the computer are called the input devices. These devices are used for
inputting data on graphical workstation. The most commonly used input device is the keyboard. Other special input devices
include mouse, trackball, space ball, joystick, dials, digitizers, data gloves, button boxes, image-scanners, voice systems and
touch panels.
Input Devices

Keyboard Pointing Devices Handheld Devices Optical Devices Audio/Visual


Devices

Mouse Trackball Touchpad Stylu Touch Joystick Barcode Scanners OCR OMR MICR
Screen readers

Figure: Input devices


1. Keyboard
Keyboard is a primary input device that consists of number of different keys through which data is provided to the
computer. It is used to input numeric and alpha-numeric data and commands. A keyboard is also used to enter the screen
coordinates, to select the menu-options or graphic functions etc. Whenever user presses the keys, an input in the form of
binary data is provided to the computer.

Figure: Keyboard
2. Pointing Devices
A pointing device allows user to control the pointer movement in selecting the items/commands and draw the graphics
on screen.
(i) Mouse
Mouse is a small hand-held device that was developed at the Stanford Research Institute. It is used to position the screen
cursor. It has roller (wheel) at the bottom which is used to determine the amount and direction of the mouse movement.
The wheel is connected to a shaft encoder which generates an electrical signal on each rotation of the wheel. The mouse
movement is encoded in x and y directions, when it is moved on a lat surface and this movement is stored in separate
registers.
An optical sensor is also used to determine its motion. For this, a special mouse pad consisting of a grid is used. As the
mouse moves on the grid, its movements are determined.
A variation of the standard mouse called as a Z-mouse is developed which contains three buttons, a trackball on the top,
a thumb wheel on its side and a standard mouse ball at the bottom, hence providing six degrees of freedom. With the help
of a Z-mouse, an object can be picked, rotated and moved in any direction.
12 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
(ii) Trackball
A trackball is a 2D positioning device. It is ixed as a base on keyboard and mouse. It can be rotated with ingers to gener-
ate screen-cursor movement.
The potentiometers attached to the base determines the amount and direction of rotation.
(iii) Touchpad
Touchpad is a type of pointing device containing a sensitive surface of 1.5 – 2 inches. It is provided on the keyboard or
laptops and the user need to operate it with the ingers by sliding on its surface. It will convert the motion and position of
the ingers into the relative position on the screen. It also has buttons that work as mouse buttons.
3. Handhled Devices
A handheld device is a pocket sized computing device with display screen along with touch input and miniature keyboard.
(i) Joystick
A joystick is similar to a trackball, but has limited movement. It consists of a stick (i.e., a small and vertical lever) that is
attached to the base and is used to direct the cursor. The screen positions can be selected either by the stick movement or
by applying pressure on the stick. They can be ixed on a keyboard. The movement of stick in some particular direction
from its center indicates the movement of the screen-cursor in that direction. The potentiometers that are attached to the
base determines the amount of movement where as the spring causes it to return to the centre position upon its release.
Another version of a movable joystick causes the cursor to move in a speciied direction at a constant speed by activating
one of the eight switches arranged in a circular manner.
An isometric joystick is a pressure-sensitive joystick that contains a non-movable stick. The applied pressure is converted
to the cursor movement by the strain gauges.
(ii) Stylu
Stylu is a pen shaped input device where user will enter the information by writing on the touch screen of a device. It is
used to draw the lines on surface, select an option from the menu, move the cursor, record the notes and even create short
messages. It must be placed in the slot.
(ii) Touch Screen
Touch screen is the display screen which identiies the occurrence and position of the touch on it. Users can touch it by
ingers or stylus and can directly communicate with the things displayed on the screen. Touch screens are embedded in
laptops, PDA's, computers and mobile phones. Applications of it are car navigation screens, DOS (point-of-sale) cash
registers, automated teller machines (ATMs), gaming consoles etc.
4. Optical Device
Optical devices are also called data scanning devices that make use of light as a source of input to detect or recognize
various objects like characters, marks, codes and images. Some of the optical devices are as follows,
(i) Barcode Reader
Barcode reader is an input device that captures and reads the information that is on bar code. It contains a scanner, decoder
and cable. It reads and converts the barcode into integers or alphabets. It is connected to the computer through serial port,
keyboard port or interface device. It emits a light on the bar code and measures the amount of light that got relected. The
white spaces relect more light than the dark bars. This light energy is converted into electrical energy. These signals are
again converted into the data and sent to the computer for processing.
(ii) Image Scanner
Image scanners are the input devices used to store graphs, drawings, both color and black and white photos by using an
optical scanning mechanism. These storage objects are then used for computer processing. The variations in color or gray
scale are stored in an array.
After capturing the internal description of a picture, transformations like rotation, scaling etc., can be applied. An array
representation can be varied by using image-processing methods. Editing operations can be performed on the stored
scanned text.
(iii) Optical Character Recognition (OCR)
It is one of the most sophisticated type of optical recognition. An optical card reader works in the similar way as the hu-
man eye. It uses a device that reads preprinted characters in a particular font and converts them to digital code.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 13
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
A set of optical characters used on merchandise tags that can be read using an OCR want reader to process the sales
transaction.
The information on the tag, such as item price and the inventory number can be automatically entered at a point of sale
terminal. Pertinent data can be saved and transferred to the company’s main computer system to be used in activities such
as managing inventories and analyzing sales.
The primary advantages of OCR is that it eliminates some of the duplications of human efforts required to get data into the
computer. This reduction effort can improve data accuracy and can increase the timeliness of the information processed.
However, dificulties in using OCR equipment may be encountered when documents to be read are poorly typed or have
strikeovers or erasures. Also, form design and ink speciications may become more critical when people uses the data
from the forms.
(iv) Optical Mark Recognition (OMR)
The process of extracting the data from marked ields like ill-in ields of checkboxes is called OMR. It contains mark
sensing to scan and translate a series of pen or pencil marks in OMR sheet into computer readable form based on its lo-
cation. An example of it is the objective type multiple choice question paper of bank recruitment exam. A computerized
optical mark reader generates scores by identifying the position of the mark.
(v) Magnetic Ink Character Reader (MICR)
Magnetic Ink Character Reader (MICR) checks the legitimacy of the paper documents, such as bank checks. It has magnetic
ink printed characters that are captured by the high speed magnetic recognition devices. They provide some important
information to the receivers for processing. They promote security and speed up in the document sorting process. They
decrease the chances of check fraud.
5. Audio Visual Input Devices
Computers now a days allow the users to record songs, view the animated movies in addition to reading and writing the text.
They make use of audio and video input devices to pass audio and video as input to the computers.
(i) Audio Input Devices
Audio input devices are used for capturing or for creating the sound such as music, speech, sound effects for recording
etc. Examples are microphones and CD players. It is later converted into digital data using the sound card. The computer
that has microphone and speakers can be used to make telephone calls and for video conferences over internet.
(ii) Video Input Devices
Video input devices record video from the outside world and store in the computer. Video refers to a moving picture along
with sound. Video cards are used to convert the recorded video from analog form to digital form. Examples of it are digital
camera and web camera. They are used for video conferences, for recording memorable moments of someone and for security
purposes also.
Q19. Explain about output devices.
Answer : Model Paper-III, Q3(a)(ii)

Output Devices
Output devices are those devices using which, a computer can communicate with the users. These devices take the result
which is in machine-language from the processor and translate these results in the form easily understood by the users.
Output Devices

Soft Copy Devices Hard Copy Devices

Monitor Projector Speaker Printer Plotter

Figure: output devices


14 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
1. Soft Copy Devices (ii) Projectors
A projector takes a video signal and projects the cor-
Soft copy refers to the electronic representation of the
responding image on a projection screen using a lens system.
output. It is the output that is present in the computer’s memory Common display resolution for a portable projector is 800×600
or is stored on the secondary storage devices. In contrast to hard pixels. Images of higher resolution are shown by using projector
copy output, soft copy output is not stored permanently. Such video systems. Several novel (original and creative) products
type of output are transient in nature and is usually displayed have been involved to display computer generated images on to
onto the output device i.e., monitor. a screen. A video projector can generate larger display of size
2×3 metre or more. These devices are relatively cheap but the
(i) Monitor rate of quality and productivity is very high. They are used during
meetings where 10-100 people can view colourized computer
Display screens or monitors are output devices that not
displays by making simple variations in projector devices i.e.,
only display the programming instructions but also display the use an LCD plate in connection with an over head projector.
data supplied as input. In addition to this, monitors also display
(iii) Speakers
the information generated after processing the user-entered data.
The different types of display screens are, Speaker is an output device that takes audio input
from the sound card of computer and gives audio output in
v CRT the form of sound waves to the user. They are external to the
computer and usually contains low-power internal ampliier.
In color CRT monitors, a combination of different col- The computer speakers are available in variety of qualities
ored phosphors are used to display color pictures. and price. Those speakers that are present with the system
are often small and made up of plastic but has medium type
v LCD
of sound quality. Some speakers support power ampliiers for
Liquid Crystal Display (LCD) monitors are lat panel bass speakers and small satellite speakers.
displays that occupy less space. They are preferred Basically, PC speakers can be grouped into two types,
over CRT monitor because they are light weight and (a) Passive speaker
consume less power. They produce licker-free images
(b) Active speaker.
on the screen so as to minimize the eyestrain by drawing
the entire image at one time. They can be used in small (a) Passive Speaker
devices such as laptops, calculators, watches, microwave A passive speaker is the standard speaker incorporated
ovens and so on. by most of the PCs. It does not contain ampliier. A
passive speaker before producing the sound, receives
a speciied amount of ampliied signal that is suficient
to create motion in the speaker's diaphragm.
(b) Active Speaker
An active speaker contains ampliier i.e., the ampliier
built-in the PC. It eliminates the need for external ampliier.
These speakers support low-level (line-level) signals.
Most of the PCs available in market are passive speakers
that include subwoofers. The subwoofers are those
speakers that produce only low frequency sounds such
as bass tones. It is an active speaker because it contains
Figure: Lcd monitor
large built-in ampliier. The advantage of including
The LCD monitor creates an image on the screen by subwoofers is that, it controls all low bass sounds and
making use of the light that is passed. It consists of two sheets of leaves only passive speakers. With the use of ampliiers,
all higher-level sounds can be under control. As a result,
lexible polarizers named as front polarizer and back polarizer.
the sounds can be easily reproduced.
Between these two polarizers, there exist a liquid crystal. This
liquid crystal lows in the form of a liquid but the molecules The coniguration of PC speakers ranges from small
passive systems which are powered by sound card's
present inside it gets arranged in a fashion that gives a view of
headphone output to the active three way. Also, there
a crystal. It has a property that it can rotate the polarization of
exist surround-sound systems suitable for theaters or
light when passed through it. The property of the liquid crystal home theaters. Some PCs such as laptops have integrated
can be avoided by applying an electric ield. speakers present inside the cases or attached to the sides.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 15
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
2. Hard Copy Devices (b) Non-Impact Printers
Hard copy refers to the physical representation of the out- Non-impact printers are those printers that doesn’t use
any physical device to strike the head onto the page. Such
put. It is the output that is copied onto a paper from the computer.
printers are generally developed to fulill the requirements
Paper is considered as the most commonly used hard copy output
of users that were not being satisied by the impact printers.
media. The characteristic features of hard copy output are that
The various types of non-impact printers are as follows,
hard copy is permanent form of output and the output obtained
v Ink-Jet Printers
is relatively stable and highly portable.
Ink-jet printers are most commonly used printer.
(i) Printers These printers print the image by spraying tiny
droplet of ink onto a paper. Since it is a non-impact
Printers are hard copy output devices that print both infor-
printer, it doesn’t have any kind of impact with the
mation and data consisting of characters, symbols and graphics
paper (i.e., it creates an image without touching the
on paper or on some other durables surface like microilm. Some
paper). The tiny droplet of ink are sprayed directly
printers are text-speciic while others can print graphics also. onto the paper by using a sequence of nozzles. These
Printers can be classiied into two types, types of printers are not only capable of printing
monochromatic images but also print the images
(a) Impact Printers in different combination of colors called CMYK
(b) Non-impact Printers. (cyan, magenta, yellow, black).
v Laser Printer
(a) Impact Printers
Laser printer prints text and images that are of high
Impact printers are those printers that consist of physi- quality. Such printers are also known as page printer
cal device (i.e., hammer) to strike a head against an ink as they are responsible for processing and storing
ribbon. This impact causes an image of the character to one complete page before printing it. These printers
be printed on the paper. The different types of impact are capable of printing both text as well as graphics
printers are, with a resolution of 300 to 1200 dip.
(ii) Plotters
v Dot Matrix Printers
Plotters are used for creating vector images by using a
Dot matrix printer is one of the primitive types of pen which is attached to a computer. Because of this, plotters
printing technology that prints single character at are referred to as pen-based output device. Vector images are
a time. These printers are capable of printing the the images that are created by a series of straight lines. Plotters
characters of any shape, font or density onto a pa- are very much similar to printers except that the former draw the
per. The dot matrix printer not only prints special lines using a pen.
characters but also prints graphics like charts and Plotters are expensive and are capable of generating more
graphs. The speed of printing character is from 200 printouts incomparable to the conventional printers. They are
to 500 characters per second. These type of printers generally used in CAD, CAM applications. The following are
are generally used in low-cost, low quality applica- the two types of plotters,
tions like cash-registers.
(a) Drum Plotter
v Daisy Wheel Printers In drum plotter, the paper on which the output is to be printed
Daisy wheel printers are used when it is required is placed over a drum. Such plotters consist of at least one
to generate formal (i.e., professional) letter quality pen that is mounted on a carriage. The carriage is placed
documents. These printers consist of a print head horizontally across the drum which can be rotated in both
whose shape is similar to that of a daisy lower. clockwise and anti clockwise direction. These type of plotters
These type of printers are known as letter quality are generally preferred when it is necessary to print output
printers because the quality of printing is similar to continuously such as plotting the earthquake activities.
the high-quality typewriter. The speed of printing (b) Flat-bed Plotter
the characters is 90 CPS. Flatbed plotter comprises of stationary horizontal plotting
surface over which a paper cannot move (i.e., it is static).
v Drum Printers
A pen is mounted on a carriage. This carriage can move
In contrast to the previous two printers, the drum horizontally, vertically, leftward or rightward in order to
printer is a line printer that can print one line at a draw lines. Since the paper is ixed, the pen is respon-
time. These printers are usually preferred because sible for providing all the necessary movements. Flatbed
of their speed. The speed of printing is measured plotters are generally used in designing of ships, aircraft,
in lines per minute. They can be print 150 to 2500 buildings etc. The main drawback of latbed plotters is
lines per minute. that the speed of printing the output is very slow.
16 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V

1.3 computer memory and processors

1.3.1 Introduction, memory hierarchy


Q20. Give a brief introduction on computer memory. Illustrate the hierarchy of memory.
Answer : Model Paper-I, Q3(b)(i)

Memory
Memory is the internal storage of the computer that can store data or programs permanently or temporarily. It is classiied
into primary memory and secondary memory. The main memory or primary memory contains instructions and data while the
program is in execution. The auxiliary or secondary memory contains the data or programs which are not used currently.
For a program execution, all its related data will be loaded into the main memory. It is volatile and can retain the data only
until the power is on. Where as the secondary memory is non-volatile and stores the data permanently.
Memory Hierarchy
There are various storage devices that allow data to be stored and accessed by the CPU. Secondary storage devices are hard
disk drives, optical disk drives and other devices. Examples of primary memory are ROM, EROM etc. The memory hierarchy of
a computer is determined as follows, The storage devices at higher level are less capable, more expensive but have quick access
compared to the storage devices at the lower levels.

CPU Registers

Level 1 Cache

Level 2 Cache

Level 3 Cache

Primary Memory

Hard Disk

Optical Disk

Magnetic Tape

Figure: memory Hierarchy


The storage devices like CPU registers, cache and primary memory belong to the system memory. They are expensive,
small in size, less capable, volatile and have less access time features. The storage devices like hard disk, optical disk and magnetic
tape are less expensive, big in size, more capable, volatile and have more access time features.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 17
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1

1.3.2 processor registers, cache memory, primary memory


Q21. Write about the following,
(i) Processor registers
(ii) Cache memory.
Answer : Model Paper-II, Q3(b)

(i) Processor Registers


Registers are considered as special purpose, high-speed temporary memory components that are capable of storing different
types of information like data, instruction, addresses etc. It generally stores the information which is currently being used by CPU.
It performs its work by following the instructions of control unit that specify the way of accepting input, storing it, transferring
instructions and performing arithmetic and logical comparison. Whenever an instruction present in the register is processed, it
is immediately substituted by another instruction that needs to be processed.
The addresses associated with the instructions are stored in consecutive registers and the execution is performed sequentially.
Control unit is responsible for reading an instruction stored in the memory using a speciic address achieved in the register. Once
this instruction is executed, the next instruction is fetched sequentially. The sequential execution of the instruction is possible
due to the presence of a counter that keeps track on the instruction addresses that need to be executed.
Types of Registers
1. Program Counter (PC) Register
This register is responsible for storing information about the next instruction that needs to be executed.
2. Instruction Register (IR)
This register stores those instructions that are required to be decoded by control unit.
3. Memory Address Register (MAR)
This register stores the information about the address belonging to the next location stored in the memory and that needs
to be accessed.
4. Memory Buffer Register (MBR)
This register is responsible for storing data transferred by CPU or transferred to CPU.
5. Accumulator (ACC)
This register is considered as general purpose register which is responsible for storing temporary results as well as those
results generated by arithmetic logic unit.
6. Data Register (DR)
This register is responsible for storing the information associated with the operands and other data.
(ii) Cache Memory
Cache memory is a small memory present between CPU and main memory. It has higher speeds compared to other.
Because of the high speeds that it offers, it is used mostly in the computers where the RAM is slower than the processor. The
memory area of this can be a part of main memory or a completely different storage device. This reduces the overall processing
time as the program is loaded less number of times into the processor from the storage. There are two main cache types. Memory
cache and disk cache. The memory cache is present in the high speed SRAM and it is very much useful as the same program,
data (or) instructions can be used again and again. Disk cache uses probability function to identify the page which can be
accessed after the current page. The page that is assumed to be accessed is retrieved and stored in the disk cache in advance.
The cache memory hierarchy carries three levels.
In some computers, level-1 (L1) is present on the processor whereas level 2 and level 3 are present on the mother board. In
some other computers level-1 (L1) and level 2 (L2) are present on the processor where as the level 3 is present on the motherboard.
The main intention of cache memory is not only to improve speed but also to provide bigger memory size at the lowest
possible price. Cache is the irst level of memory in the memory hierarchy. It is based on the principle of locality of reference.
The term cache is also used with those buffers that hold commonly occurring data. For example, ile caches and name cache.
Cache memory stores only a copy to a block of memory which is actually stored on main memory. And thus, the cache memory
is an extension of main memory which improves the overall performance. The igure below shows the process of data transfer
between main memory to cache memory and CPU.
18 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
Main memory
Transfer of block

Cache memory
Transfer of word

Processing unit

Figure: data Transfer between cache and main memory

The cache memory is placed in between the CPU and main memory. Whenever CPU needs a word, it accesses the cache
memory to check whether the requested word is available or not. If the requested word is present, then it is fetched from a cache.
This is referred to as a “cache hit”. On the otherhand, the unavailability of the requested word in the cache leads to a cache miss.
Since CPU references cache when it needs a word, it is necessary that the speed of cache must match with the speed of the CPU.
On a cache miss, the requested item is moved from main memory to cache and the CPU gets the requested item. Cache misses
are handled by the hardware.

Q22. Explain in detail about primary memory.

Answer : Model Paper-I, Q3(b)(ii)

Primary Memory

Primary memory consists of data which is required to be manipulated immediately. In addition to this, it also stores the
information about what is being processed by the processor. Primary memory is also known as main memory. There are two
types of primary memories. i.e., RAM and ROM.

Primary memories are extremely fast memories. These memories are nothing but semiconductor elements capable of
storing single bit of information. These elements together store certain length of data called as words. A small scale memory
stores about few thousands of words where as a medium scale memory can store about few millions of words. An extremely fast
memory which is provided to support the speed of processor is referred as cache memory. Computer consists of a new set of
memory referred as main memory. These type of memories are rather slow, but can store large volumes of data i.e., data extending
in Giga bytes. Secondary memories cost less and at the same time provides large storage capacity. Few examples of secondary
memories are magnetic tapes, CDROMs etc.

1. RAM

Random Access Memory (RAM) is one of the basic memory of computers today. They cannot hold data permanently.
Hence, they are utilized to store several intermediate results and other temporary data. Data remains in these memories as long
as there is constant supply of power. Once the power is turned off, data inside it gets lost. They are read once and write many
times type of memories.

Data inside these memories can be accessed randomly from any location.

Address bus
Read RAM Data output
Write

Data input

Figure: Block diagram of random access memory


SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 19
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
Data reading and writing mechanisms in this memory (d) SDRAM
are quite simple. In order to write the data, initially the address This type of RAM supports synchronous transfer of data
(which describes the position where the data is to be loaded) is between the CPU and the memory. In this, while the CPU is
placed on the address bus. Later, the required data is placed on processing certain amount of data i.e., running a certain process,
the data lines. Finally, write line is activated. In the same way, another process will be placed in the queue for execution. So
in order to read the data from this memory, required address is the CPU will be always busy in executing the processes. It
placed on the address lines and read line is activated. Hence, supports high bus speeds.
data can be collected through data output lines. In this way,
(e) DDR SDRAM
reading and writing tasks can be accomplished.
The functionality of (Double Data Rate Synchronous
Types of RAM
Dynamic Random Access Memory) is similar to that of
Some of the RAMs which are commonly found are as SDRAM, except that the DDR SDRAM operates at relatively
follows, high bandwidth.

(a) SRAM 2. ROM


For answer refer Unit-I, Page No. 20, Q.No. 23.
SRAM (Static Random Access Memory) is basically
used for creating CPU cache that is dependent of speed criterion. Q23. Explain briely about ROM.
This sort of RAM makes use of multiple transistors but not Answer :
capacitor per memory cell. Apart from this, it even consists of ROM
a lip lop memory which makes use of atleast six transistors
and wiring for holding a bit of memory. The major advantage of Read Only Memories (ROM) are those memories which do
SRAM is that such types of RAMs does not perform refreshing not loose its data, even if the power is turned off. Due to this nature,
operation continuously. This feature makes it a fastest RAM. On these memories are also referred to as nonvolatile memories. Hence
the other hand, the disadvantage of SRAM is that, it occupies by using ROMs, permanent storage of data can be made.
more space (since it comprises more set of parts) and is costlier ROM forms best option for program storage. These are
than other RAMs. “Write- once-read many times”type of memories. The program
can be stored in these only during the time of their manufacture.
(b) DRAM
Hence, they are capable of storing large volumes of permanent
In DRAM (Dynamic Random Access Memory), refresh data. Also, they facilitate very fast retrieval of data.
operation is performed dynamically at regular intervals of time Basically, there are many types of Read Only Memories
so as to save the information (stored on it) from being lost. with differing capabilities. Few of them are as follows,
This sort of RAM consists of a pair of transistors per memory
(i) Programmable Read Only Memory (PROM).
cell. These transistors are activated at every bit in the column
only if DRAM transmits a charge via appropriate column. The (ii) Erasable Programmable Read Only Memory (EPROM).
amount of charge to be transmitted is determined by sense (iii) Electrically Erasable and Programmable Read Only
ampliier while performing read operation. The value 1 and 0 Memory (EEPROM).
speciies that the level of charge is greater than and less than
(iv) Flash Memories.
50% respectively. It is the responsibility of CPU or memory
controller to recharge the capacitor when the value is read as Initially, consider the operation of single ROM,
zero for effective working of dynamic memory. Cell

The drawback of DRAM is that the speed of memory Word


Line
is degraded since it is necessary to perform refresh operation
which consumes huge amount of time.

(c) RDRAM
S
RDRAM (Rambus Dynamic Random Access Memory) Bit
makes use of a high speed data bus which is called “Rambus” Line
Li

channel. In comparison to other DRAMs, RDRAMs perform


their operation at high speed thereby generating lot of heat. Figure: single rom cell
20 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
The transistor in this case is connected to ground by means of a switch, hence whenever the switch is closed, the value
of the transistors switches to zero, else it remains ‘1’. In order to read the status of a cell, the word line is turned high. As a result,
if the switch of the transistor is closed, a value ‘0’ lows out of the circuit. Similarly, if the switch remains open, the transistor
supplies a value ‘1’. There is no write operation possible with ROMs, since data is added to it only while it is being manufactured.
The features of various ROMs are tabulated below,

Type Reading Limit of Description


Writing
(Variant) Speed speed Writing

Programmable Extremely fast – 1 PROM or Programmable Read Only


ROM(PROM) Memory is used for storage of programs.
They have quite less storage capacity when
compared to ROM. These memories are
empty when purchased. Data can be
programmed/written to it only once by
suitable ROM programmer. Such memories
are costlier than simple ROM.
EPROM Extremely fast – Many times EPROM facilitates data erasing and writing
as many times as possible. This can be done
by exposing the memory to a strong beam of
ultra-violet light for about 10-20 minutes.
On the other hand, data can be written to it
by a ROM programmer.
Flash Extremely fast Slow About 10,000 Flash is another variant of ROM which is
also useful for program storage. It facilitates
writing of data about 10,000 times, hence can
be applied with the system which requires
upgradation of it’s software after a long span
of time. As its writing speed is slow, it
cannot be applied with the systems which
require frequent upgradation of it’s software.
EEPROM Slow Slow Ininite This variant is also useful in the systems
that require upgradation of software
only after quite large span of time. They
cannot be applied with the systems that
require frequent upgradations. These
memories ind their applicability in the
systems which effectively depends
on the data even when there is a power loss.
Flash Cards Fast Fast Many This is a recent technology which causes a
lash memory to be patched on a card,
causing it to be used with variety of
applications. They are now available with
differing capabilities.
Flash Drives Fast Fast Many These drives are evolved to replace the hard
disk devices. But these memories fail in
terms of storage capacity, at the same time,
the speed, compatibility, access time,
insensitive to vibration, low power
consumption, less size etc.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 21
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1

1.3.3 secondary storage devices, harddisks, optical drives, usb flash drives, memory
cards
Q24. Discuss in brief about,
(i) Secondary storage devices
(ii) Hard disk.
Answer : Model Paper-III, Q3(b)

(i) Secondary Storage Devices


Secondary memory (or) auxiliary memory is the slowest and cheapest form of memory. The data present inside these memo-
ries cannot be processed directly by the CPU. Hence it is necessary to initially copy the data present in secondary memory into the
primary storage before processing. Secondary storage devices are capable of holding information until it is deleted or overwritten.
Thus, secondary memory is non volatile in nature. Some of the secondary storage devices are,
(a) Magnetic tapes
(b) Magnetic disks
(c) Optical disks.
(a) Magnetic Tapes
Magnetic tapes are plastic tapes that have a magnetic coating around it. In such tapes, the data is stored in the form of small
portion of magnetized and demagnetized layer. The magnetized portion signiies the bit values as 1 whereas the demagnetized por-
tion signiies the bit value as 0. There are different types of magnetic tapes each of which differ in their sizes and their speed (with
which the tape moves the read/write head). Magnetic tapes also differ with respect to recording density that speciies the amount of
data stored on a linear inch of tape.
Advantages of Magnetic Tapes
v They are very durable.
v They can be erased and even reused many number of times.
v They are very much reliable
v They are inexpensive when compared to other secondary storage devices.
v They provide fast sequential access to data.
(b) Magnetic Disks
Magnetic disks are the most commonly used secondary storage medium.
Magnetic disk comprises of a circular plate made of either plastic or metal. This plate is coated with magnetic oxide layer.
Data in these disks are stored either on the magnetized or demagnetized layer. The bit-value of 1 is represented on a magnetized
spot and value of 0 is represented on demagnetized spot. In order to carry out the read operation, the data present on the magnetized
surface is converted into electrical impulses which are then sent to the processor for execution. On the other hand, the write opera-
tion can be carried out by converting those electrical impulses into magnetic spots. Magnetic disk is engraved inside a protective
shield in order to protect it from dust or other interferences.
Advantages of Magnetic Disks
v They provide high storage capacity
v They are much reliable
v They have the ability to directly access the stored data.
Types of Magnetic Disks
Magnetic disks can be classiied into two types,
v Floppy disk
v Hard disk.
22 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V
v Floppy Disk
Floppy disk is a type of magnetic disk which is circular, lat piece made of mylar plastic. This disk is coated with ferric oxide
and is enclosed in a plastic cover that act as a protective shield. Floppy disk are read and written by a loppy disk drive. It is
the drive which is responsible for carrying out all the necessary operations like, rotating the disk, reading data from the disk
and writing data onto the disk.
Floppy disk were basically used in personal computers so as to perform software distribution, perform data transfer and to
create small backups.
(c) Optical Disks
For answer refer Unit-I, Page No. 24, Q.No. 26.
(ii) Hard Disk
Hard disk is the primary storage unit of the computer system. It is also known as hard drive or ixed disk. This disk comprises
of stack of disk platters. These platters are made of aluminium alloy that has a magnetic material coating. It also consists of protec-
tive layer, that protects the disk from being crashed.
There are different types of hard disk that differ with respect to their storage capacity. Hard disk holds data ranging from
several hundreds of megabytes to several gigabytes. The speed of hard disk is measured in terms of access time.
Hard disk drive which was initially named as Winchester drive is a secondary storage device that stores the programs and
data permanently. It is also considered as the permanent storage device as it enables the computer to remember the things even
if the power goes off i.e., the data can be accessed again when the power is on (unlike primary storage device). Some PC's even
posses the ability of using two hard drives.
There are variety of hard disk drives available in the stores. The only difference lies in the components i.e., the type of
material used and the way they are arranged, otherwise, the operation of all the hard drives are similar. The construction and
working of hard disk drive is basically dependent on its components which are as follows,
(a) Disk platters
(b) Spindle
(c) Spindle motor
(d) Head actuator
(e) Logic board
(f) Cable and connectors
(g) Read/write head.
Q25. Write in short about the following,
(i) USB lash drives
(ii) Memory cards.
Answer :
(i) USB Flash Drives
USB lash drives are the storage devices that are removable, rewritable and small in size (less than 30g). It contains a
small printed circuit board that contains circuit elements and USB connector. They are insulated and protected within a plastic,
metal or rubberized case. They extract power from computers through external USB connection. Uses of USB lash drive are as
follows,
(a) Booting Operating System
The PC irmware now a days enables booting from USB drives. Such type of coniguration is referred as line USB.
(b) Personal Data Transport
Flash drive is used for storing and transferring the personal iles like images, audio, video, documents etc.
(c) System Administration
Flash drives are used by system or network administrators to store the coniguration information and software that is used
for system maintenance, troubleshooting and recovery. They are even used for transferring the recovery and antivirus
software to the infected PCs. They replaced CD-ROM's due to their storage capacity.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 23
Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1
(d) Backup
Flash drives are used as backup medium so that users need not lose their valuable information.
(e) Music Storage and Marketing
USB lash drives can store audio iles and can transfer these iles from one computer to another. They can be played on the
compatible media player on a computer. Most of the car stereo's and home WiFi's contain USB ports so that USB drives
can be connected.
(ii) Memory Cards
Memory cards are very small storage devices that can store digital iles. They are portable i.e., it can be moved, inserted
into a computer, mobile phone and other gadgets. They can store text documents, audio iles, video iles, pictures etc. It makes
use of lash memory so that users can add, delete and copy the iles multiple times. They are less expensive and small in size.
Various types of memory cards are compact lash memory, miniSD card, microSD card, memory stick, secure dig memory card
(SD) and multimedia card (MMC). They are all time powered and nonvolatile. They are not consistent in capacity. They vary in
storage capacity by providing options to the users. They are portable, lightweight but expensive.
Q26. Discuss about optical drives.
Answer :
Optical Disk/Drives
Optical disk is a form of external storage device which is most widely used today for storing large volume of computer
data. An optical disk is a round, lat piece of plastic disk. This disk is coated with a material on which data is written on highly
relective areas. The stored data may be read from less relective areas by using a laser diode.
Advantage of Optical Disk
v They are capable of storing massive volume of data in very less space.
v They consume less cost for storing a single bit.
Types of Optical Disks
Some of the optical disks are as follows,
1. CD-ROM
CD-ROM or Compact Disk-Read Only Memory is a non-volatile optical disc storage medium. It is capable of storing
different types of texts, pictures, graphics, sounds and animations. The data present in a CD-ROM is read only hence
they cannot be altered/rewritten. The data contained in CD-ROM is accessible by computers and be read using CD-ROM
drive. A standard CD-ROM of size 120 MM is capable of holding data of about 700 MB.
2. DVD-ROM
Digital Versatile Disc-Read Only Memory is also a non volatile optical storage media similar to CD-ROM. They are
specially used for storing movies of high sound and quality. The data present on DVD-ROM are read only, and cannot be
altered or erased. It can be accessible by DVD-ROM drive which is attached to desktop computers/Laptops etc.
3. CD-Recordables
CD-R is also a type of optical disk wherein a CD can be written only once but can be read many times. Even though the
process of recording a CD is slow, but it enables the users to make their own CD disks that are non-erasable. CD-R disks
are mostly used for storage applications because of its high capacity, better reliability and longer life.
4. CD-Rewritables
CD-RW is another type of optical disk that can be used to record and erase data i.e., it enables a user to use a single CD
multiple times. It is also known as erasable optical disk. These disks require special CD-RW drives and software as it
cannot be read by CD-ROM drives. It is commonly used to archive and backup huge amount of data and it is also useful
in multimedia production and desktop publishing.
24 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V

Internal assessment

objectIve type
I. Multiple Choice

1. Monitor is a __________device. [ ]
(a) Software (b) Input
(c) Output (d) Control

2. The irst generation computers used __________. [ ]


(a) Vaccum tubes (b) Transistors
(c) Integrated circuit (d) Microprocessor

3. __________ computers work on continuous data. [ ]


(a) Super (b) Analog
(c) Digital (d) Mini

4. __________ performs calculations in computers. [ ]


(a) CPU (b) Control unit
(c) Memory unit (d) ALU

5. Floppy disk is a __________ device. [ ]


(a) Input (b) Output
(c) Secondary storage (d) Primary storage

6. __________ computers do not generate accurate or reliable results. [ ]


(a) Analog (b) Digital
(c) Mini (d) Micro

7. __________ is considered as a brain of computer. [ ]


(a) CU (b) CPU
(c) MU (d) ALU

8. __________ is a volatile memory. [ ]


(a) RAM (b) ROM
(c) EEPROM (d) PROM

9. __________ computers are relatively small and inexpensive computers. [ ]


(a) Analog (b) Digital
(c) Micro (d) Mini

10. Mouse is a popular__________ device. [ ]


(a) Input (b) Output
(c) Peripheral (d) Secondary storage

SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 25


Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1

II. Fill in the Blanks

1. A __________ is an electronic device that can store, retrieve and execute instructions provided by the users.

2. __________ stores program and application data needed by the computer.

3. __________ are those memories which do not loose their data.

4. Present generation computers offer a storage capacity in __________.

5. A software is a collection of __________ and __________.

6. __________ are the physical components of computer.

7. Personal Computers (PC) are example of __________.

8. __________ devices are used for inputting data on graphical workstations.

9. Data glove is a __________ device.

10. Printers are hard copy __________ devices.

26 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


UNIT-1 INTrodUcTIoN To compUTers, INpUT aNd oUTpUT devIces, compUTer memory aNd processors Computer SCienCe paper-V

Key
I. Multiple Choice
1. (c) 2. (a) 3. (b) 4. (d) 5. (c)

6. (a) 7. (b) 8. (a) 9. (c) 10. (a)

II. Fill in the Blanks


1. Computer

2. Random Access Memory (or) RAM

3. Read Only Memory (ROM)

4. Tera Bytes (TB)

5. Program, instruction

6. Hardware

7. General purpose computers

8. Input

9. Input

10. Output

SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 27


Computer SCienCe paper-V InfORmaTIOn TEcHnOLOgIES-1

III. Very Short Questions and Answers


Q1. Deine computer.

Answer :
A computer is an electronic device that can store, retrieve and execute the instructions provided by the user. The term
computer has been originated from the word ‘compute’ which means to calculate.

Q2. What is cache memory?

Answer :
Cache memory is a small memory present between CPU and main memory. It has higher speeds compared to other.
Because of the high speeds that it offers, it is used mostly in the computers where the RAM is slower than the processor.

Q3. Deine primary memory.

Answer :
Primary memory is a type of memory which consists of data required to be manipulated immediately. In addition to this,
it also stores the information about what is being processed by the processer. Primary memory is also known as main memory.

Q4. What is PROM?

Answer :
Programmable Read only Memory (PROM) is a non volatile memory used as a storage for programs. They have less storage
capacity than ROM.

Q5. Deine lash drive.

Answer :
USB lash drives are the storage devices that are removable, rewritable and small in size (less than 30g). It contains a
small printed circuit board that contains circuit elements and USB connector.

28 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V

UnIT Computer software and


operating systems
2
Learning Objectives

After studying this unit, a student will have a thorough knowledge about the following key concepts,

 Introduction and Classification of Computer Software.

 System Software and Application Software.

 Firmware, Middleware and Acquiring Computer Software.

 Introduction and Evolution of OS.

 Process Management, Memory Management, File Management, Device Management and Security Manage-
ment.

 Command Interpreter, Windows and Linux.

intrOductiOn

Computer software is a collection of programs that directs the computer to perform some tasks. It is developed by
the programmers and is converted by the compiler into the language understandable by the computer. Examples
of computer softwares are driver software, operating systems, media players, computer games etc.

Operating system is a program or set of programs that controls the computer hardware. It act as an interface between

user and hardware. The basic objectives of operating system includes efficiency, convenience and ability to evolve.

Windows 7 is the latest version of operating system being used on desktop PC’s, business organizations etc. It
focuses on incremental upgrades to Windows. Its purpose is to provide compatibility with application and hardware
with which Windows Vista is compatible. MS-DOS is a single user operating system which is used for searching
and configuring system files.

SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 29


Computer SCienCe paper-V information teChnologieS-1

part-a
short Questions with solutions
Q1. Define computer software.
Answer :
Computer software is a collection of programs that directs the computer to perform some tasks. It is developed by the
programmers and is converted by the compiler into the language understandable by the computer. Finally, it is executed and
result is generated. Examples of softwares are driver software, operating systems, media players, computer games software etc.
Q2. What is system software and application software?
Answer : Model Paper-I, Q2(a)

System Software
A set of programs that is capable of controlling and supporting the computer system and its information processing
activities is called system software. It is used in programming, testing and debugging of computer programs. System software
program helps the application software by providing the basic functionalities of the computer.
Application Software
The software that helps the user in accomplishing some specific task is referred to as application software. A single program
or a set of programs forms the application software.
An application software can be built for any kind of application like graphics, word processors, media players, database
applications, telecommunications etc.
Q3. Define firmware and middleware.
Answer : Model Paper-II, Q2(a)

Firmware
Firmware is a software which is contained in the hardware. If the cost is found as more important factor than the performance
then some of the functions of electronic circuits are implemented by set of instructions and electronic circuits are decreased.
Certain hardware devices contain the software programmed and stored in memory of that particular hardware. This memory will
store program code as well as related data. The devices such as ROM, EPROM or flash memory which are non volatile will store
the firmware.
Middleware
Middleware is a software that combines two individual applications that are already existing. It acts as an interface between
two applications and also provides the services that are not provided by the operating system. For example middleware can pro-
vide communication between two separate applications through messaging services. The below diagram depicts the middleware
in computer system.
Q4. Define OS.
Answer : Model Paper-III, Q2(a)

Operating System
An operating system is a software or computer program that controls the computer hardware. It acts as an interface or an
intermediate between the user and hardware. It provides platform for running application programs.
User
Operating Computer
system hardware

figure: operating System as an Interface


Role of Operating System
(i) Operating system as a resource manager
(ii) Operating system as a user/computer interface.
30 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
Q5. What are the functions of operating system?
Answer :
The functions performed by operating system are as follows,
1. Resource management
2. Process management
3. File management
4. Memory management
5. Communication management and
6. Security management.
Q6. Write about the attributes of file.
Answer : Model Paper-I, Q2(b)

Each file has several attributes. They are,


(a) Name
It is a symbolic name of the file which gives convenience to users to refer the file. It is a string of characters like myfile.
txt, resume.doc etc.
(b) Identifier
It is a unique number which is used to identify a particular file by the file system. It is not in user-readable form.
(c) Type
There are different types of files depending on the type of data they store like text, executable code, sound, video, image
etc. This attribute tells the type of data stored in the file.
(d) Location
It specifies the physical address of the file located on a particular storage device.
(e) Size
It indicates the size of a file which is usually measured in bytes. It can also specify the maximum size allowed to a file.
(f) Protection
This attribute determines the access control information i.e., who are allowed to use this file and with what privileges.
Other miscellaneous information include date and time at which the file was created, last modification done, last usage etc.
Q7. Write in brief about Relative file organization.
Answer : Model Paper-II, Q2(b)

Relative file organization will provide an efficient method to access separate records. The file records are sorted based on
the relative key. The position of the record can be known by the records number. Number of record are represented by n where 0
is the first records and n – 1 is the last record. The relative files and records are sorted in ascending order. A relative file is same
as a single dimension table stored on the disk. it contains a relative record number as index of table.
Q8. What is command interpreter?
Answer : Model Paper-III, Q2(b)

Command interpreter serves as a bridge between user and operating system. It operates upon the commands given by the
user and OS executes them by converting into system calls. It mainly emphasizes upon fetching and executing the next commands
given by the user. In actuality, the command interpreter is not considered to be a part of kernel because many command interpreters
such as shell and UNIX though substantiated by OS but does not require kernel mode to run.
When separated from kernel it produces two main benefits to the user. They are,
(i) It allows aesthetic modification to the interpreter and if the kernel code is unchangeable the interpreter also cannot
be changed.
(ii) It allows malicious activity to acquire the control upon a specific part of the kernel provided if the command interpreter
is made a part of the kernel.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 31
Computer SCienCe paper-V information teChnologieS-1

part-b
essay Questions with solutions
2.1 Computer software

2.1.1 introduction, Classification of Computer Software


Q9. Explain briefly about the computer software.

Answer : Model Paper-I, Q4(a)(i)

Computer Software
Computer software is a collection of programs that directs the computer to perform some tasks. It is developed by the
programmers and is converted by the compiler into the language understandable by the computer. Finally, it is executed and
result is generated. Examples of softwares are driver software, operating systems, media players, computer games software etc.
Computer System

Computer Hardware Computer Software

System Application
Software Software

Classification of Computer Software


Software has been categorized into two types. They are,
1. Application software
2. System software.
1. Application Software
For answer refer Unit-II, Page No. 35, Q.No. 11, Topic: Application Software.
2. System Software
For answer refer Unit-II, Page No. 32, Q.No. 10, Topic: System Software.

2.1.2 System software, Applications Software


Q10. Explain in detail about system software.
Answer : Model Paper-II, Q4(a)(i)

System Software
A set of programs that is capable of controlling and supporting the computer system and its information processing
activities is called system software. It is used in programming, testing and debugging of computer programs. System software
program helps the application software by providing the basic functionalities of the computer.
Some of the basic functionalities includes,
v Monitoring the overall performance
v Providing and maintaining the user interfaces
v Reading the programs into memory and managing the allocated memory
v Managing the directories
v Detecting viruses and correcting errors etc.
32 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
The diagrammatic representation of the categorization of system software is given below,

figure: Categorization of System Software


I. System Software for Managing the Functionalities of a Computer
It includes all those programs that are written for the functioning of different components of a computer like processor,
input and output devices etc., and also the programs that manages the operations performed by these components. The software
components of a system such as operating system, device drivers and system utilities comes under this category.
1. Operating System
An operating system is a program or a collection of programs that controls the computer hardware and acts as an intermediate
between the user and hardware. It provides platform for application programs to run on it. It has the following objectives,
(a) Efficiency
All the system resources present in the system should be utilized and managed efficiently.
(b) Convenience
The operating system should provide an environment that is simple and easy to use.
(c) Ability to Evolve
An operating system should be developed in such a way that it provides flexibility and maintainability. Hence, the changes
can be done easily.
Operating Computer
User
System Hardware

figure: operating System as an Interface


The operating system offers the following services,
(i) Program Creation and Execution
The operating system should support various utilities such as editors, compilers and debuggers etc., in order to give
programmers the facility to write and execute their programs.
(ii) User Interface
The operating system should provide an interface through which a user can interact. Most of the earlier operating systems
provide Command Line Interface (CLI), which uses text commands. All the users are supposed to type their commands
through keyboard. Some systems support batch interface which accepts a file containing a set of commands and executes
them. Now-a-days, Graphical User Interface (GUI) is used where a window displays a list of text commands to be chosen
by a user through an input or some pointing device.
(iii) Resource Allocation
In a system, multiple programs may be executing concurrently. It is the responsibility of the operating system to allocate
resources (such as CPU time, main memory, files, etc.,) to them. For example, various scheduling algorithms are used for
allocating CPU time and resources to processes.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 33
Computer SCienCe paper-V information teChnologieS-1
(iv) Error Detection II. System Software for the Development of an
The operating system is responsible for keeping track Application Software
of various errors that may occur in CPU, memory, I/O It includes all those programs that are capable of
devices, user program, etc. Whenever errors occur, providing the services for the development and execution
the operating system takes appropriate steps and may of application software. The software components such as
provide debugging facilities. programming language software, translator software loader,
2. Computer BIOS and Device Driver linker comes under this category.

BIOS stands for computer basic input/output system. The 1. Programming Languages
BIOS and device drivers provide certain basic functionalities Programming languages are used to develop the
to operate as well as control the hardware that is connected or software. There are three types of programming languages,
built into the computer. BIOS defines the firmware interface (a) Highlevel language
and run by the computer initially when it is switched on. The (b) Assembly level language and
BIOS will initialize and identifies the devices like mouse, CD/
(c) Machine level language.
DVD, hard disk, keyboard etc. It even identifies the software
in hard disk or CD, loads it and then executes it. Such process (a) High-level Language
is called booting. BIOS is contained in ROM and it maintains High-level languages (HLL) are preferred over other low
a user interface that is accessed by pressing a key on keyboard. level language (LLL) because of the following reasons,
User can configure the hardware, activate or deactive the system v Easier to read, write and maintain.
components, set the system clock, choose the devices and even v They are more abstract
set password prompts through the BIOS menu.
v They are more portable
Device driver acts as an interface between a device and
v They are more structured
the software. Thus, every device need its respective driver for
proper functioning. For example, hard disk needs a hard disk v These languages provide a direct communication
driver which enables it to understand any related command between a human and a computer.
given by the user or a program. (b) Assembly Level Language
3. System Utility Software The language which lie between the machine language
and HLL is Assembly language, it is very much
This software is required for proper maintenance of
similar to machine language. But these languages
computer system. It also helps in supporting and enhancing
are comparatively easier to program as they allow a
the program and data in the computer. Some of the examples
programmer to write programs using instruction code
include anti-virus utility, data compression utility, cryptographic
(i.e., mnemonics) instead of binary numbers.
utility, disk compression utility, disk partitioning utility and disk
cleaner utility, backup etc. (c) Machine Level Language
The utility programs can be requested by application Machine language is also known as machine code or
programs while executing them. Some of them are discussed object code. In this language, programs are written in
below, the form of binary digits or bits with different patterns
relating to different commands that are easily readable
v Disk cleaners are used to identify the files that are not
and interpreted by a computer.
useful and allow users to delete them.
2. Translator Software
v Disk partitions will divide the individual drive into
various logical drives. A translator software translates the program written in
high-level language and assembly language into the machine
v Disk checkers are used to identify the corrupted hard
understandable formats. The different translators that are in use are,
disk contents and delete them.
(a) Assembler
v Disk compression is used to improve the disk capacity
by compressing or decompressing the disk contents. An assembler is a system utility program responsible for
converting assembly language instructions into machine
v Command line interface and graphical user interface is
language instruction. There exist one machine language
used to modify the operating system.
instruction for individual assembly language instruction
v Antivirus utilities are used to scan the system for virus because of the presence of one-to-one mapping between
effected areas. assembly language and machine language. Assemblers
v File managers are used to provide methods to perform are not only capable of converting the instruction but are
routine management tasks like moving, deleting, also capable of generating error messages. Examples of
copying, modifying the data sets. assemblers include 8085 assembler, 8086 assembler etc.
34 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(b) Compiler 1. Microsoft Office Package
A compiler is a system utility program responsible Microsoft office can be defined as an application
for converting high-level instructions into machine software which consists of products or components designed
language instructions. All the instructions are converted by Microsoft corporation.
at a time. Compilers are capable of generating error
Components of MS-office
messages encountered during translation. After successful
compilation of a program, compiler software is not The components of MS-office are as follows,
required as the machine instruction is reused several (a) MS-Word
times. Examples of compilers are Pascal compiler, C
compiler, COBOL compiler etc. MS-Word is an application of word processing software
developed by Microsoft. MS-Word application can be used to
(c) Interpreter
create, manipulate and save a document, a note, a report, an
Interpreter is similar to that of a compiler but the official letter, a file and a menu.
difference arises in their conversion format. Interpreter
interprets every individual instruction and executes it Features of MS-Word 2007
immediately rather than executing entire program at 1. It allows users to manually enter data into a digital
once. In case of any error, the program execution is document.
halted until the error is rectified. The interpreter needs
to be stored in the memory till the program execution is 2. It allows users to add, delete and modify existing text
completed. Interpreter is useful while debugging because document.
it displays the error message soon after interpreting 3. It allows users to copy a document or part of it into
individual instruction. another document.
3. Linker 4. It allows users to customize paragraph setting, adjust
Linker is a program used to link several independent margins (top, bottom, left and right), line spacing etc.
broken modules and libraries of a very large program into an 5. It allows users to represent the information in tabular
executable program which is easy to debug and maintain.
format using built-in table styles.
4. Loader
(b) MS-Excel
Loader software handles the task of loading and
relocating of executable program in the main memory. Microsoft excel (MS-Excel) refers to a spreadsheet
application program. It can store, organized, analyze and
Q11. Explain in detail about application software.
manipulate the data. It is developed and configured by the
Answer : Model Paper-III, Q4(a)(i) Microsoft corporation to support Microsoft Windows and
Application Software MAC operating system. It is regarded as the most powerful
The software that helps the user in accomplishing some spreadsheet package.
specific task is referred to as application software. A single Features of MS-Excel
program or a set of programs forms the application software.
1. It provides menus and commands to user for creating
An application software can be built for any kind of worksheets easily.
application like graphics, word processors, media players,
database applications, telecommunications etc. 2. It allows users to store huge amount of data in excel
worksheet using its numerous rows and columns.
Examples of application software are word processors,
spreadsheets, media players, education software, CAD, CAM 3. It generates reliable and accurate output.
etc. Various applications packed together are called sometimes 4. It automatically checks and rectifies mistakes in spelling
as application suite. There are multiple application software and grammar through ‘spell check’ and ‘grammar check’
packages available in the market for various applications. One
option.
of the popular application software is productivity software.
5. It provides the facility of chart wizard for the user to
Productivity Software
create various types of charts.
This software enhances the productivity of the computer
user. 6. It provides the features of inserting graphs and pictures
into a document.
Examples of such softwares are spreadsheet applications
and graphic design software. Users use these tools to create the 7. It provides a variety of in-built functions that helps the user
documents, databases, graphs, charts, presentations etc. for calculating means, standard deviation, regression and
Mostly used software package in the market is microsoft correlation etc.
office package. It provides all the required functionalities to the 8. It also has the ability of changing the selected text into
users. Some of the productivity softwares are as follows, a variety of styles as bold, italic or underline.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 35
Computer SCienCe paper-V information teChnologieS-1
(c) MS-Access 5. Powerpoint projects are used as a project prototypes
Microsoft Access is a DBMS fully featured package. for all web based projects, consulting, engineering
It is a relational database management system which is architectural and environmental fields.
developed by Microsoft. It merges the features of Microsoft 6. They are used in literature for writing new letters,
Jet Database Engine together with GUI features as well as journals etc.
software development tools. The data stored in Microsoft SQL
server, Oracle or any ODBC-compliant data container can be The powerpoint presentations are used by trainers,
utilized by Access. Many of the software developers and data professionals, students and business people to,
architects prefers Access while developing application software (i) Create the presentation related to their fields.
and unskilled programmer can use it while developing simple
applications. However, Access support many of the object- (ii) Create video slide shows.
oriented techniques, it cannot be considered as a fully object- (iii) Print the presentation in the form of handouts and
oriented development tool.
speaker’s notes.
MS Access assist the user in collecting, organizing,
(iv) Add transparencies.
searching, displaying the information belonging not only to
the personal life but also the information associated with the Features of Powerpoint
business. The information that is dealt with MS Access is The features of powerpoint are as follows,
staggering. This package comprises of different wizards as
well as predefined database element. These elements assists 1. It provides slides to develop presentations.
the users in monitoring the following information, 2. It supports templates, wizards and built-in slide layouts.
v Assest tracking 3. It allows the users to add picture from clip art or the
v Event management pictures from browsed files.
v Inventory control 4. It allows the users to represent the data in the form of
tables and charts.
v Ledgers
5. It allows the users to add various types of sound effects
v Order taking and tracking system
and animation techniques into different presentations.
v Resource scheduling etc. 2. Graphics Software
(d) Power Point Graphics software is a type of image editing software
Ms-powerpoint is a part of Microsoft Office Suite through which user can create as well as edit the digital images.
provided by Microsoft Corporation. It provides various Examples of graphic software are Adobe Photoshop, Paint Shop
templates and tools for creating slide. Each slide contain Pro and Microsoft paint. Various applications of graphics are
valuable information related to specific fields. These slides as follows,
are prepared by people of different organizations like school,
colleges, business etc. (a) Paint Program
It allow users to create freehand drawings. The images
Applications of Powerpoint Presentation
are saved in bitmap format so that they can be edited.
The applications of powerpoint presentation are as
follows, (b) Presentation Software
It allows users to create pie charts, graphics, reports, bar
1. Powerpoint presentations are used by the business
organizations to conduct business meetings, to produce charts etc. It depend upon the numerical data that is imported
annual report of the company, to explain about particular from the spread sheet applications.
project etc. The decision makers and analysts mostly use this
2. Powerpoint presentations are used by sales managers software.
to generate report of their sales, to do marketing about (c) CAD Software
specific product etc.
It is used mostly by the architects and engineers for
3. Powerpoint presentations are used in education architectural drawings, landscape plan, product designs etc. It
institutions to create lecture notes, to conduct seminars makes drawing fast and simple.
to students etc.
(d) Animation Software
4. Powerpoint presentations are used in corporate offices
to describe their organizational policies on quality, HR, It is used to simulate the movement by displaying set of
finance etc. images in short span of time.
36 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(e) Illustration, Design or Draw Programs Hardware Requirements to Support Multimedia
These type of programs provide advanced features than Applications
paint to the users. They are used for drawing the curved A computer requires below hardware devices to support
lines and store the images in vector based format. multimedia applications.
(f) Desktop Publishing (a) Multimedia keyboard enables the users to control the
This application provides word processing features. music's volume and side effects.
Users are allowed to create books, advertisements, news (b) An electronic writing pad enables users to provide direct
letters etc. input by writing on it. They are mostly used to extract
3. Multimedia Software signatures from user.
Multimedia software is a combination of text, audio, (c) Mouse is used to draw images.
images, video, animation etc. It can be divided into linear and (d) Printers provide printed copy of the electronic text or
non linear. The linear active content is stable and does not allow image.
user to interact via navigation. Non linear content allows user (e) Microphone is used to record sound into the computer.
to interact through navigation. Multimedia is mostly used in
(f) Speaker is used to extract audio output from the
areas like entertainment, education, advertisement, medicine,
computer.
business etc.
(g) Scanners provide electronic copy of printed text.
Software Requirements for Supporting Multimedia Data
Media Centre PC
Multimedia data can contain audio, video, pictures and
text. The features that are to be supported by the multimedia Computers are used at homes to perform various
enabled computer are as follows, activities and televisions are used for entertainment for watching
movies and shows. Some of the operations of media center PC
(a) Text Styling
are as follows,
Users can apply various fonts, font sizes and other effects
(a) Sending emails
to make the text presentable.
(b) Browsing internet
(b) Text Importing
(c) Playing games
Users can add the existing text to the new document to
save time and money. (d) Capturing, editing and emailing digital photos
(c) Draw and Paint (e) Chatting with friends
Users can create or edit the images through lines, (f) Creating music by mixing the audio files
polygons and circles. (g) Playing, recording and pausing the FM radio shows etc.
(d) Hypertext 4. Database Management Software
Users can navigate the information using this feature, A database is the set of interrelated files in a computer
(e) Clip Art system. Database software is a program that can control the
database structure and even access to the data.
Users can add images to the documents from this library
of pictures. (a) Organization of Database
(f) Software Support A database contains items ranging from smallest to
largest fields, records and files. A field is a unit of data
This feature supports high resolution graphics. containing characters. A record is a set of related fields.
(g) Animation Clips A file is a set of related records.
Users can add existing clips in the multimedia (b) Retrieve and Display
applications from this library of clips. The advantage of database software is that the records
(h) Transition Effects in the file can be found quickly. Any records can be
These effects are rotation, zoon-in, layering, fade-in extracted and displayed on the screen.
using which realistic animations are created. (c) Sort
(i) Voice Recognition Software Using database software, user can change the order of
It is used to match the voice at speaker with the voice records in a file. Records are inputted into a database
in records of database. in the order they occur, such as by the date a person
registered to attend college.
(j) Video Editors
(d) Calculate and Format
Users can edit the video and add special effects to it.
Most of the database programs consists of built-in
(k) Sound Editor mathematical formulas. For example, to find the grade
Users can edit the sound and add special effects to it. point/averages of students secured in different classes.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 37
Computer SCienCe paper-V information teChnologieS-1
Q12. Differentiate between application software and system software.
Answer :

Application Software System Software


1. It refers to a set of programs that written for a particular 1. It refers to a set of programs that allow users to communi-
application. cate with the hardware components.
2. It communicates with the hardware components by us- 2. It controls as well as manages the hardware.
ing the services provided by the system software.
3. It is independent of machines. 3. It is dependent on the machines.
4. It communicates with the hardware indirectly by using 4. It can directly communicate with the hardware.
the system calls.
5. The developers can build the application software irr- 5. The developers build the system software by considering
spective of the machine and hardware architecture. the machine and hardware architecture.
6. Developing application software is a simple and easy 6. Developing system software is a complex task.
task.
7. Examples are Microsoft Word and Microsoft Paint. 7. Examples are Operating System and Compiler.

2.1.3 Firmware, Middleware


Q13. Write short notes on,
(a) Firmware
(b) Middleware.
Answer : Model Paper-I, Q4(a)(ii)

(a) Firmware
Firmware is a software which is contained in a hardware. If the cost is found as more important factor than the performance,
then some of the functions of electronic circuits are implemented by set of instructions and usage of circuits are decreased. Certain
hardware devices contain the software programmed and stored in memory of that particular hardware. This memory will store
program code as well as related data. The devices such as ROM, EPROM or flash memory which are non volatile will store the
firmware.
The firmware is the internal part of the electronic optical drives, routers, scanners, digital cameras, digital watches,
computers and their peripherals, consumer appliances, mobile phones, traffic lights etc. Earlier, the vendors were implementing
only the system software as firmware but now the application programs are also used as firmware. Hence, Usage of firmware in
computer system design is increasing and it is even used as an alternative to the electronic circuits.
(b) Middleware
Middleware is a software that combines two individual applications that are already existing. It acts as an interface be-
tween two applications and also provides the services that are not provided by the operating system. For example, middleware
can provide communication between two separate applications through messaging services. The below diagram depicts the
middleware in computer system.

Client applications Server applications

Middleware services like Middleware services like


support, messaging and messaging, support and
management services management services

Network interfaces Network interfaces


and operating system and operating system

figure: middleware in Computer Networks


38 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
In the above figure, the middleware is used in client- (i) All the requirements are noted.
server system. It is a software layer that acts as an interface (ii) A survey is conducted on various organizations to
between client and server applications. It provides the know the time, money and effort required to create the
services like managing, messaging and support for hiding the software.
heterogenity of the network, hardware as well as operating (iii) One of the best vendor is choosed depending upon the
systems for application programs. quoted cost and the companies reputation.
Middleware can be defined as a set of data and tools The selected organization will develop the required
that allow various applications to make use of the resources as software that meets the user needs.
well as the services in networked system. It simplifies the work 3. Downloading the Public Domain Software
of software developers so that they can focus on developing
Certain software applications that are available on
instead of wasting time in providing communication between internet can be downloaded for free of cost by the users. They
two computers. Middleware is also referred as plumbing since are called as freeware, shareware or community software.
it connects two systems and even passes the data between
Some applications are for free of cost and have full set
them.
of features. Where as some other applications have limited
2.1.4 Acquiring Computer Software features and provided for limited period of time.
Certain public domain softwares are open source
Q14. Discuss in brief about acquiring computer softwares that are equally popular in user community.
software.
They enable the users to view, download and modify
Answer : their source code. But, there are even copyright protection
schemes for the original authors.
When a computer is purchased, only the hardware is
obtained. To make it functional, some type of software must 2.2 operating systems
be acquired. This is possible in three different ways,
1. Purchasing a Pre-written Software 2.2.1 Introduction, Evolution of OS
Nowadays, there are many pre-written software Q15. What is an operating system? Explain the
packages available in the market. User need to choose the best functions of operating system.
suitable one depending upon the requirements. There are two
Answer : Model Paper-II, Q4(a)(ii)
factors for requirements. First factor is the compatibility with
hardware as well as the operating system where as second is Operating System
the set of features, cost, warranty etc. For answer refer Unit-II, Page No. 33, Q.No. 10, Topic:
2. Customized Software Operating System.
When any software packages does not meet the Role of Operating System
requirements of any organization, then the alternative is to (i) Operating system as a resource manager
obtain a customized software package. The organization
can create a customized software package in-house or event (ii) Operating system as a user/computer interface.
outsource to some other organization. (i) Operating System as a Resource Manager
In-house Development of Customized Software Operating system is an interface between user and the
A customized software is developed by software team hardware. A computer system consists of a set of resources,
in an organization by following the below steps, where in data manipulations is done through these resources.
(i) The software development team will study the Operating system can be viewed as a resource allocator in this
requirements of the user and even plan the functional context. It allocates various resources like CPU time, memory
modules. space, file-storage space, input/output devices etc. All these
resources are under the control of the operating system. Thus,
(ii) If such software is already available then it is extended
operating system acts as the resource manager or a resource
and used. Otherwise, a new software is developed.
allocator.
(iii) The planned modules are coded, tested and documented.
The primary task of an operating system is to keep track
Once the software is ready, it is integrated in the user's of who is using which resource, to grant resource request, to
machine and finally maintenance activities are performed. account for usage and to resolve conflicting requests from
Outsourcing the Customized Software different programs and users. In this way, operating system
If the customized software is developed by some other manages and protects memory, input/output devices and other
organization then the below steps are performed. resources when different processes share them.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 39
Computer SCienCe paper-V information teChnologieS-1
Computer System

Operating system Programs


software and data
I/O devices
Printers, I/O controller Processor
keyboards,
digital
I/O controller Processor
camera etc.

I/O controller Processor

Storage
OS
Program
Data

figure (2): operating System as a resource manager

In the above figure (2), the main memory were occupied jointly by operating system as well as the other programs i.e.,
the main memory (a resource) is being controlled by both of them. Operating system controls the processor and I/O controllers
to execute the programs and to fetch data from I/O devices.

(ii) Operating System as a User/Computer Interface

The facilities (both hardware and software) provided to the user can be viewed in the following hierarchical manner,

End users Application programs

Utilities
Programmers
Operating system

Operating system Computer hardware


designer

figure (3): Layers and Views of a Computer System

As shown in the figure (3), the users of the applications are not concerned with the hardware details instead, a computer
system can be viewed as a collection of applications to the end users. An application-programmer is responsible for developing
applications in some programming language. Some of the system programs called as utilities or utility programs are provided
to the users which assists them in creating programs, managing files and controlling I/O devices. Among the available system
programs, OS is the most important program which hides the hardware details from the programmers by providing a suitable
interface to them.

Functions of Operating System

The functions performed by operating system are as follows,

1. Resource management

2. Process management

3. File management

4. Memory management

5. Communication management and

6. Security management.
40 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
1. Resource Management 4. Batch Processing System (1960s)
Operating system is also called as resource allocator. A batch processing operating system reads a set of
This is because, it responsible for controlling and separate jobs, each with its own control card. This control card
allocating various hardware resources (CPU, printer, contains information about the task to be performed. Once
etc), and communication resources, CPU time, memory
the job is completed its output is printed. The processing in a
space, file-storage space etc., to users. It also executes
batch system does not involve interaction of user and the job
a user program efficiently.
during its execution. However, in these systems the CPU was
2. Process Management not utilized efficiently due to mismatch in processing speed of
Operating system is also responsible for managing mechanical card reader and electronic computer.
process execution. A multiprogramming operating
system runs multiple processes concurrently. Example

3. File Management MS-DOS


An operating system is also responsible for managing 5. Multiprogramming (1970s)
the file name, directory name etc. It also provides access
In multiprogramming, when one user program contains
properties like file size, type, modified etc.
I/O operations, CPU switches to the next user program. Thus,
4. Memory Management CPU is made busy at all the times.
Operating system also manages memory needed for
A single user cannot keep CPU busy at all times. Hence,
executing the user’s program.
multiprogramming increases CPU utilization by organizing
5. Communication Management jobs (programs), so that CPU is busy at all times by executing
Operating system provides networking services some user program or the other.
like Local Area Networking (LAN) and Wide Area
Networking (WAN) services. The idea behind the multiprogramming is that, the OS
picks one of the jobs from job pool and sends the jobs to CPU.
6. Security Management
When an I/O operation is encountered in that job, OS allocates
Operating system provides various security services I/O devices for that job and allocate CPU to next job in the job
to protect the data from illegitimate software attacks. pool.
Antivirus softwares are the most commonly used
security service installed on a computer to protect In multiprogramming most of the time CPU is busy.
the data from getting corrupted. Besides this, various The advantages of multiprogramming are, Higher CPU
password preserving mechanism as well as firewalls are utilization and Higher job throughput.
used to avoid unauthorized access.
Throughput is the amount of work done in a given time
Q16. Discuss in detail the different types of operating interval.
systems.
Amount of time CPU is utilized
Throughput = Total time for executing the program
Answer : Model Paper-III, Q4(a)(ii)

The different types of operating systems are as follows, (i) Singleuser Multitasking Operating System
1. Single-user Operating System The single user multitasking operating system enables
This operating system allows a single user to perform only one user to perform various tasks. It is mostly used in
operation on the computer at a given instance of time. In this desktops and laptops to improve user's productivity in order
type of operating system, a single application rather than multiple to perform multiple tasks at a time. For example, user can do
application can be executed at one time. some work in notepad, listen to music and print a document
2. Multi-user Operating System simultaneously. Examples of it are Microsofts Windows and
Apple's Mac OS platforms.
In contrast to single user operating system, this operating
system enable multiple users to operate the computer simultane- (ii) Multiuser Multitasking Operating System
ously. This operating systems perform efficient utilization of CPU A multiuser operating system allows several users to
by assigning equal amount of time slice to every individual user
access one system on various computers. Several users can
(connected through different terminals).
connect to the main computer and access the same data at a
3. Multi-process Operating System particular time instant. The terminals are used by the users to
In this type of operating system, a single program is pro- access the main system through the network. It is mostly used
cessed by multiple CPUs. This operating system is used basically on main frames.
when batch processing has to be supported. The multi-processing
operating system is oftenly used because it acts as a backup for Example
the existing CPU. Windows
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 41
Computer SCienCe paper-V information teChnologieS-1
6. Time Sharing System (1970s)
Time sharing is considered as multiprogramming systems logical extension. In time sharing system, the user has a separate
program in memory. Each program in time sharing system is given a certain time slot i.e., operating system allocates CPU to any
process for a given time period. This time period is known as “time quantum” or time slice. In Unix OS, the time slice is 1 sec
i.e., CPU is allocated to every program for one sec. Once the time quantum is completed, the CPU is taken away from the program
and it is given to the next waiting program in job pool. Suppose, a program executes I/O operation before 1 sec time quantum,
then the program on its own releases CPU and performs I/O operation. Thus, when the program starts executing, it executes only
for the time quantum period before it finishes or needs to perform I/O operation. Thus, in time sharing any user can share the CPU
simultaneously with other user. The CPU switches rapidly from one user to another giving an impression to each user that the user
has its own CPU whereas, actually only one CPU is shared among many users. Hence, CPU is distributed among all programs.
In a situation where there are more number of jobs that are ready to be inserted into the memory and when there is not
enough memory, a decision made to select the jobs among them. This decision making process is known as “job scheduling”.
Example
Unix
7. Real Time System (1980s)
Real time operating systems are time bounded systems, wherein the system must respond to perform a specific task
within predefined boundary. There are two types of real time system.
(i) Hard Real Time System
In this real time system, actions must be performed on specified time which could otherwise lead to huge losses. It is
widely used in factories and production lines.
Example
In automobile, assembly line welding must be performed on time. This is because, a weld before or after the specific
instance can damage the product.
(ii) Soft Real Time System
In this real-time system, a specified deadline can be missed. This is because, the level of loss is low compared to hard real
time system.
Example
A video game can has voice not synchronized to the movie. This is still undesirable but does not cause huge loss.
8. Distributed System
It is a collection of independent, heterogeneous computer systems which are physically separated but are connected
together via a network to share resources like files, data, devices, etc. The primary focus of distributed system is to provide
transparency while accessing the shared resource i.e., a user should not worry about the location of the data. There are various
advantages of distributed systems like they help in increasing computation speed, functionality, data availability and reliability.
Example
Novell network
9. Virtual Machine
Virtual machine operating system allows various users to use it as their personal computers. In such type of operating
system various OS environment's can be contained in one computer. For example Windows, Linux and Solaris can be contained
in one computer.

2.2.2 Process Management


Q17. Define the following,
(a) Process
(b) Process control block
(c) Process state diagram.
Answer : Model Paper-I, Q4(b)(i)

(a) Process
Process is the fundamental concept of operating systems structure which is defined as a program under execution
Alternatively, it can also be defined as an active entity that can be assigned to a processor for execution. A process is a
dynamic object that resides in main memory and it includes the current values of the program counter and processor’s
registers. Generally every process contains the following components,
42 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(i) Program code
(ii) Set of data
(iii) Resources and
(iv) Program Status.
Set of Data

Program code Process Resources

Status of Program

figure: process
(b) Process Control Block
The operating system is responsible for process management i.e., it is responsible for allocating the resources, allowing
processes to share and exchange the information, protecting the resources of one process from other processes and even allowing
synchronization between the processes. For this, the operating system will maintain a data structure for every process to depict
the state and resource ownership of that process. PCB is also known as task control block. It contains all the information related
to a process such as given below,
v Process number to identify the process
v Pointers to point to the PCB of processes
v Processe's current state.
v Program counter to store the address of the next executable instruction.
v CPU register's data.
v Flags and switches states.
v Memory range or limit for the processes
v Files opened by the process.
v Process priority
v I/O devices status for the process.
Pointer Process state
Process number
Program counter
CPU registers
Memory allocations
Event information
List of files opened

figure: process Control Block


(c) Process State Diagram
A process when being executed undergoes many states as per the demand. And the execution of the process is controlled
by the operating system. The operating system is also responsible for allocating resources to the processes. In order to explain
the behaviour of the process during their execution, process state transition models are used. The figure shown below depicts a
five-state process model.

Blocked

Event occurs Event wait

Admit Dispatch Release


New Ready Running Exit
Time-out

figure: five State process Transition model


SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 43
Computer SCienCe paper-V information teChnologieS-1
When the number of processes to be executed are large, (v) Running-Blocked
then those processes are moved to a queue and it would be If a running process needs some other event to occur
operated in a Round Robin fashion. A process in the queue can be so that it can proceed with its execution in the running
available in any one of the following states, state, it waits for some time. As the process is currently
1. Running waiting, it is pushed from the running state to the
blocked state by the operating system. And as soon as
A process is said to be in running state, if it is being the event occurs for which the process is waiting, it is
executed by the processor. In a uniprocessor system, only again moved back from blocked to ready state.
one process is executed by the CPU at a time. In case of (vi) Blocked-Ready
multiprocessor systems, many processes can exist in a
running state and the operating system has to keep track As soon as the event occurs for which the process is
waiting, the process is pushed to Ready State from
of all of them.
blocked state.
2. Ready
(vii) Ready-Exit
A process in ready state is waiting for an opportunity to be Some process would stay in the queue just because its
executed. All the ready processes are placed in the ready parent process is not terminated and it terminates when
queue. its parent process gets terminated and thus, a process
3. Blocked can move from ready state to an exit state. This is
similar to the transition of a process from the blocked
In blocked state, the process waits for the occurrence to an exit state.
of an event, in order to be executed. Until that event is
completed, it cannot proceed further. Q18. Explain the process creation and termination.

4. New Answer :
A newly created process is one which has not even been There are two basic operations that can be performed
on a process. They are,
loaded in the main memory, though its associated PCB
has been created. 1. Process creation and
5. Exit 2. Process deletion/termination.

A process is said to be in exit state, if it is aborted or 1. Process Creation


halted due to some reason. An exit process must be The concept of process creation is discussed below,
freed from the pool of executable processes by the (i) When a new process is created, operating system
operating system. assigns a unique Process Identifier (pid) to it and
As shown in the diagram, the process can change their inserts a new entry in primary process table.
states according to the situations given below, (ii) Then the required memory space for all the elements
of process such as program, data and stack is allocated
(i) New-Ready
including space for its Process Control Block (PCB).
When the operating system becomes capable of taking
(iii) Next, the various values in PCB are initialized such as,
an additional process, it moves a process from new to
ready state. (a) Process identification part is filled with PID
assigned to it in step (i) and also its parent’s PID.
(ii) Ready-Running
(b) The processor register values are mostly filled
When a new process has to be selected for running, with zeroes, except for the stack pointer and
the operating systems selects one of the process in the program counter. Stack pointer is filled with the
ready state. This is done either by using ‘scheduler’ or address of stack allocated to it in step (ii) and
‘dispatcher’ (operating system processes). program counter is filled with the address of its
program entry point.
(iii) Running-Exit
(c) The process state information would be set to
If the process which is currently running, either ‘New’.
completes or aborts, that running process must be
(d) Priority would be lowest by default, but user can
moved to an exit state by the operating system.
specify any priority during creation.
(iv) Running-Ready
(e) In the beginning, process is not allocated to any
This transition occurs as per the pre-emption rules of the I/O devices or files. The user has to request them
operating system. This is allowed in order to maintain or if this is a child process it may inherit some
time discipline without any interruption of execution. resources from its parent.

44 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(iv) Then the operating system will link this process to
scheduling queue and the process state would be P1 P2 P3
changed from ‘New’ to ‘Ready’. Now process is 0 24 27 30
competing for the CPU. So,
(v) Additionally, operating system will create some other Waiting time for process P1 = 0 ms
data structures such as log files or accounting files to
Waiting time for process P2 = 24 ms
keep track of processes activity.
Waiting time for process P3 = 27 ms
2. Process Deletion/Termination
0 + 24 + 27 51
Processes are terminated by themselves when they finishes Average waiting time = 3 = = 17 ms
3
executing their last statement, then operating system uses exit( )
If the sequence of arrival is P2, P3, P1, then we get the
system call to delete its context. Then all the resources held by following Gantt chart.
that process like physical and virtual memory, I/O buffers, open
files etc., are taken back by the operating system. A process P P2 P3 P1
can be terminated either by operating system or by the parent 0 3 6 30
process of P. A parent may terminate a process due to one of the
Waiting times for P1, P2, P3 are now 6 ms, 0 ms, 3 ms
following reasons, 6+0+3
respectively and average waiting time is, 3 = 3 ms.
(i) When task given to the child is not required now.
So, average waiting time varies with the variation in process
(ii) When child has taken more resources than its limit. CPU-burst times.
(iii) The parent of the process is exiting, as a result all Another difficulty with FCFS is, it tends to favour
its children are deleted. This is called as cascaded CPU bound processes over I/O bound processes. Consider
termination. that there is a collection of processes one of which mostly
uses CPU and a number of processes which uses I/O devices.
Q19. Explain FCFS, SJF, Priority, Round Robin
scheduling algorithms. When a CPU-bound process is running, all the I/O
bound processes must wait, which causes the I/O devices to
Answer : Model Paper-II, Q4(b)(i)
be idle. After finishing its CPU operation, the CPU bound
Scheduling process moves to an I/O device. Now, all the I/O bound
processes having very short CPU bursts execute quickly and
Scheduling is defined as the activity of deciding, when
move back to I/O queues and causes the CPU to sit idle. In
processes will receive the resources they request. There exist
this way FCFS may result in inefficient use of both processor
several scheduling algorithms among which some are as and I/O devices.
follows,
Once the CPU has been allocated to a process, it
1. First Come First Served (FCFS) Scheduling will not release the CPU until it is terminated or switched
This algorithm allots the CPU to process that requests to the waiting state. So, this algorithm is non-preemptive. It
first from the ready queue. It is considered as the simplest is difficult to implement for time-sharing systems in which
each user gets the CPU on a time based sharing.
algorithm as it works on FIFO(First in First Out) approach.
In the ready queue when a new process requests CPU, it is 2. Shortest Job First (SJF) Scheduling
attached to the tail of the queue and when the CPU is free, it is This algorithm schedules the processes by their CPU
allotted to the process located at the head of the queue. burst times which means the process with less CPU burst
One of the difficulties associated with FCFS is that the time will be processed first, before other processes. If two
average waiting time is quite long. For instance, consider a set processes have same burst times then they will be scheduled
by using FCFS scheduling. This is also called as “shortest
of three processes P1, P2, P3 whose CPU burst times are given
next CPU burst”.
below,
Consider the following example,
Process Burst Time (ms)
Process Burst Time (ms)
P1 24
P1 6
P2 3
P 2 8
P3 3
P3 7
If the sequence of arrival is P1, P2, P3 then we get the
P4 3
following result.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 45
Computer SCienCe paper-V information teChnologieS-1
Using SJF scheduling, the following result is obtained.

P4 P1 P3 P2
0 3 9 16 24

Waiting time for process P1 = 3 ms


Waiting time for process P2 = 16 ms
Waiting time for process P3 = 9 ms
Waiting time for process P4 = 0 ms
3 + 16 + 9 + 0 28
So, average waiting time = 4 = = 7 ms
4
This algorithm gives the minimum average waiting time by moving a short process before a long one which decreases the
waiting time of the short process. CPU needs to know the length of requested process which is difficult to compute. This cannot
be implemented at the level of short-term CPU scheduling and is used frequently in long-term scheduling.
One way to overcome this difficulty is to predict the average length of requested process rather than determining
the length of requested process. This can be done by computing exponential average of length of previous CPU burst value
associated with the process. It can be computed using the formula,
tn + 1 = atn + (1 – a)tn
Where,
tn = Most recent information related to CPU burst
tn = Past history of CPU bursts
a = Parameter that is used to have control over weight of recent and past information.
The SJF algorithm can be considered as preemptive and non-preemptive. In a preemptive SJF, when a process is in running
state and a new process arrives whose CPU burst time is shorter than the active process, then it preempt the active process. It is also
called shortest - remaining time first scheduling.
In a non-preemptive SJF, the process is allocating with CPU till the completion of the process. It is also called as shortest
Path Next (SPN) algorithm.
3. Priority Scheduling
This algorithm associates each process with a priority and the process with highest priority will get the CPU first. If
there are two processes with same priority, FCFS scheduling is used to break the tie. Priorities are of generally some fixed
range of numbers, such as 0 to 7 or 0 to 4064. Here 0 is allotted to the process with lowest CPU burst which is highest interms
of priority.
Depending on the system, the high priority number which can be either lowest number or highest number. Considering
the numbers that represent high priority. For example, consider set of processes, arrived at time 0, in sequence P1, P2, ... P5, and
with the burst time and priority as follows,

Process Burst time (ms) Priority


P1 10 3
P2 1 1
P3 2 3
P4 1 4
P5 5 2

Using priority scheduling, the following Gantt chart is obtained,

P2 P5 P1 P3 P4
0 1 6 16 18 19

46 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
Waiting time for process P1 = 6 Process CPU Burst Time (ms)
Waiting time for process P2 = 0 P1 25
Waiting time for process P3 = 16
P2 4
Waiting time for process P4 = 18
P3 4
Waiting time for process P5 = 1
Let us assume the time quantum as 5 ms. In this case,
The average waiting time
P1 is first allocated with CPU for 5 ms and then it is sent at the
=
6 + 0 + 16 + 18 + 1 41
= 5 = 8.2 ms tail of the queue. P1 requires another 20 seconds to complete its
5 execution. Now, the CPU is allocated to P2 which returns it in 4
The allotment of priorities can be carried out internally ms because it needed only 4 ms to complete and hence it quits
as well as externally. In an internally defined priority, before the expiration of time slice. Now, the CPU is allocated to
priorities are allotted based on the computation of certain P3 which also requires only 4 ms and hence it also quits before
measurable quantities such as CPU burst time, time limits expiration. Now the Gantt chart will be as follows,
etc. In an externally defined priority, priorities are assigned
based on certain external factor associated with the process. P1 P2 P3 P1 P1 P1 P1
An example of such allotment is assigning the priorities based 0 5 9 13 18 23 28 33
on the importance of the process.
Waiting time for process P1 = (13 – 5) = 8
Similar to SJF, priority scheduling can also be used to
Waiting time for process P2 = 5
preemptive and non-preemptive. A major drawback associated
with this algorithm is indefinite blocking which is also called Waiting time for process P3 = 9.
starvation. In this case, a process with lowest priority will The average waiting time associated with the above set
never get the CPU because it keeps on allotting the higher 22
of processes can be computed as, 8 + 5 + 9 = 3 = 7.33 ms
priority to other processes. To avoid this, a technique called 3
‘Aging’ is employed which increases the priority of processes None of the processes allowed to use the CPU for
that are present in the ready queue for a long time. more than one quantum. For this reason, this algorithm is
dependent on the size of time slice. It acts as a typical FCFS
4. Round Robin Scheduling algorithm in case of large time slices whereas, in case of too
This algorithm is considered as a preemptive version small time slices, the algorithm is referred as processor to
of FCFS algorithm which is especially designed to be used sharing with the speed of value of real processors speed.
in time sharing systems. Preemption i.e., switching between Q20. Write a short notes on process synchronization.
various processes is carried out by creating certain time Answer :
intervals called time slices (or) time quantums whose typical
value lies between 10 and 100 ms in length. Based on these Process synchronization is a method of synchronization.
time slices, CPU is allotted to the processes present in the The processes executes in such a way that two processes can
ready queue making the ready queue act as a circular queue. share the data or resource at a time. This is the case when
These processes uses the CPU for 1 quantum of time and then multiple processes run concurrently. Such type of situations give
the CPU is allotted to the next process. rise to inconsistency of data, ambiguous and arbitrary usage of
system's resources.
In a ready queue of RR scheduling new processes
Each program contains a critical section that contains
are added based on FIFO queue. Starting from the head of
instructions that can alter the value of global variable, modify
the ready queue. Each process is allotted with certain time
the file data etc., one solution to this problem is to allow only
interval (time slice) and dispatched.
one process to execute the critical section at a time. When one
During the allocation of CPU to the process, either of process is in critical section, other processes should not enter
the two situations can arise, into the critical section. For this a process must acquire a lock
over the system's resources required by it. Once it exits from the
(a) The process completes within the time slice and the
critical section when the signal is received, the lock is released
scheduler simply allocates the CPU to the next process
so that the processes waiting to enter into the critical section
present in a queue.
can execute and use the resources.
(b) The process does not completes its execution within Wait w
the time slice. In this case, an interrupt is made and the Enter
process is jumped to the tail of the ready queue. Now, Critical
the CPU is allocated to the preceding process.
Section
The average waiting time associated with each process Exit
of RR scheduling algorithm is long. For example, consider a Signal si
set of processes whose CPU burst times are as follows, figure: process Synchronization
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 47
Computer SCienCe paper-V information teChnologieS-1
Q21. What is inter-process communication? What
are the models of IPC? Process 1
Answer :
Shared Memory
Inter Process Communication (IPC)
Interprocess Communication(IPC) is defined as the Process 2
communication between processes. It provides a mechanism
to allow processes to communicate and to synchronize their
actions.
The need for interprocess communication are,
(i) Sharing of information
(ii) High computation speed
(iii) System’s modularity
(iv) Convenience to users.
Kernel
(i) Sharing of Information
A specific type of information may be useful to figure: Shared memory System
many users. So, in order to fulfil this an cooperative (ii) Message Passing System
environment must be created wherein the users can gain In message passing system the job of operating system
access to all resources concurrently. is to perform both tasks i.e., providing memory space and
(ii) High Computation Speed performing communication. The main function of message
The execution of the particular task can be enhanced passing system is to allow processes to communicate with each
by dividing the task into various subtasks wherein each other without the need to resort to share variables. The message
subtask can be executed parallely along with others. sent by a process can be of either fixed size or variable size. If
However, high computation speed can be obtained two processes wants to communicate then they must send and
through multiple processing elements such as CPU’s receive messages from each other. Thus, a communication link
as I/O channels. must exist between them which can be implemented in a variety
of ways.
(iii) System’s Modularity
Process 1
The systems can be manufactured in a modular way i.e.,
breaking the system’s functions into various separate
processes or threads. Process 2
(iv) Convenience to Users
The cooperating environment facilitates the convience
to users. Many users can perform multitasking i.e., they
work on more than one task.
Example
The user can handle printing, editing and compiling
simultaneously. Message Queue
Models of IPC
Inter process communication has two different models. m0 m1 m2 m3 mn
They are as follows,
(i) Shared memory system Kernel
(ii) Message passing system. figure: message passing System
(i) Shared Memory System In message passing system, if two processes desire to
Shared memory system requires communicating process communicate with each other, then they can communicate in the
to share some variables. The processes are expected to exchange following ways,
information through the use of shared variables. Here, the (a) Direct and indirect communication.
operating system needs to provide only shared memory and (b) Symmetric and asymmetric communication.
the responsibility of providing communication rests with the
application programmers and the operating system does not (c) Automatic and explicit buffering.
interfere in communication. (d) Send by referred and send by copy.
48 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
Q22. Explain about deadlock. Out of the four conditions described above, the first
three conditions are necessary but not enough for the existence
Answer :
of a deadlock. The fourth condition actually results from the
Deadlock first three conditions i.e., the first three conditions results in a
A situation in which a process waits indefinitely for sequence of events that finally leads to an unresolved circular
requested resources and that resources are held by other wait which is actually the main cause for the occurrence of
process in a waiting state. This situation results in disallowing deadlock.
the process to change its state which is called as deadlock Deadlock Prevention
situation.
Dead lock can be prevented by any of the below three ways,
P1
1. Deadlock Prevention and Avoidance
Deadlock prevention means placing restrictions on
resource requests so that deadlock cannot occur. Deadlock
R2 R1
avoidance does not impose any rules but, here each resource
request is carefully analyzed to see whether it could be safely
fulfilled without causing deadlock. The drawback of this
P2 scheme is its requirement of information in advance about
how resources are to be requested. Different algorithms
figure: deadlock
require different type and amount of information like some
Conditions for the Deadlock require maximum number of resources that each process
A deadlock can occur if the following four conditions requires etc
hold simultaneously in a system, 2. Deadlock Detection and Recovery
1. Mutual Exclusion When deadlock is not avoided when it is detected, then
In a non-sharable environment, where no more than the operating system will abort the process or preempts the
a single process can be allocated with a particular resources from that process.
resource at a time is referred to as mutual exclusion. When a deadlock has been detected in the system by
In such an environment, if a resource which is already deadlock detection algorithms, then it has to be recovered by
in used by one process and is requested by some other using some recovery mechanism. But this is not a good option.
process, then it is kept on hold until that particular 3. Deadlock Ignorance
resource is released.
This type of approach indicates that the deadlock will
2. Hold and Wait never occur. It occurs very rarely. For example, once in a year.
A process which is already holding a resource cannot So, it is better to let them happen and reboot the system rather
make use of other additional resources which are being than to use deadlock prevention or detection strategies. Both
used. This situation is known as hold and wait. windows and unix operating systems use this method.

3. No Preemption 2.2.3 Memory Management


A resource allocated to one process can be allocated to Q23. Write in brief about multiple partition allocation.
other only when the process holding it locates it after
Answer :
completion. This means that the resources cannot be
preempted. Multiple Partition Allocation

4. Circular Wait The operating system maintains list of free memory parts
multiple partition allocation that are ready to be allocated. The
There exists a list of waiting processes (P0, P1,..., Pn)
memory is scanned for the appropriate hole and allocated to
such that process P0 is waiting for a resource currently
the processes when required. When the process completes its
under the usage by process P1, P1 is waiting for a
execution, the memory is released and added to the list of holes.
resource that is held by P2, P2 is waiting for a resource
Allocation of memory depends on the below three options.
that is held by P3 and so on. Finally, a process Pn is
The hole that matches one of the following is allocated to the
waiting for the resource held by P0.
process,
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 49
Computer SCienCe paper-V information teChnologieS-1
(i) First Fit
The first hole whose size is as big as required by the process will be allocated.
(ii) Best Fit
The hole whose size is small enough as required by the process will be allocated.
(iii) Worst Fit
The hole that is largest of all in the memory will be allocated to the process.
A major drawback of this scheme is memory fragmentation. It occurs when the free memory is broken into small pieces
while allocation and deallocation. These small pieces cannot be used by any process and remain unused.
Example
Consider a situation in which only one process is stored in main memory of the computer.
900
800
600
450
300
P1
100
0
(a) Allocate the memory for the process P2 of size 150K using the first fit technique.
(b) Allocate the memory for process P3 of size 50K using the best fit technique.
(c) Allocate memory for process P4 of size 200Kk using the worst fit technique.
(d) Allocate memory for process P5 of size 300K using any technique.
Solution for these four problems is as follows,
(a)
900
800
600
450
P2
300
P1
100
0
figure: process p2 of Size 150K
(b)
900
800
600
450
P2
300
P1
100
50
P3
0
figure: process p3 of Size 50K
50 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
(c)
900
800
P4
600
450
P2
300
P1
100
50
P3
0
figure: process p4 of Size 200K
(d) Even if 300K of memory for P5 is available in the memory, it cannot be allocated because the available memory is
fragmented. It can only be handled by techniques like paging and segmentation.
Q24. Explain the paging concepts.
Answer : Model Paper-I, Q4(b)(ii)

Paging
It is a non-contiguous memory allocation scheme. It divides the physical memory into fixed-sized blocks called as
frames and logical memory into pages. The page and block are of the same size. Hence, one logical page fits exactly in one
physical block.
Each process ‘Pi’ residing on disk is composed of several pages. Whenever ‘Pi’ has to be executed, its pages are brought
into main memory’s frames. There is no restriction of pages being contiguous, they can be fragmented, in main memory. Each
process maintains a table which maps its page numbers to the block numbers they are residing in.
Frame
Process Pi number
Some other
0 pages xyz
1 Pi's page 4
Process Pi Page Frame
No. No. 2 xyz
Page Page
1 2 1 5 3 Pi's page 2
2 3
Page Page
3 6
4 xyz
3 4
4 1 5 Pi's page 1
Disk 6 Pi's page 3
7 xyz
8 xyz

Main memory
figure (1): mapping pages to frames
Paging Implementation
In basic implementation of paging, the physical memory is divided into fixed -sized blocks called frames and logical
memory into pages.
There is a page table available which stores the base address of each page available in main memory and the offset
act as descriptor within the page. The base address is combined with offset to get address of a physical memory location.
The system makes use of a paging table to implement paging. When a process is to be executed, its pages are
loaded into free frames in the physical memory. The information about frame number, where a page is stored is entered
in the page table. During the process execution, CPU generates a logical address that comprises of page number (P) and
offset within the page (d). The page number 'p' is used to index into a page table and fetch corresponding frame number.
The physical address is obtained by combining the frame number with the offset. Logical address consists of page
number and page offset.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 51
Computer SCienCe paper-V information teChnologieS-1

Page number (P) = n - m Page offset = m

22 bits 10 bits

P = Index into the page table


D = Displacement within the page
Size of the logical address = n = 32
Number of bits to represent page offset = m = 10
Number of bits to represent page number n – m = 22
Page size = 2m = 210 = 1024 bytes

The lower order bits of a logical address represent page offset and higher order bits represent page number. Max size of
logical address space is 232 bytes i.e., 4 G bytes.

So, the maximum length of a page table of a process = 4 m entries, each entry being 4 bytes. So a page table would
occupy 16 M bytes in RAM.

There is a page table available which stores the base address of each page available in main memory and the offset act
as descriptor within the page. The base address is combined with offset to get address of a physical memory location. The figure (2)
shows the hardware requirement of paging scheme.
Logical address
Page
CPU Offset
Number

Page number Frame number

Frame
Frame number +
number Physical
address
Main
memory

Page table

figure (2): paging Implementation

Q25. Write a brief note on segmentation.


Answer :
The concept of segmentation helps the programmer to view memory as consisting of multiple address spaces or segments.
Segments may be of unequal size. Memory references consists of a (segment number, offset) form of address.
The organization has a number of advantages. They are as follows,
(i) It simplifies handling of growing data structures.
(ii) It allows programs to be altered and recompiled independently, without requiring entire set of programs to be relinked
and reloaded.
(iii) It lends itself to share among processes.
(iv) It lends itself to protection.
52 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
For a virtual memory scheme based on segmentation, there is a unique segment table for each process. Because only
some of the segments of a process may be in main memory, a bit is needed to indicate if corresponding segment is present in
main memory and if present, then the entry also includes starting address and length of the segment. There is also a modify
bit indicating whether the contents of the segment have been altered, since the segment was last loaded into main memory. If
protection or sharing is managed at segment level, there are other control bits for them.
Segment table is of variable length and so cannot be held in registers but must be held in main memory. When a particular
process is running, the starting address of the segment table for that process is held in a register. The segment number of a virtual
address is used to index the table and look up the corresponding main memory address from the start of segment. This is added
to the offset portion of virtual address to produce desired real address.
V i r t ua l a ddr e s s S e gm e nt ttable
Segment a bl e
Seg # Offset = d + BBase
a s e +d

R e gi s t e r
Register
Seg table ptr
d S e gm e nt
Segment
Segment table
S e g#
Seg

Length Base

Program M a i n memory
Main m e m or y
S e gm e nt a t i on mechanism
Segmentation m e c ha ni s m

figure: address Translation in a Segmentation Systems

2.2.4 File Management


Q26. Define file. Write about data hierarchy and file attributes.
Answer : Model Paper-II, Q4(b)(ii)
File
A file is grouping of similar records or related information together which is stored in secondary memory. Both the data
as well as programs of all users are stored in files. A collection of files is called directory. They are used to organize files. Files
and directories are the basic mechanism of a file system.
In order to store data on secondary memory, it is necessary to create a file and input data into it, which is then stored in
secondary memory. Without a file, data cannot be store in secondary memory.
Data Hierarchy
The data storage hierarchy consists of the levels of the data stored in a computer file: bits, bytes (characters), fields, record,
files, and databases.
(a) Bits, Bytes
Bits and bytes are the building blocks for representing data, whether it is being processed, stored, or telecommunicated.
(b) Field
A field is a unit of data consisting of one or more characters (byte). An example of a field is name, address or Social
Security Number.
(c) Record
A record is a collection of related fields. An example of a record would be name, address or Social Security Numbers.
(d) File
A file is a collection of related records. An example of a file is a data collected on everyone employed in the same department
of a company, including all names, addresses, and Social Security Numbers.
(e) Database
A database is an organized collection of integrated files. A company database might include files on all past and current
employees in all departments. There would be various files for each employee: pay roll, retirement benefits, sales quotas
and achievements (if in sales), and so on.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 53
Computer SCienCe paper-V information teChnologieS-1
Attributes of File (iii) Reading from a File
Each file has several attributes. They are, To read from a particular file, user has to specify the
(a) Name filename. The operating system starts reading file
from the current position of read-pointer, which is
It is a symbolic name of the file which gives associated with each process of reading the file.
convenience to users to refer the file. It is a string of
characters like myfile.txt, resume.doc etc. (iv) File Seek (Repositioning with in a File)
It refers to repositioning the current-file-position
(b) Identifier
pointer to a specified location within a file. It is done
It is a unique number which is used to identify a before reading or writing into file.
particular file by the file system. It is not in user-readable
(v) File Deletion
form.
User specifies the filename to be deleted. Operating
(c) Type
system searches the file in directory table and deletes
There are different types of files depending on the type the entry of that file from directory. Then, it marks the
of data they store like text, executable code, sound, space occupied by that file as free.
video, image etc. This attribute tells the type of data
(vi) Truncating a File
stored in the file.
This operation erases some content of the file and
(d) Location
keeps all its attributes untouched except the file length.
It specifies the physical address of the file located on a
(vii) Retrieval
particular storage device.
Retrieval of data from a file is done by extracting file
(e) Size
data. This can be done for enquiry purpose or report
It indicates the size of a file which is usually measured in generation purpose. Enquiry needs less amount of
bytes. It can also specify the maximum size allowed to a data. Whereas report generation needs large amounts
file. of data.
(f) Protection (viii) Maintenance
This attribute determines the access control Maintaining a file is restructuring or reorganizing a
information i.e., who are allowed to use this file and file for the performance improvement of the programs
with what privileges. which access and use the file data. Restructing
Other miscellaneous information include date and time involves changes to the structual aspects of file where
at which the file was created, last modification done, last usage as organizing involves changes to complete file
etc. organization.

Q27. What are the file operations? Explain them. The basic operations discussed above can be combined
in various ways to create other operations such as appending
Answer : data at the end of file, renaming existing file etc. Before
File Operations performing any of the file operations, it needs to be opened
using open( ) system call. It accepts various mode informations
Users perform many operations on files by using the
in which file has to be opened like read-only, read-write,
system calls provided by operating system. For example,
append mode etc.
create( ), open( ), read( ), write( ), close( ), truncate( ), delete( )
etc. The following are the six basic file operations, Q28. Write short notes on,
(i) File Creation (a) Sequential file organization
When a new file is created by user by calling (b) Relative file organization
respective system call, operating system performs two (c) Indexed sequential file organization.
operations. Firstly, it allocates space for that file and
secondly, it inserts a new entry in the directory table Answer :
for this file. (a) Sequential File Organization
(ii) Writing to a File Sequential file is the most common form of file. In this
To write into a particular file, user must specify the type of file, a fixed format is used for records. All records are
filename and data that has to be written. The operating of same length, consisting of the same number of fixed-length
system searches the directory to find that file, open it fields in a particular order. Because the length and position of
and use a write-pointer to point the location of file. As each field is known, only the values of fields need to be stored,
data is written into the file, the write-pointer is updated the field name and length for each field are attributes of the file
to specify the next write location. structure.
54 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
The first field in each record, is referred to as the key The relative files are used for both random as well as
field. The key field uniquely identifies the record, thus key sequential access.
values for different records are always different. Further, the
records are stored in key sequence, alphabetical order for a text Record Number Records in Memory
key, and numerical order for a numerical key. The sequential
0 Record 0
file organisation is the only one that is easily stored on tape as
well as on a disk. 1 Record 1
The sequential file provides poor performance due to 2 Record 2
the interactive applications that involves queries and updates 3 FREE
of individual records. Access requires the sequential search of
the file for a key match. More efficient search techniques can
be employed, if large amount of the file can be brought into
main memory at once. Nevertheless, considerable processing 30 Record 30
and delays are encountered to access a record in a sequential 31 FREE
file.
figure (b): relative file organization

The record number starts at 0 and ends at highest record


number '– 1'. The records indicating 'FREE' are the empty
records. The fixed length records can be accessed randomly
using the below formula.

Address of the ith record = Base address + (i – 1)* record


length.

For example to access 2nd record

= 1000 + (2 – 1) * 10

= 1000 +10

= 1010
figure (a): Sequential file organization
An alternative way is to organise the sequential file (c) Indexed Sequential File Organization
physically as a linked list. One or more records are stored in Indexed sequential file organization overcomes the
each physical block. Each block on disk contains a pointer to disadvantages of the sequential file organization. Records being
the next block. The insertion of new records involves pointer the key characteristic of the sequential file are maintained by
manipulation, but does not require the new records which the indexed sequential file and are used to organize in sequence
occupy a particular physical block position. Thus, some added
based on a key field. The two features added are an index to a
convenience is obtained at the cost of additional processing and
file to support random access and an overflow file. The index
overhead.
provides a lookup capability to reach quickly to the limit of a
In this type of sequencing, the physical organisation of desired record. The overflow file is similar to the log file used
the file on tape or disk directly matches the logical organisation with a sequential file.
of the file. In this case, the usual procedure is to place new records
in a separate file, called a log file or transaction file. Periodically, A single level of indexing is the simplest indexed
a batch update is performed that merges the log file with the sequential structure used. A key field which is same in main
master file to produce a new file in correct key sequence. file and the pointer into the main file are the two fields present
into each record of the index file.
(b) Relative File Organization
Relative file organization will provide an efficient Consider an example of a sequential file with one million
method to access separate records. The file records are sorted records, to search for a particular key value with an average of
based on the relative key. The position of the record can be 500,000 record accesses. Now, suppose that an index containing
known by the record number. Number of records are represented 1000 entries is constructed with keys in the index more or
by n where 0 is the first record and n – 1 is the last record. The less evenly distributed over the main file. Now, it will take an
relative files and records are sorted in ascending order. A relative average 500 accesses to the index file, followed by 500 accesses
file is same as a single dimension table stored on the disk. It to the main file, to find the record. The average search length
contains a relative record number as index of table. is reduced from 5000,000 to 1000.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 55
Computer SCienCe paper-V information teChnologieS-1
The indexed sequential file greatly reduces the time required to access a single record without affecting the sequential nature
of the file. To process the entire file sequentially, the records of the main file are processed in sequence until a pointer to the overflow
file is found. Then accessing continues in the overflow file until a null pointer is encountered, at which time-accessing of the main
file is resumed where it was left off.
To provide even greater efficiency in access, multiple levels of indexing can be used. Thus, the lowest level of index file
is treated as a sequential file and a higher level of index file is created for that file.

figure (c): Indexed Sequential file organization


2.2.5 Device Management
Q29. Discuss about device management.
Answer : Model Paper-III, Q4(b)(i)

A computer is connected to several peripheral devices like mouse, printer, keyboard etc. They tend to transmit or receive
the data in terms of characters, blocks either sequentially or randomly. It is the responsibility of the operating system to control and
manage the devices. Every device is accompained by a device driver software using which the operating system communicates
with them.
Operating System

Device driver 1 Device driver 2 Device driver 3 Device driver n

Device 1 Device 2 Device 3 Device n


figure: operating System Interaction with devices
Other than managing the I/O devices, the operating system provides various services such as I/O scheduling, buffering,
polling, DMA and interrupt handling.
1. I/O Scheduling
The operating system schedules the I/O requests received from the processes. It also reschedules the I/O requests sent by
the processes for performance improvement of the system. The requests are maintained in request queue that can be rearranged
for scheduling the I/O requests.
2. Buffering
A special storage place where data to be transmitted between systems (or) applications are stored is called as a buffer.
This function is one of the most prominent task of an I/O module. The rate at which the data is transferred in or out of the
processor is very high. However, in case of peripheral devices, although the orders of magnitude is less, it still contains a wide
range. The data which is retrieved from the processor is transmitted to an I/O module in an instantaneous break. Buffering of
this data is done and it is transmitted at its data rate to a peripheral device. Whereas, in the other case, buffering of data is done to
avoid the tie up of memory in terms of a slow transfer operation. Therefore, an I/O module should be capable of operating at the
speeds of both memory and device. In case, if the operating speed of an I/O device is greater than the speed of memory access,
then the buffering operation required is performed by the I/O module.
56 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
3. Polling
In the process of polling, the CPU will wait for a device until it is ready to perform the I/O operation. It will read the
status register repeatedly until the busy bit is cleared from it. Busy bit indicates that the device is busy in performing some task.
4. Direct Memory Access (DMA)
DMA or Direct Memory Access is generally granted to an independent block which resides either on the system bus or
near the I/O module. Whenever the processor analyzes the requirement of performing an I/O activity, it activates the given DMA
module by transmitting special information consisting of data such as, the address of the given I/O device, status of read/write
operations, address of the memory location, amount of data to read/write etc., and the processor resume back to its execution.
The DMA module based on this information performs the given task and interrupts the processor about it’s status. Hence, in this
process, the processor is involved only at the beginning and at the end. As the I/O devices can now transmit their data or interact
with the memory directly, the process is called DMA.
5. Interrupt Handling
An interrupt is an asynchronous event that halts the normal program execution and diverts the program flow temporarily
to an interrupted routine. Interrupts are caused both by the hardware and software. On occurrence of an interrupt, the current
status of the running program is stored and the control is transferred to ISR (which is responsible for handling interrupts) after
its execution, the control switches back to the execution of the suspended program.
Interrupts are handled by interrupt handler. Interrupts are of three types,
(a) Hardware Interrupts
Hardware interrupts are categorized into two types. i.e., internal interrupts and external interrupts.
(i) Internal Interrupts
Internet interrupts are due to exceptional conditions generated by the program itself but not by the external event. Signals
generated in the CPU hardware also leads to the occurrence of internal interrupt. Internal interrupts are generated due
to error condition produced by the execution of an illegal or instruction. Examples of this type of interrupts are register
overflow, divided by zero, use of unacceptable operation codes stack overflow and safety or protection breach. The
programmer experience such condition during the premature termination of instruction execution.
(ii) External Interrupts
External interrupts are derived from a hardware signals. Sources of hardware signal are input/output devices, timer,
console switch or any other external sources such as a power sensing circuit. For example, an I/O device controller may
request for data transfer or it may ask for CPU’s attention after it has finished the data transfer, power failure or elapsed
time of an event.
(b) Software Interrupts
Software interrupts is a special call instruction that acts as an interrupt but not as a subroutine call. Software interrupt
is caused by executing an instruction of type INT. Main difference between internal interrupts and software interrupts is that
software interrupts are under the control of the programmer where as internal interrupts are not (i.e., the programmer can use
software interrupt to raise an interrupt procedure at any point in the program).
(c) Traps
A trap is a software-generated interrupt detected by the CPU due to errors such as divide by zero. It is synchronous in
nature. It can also be generated by a user intentionally to catch errors or to call operating system routines.

2.2.6 Security management


Q30. Write about security management.
Answer :
The security concept in the operating system provides protection to the resources like data, programs, CPU, memory, disk
etc. The operating system provides security at below two levels,
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 57
Computer SCienCe paper-V information teChnologieS-1
1. External Security It is not an attack but an automatic tool which tries to
External security should only be implemented when the create TCP/IP connections on a particular port or a group
system is either connected to the network or internet. It can be of ports and scans them for any vulnerability or bug. If
provided by the following, found, it can use that bug for exploiting the system by
(a) Authentication installing Trojan horses, back-door programs etc., in it.
Bug (or vulnerability) refers to any chance of entering
Authentication is the process of verifying the system
the system unauthorizedly.
users so that only the authentic/original users perform the
operations on computer. An authentic user is verified through (vi) Denial of Service
username and password or by using physical and unique
attributes. The Denial of Service(DOS) attack prevents the user
from reasonable and legitimate use of system. It may
(b) Program Threats
happen accidentally, but usually it is an intrusion activity.
Operating system manages and controls the devices,
The aim of attacker is not only to gain resources or steal
resources and data in the computer. A user can develop and
information but also to disturb the use of system.
even execute the programs that might involve transmission of
user credentials over the network to some hacker. These type 2. Internal Security
of programs are called program threats. Some of them are as
follows, Internal security enables that, the resources are efficiently
used by the computer. The operating system implements concept
(i) Trojan Horse of priority and assigns the resource for one process at a time
A Trojan horse is a program that contains two parts, one based on the priority.
that performs legal activities which is known to operating
system and users and the other part which is hidden 2.2.7 Command Interpreter
and perform malicious activities like masquerading,
message modification etc. Q31. Write about the command interpreter.
(ii) Trap Door Answer :
In this type of attack, designer (or) programmer reserves
certain region in the software that can only be accessible Command Interpreter
by them. For example, the programmer may write code Command interpreter serves as a bridge between user
which checks for a special userID and password, which and operating system. It operates upon the commands given by
knows. These types of security breaching holes are the user and OS executes them by converting into system calls.
called as trap doors. It mainly emphasizes upon fetching and executing the next
(iii) Logic Bomb commands given by the user. In reality, the command interpreter
is not considered to be a part of kernel because many command
These are programs which perform normal activity and
interpreters such as shell and UNIX though substantiated by
operation but breaches security under certain predefined
OS but does not require kernel mode to run.
circumstances. When certain situation occurs or certain
parameters are met, the logic bomb explodes causing When separated from kernel it produces two main
damage to the system security. Consider a notorious benefits to the user. They are,
example, an employee writes a logic bomb code to
check whether the user is still employed, if yes nothing (i) It allows aesthetic modification to the interpreter
happens, if no certain damage to system is performed. and if the kernel code is unchangeable the
interpreter also cannot be changed.
(vi) Viruses
(ii) It allows malicious activity to acquire the control
Viruses is a program threat which is designed to damage
upon a specific part of the kernel provided if the
system by deleting or modifying files, causing system
command interpreter is made a part of the kernel.
to malfunction or simply crash and infact effect other
programs by copying itself throughout the system or Types of Command Interpreter
network. The virus code is usually placed or embedded
The command interpreter's user interface can be divided
in a legal program.
into two group's, namely CLI and GUI.
(v) Worms
1. CLI (Command Line Interface)
It is a program that replicates itself at a higher rate and
spreads over other computer systems in a network, exploit CLI is also referred as command line user interface, text
holes in their security system, consumes their CPU time. interface, sole user interface or character user interface. Using
They are more difficult to trace than viruses due to their CLI the user's can communicate with the program by typing
high rate replicating behaviour. Port scanning crackers the commands at the prompt. Such type of interface make use
detect the vulnerabilities of system by port scanning. of keyboard for issuing commands.
58 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
CLI is used for the below reasons, Applications of GUI
v It provides concise as well as powerful means for GUI is applied in below areas other than computers.
controlling the program or operating system. v House hold appliances, offices and industry equipments
v The programs can be automated with via CLI scripting. make use of GUI.
v It is useful in certain types of operations such as renaming. v Automated Teller Machines (ATM's)
v The commands in CLI are stable even though new one's v Hand held devices such as MP3 players, mobile phones,
are added. gaming devices etc.
v Some of the networking devices can be manipulated v Point of sale kiosks and information kiosks at railway
only by CLI while sharing the resources. stations or museums.
2. GUI (Graphical User Interface) v Airline self ticketing and check-in.
GUI stands for graphical user interface. It allows user's
2.2.8 Windows, linux
to communicate with computer through the below components.
(a) Pointer Q32. Explain about windows operating system.
Pointer is an arrow using which users can select the Answer : Model Paper-III, Q4(b)(Ii)
commands or objects on the screen. Windows Operating System
(b) Menus Windows operating system has been evolved from the
Menu is GUI element that displays a set of available year 1985 in which it is was introduced initially. Its progress in
commands. uneven and not always in forward direction. Windows in today's
world is reliable, secure, easy to use and ubiquitous completely.
(c) Icon
The emergence of the Windows OS is from Windows 1.0
They are the pictures representing commands, files or in the year 1985 to Window 7 in 2009. Since 24 years various
windows, versions of Windows got released. The below table depicts the
(d) Pointing Device overview of the history of the Windows OS.
It is a device using which user can select objects on the Basic Versions of Windows
screen. The basic versions of windows are discussed below,
(e) Window 1. Windows 3.1
Window displays menus, icons, files, objects etc., on the Windows 3.1 is an enhanced version of DOS operating
screen. system, with GUI technology. Icon or programs can be
Advantages of GUI used by the users in order to activate the program. Multiple
applications can be opened in multiple windows.
The advantages of graphical user interface are as follows,
2. Windows 95
v It allows users to access multiple windows at the same
Windows 95 is an enhancement of microcomputers.
time.
It is powerful, fast and yields better performance. It
v It supports the use of pointing devices such as light pen, occupies 20 MB of disc space and 8 MB of RAM. It is
mouse. Thus, it enhances efficiency of command issue also referred to as windows 4.0 and is similar to that of
procedure. Windows 3.1. But, it is not dependent upon DOS and
v It provides command selection option with the help of known as a complete operating system. It has feature
user friendly and appearing menu selection system on called plug and play.
the top of window. 3. Windows 98
v They simplify the task of transferring of data between Windows 98 is with internet explorer in built. It contain
applications tools which allow a computer to run more fast than
v They provide feedback regarding the effect of users Windows 95 without using any additional hardware. It
action. also contain programs which optimize the computers
efficiency.
Disadvantages of GUI
4. Windows(Me)
v GUI needs more resources compared to CLI inorder
Windows Me is next version to microsoft Windows 98.
to load the graphical elements like icons, menus, fonts
It is similar to that of Windows 98 and has improvements
including video and mouse drivers.
in core operating system. It has impressive digital media
v Most of the advanced tasks are done by using the CLI features such as protection for system calls, restoring old
even though GUI is providing good control over the file configuration, fast starter, hibernate or resume, new TCP/
and operating systems. IP stack and Windows media player.
SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 59
Computer SCienCe paper-V information teChnologieS-1
5. Windows 2000
Windows 2000 is next version in the Windows operating system developed for PC’s. It depends upon Windows NT
technology.
6. Windows XP
Windows XP is a new version among all the existing operating systems. It doesn’t contain any icons to be used. It provides the
user with a ‘start’ menu for pulling up the programs from it. It allows the users to create short cuts and icons on the screen if
needed. It contain features such as better support for digital music and photography, and instant messaging system with audio
or video. It also provides a help facility through which some other person can take remote control of PC to fix a problem.
7. Windows NT
Windows NT is a type of 32 bit microkernel-centred multitasking operating system. NT indicates new technology. It
includes many features of the existing operating systems and addresses the physical memory through 32 bit integers.
8. Windows NT Work Station
Windows NT work station is developed for the system whose resources are exclusively used by a single user.
9. Windows NT Server
Windows NT server is developed for the system such as file servers, print servers, network name servers, etc.
10. Windows NT Server Enterprise Edition
Window NT Server Enterprise Edition is developed to run distributed applications.
11. Windows Vista
Windows vista is a new line of operating system for PC and laptops. It is easier, safer and more entertaining to be used irrespective
of time and location. It allows the information to be shared on PC or on web. It add features such as windows defender which
protects the PC from pop ups, slow performance, security threats which are caused by the other unnecessary software.
12. Windows 7
Windows 7 is the latest version being used. It focuses on incremental upgrade to the windows line with the purpose to be
fully compatible with applications and hardware with which Windows vista is compatible. It doesn’t include windows
calendar, windows-mail, windows movie maker and windows photo gallery.
13. Windows 8
Windows 8 involves a touch optimized user interface. It is a complete new operating system and easy to be used on the
tablets. It has windows defender and windows smart screen that protect the computer system from viruses, spyware and
other malicious software. It allows users to login into the microsoft account so that they can use the applications, settings,
layout etc. Users can save, view and even edit the documents and photos online using sky drive.
Q33. Give a brief introduction on Linux.
Answer :
Linux
Linux is an open source operating system which is powerful and easy to implement. It can be easily installed onto the
system. It can run on various platforms and can be shared and distributed freely. It is used to develop the applications, interfaces,
programs and software. In addition to these, it is also used in real-time programs and embedded systems. Its widespread use
is making it evolve rapidly. Linux observes POSIX (Portable Operating System Interface) specifications and is provided with
extensions similar to unix system V and BSD.
Functionalities of Linux
The functionalities of Linux operating system are as follows,
1. It is a multi-user, multi-process, multi-processor and a multi-platform based operating system.
2. It manages control messages and favours inter-process communication.
3. It supports pseudo-terminals and process control.
4. It supports TCP/IP and other network protocols.
5. It supports wide variety of peripheral devices like sound cards, graphics interfaces, networks, SCSI etc.
6. It has a buffer cache used for storing buffer inputs and outputs.
7. It request for a page from page memory management, since it will not load a page until it is required in the memory.
8. It provides dynamic and shared libraries. Dynamic libraries are loaded when several applications demands for it.
60 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.
UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V

internal assessment

objeCtive type
I. Multiple Choice
1. __________operating systems runs more than one applications. [ ]

(a) Single-user (b) Multi-tasking

(c) Multi-user (d) Multi-processing

2. DOS stands for __________. [ ]

(a) Data operating system (b) Dual-core operating system

(c) Distinct operating system (d) Disk operating system

3. A person who intrudes the network security __________. [ ]

(a) Hacker (b) Virus

(c) Worms (d) None of the above

4. __________ icon allow users to browse things present within the computer. [ ]

(a) Desktop (b) Control panel

(c) My computer (d) Recycle bin

5. __________ is used for configuring different windows setting. [ ]

(a) Network places (b) Control panel

(c) My documents (d) My computer

6. __________ is a user interface element. [ ]

(a) Desktop (b) My computer

(c) Network places (d) Start menu

7. A program in execution is known as, __________. [ ]

(a) Thread (b) State

(c) Process (d) Status

8. _________ is not a requirement for critical section problem. [ ]

(a) Mutual exclusion (b) Deadlock

(c) Progress (d) Bounded waiting

9. _____ is not on allocation algorithm. [ ]

(a) First fit (b) Best fit

(c) Worst fit (d) Mixed fit

10. In which type of file does a record consists of same number of fixed-length fields? [ ]

(a) Sequential (b) Indexed

(c) Indexed sequential (d) Direct


SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 61
Computer SCienCe paper-V information teChnologieS-1

II. Fill in the Blanks

1. An __________ is a software that controls the hardware.

2. __________ operating system allow a single user to perform operation on the computer at a given instance of time.

3. A __________ is a software program that replicate itself and infects another files without the knowledge of users.

4. __________ is the essential icon present on the window.

5. __________ contains some useful tool to run the system smoothly.

6. The process of loading the operating system into the systems internal memory is referred as __________.

7. __________ are operating system build on real-time applications.

8. Control panel is one of the important component of __________.


9. _________ refers to a situation wherein processes wait indefinitely for being scheduled.

10. Programmer can view the memory as segments in the concept of __________.

62 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


UNIT-2 CompUTer SofTware aNd operaTINg SySTemS Computer SCienCe paper-V
Key

I. Multiple Choice

1. (b) 2. (d) 3. (a) 4. (c) 5. (b)

6. (d) 7. (c) 8. (b) 9. (d) 10. (a)

II. Fill in the Blanks


1. Operating system

2. Single user

3. Virus

4. Start icon

5. Window accessories

6. Booting process

7. Real time

8. MS window GUI

9. Starvation

10. Segmentation.

SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. 63


Computer SCienCe paper-V information teChnologieS-1
III. Very Short Questions and Answers
Q1. Define computer software.

Answer :
Computer software is a collection of programs that directs the computer to perform some tasks. It is developed by the
programmers and is converted by the compiler into the language understandable by the computer.

Q2. What is application software?

Answer :
The software that helps the user in accomplishing some specific task is referred to as application software. A single
program or a set of programs forms the application software.
Q3. What is system software?

Answer :
A set of programs that is capable of controlling and supporting the computer system and its information processing
activities is called system software.
Q4. Define operating system.

Answer :
An operating system is a software or computer program that controls the computer hardware. It acts as an interface or an
intermediate between the user and hardware.

Q5. Define command interpreter.

Answer :
Command interpreter serves as a bridge between user and operating system. It operates upon the commands given by the
user and OS executes them by converting into system calls.

64 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


Important QuestIons Computer SCienCe paper-V

UnItwIse Important QUestIons

Unit- 1
Short QueStionS

Q1. List any four characteristics of a computer.

Answer : Important Question

For answer refer Unit-I, Page No. 2, Q.No. 2.


Q2. List the applications of computers.

Answer : Important Question

For answer refer Unit-I, Page No. 2, Q.No. 3.


Q3. Write short notes on primary and secondary memory.

Answer : Important Question

For answer refer Unit-I, Page No. 3, Q.No. 6.


Q4. Write brief note on RaM and ROM.

Answer : Important Question

For answer refer Unit-I, Page No. 3, Q.No. 7.


Q5. What is USB flash drive?

Answer : Important Question

For answer refer Unit-I, Page No. 4, Q.No. 9.


Q6. Define memory cards.

Answer : Important Question

For answer refer Unit-I, Page No. 4, Q.No. 10.


Q7. What are the advantages of flash drive?

Answer : Important Question

For answer refer Unit-I, Page No. 4, Q.No. 11.


eSSay QueStionS

Q8. What is computer? Explain in brief the significant characteristics of a computer.

Answer : Important Question

For answer refer Unit-I, Page No. 5, Q.No. 13.


Q9. Discuss in brief about the various generations of computers.

Answer : Important Question

For answer refer Unit-I, Page No. 6, Q.No. 14.

SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. IQ.1


Computer SCienCe paper-V InformatIon technologIes-1
Q10. Explain the block diagram of a computer.

Answer : Important Question

For answer refer Unit-I, Page No. 9, Q.No. 16.

Q11. Explain the various applications of computers.

Answer : Important Question

For answer refer Unit-I, Page No. 11, Q.No. 17.

Q12. Explain about input devices.

Answer : Important Question

For answer refer Unit-I, Page No. 12, Q.No. 18.

Q13. Explain about output devices.

Answer : Important Question

For answer refer Unit-I, Page No. 14, Q.No. 19.

Q14. Give a brief introduction on computer memory. Illustrate the hierarchy of memory.

Answer : Important Question

For answer refer Unit-I, Page No. 17, Q.No. 20.

Q15. Write about the following,

(i) Processor registers

(ii) Cache memory.

Answer : Important Question

For answer refer Unit-I, Page No. 18, Q.No. 21.

Q16. Explain in detail about primary memory.

Answer : Important Question

For answer refer Unit-I, Page No. 19, Q.No. 22.


Q17. Write in short about the following,
(i) USB flash drives
(ii) Memory cards.

Answer : Important Question

For answer refer Unit-I, Page No. 23, Q.No. 25.

Q18. Discuss in brief about,

(i) Secondary storage devices

(ii) Hard disk.

Answer : Important Question

For answer refer Unit-I, Page No. 22, Q.No. 24.

IQ.2 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.


Important QuestIons Computer SCienCe paper-V

Unit- 2
Short QueStionS
Q1. What is system software and application software?
Answer : Important Question

For answer refer Unit-II, Page No. 30, Q.No. 2.


Q2. Define firmware and middle ware.
Answer : Important Question

For answer refer Unit-II, Page No. 30, Q.No. 3.


Q3. Define OS.
Answer : Important Question

For answer refer Unit-II, Page No. 30, Q.No. 4.


Q4. Write about the attributes of file.
Answer : Important Question

For answer refer Unit-II, Page No. 31, Q.No. 6.


Q5. Write in brief about Relative file organization.
Answer : Important Question

For answer refer Unit-II, Page No. 31, Q.No. 7.


Q6. What is command interpreter?
Answer : Important Question

For answer refer Unit-II, Page No. 31, Q.No. 8.


eSSay QueStionS
Q7. Explain briefly about the computer software.
Answer : Important Question

For answer refer Unit-II, Page No. 32, Q.No. 9.


Q8. Explain in detail about system software.
Answer : Important Question

For answer refer Unit-II, Page No. 32, Q.No. 10.


Q9. Explain in detail about application software.
Answer : Important Question

For answer refer Unit-II, Page No. 35, Q.No. 11.


Q10. Write short notes on,
(a) Firmware
(b) Middleware.
Answer : Important Question

For answer refer Unit-II, Page No. 38, Q.No. 13.


SIA PUBLISHERS and dISTRIBUTORS PVT. LTd. IQ.3
Computer SCienCe paper-V InformatIon technologIes-1
Q11. What is an operating system? Explain the functions of operating system.

Answer : Important Question

For answer refer Unit-II, Page No. 39, Q.No. 15.


Q12. Discuss in detail the different types of operating systems.

Answer : Important Question

For answer refer Unit-II, Page No. 41, Q.No. 16.


Q13. Define the following,

(a) Process

(b) Process control block

(c) Process state diagram.

Answer : Important Question

For answer refer Unit-II, Page No. 42, Q.No. 17.


Q14. Explain FCFS, SJF, Priority, Round Robin scheduling algorithms.

Answer : Important Question

For answer refer Unit-II, Page No. 45, Q.No. 19.


Q15. Explain the paging concepts.

Answer : Important Question

For answer refer Unit-II, Page No. 51, Q.No. 24.


Q16. Define file. Write about data hierarchy and file attributes.

Answer : Important Question

For answer refer Unit-II, Page No. 53, Q.No. 26.


Q17. Discuss about device management.

Answer : Important Question

For answer refer Unit-II, Page No. 56, Q.No. 29.


Q18. Explain about windows operating system.

Answer : Important Question

For answer refer Unit-II, Page No. 59, Q.No. 32.

IQ.4 SIA PUBLISHERS and dISTRIBUTORS PVT. LTd.

You might also like