You are on page 1of 28

ITAB ANSWER BANK

PART-A(MCQ)
1. What is Cloud Computing?
(A) Cloud computing means providing services like storage,
servers, database, networking, etc.
2. What is the most important concern of cloud computing?
(C)Security
3. Which of the following statement is correct?
(A)1kb=1024bytes
4. Functions of Control Unit
(C)Both a&b
5. Which of the following is example of firmware:
(C)Both a&b
6. Which is expensive memory among following for same
size:
(A)Cache
7. Which of the following is not an output device:
(D)Web cam
8. OS is an example of
(A)System software
9. Full form of BIOS is:
(C)Basic Input Output system
10. Daisy Wheel printer is a type of:
(B)Character printer
11. Who is the father of cloud computing?
(C)J.C.R.Licklider
12. Which of the following is the smallest unit of data in a
computer?
(A)Bit
13. Which of the following can access the server?
(A)Web Client
14. What is the most used computer operating system?
(B)Windows
15. These devices provide a means of communication
between a computer and outer world.
(A)I/O
16. What does GUI stand for?
(D)Graphical User Interface
17. What is the full form of DBMS?
(B)Database Management System
18. What is DBMS?
(D)DBMS stores, modifies and retrieves data
19. When was the first operating system built?
(A)1956
20. What is the shortcut key to create Hyperlink?
(B)Ctrl+H
21. What does an operating system do?
(A)An interface that regulates hardware and software
programes
22. What does restarting an operating system do?
.(A)Restarts all processes
23. What operations mentioned are done by an operating
system?
(D)All of the above
24. What is the number of layers in the OSI model?
(C)7
25. What of the following isn’t directly related to the
operating system?
(C)Hardware Devices
26. What is a time-sharing operating system?
(C)Allows users to use one system with two different
terminals
27. What is a batch operating system?
(B)Similar types of tasks are grouped together
28. What is a compiler?
(A)System program that converts instructions to machine
language.
29. Which of the following isn’t a characteristic of High-level
languages?
(A)Machine code
30. Which translator translates one line at a time?
(B)Interpreter
PART-B(SHORT ANSWERS)

QUESTION:1Differentiate between Primary memory and Secondary


memory. Give suitable examples.
ANSWER 1:
BASIS PRIMARY MEMORY SECONDARY MEMORY
NATURE Primary memory, commonly known Secondary memory refers
as RAM (Random Access Memory), is to non-volatile storage
volatile memory that is used for devices used for long-term
temporary storage while a computer data storage, even when
is running. the power is turned off.
FUNCTION It serves as the working memory of a It stores data and files that
computer, where the operating are not actively in use.
system, applications, and currently Secondary memory retains
active data are stored for quick information even after the
access by the CPU. system is powered down
and is used for storing the
operating system,
applications, documents,
and other files.
SPEED Primary memory is faster than Secondary memory is
secondary memory, providing rapid slower compared to
access to data. However, it is volatile, primary memory but
meaning that it loses its content provides larger storage
when the power is turned off. capacity. Access times are
generally higher than in
primary memory.
USE Primary memory is crucial for the Secondary memory is
smooth functioning of a computer, as essential for storing data
it directly influences the speed and persistently and allows
responsiveness of the system duringusers to retain their files
active tasks. and applications even
when the computer is
turned off. It provides a
larger storage capacity for
documents, multimedia,
and other files.
EXAMPLE Examples of primary memory include Examples of secondary
DDR4 RAM, DDR3 RAM, or any other memory include hard disk
type of RAM used in computers and drives (HDDs) and solid-
electronic devices. state drives (SSDs). HDDs
use magnetic storage,
while SSDs use flash
memory for faster access
times.

QUESTION2: Distinguish between Hardware, Software and Firmware


with a suitable example.
ANSWER 2:
BASIS HARDWARE SOFTWARE FIRMWARE
DEFINATION Hardware refers to Software refers to the Firmware is a type of
the physical set of instructions or software that is
components of a programs that tell the embedded into the
computer system hardware how to hardware of a device.
or any electronic perform specific tasks. It provides low-level
device. These are It is a collection of control for the
tangible, code written to specific hardware it is
touchable parts achieve particular associated with.
that you can see functions on a
and interact with. computer.
CHARACTERSTIC Hardware Software is intangible Firmware is stored in
S components are and cannot be non-volatile memory
essential for the touched. It is stored in (e.g., ROM or flash
functioning of a a digital format and memory) and is
computer system. loaded into the designed to be more
They are built computer's memory permanent than
from materials when the system is in regular software. It is
such as metal, use. essential for the
plastic, and silicon. basic functionality of
Hardware hardware
components are components.
often connected
through cables
and other physical
means.
Modifiability Hardware is Software is generally Firmware can be
generally less more easily modifiable updated, but the
easily modified or than hardware. process is often more
updated Updates and involved than
compared to modifications can be updating regular
software. made through code software. Firmware
Upgrading changes without updates are typically
hardware often physically altering the specific to the device
involves physically components. and may require
replacing careful handling to
components, and avoid issues.
it may require
technical
expertise.
EXAMPLE An example of An example of An example of
hardware is the software is the web firmware is the BIOS
physical keyboard browser you use to (Basic Input/Output
of a computer. The access the internet. System) in a
keys, circuits, and The browser is a computer. The BIOS
plastic casing program that provides is a set of
make up the a user interface and instructions stored
hardware of the allows you to interact on a chip on the
keyboard with the hardware to computer's
browse web pages. motherboard,
providing essential
functions such as
booting the
operating system and
managing hardware
components.

QUESTION3: Distinguish between LAN, MAN and WAN.


ANSWER 3:
BASIS LAN MAN WAN
SCOPE LAN stands for Local MAN stands for WAN stands for Wide
Area Network. It is a Metropolitan Area Area Network. It
network that is Network. It covers a covers a broad
limited to a small larger geographic area geographic area, often
geographic area, such compared to LAN but spanning across cities,
as a single building, a is still limited to a countries, or even
campus, or a group of specific metropolitan continents.
nearby buildings city or large campus.
SIZE LANs typically cover a MANs typically cover a WANs cover extensive
short distance, larger distance than distances, connecting
ranging from a few LANs, extending from LANs and MANs over
meters to a few a few kilometers to long distances. They
kilometers. They are tens of kilometers. may use various
designed for They connect multiple telecommunication
providing high-speed LANs within a technologies to
connectivity within a metropolitan area. establish connections.
confined
geographical
location.
OWNERSHIP LANs are usually MANs may be owned WANs are often
owned, set up, and and operated by a established and
maintained by a single organization or maintained by
single organization or may involve multiple organizations,
entity. They facilitate collaboration between service providers, or
communication and multiple organizations. telecommunication
resource-sharing They are used to companies. They
among devices connect LANs across a facilitate
owned by that city. communication and
organization. data exchange over
vast regions.
SPEED LANs offer high data MANs provide WANs can have
transfer speeds, often moderate to high data varying data transfer
reaching gigabit transfer speeds, speeds, which may be
speeds. This allows ensuring efficient influenced by factors
for quick and efficient communication such as the type of
communication between different connection, distance,
among devices within LANs. The speed may and network traffic.
the network. vary depending on the They may include
technology used. technologies like
leased lines, satellite
links, or optical fibers.
EXAMPLE Examples of LAN Examples of MAN Examples of WAN
include the network include networks include the internet
within a home, office, connecting multiple itself, connecting
or a university campuses of a devices globally.
campus where university within a city Corporate networks
computers, printers, or networks connecting branch
and other devices are connecting various offices spread across
interconnected. offices of a corporation different cities or
across different parts countries also form a
of a city. part of WANs

QUESTION4: Discuss application of Information Technology in railways.


ANSWER 4:
The application of Information Technology (IT) in railways has
transformed various aspects of operations, management, and customer
services. Here are key applications of IT in the railway industry:
1. Automated Ticketing Systems:
 IT has revolutionized ticketing processes in railways. Online
booking systems and mobile applications allow passengers
to book tickets, check seat availability, and receive electronic
tickets. Automated ticketing reduces queues, enhances
efficiency, and provides a convenient experience for
passengers.
2. Train Management and Tracking:
 IT plays a crucial role in train management and tracking
systems. Advanced technologies such as Global Positioning
System (GPS) and Geographic Information System (GIS)
enable real-time tracking of trains. This information is
valuable for both railway operators and passengers,
providing updates on train locations, delays, and expected
arrival times.
3. Maintenance and Asset Management:
 IT is employed for predictive maintenance and management
of railway assets. Sensors and monitoring systems collect
data on the condition of tracks, signaling equipment, and
rolling stock. Predictive analytics help identify potential
issues before they lead to breakdowns, ensuring efficient
maintenance practices and minimizing disruptions.
4. Passenger Information Systems:
 Information Technology has improved passenger
communication through systems that provide real-time
information. Digital displays, mobile apps, and
announcements keep passengers informed about train
schedules, platform changes, and other relevant updates.
This enhances the overall travel experience and reduces
uncertainties for passengers.
5. Safety and Security Systems:
 IT contributes significantly to enhancing safety and security
in railways. Surveillance cameras, access control systems,
and automated signaling systems are deployed to monitor
and control railway operations. Additionally, data analytics
and artificial intelligence may be used to detect anomalies or
potential security threats.

QUESTION5: Discuss the security issues in Information Technology.


ANSWER 5:
Information Technology (IT) is integral to modern business and daily life,
but it also introduces various security issues that need careful
consideration. Here are key security issues in Information Technology:
1. Cybersecurity Threats:
 Cybersecurity threats, including malware, ransomware,
phishing attacks, and hacking, pose significant risks to IT
systems. Malicious actors exploit vulnerabilities to gain
unauthorized access, steal sensitive data, or disrupt
operations. Robust cybersecurity measures, such as firewalls,
antivirus software, and regular security audits, are essential
to counter these threats.
2. Data Breaches:
 Data breaches involve unauthorized access to sensitive
information, leading to its exposure or theft. This can result
in severe consequences, including financial losses, damage
to reputation, and legal ramifications. Organizations must
implement encryption, access controls, and secure storage
practices to safeguard against data breaches.
3. Identity Theft and Fraud:
 The theft of personal information for fraudulent purposes is
a significant security concern. Cybercriminals may use stolen
identities to commit financial fraud, access accounts, or
engage in other malicious activities. Two-factor
authentication, biometrics, and identity verification
processes help mitigate the risks of identity theft.
4. Insider Threats:
 Insider threats involve individuals within an organization
misusing their access privileges for malicious purposes. This
could be employees, contractors, or business partners.
Implementing strict access controls, monitoring user
activities, and providing cybersecurity awareness training
can help prevent and detect insider threats.
5. Vulnerabilities in Software and Systems:
 Software and system vulnerabilities, if not promptly
addressed, can be exploited by attackers to compromise IT
security. Regular software updates, patches, and
vulnerability assessments are essential to mitigate these
risks. Additionally, organizations should follow secure coding
practices and conduct thorough security testing during the
development phase.
.
QUESTION6: Differentiate Internet, Intranet and Extranet
ANSWER 6:
BASIS INTERNET INTRANET EXTRANET
SCOPE The internet is a An intranet is a An extranet is a
global network private network network that
that connects within an allows controlled
millions of organization. It is access to specific
public and used for internal authorized
private communication, external users,
networks collaboration, such as business
worldwide. It is and sharing of partners,
a vast, publicly information suppliers, or
accessible among customers. It
network that employees, extends a part of
allows departments, the
communication, and units. organization's
information intranet to
sharing, and external entities.
collaboration on
a global scale.
ACCESSIBILITY The internet is Intranets are Access to an
open and accessible only extranet is
accessible to to the members limited to
the public. of the specific external
Users can organization. entities that
access a wide Users need have a legitimate
range of proper business
resources, authentication to relationship with
websites, and access the the organization.
services without intranet, and the Users from
restrictions, content is limited outside the
making it a to the organization can
global platform organization's access certain
for internal parts of the
communication, resources. intranet.
commerce, and
information
dissemination.
SECURITY Security on the Intranets are Extranets
internet relies generally require robust
on various considered more security
measures such secure than the measures to
as encryption, internet because ensure that
secure they operate external users
protocols, and within the only have access
firewalls. While organization's to the
security is a firewall. Access authorized
concern, the control resources.
internet is mechanisms, Security features
designed for authentication, include
open access, and encryption authentication,
and users must are implemented encryption, and
implement their to ensure that secure
own security only authorized communication
measures. users can access channels.
the intranet.
EXAMPLE Examples of An intranet is An extranet can
internet usage used for internal be used for
include purposes such as collaboration
accessing sharing company between a
websites, policies, company and its
sending emails, announcements, suppliers to
online collaboration on manage
shopping, social projects, inventory, share
media document product
interactions, sharing, and information, or
and various other coordinate
other global communication logistics. It
online activities. within the provides a
organization. secure platform
for external
entities to
interact with
specific internal
resources.

QUESTION7: What do you mean by network topology? List and explain


any three topologies used in networking.
ANSWER 7:
Network Topology refers to the physical or logical layout or
arrangement of devices and connections in a network. It defines how
different network devices are connected to each other and how data is
transmitted within the network. The topology influences the efficiency,
reliability, and scalability of a network.
Three Network Topologies:
1. Bus Topology:
 In a Bus Topology, all devices share a single communication
line or bus. The devices are connected to the bus using drop
lines, and each device has a unique address. Data is
broadcasted to all devices on the bus, and the intended
recipient recognizes and accepts the data.
 Advantages:
 Simple and easy to implement.
 Cost-effective for small networks.
 Disadvantages:
 Limited scalability.
 Performance degrades as more devices are added.
 Failure in the main bus can disrupt the entire network.
2. Star Topology:
 In a Star Topology, all devices are connected to a central hub
or switch. The hub acts as a repeater and enables
communication between any two devices in the network. If
one device wants to communicate with another, it sends the
data to the central hub, which then forwards it to the
destination device.
 Advantages:
 Easy to install and manage.
 Fault isolation – failure of one device doesn't affect
others.
 Centralized control makes it scalable.
 Disadvantages:
 Dependency on the central hub – failure of the hub
disrupts the entire network.
 More cabling is required than in a bus topology.
3. Ring Topology:
 In a Ring Topology, devices are connected in a circular
fashion, forming a closed loop. Each device is connected to
exactly two other devices, forming a pathway for data
transmission. Data travels in one direction through the ring
until it reaches the destination device.
 Advantages:
 No central point of failure – failure in one device
doesn't affect the entire network.
 Simple and easy to install.
 Disadvantages:
 Adding or removing devices can disrupt the entire
network.
 If one device fails, the entire network may be affected
until the failure is fixed.
 More difficult to troubleshoot compared to star or bus
topologies.
Each of these topologies has its strengths and weaknesses, and the
choice depends on factors such as the size of the network, cost
considerations, and the level of fault tolerance required.
PART-C(LONG ANSWERS QUESTION)

QUESTION2 : What is Computer Software. Discuss, in detail, different


generations of languages.
ANSWER2: Computer software refers to a set of instructions or
programs that tell a computer how to perform specific tasks. It is a
collection of data or code written in a programming language that
enables the computer hardware to execute a particular function.
Software can be broadly categorized into two types: system software
and application software.
 System Software: This type of software manages the hardware
components and provides a platform for running application
software. Examples include operating systems like Windows,
macOS, and Linux.
 Application Software: This software is designed to perform
specific tasks for end-users. Examples include word processors,
web browsers, and video games.
Generations of Programming Languages:
Programming languages have evolved over time, and they are often
classified into different generations based on their features and
characteristics. Let's discuss the four generations of programming
languages:
1. First Generation (1GL) - Machine Language:
 Description: The lowest-level programming language, written in
binary code (0s and 1s), representing machine instructions
directly.
 Characteristics: Difficult for humans to read and write, specific to
the computer's architecture.
2. Second Generation (2GL) - Assembly Language:
 Description: Assembly language uses symbolic names and codes
(mnemonics) to represent machine instructions. It is specific to a
particular computer architecture.
 Characteristics: More readable than machine language but still
closely tied to hardware. Each mnemonic corresponds to a specific
machine language instruction.
3. Third Generation (3GL) - High-Level Language:
 Description: High-level languages are designed to be more
human-readable and closer to natural language. Examples include
Fortran, COBOL, C, and Java.
 Characteristics: Use of English-like keywords and syntax,
abstraction from hardware details, portability across different
platforms, and support for structured programming.
4. Fourth Generation (4GL) - Domain-Specific Language:
 Description: These languages are designed for specific application
domains and often include tools for database management and
report generation.
 Characteristics: Focus on problem-solving rather than procedural
details, higher level of abstraction, and often used in business and
data processing applications.
5. Fifth Generation (5GL) - Artificial Intelligence Languages:
 Description: These languages are associated with artificial
intelligence and parallel processing. They focus on logic
programming and symbolic reasoning.
 Characteristics: Designed to support advanced AI applications,
knowledge representation, and problem-solving using declarative
languages like Prolog.
Each generation represents a leap in terms of abstraction and ease of
programming. Higher-level languages provide greater abstraction from
hardware details, making it easier for programmers to write code and
develop complex software applications.

QUESTION 3: Differentiate between assembler, complier and


interpreter.
ANSWER3:
BASIS ASSEMBLER COMPILER INTERPRETER
DEFINATION An assembler is A compiler is a An interpreter is
a program that program that a program that
translates translates the translates and
assembly entire source executes high-
language code code of a high- level
into machine level programming
code or object programming code line by
code. language into line, without
machine code producing a
or an separate
intermediate executable file
code.
FUNCTIONALIYY It converts It analyzes the It reads a high-
mnemonic entire program, level source
instructions generates an code statement,
written in intermediate translates it into
assembly code or machine code
language into machine code, (or an
binary code and then intermediate
that can be produces an code), and
directly executable file. immediately
executed by the executes it.
computer's
CPU.
OUTPUT The output of The output of a No separate
an assembler is compiler is an executable file
typically an executable file is generated.
object file or that can be run The execution is
machine code independently directly from
that is specific of the source the source
to the code. This code.
architecture of executable file
the target is specific to the
computer. target platform.
EXECUTION Assemblers Compilation is a Interpretation
happens in real-time,
work on a one- separate phase, and the program
to-one basis, and the needs to be
translating each compiled code interpreted each time
it is run.
assembly can be executed
language multiple times
statement into without the
a corresponding need for re-
machine translation.
language
instruction.
PROCESSING Converts Translates the Translates and
APPROACH assembly entire high-level executes high-
language to code to level code line
machine code. machine code by line.
or an
intermediate
code.
EFFICIENCY Efficient in May be slower Tends to have
terms of in the initial slower
machine code phase due to execution as it
generation. compilation but interprets code
faster in line by line.
execution.
PROFITABILITY Less portable, Can generate Generally less
as machine- platform- portable, as it
specific code is specific or relies on
generated. platform- interpreting the
independent source code
code. directly.

In summary, an assembler converts assembly language to machine


code, a compiler translates entire high-level code to an executable file,
and an interpreter translates and executes high-level code line by line
without producing a separate executable.

QUESTION 4: What is an Operating System? Why is it necessary for a


computer system? List and explain the various
functions performed by an operating system.
ANSWER 4:
1. Definition of Operating System:
 An operating system (OS) is a fundamental software component
that acts as an intermediary between computer hardware and
application software. It manages and controls the hardware
resources, facilitates user interaction, and provides a platform for
running applications.
2. Necessity of an Operating System:
 An operating system is essential for a computer system due to the
following reasons:
 Resource Management: It efficiently allocates and manages
hardware resources such as CPU, memory, storage, and
input/output devices.
 User Interface: It provides a user-friendly interface, allowing
users to interact with the computer system through
commands or graphical interfaces.
 Execution of Programs: It enables the execution of
application programs and provides a runtime environment
for software to run smoothly.
3. Functions Performed by an Operating System:
a. Process Management:
 Explanation: Manages the execution of processes, which are
instances of running programs. It handles process scheduling,
synchronization, and communication between processes.
 Example: Ensures that multiple applications run concurrently
without interfering with each other.
b. Memory Management:
 Explanation: Controls and organizes the computer's memory,
allocating space to programs and data. It manages both main
memory (RAM) and secondary storage (like hard drives).
 Example: Prevents programs from overwriting each other's data in
memory.
c. File System Management:
 Explanation: Manages files on storage devices, organizing data
into a hierarchical structure. It handles file creation, deletion, and
manipulation.
 Example: Enables users to create, save, and retrieve documents or
files on the computer.
d. Device Management:
 Explanation: Controls and coordinates input/output (I/O) devices
such as keyboards, mice, printers, and disks. It ensures efficient
communication between hardware and software.
 Example: Manages the flow of data between the computer and
external devices.
e. User Interface:
 Explanation: Provides a means for users to interact with the
computer. This can be through a command-line interface (CLI) or a
graphical user interface (GUI).
 Example: GUIs like Windows or macOS allow users to perform
tasks using visual elements like icons and windows.
f. Security and Access Control:
 Explanation: Ensures the security of the computer system by
controlling access to resources and data. It includes user
authentication and authorization mechanisms.
 Example: Requires a password to log in and restricts certain
operations to authorized users.
g. Error Handling:
 Explanation: Manages system errors and exceptions, providing
error messages and logging information. It helps in diagnosing and
resolving issues.
 Example: Displays an error message when a user tries to access a
file without proper permissions.
h. Communication and Networking:
 Explanation: Facilitates communication between computers in a
network. It includes network protocols and services.
 Example: Allows a computer to connect to the internet and
communicate with other devices on the network.
i. Task Scheduling:
 Explanation: Optimizes the utilization of CPU resources by
scheduling tasks and processes. It ensures efficient use of
computing power.
 Example: Assigns priority to tasks based on their urgency and
importance.
j. System Monitoring and Performance:
 Explanation: Monitors system performance, resource usage, and
hardware health. It may include tools for performance analysis
and optimization.
 Example: Provides information on CPU usage, memory utilization,
and disk activity.

QUESTION7: Explain 5 mathematical and 5 date & time functions


used in MS-Excel with the syntax and example.
ANSWER7:
Mathematical Functions in MS-Excel:
1. SUM Function:
 Syntax: =SUM(number1, number2, ...)
 Example: =SUM(A1:A5) adds the values in cells A1 to A5.
2. AVERAGE Function:
 Syntax: =AVERAGE(number1, number2, ...)
 Example: =AVERAGE(B1:B10) calculates the average of
values in cells B1 to B10.
3. MAX Function:
 Syntax: =MAX(number1, number2, ...)
 Example: =MAX(C1:C8) returns the highest value in cells C1
to C8.
4. MIN Function:
 Syntax: =MIN(number1, number2, ...)
 Example: =MIN(D1:D6) gives the smallest value in cells D1 to
D6.
5. SQRT Function:
 Syntax: =SQRT(number)
 Example: =SQRT(E1) calculates the square root of the value
in cell E1.
Date & Time Functions in MS-Excel:
1. TODAY Function:
 Syntax: =TODAY()
 Example: =TODAY() returns the current date.
2. NOW Function:
 Syntax: =NOW()
 Example: =NOW() provides the current date and time.
3. DATEDIF Function:
 Syntax: =DATEDIF(start_date, end_date, unit)
 Example: =DATEDIF(F1, G1, "d") calculates the difference in
days between the dates in cells F1 and G1.
4. HOUR Function:
 Syntax: =HOUR(serial_number)
 Example: =HOUR(H1) extracts the hour from the date and
time in cell H1.
5. MONTH Function:
 Syntax: =MONTH(serial_number)
 Example: =MONTH(I1) returns the month from the date in
cell I1.
Explanation:
 The SUM, AVERAGE, MAX, and MIN functions are commonly used
for basic mathematical operations, allowing users to quickly
calculate totals, averages, maximum, and minimum values in a
range of cells.
 The SQRT function is used to find the square root of a number,
which can be helpful in various mathematical calculations.
 The TODAY and NOW functions are used for dealing with dates.
TODAY returns the current date, while NOW provides both the
current date and time.
 The DATEDIF function calculates the difference between two dates
in terms of years, months, or days, allowing users to determine
durations between events.
 The HOUR and MONTH functions are useful for extracting specific
components of date and time information, such as hours and
months, from a given date-time value.
These functions enhance the capability of MS-Excel, making it a
powerful tool for mathematical calculations, data analysis, and time-
related operations in various applications.

You might also like