This document contains a model question paper for a Computer Science examination with multiple choice and descriptive questions. The questions cover topics such as computer hardware components, operating systems, databases, networking, and more. The document is divided into 16 parts with varying numbers of questions in each part. Answers or solutions are provided below each set of questions. The total number of questions is not specified but there appear to be over 50 questions covering fundamental Computer Science topics.
This document contains a past computer applications exam with three sections - Section A with short answer questions, Section B with longer answer questions, and Section C with essay questions. Section A contains 10 one-mark questions testing definitions and concepts. Section B has 4 out of 7 five-mark questions to choose from. Section C provides 2 out of 3 ten-mark essay questions. The exam covers topics such as computer hardware, software, operating systems, databases, networking and applications of computers in management.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
This document contains a series of questions and answers related to computer networking and communication technologies. It begins with 26 very short answer questions testing knowledge of topics like domain names, web hosting, packet vs message switching, protocols, cloud computing, Wi-Fi characteristics, mobile technologies, and network topologies. It then includes 17 short answer questions requiring 1-2 sentences, and 12 short answer questions requiring more explanation. The questions cover additional topics such as network cable types, IP addresses, HTTP, cookies, spam, and cyber crimes.
This document provides an overview of e-ball technology, which describes a conceptual spherical personal computer. The e-ball PC would be 160mm in diameter and contain components like a dual-core processor, 2GB RAM, 350-500GB hard drive, integrated graphics and sound card, speakers, wireless mouse, and an LCD projector to project the screen onto a wall. It would run on a Windows operating system and allow touchless input through a virtual keyboard that projects onto any surface. The document discusses the components and features of the e-ball concept in more detail.
Here are the collections of sets of Multiple Choice Questions -MCQ of the different subjects related to Computer Science or Information Technology along with the answer of each question below the questions set. It may help for the preparation of your exams, tests or interviews. If you have any suggestions or comments or have any errors on questions and answers, can post on the comment session.
This document contains a past computer applications exam with three sections - Section A with short answer questions, Section B with longer answer questions, and Section C with essay questions. Section A contains 10 one-mark questions testing definitions and concepts. Section B has 4 out of 7 five-mark questions to choose from. Section C provides 2 out of 3 ten-mark essay questions. The exam covers topics such as computer hardware, software, operating systems, databases, networking and applications of computers in management.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
This document contains a series of questions and answers related to computer networking and communication technologies. It begins with 26 very short answer questions testing knowledge of topics like domain names, web hosting, packet vs message switching, protocols, cloud computing, Wi-Fi characteristics, mobile technologies, and network topologies. It then includes 17 short answer questions requiring 1-2 sentences, and 12 short answer questions requiring more explanation. The questions cover additional topics such as network cable types, IP addresses, HTTP, cookies, spam, and cyber crimes.
This document provides an overview of e-ball technology, which describes a conceptual spherical personal computer. The e-ball PC would be 160mm in diameter and contain components like a dual-core processor, 2GB RAM, 350-500GB hard drive, integrated graphics and sound card, speakers, wireless mouse, and an LCD projector to project the screen onto a wall. It would run on a Windows operating system and allow touchless input through a virtual keyboard that projects onto any surface. The document discusses the components and features of the e-ball concept in more detail.
Here are the collections of sets of Multiple Choice Questions -MCQ of the different subjects related to Computer Science or Information Technology along with the answer of each question below the questions set. It may help for the preparation of your exams, tests or interviews. If you have any suggestions or comments or have any errors on questions and answers, can post on the comment session.
1)Today, the overwhelming world leader in microprocessor sales i.pdfisenbergwarne4100
1)
Today, the overwhelming world leader in microprocessor sales is:
A)
Intel.
B)
Microsoft.
C)
Motorola.
D)
Digital Equipment Corporation (DEC).
2)
Which of the following is not an example of a computer output device?
A)
Video display unit
B)
Scanner
C)
Magnetic tape unit
D)
Printer
3)
Which of the following is not an example of applications software?
A)
Spreadsheet packages
B)
Inventory record-keeping programs
C)
Word-processing software
D)
Operating systems software
4)
Which of the following describes a function of an operating system?
A)
Stores and retrieves data files
B)
Decides when to initiate a particular job from among those waiting in the input queue
C)
Controls the inflow and outflow of communications with various terminals and microcomputers
D)
All of the above
5)
Which of the following is an example of an open operating system?
A)
Linux
B)
Windows NT
C)
OS/400
D)
Windows XP
6)
A metalanguage standard for specifying a document markup language based on plain-text tags,
and used to facilitate data interchange among applications on the Web, is
A)
HTML
B)
JavaScript
C)
HTTP
D)
XML
7)
Which of the following is not an advantage of distributed and client/server systems?
A)
Data more readily available to users
B)
Increased service and responsiveness to local users
C)
Less dependence on telecommunications lines and media
D)
Reduced computing costs
8)
When data can be transmitted in both directions but not simultaneously, the transmission type is
referred to as:
A)
simplex.
B)
half-duplex.
C)
full-duplex.
D)
switched-line.
9)
A telecommunications network often includes physical media over which communication signals
are sent. All of the following are examples of physical media except:
A)
twisted pair wire.
B)
coaxial cable.
C)
fiber-optic cable.
D)
satellite.
10)
All of the following are characteristic of fiber-optic transmission, except:
A)
more secure than other transmission media.
B)
faster transmission than other transmission media.
C)
space requirements are more than other transmission media.
D)
more reliable than other transmission media.
11)
A method of operating a digital telecommunications network in which information is divided
into units of some fixed length that are then sent over the network separately, allowing the units
of data from various users to be interspersed with one another is called:
A)
bundling.
B)
time sharing.
C)
batching.
D)
packet switching.
12) The basic unit of a spreadsheet is a:
A) box
B) cube
C) cell
D) grid
13) Booting a computer means to:
A) restart the computer
B) run a program from the hard disk
C) start the computer
D) none of the above
14) The correct order from lowest to highest level of detail of the same program is:
A) assembly language, programming language, and binary
B) programming language, assembly language, and binary
C) binary, assembly language, and programming language
D) binary, programming language, and assembly language
15) Instruction sequences that repeat are called:
A) loops
B) assump.
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
IFSM 310 Software and Hardware Infrastructure Concepts
Computer and Number Systems
1.
(10 pt)
You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.
2.
(2.5 pt each)
In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.
(c) Convert the following decimal number to binary:
21842
(d) Convert the following binary number to decimal:
11000111011.101
(c) Convert the following hexadecimal number to decimal:
CA97
(d) Convert the following binary number to hexadecimal:
1110011111011010100
CPU and Memory
3.
(10 pt)
ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?
(HINT: Decode the sequence reading from left to right then write the corresponding binary sequence, leaving a space between each binary sequence.)
4.
(10 pt)
Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.
Input / Output
5. Answer the follow questions about interrupts.
a.
(5 pt)
Describe in detail the steps that occur when a system receives an interrupt.
b.
(5 pt)
Describe how these steps differ in the case when a system receives multiple interrupts
Computer Systems
6. Answer the following questions about clusters.
a.
(5 pt)
Describe how you might use a cluster to provide fault-tolerant computing
b.
(5 pt)
Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.
Networks
7. Answer the following questions about communication protocols.
a.
(5 pt)
Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.
b.
(5 pt)
If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why
.
8. In the context of network security,
a.
(3 pt)
exp.
1. The document contains an ICT exam from 2011 with questions about computer programming, networking, and the internet.
2. The questions cover topics such as programming languages and their generations, computer networks and their components, the basic requirements to access the internet, elements of web pages, and the history and functions of the world wide web.
3. The exam concludes with questions asking students to draw diagrams of different network topologies including a star network, ring network, and bus network.
This document contains 16 important questions covering various topics related to computer networks across 5 units. The questions cover topics such as the ISO-OSI model, data encoding schemes, error detection and correction mechanisms, network layer protocols, transport layer protocols, network security, application layer protocols, and web technologies. Key topics include data link layer functions, error detection methods, flow control, network layer routing protocols, transport layer protocols TCP and UDP, network security concepts, and application layer protocols like HTTP, FTP, and DNS.
This document describes the development of an electronic nameplate system that allows users to change the displayed text wirelessly using an Android application. The system uses an Arduino Uno microcontroller connected to an LCD display to show the text. A Bluetooth module is used to wirelessly receive text messages sent from an Android app. Users can easily update the nameplate's text in real-time from their mobile phone without needing to physically access the display. The project aims to create a low-cost and user-friendly electronic nameplate system using Bluetooth communication between an Android application and the Arduino/LCD receiver module.
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
This document provides solutions to review questions and exercises related to network models and data link control. It begins with solutions to review questions on network models, including definitions of the OSI and Internet models. It then provides solutions to exercises on typical network examples like telephone and cable networks. Finally, it discusses data link control protocols like Stop-and-Wait ARQ, Go-Back-N ARQ, and Selective-Repeat ARQ, and provides solutions to related exercises.
This document contains a 10 question computer fundamentals test covering topics like hardware components, generations of computers, computer terminology, and computer history. It provides multiple choice answers for each question along with explanations of the correct answers. The test addresses topics ranging from early computer models like UNIVAC and IBM 1401 to components like CPUs, memory, and storage devices to computer language, network, and industry terms.
This document discusses the history and evolution of computers from the first generation using vacuum tubes to modern computers using microprocessors. It covers the major technological developments including transistors replacing vacuum tubes in the second generation, integrated circuits and silicon chips in the third generation, and microprocessors integrating thousands of circuits onto a single chip in the fourth generation. These changes made computers smaller, faster, cheaper, more energy efficient and reliable over time. The document also provides some examples of early computers from each generation like ENIAC, UNIVAC and discusses improvements in processing power, memory and programming languages that came with each new generation of computing technology.
Question 1The OSI model has seven layers where each layer pe.docxssuser774ad41
Question 1
The OSI model has seven layers where each layer performs various functions that are integrated to ensure that the network performs efficiently. The layers are arranged as follows from the bottom to the top layer:
a) The physical layer:
This is the first layer of the model and it has several functions. These are:
i. Bit synchronization:
The physical layer is very crucial in terms of timing and synchronizing the period and the amount of bits that are transferred between the sender and the recipient of a message. It uses a clock to ensure accurate and reliable synchronization.
ii. Bit rate control:
The physical layer also controls the bandwidth in a network by determining the number of bits that are transferred over the network channel within the specified time which is seconds in most cases.
iii. Physical topologies:
The physical layer also determines the design which is used to connect all the devices that make up the network. These include routers, switches, hubs and other equipment used in a network.
iv. Transmission mode:
The connection of devices in the physical layer determines how data between the communicating devices flows. There are various transmission modes which are supported by the physical layer. These are simplex, half-duplex and full-duplex. In simplex, data flows in only one direction. In half-duplex data can flow in both directions but not simultaneously. In the full-duplex transmission mode, data flows in both directions at the same time.
b) Data Link Layer:
This is the second layer of the OSI model. Some of its functions include:
i. Framing:
Data that is being transmitted is segmented into pieces known as frames to make the transmission process easier. The Data link layer facilitates the framing process to ensure that the receiver acquires the accurate and relevant information within the shortest possible time.
ii. Physical addressing:
The frames require adequate data regarding the sender and the recipient to ensure that a message does not fail to reach the intended recipient. The Data Link Layer achieves this by adding a MAC address to the header section of each of the frames that are being transmitted.
iii. Error control:
The use of frames in the DLL enables the network layer to detect when frames do not reach the intended recipient. In return, the DLL is able to retransmit the lost or damaged frames using the details in the headers.
iv. Flow control:
The DLL ensures that the flow of data between the sender and the recipient is constant. This techniques ensures the stability of the communication channel that is established when transmitting data.
v. Access control:
The assigning of MAC addresses to all the computers in a network enables the Data Link Layer to determine the machines with access to certain resources.
c) Network layer:
The functions of the third OSI model layer are:
i. Routing:
The network layer assesses the different routes that a frame can use to reach its recipient and it chooses the best rou ...
Here is a draft proposal for migrating the Windows XP machines in the new LSDG research group to Linux:
Proposal to Migrate LSDG Desktops from Windows XP to Linux
Introduction
The new LSDG research group at Linx LLC will be using desktop operating systems. Currently, some machines in the larger Linx LLC organization run Windows XP and Windows 7. As LSDG will be a separate research group, we need to consider the best desktop OS choice for their needs and the longevity of the machines.
Analysis
Windows XP is no longer supported by Microsoft, so continuing to use it poses major security risks. Without updates and patches, XP machines are vulnerable to exploits. Support for Windows 7 will also end
This document provides an overview and table of contents for a book titled "CCNA Practice Questions (Exam 640-802) Third Edition" by Jeremy Cioara. The book contains practice questions and answers to help readers study and prepare for the CCNA certification exam. It is divided into two parts that cover the ICND1 and ICND2 exam objectives. Each part contains multiple chapters that review topics like networking fundamentals, routing, switching, WAN technologies and network security. The document lists the chapter titles and topics covered in each one to help readers understand the scope of the material in the book.
Overview of data communication and networkingSisir Ghosh
The document provides an overview of data communication and computer networks. It discusses the key components of data communication including senders, receivers, transmission media, messages, and protocols. It then describes different types of network connections and topologies including point-to-point, multipoint, bus, star, ring, mesh, and hybrid networks. Finally, it discusses network classification based on scale, including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document also covers protocols, standards, and reference models like OSI and TCP/IP.
The document defines several computer-related terms:
RAM, byte, mouse, icons, software, control unit, LAN, modem, ALU, and registers. It also differentiates between terms like minicomputer and microcomputer, mainframe and supercomputer, hardware and software, byte and word, and RAM and cache memory. The document provides definitions for software and describes the procedure for how data is stored on a hard disk drive using binary code and read/write heads.
Project report on mesh hybrid topology network visionJignesh Ameta
This document provides a summary of mesh/hybrid network topologies. It discusses the key characteristics of mesh topologies, including that nodes are connected to multiple other nodes on the network. This creates redundant pathways between nodes and allows the network to dynamically route around failures. The document also notes that hybrid topologies combine elements of mesh and other topologies like bus or star, providing some of the redundancy of mesh with lower infrastructure costs. In summary, the document outlines mesh and hybrid network topologies and their advantages in providing multiple connections and redundancy between nodes.
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012Syahriha Ruslan
This document contains an exam paper for a Computer Network course from June 2012. It has two sections - Section A with 40 objective questions and Section B with 2 essay questions. Section A covers topics like network topologies, transmission modes, protocols, networking devices and troubleshooting. Section B includes questions about network design, cabling, wireless security and social engineering attacks. The document provides diagrams, scenarios and context to test understanding of key networking concepts.
1. A hub works on a single collision and broadcast domain while a switch works on per-port collision and a single broadcast domain. FQDN uniquely identifies a host within a DNS hierarchy. LMHOSTS files must be manually configured and updated like HOSTS files but resolve NetBIOS names to IP addresses.
2. The main qualities of an effective network are performance, reliability, and security. 10Base2 uses thin coaxial cable up to 100m, 10Base5 uses thick coaxial cable up to 500m, and 10BaseT uses twisted pair cabling.
3. Anonymous FTP allows users to connect without a login/password using "anonymous" or "guest" as the login and their email
This document provides an overview of computer networks and networking concepts. It begins with introducing data communications and defining networks. It then discusses the OSI model and TCP/IP protocol suite. The document outlines various networking topics such as bandwidth utilization, transmission media, switching techniques including circuit switching, datagram networks, and virtual circuit networks. It provides examples and illustrations to explain networking concepts and how different network components interact.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
1)Today, the overwhelming world leader in microprocessor sales i.pdfisenbergwarne4100
1)
Today, the overwhelming world leader in microprocessor sales is:
A)
Intel.
B)
Microsoft.
C)
Motorola.
D)
Digital Equipment Corporation (DEC).
2)
Which of the following is not an example of a computer output device?
A)
Video display unit
B)
Scanner
C)
Magnetic tape unit
D)
Printer
3)
Which of the following is not an example of applications software?
A)
Spreadsheet packages
B)
Inventory record-keeping programs
C)
Word-processing software
D)
Operating systems software
4)
Which of the following describes a function of an operating system?
A)
Stores and retrieves data files
B)
Decides when to initiate a particular job from among those waiting in the input queue
C)
Controls the inflow and outflow of communications with various terminals and microcomputers
D)
All of the above
5)
Which of the following is an example of an open operating system?
A)
Linux
B)
Windows NT
C)
OS/400
D)
Windows XP
6)
A metalanguage standard for specifying a document markup language based on plain-text tags,
and used to facilitate data interchange among applications on the Web, is
A)
HTML
B)
JavaScript
C)
HTTP
D)
XML
7)
Which of the following is not an advantage of distributed and client/server systems?
A)
Data more readily available to users
B)
Increased service and responsiveness to local users
C)
Less dependence on telecommunications lines and media
D)
Reduced computing costs
8)
When data can be transmitted in both directions but not simultaneously, the transmission type is
referred to as:
A)
simplex.
B)
half-duplex.
C)
full-duplex.
D)
switched-line.
9)
A telecommunications network often includes physical media over which communication signals
are sent. All of the following are examples of physical media except:
A)
twisted pair wire.
B)
coaxial cable.
C)
fiber-optic cable.
D)
satellite.
10)
All of the following are characteristic of fiber-optic transmission, except:
A)
more secure than other transmission media.
B)
faster transmission than other transmission media.
C)
space requirements are more than other transmission media.
D)
more reliable than other transmission media.
11)
A method of operating a digital telecommunications network in which information is divided
into units of some fixed length that are then sent over the network separately, allowing the units
of data from various users to be interspersed with one another is called:
A)
bundling.
B)
time sharing.
C)
batching.
D)
packet switching.
12) The basic unit of a spreadsheet is a:
A) box
B) cube
C) cell
D) grid
13) Booting a computer means to:
A) restart the computer
B) run a program from the hard disk
C) start the computer
D) none of the above
14) The correct order from lowest to highest level of detail of the same program is:
A) assembly language, programming language, and binary
B) programming language, assembly language, and binary
C) binary, assembly language, and programming language
D) binary, programming language, and assembly language
15) Instruction sequences that repeat are called:
A) loops
B) assump.
IFSM 310 Software and Hardware Infrastructure ConceptsComputer.docxscuttsginette
IFSM 310 Software and Hardware Infrastructure Concepts
Computer and Number Systems
1.
(10 pt)
You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.
2.
(2.5 pt each)
In order to receive credit for these problems, you must show all of the steps you took to arrive at your answers.
(c) Convert the following decimal number to binary:
21842
(d) Convert the following binary number to decimal:
11000111011.101
(c) Convert the following hexadecimal number to decimal:
CA97
(d) Convert the following binary number to hexadecimal:
1110011111011010100
CPU and Memory
3.
(10 pt)
ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?
(HINT: Decode the sequence reading from left to right then write the corresponding binary sequence, leaving a space between each binary sequence.)
4.
(10 pt)
Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.
Input / Output
5. Answer the follow questions about interrupts.
a.
(5 pt)
Describe in detail the steps that occur when a system receives an interrupt.
b.
(5 pt)
Describe how these steps differ in the case when a system receives multiple interrupts
Computer Systems
6. Answer the following questions about clusters.
a.
(5 pt)
Describe how you might use a cluster to provide fault-tolerant computing
b.
(5 pt)
Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.
Networks
7. Answer the following questions about communication protocols.
a.
(5 pt)
Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.
b.
(5 pt)
If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why
.
8. In the context of network security,
a.
(3 pt)
exp.
1. The document contains an ICT exam from 2011 with questions about computer programming, networking, and the internet.
2. The questions cover topics such as programming languages and their generations, computer networks and their components, the basic requirements to access the internet, elements of web pages, and the history and functions of the world wide web.
3. The exam concludes with questions asking students to draw diagrams of different network topologies including a star network, ring network, and bus network.
This document contains 16 important questions covering various topics related to computer networks across 5 units. The questions cover topics such as the ISO-OSI model, data encoding schemes, error detection and correction mechanisms, network layer protocols, transport layer protocols, network security, application layer protocols, and web technologies. Key topics include data link layer functions, error detection methods, flow control, network layer routing protocols, transport layer protocols TCP and UDP, network security concepts, and application layer protocols like HTTP, FTP, and DNS.
This document describes the development of an electronic nameplate system that allows users to change the displayed text wirelessly using an Android application. The system uses an Arduino Uno microcontroller connected to an LCD display to show the text. A Bluetooth module is used to wirelessly receive text messages sent from an Android app. Users can easily update the nameplate's text in real-time from their mobile phone without needing to physically access the display. The project aims to create a low-cost and user-friendly electronic nameplate system using Bluetooth communication between an Android application and the Arduino/LCD receiver module.
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
This document provides solutions to review questions and exercises related to network models and data link control. It begins with solutions to review questions on network models, including definitions of the OSI and Internet models. It then provides solutions to exercises on typical network examples like telephone and cable networks. Finally, it discusses data link control protocols like Stop-and-Wait ARQ, Go-Back-N ARQ, and Selective-Repeat ARQ, and provides solutions to related exercises.
This document contains a 10 question computer fundamentals test covering topics like hardware components, generations of computers, computer terminology, and computer history. It provides multiple choice answers for each question along with explanations of the correct answers. The test addresses topics ranging from early computer models like UNIVAC and IBM 1401 to components like CPUs, memory, and storage devices to computer language, network, and industry terms.
This document discusses the history and evolution of computers from the first generation using vacuum tubes to modern computers using microprocessors. It covers the major technological developments including transistors replacing vacuum tubes in the second generation, integrated circuits and silicon chips in the third generation, and microprocessors integrating thousands of circuits onto a single chip in the fourth generation. These changes made computers smaller, faster, cheaper, more energy efficient and reliable over time. The document also provides some examples of early computers from each generation like ENIAC, UNIVAC and discusses improvements in processing power, memory and programming languages that came with each new generation of computing technology.
Question 1The OSI model has seven layers where each layer pe.docxssuser774ad41
Question 1
The OSI model has seven layers where each layer performs various functions that are integrated to ensure that the network performs efficiently. The layers are arranged as follows from the bottom to the top layer:
a) The physical layer:
This is the first layer of the model and it has several functions. These are:
i. Bit synchronization:
The physical layer is very crucial in terms of timing and synchronizing the period and the amount of bits that are transferred between the sender and the recipient of a message. It uses a clock to ensure accurate and reliable synchronization.
ii. Bit rate control:
The physical layer also controls the bandwidth in a network by determining the number of bits that are transferred over the network channel within the specified time which is seconds in most cases.
iii. Physical topologies:
The physical layer also determines the design which is used to connect all the devices that make up the network. These include routers, switches, hubs and other equipment used in a network.
iv. Transmission mode:
The connection of devices in the physical layer determines how data between the communicating devices flows. There are various transmission modes which are supported by the physical layer. These are simplex, half-duplex and full-duplex. In simplex, data flows in only one direction. In half-duplex data can flow in both directions but not simultaneously. In the full-duplex transmission mode, data flows in both directions at the same time.
b) Data Link Layer:
This is the second layer of the OSI model. Some of its functions include:
i. Framing:
Data that is being transmitted is segmented into pieces known as frames to make the transmission process easier. The Data link layer facilitates the framing process to ensure that the receiver acquires the accurate and relevant information within the shortest possible time.
ii. Physical addressing:
The frames require adequate data regarding the sender and the recipient to ensure that a message does not fail to reach the intended recipient. The Data Link Layer achieves this by adding a MAC address to the header section of each of the frames that are being transmitted.
iii. Error control:
The use of frames in the DLL enables the network layer to detect when frames do not reach the intended recipient. In return, the DLL is able to retransmit the lost or damaged frames using the details in the headers.
iv. Flow control:
The DLL ensures that the flow of data between the sender and the recipient is constant. This techniques ensures the stability of the communication channel that is established when transmitting data.
v. Access control:
The assigning of MAC addresses to all the computers in a network enables the Data Link Layer to determine the machines with access to certain resources.
c) Network layer:
The functions of the third OSI model layer are:
i. Routing:
The network layer assesses the different routes that a frame can use to reach its recipient and it chooses the best rou ...
Here is a draft proposal for migrating the Windows XP machines in the new LSDG research group to Linux:
Proposal to Migrate LSDG Desktops from Windows XP to Linux
Introduction
The new LSDG research group at Linx LLC will be using desktop operating systems. Currently, some machines in the larger Linx LLC organization run Windows XP and Windows 7. As LSDG will be a separate research group, we need to consider the best desktop OS choice for their needs and the longevity of the machines.
Analysis
Windows XP is no longer supported by Microsoft, so continuing to use it poses major security risks. Without updates and patches, XP machines are vulnerable to exploits. Support for Windows 7 will also end
This document provides an overview and table of contents for a book titled "CCNA Practice Questions (Exam 640-802) Third Edition" by Jeremy Cioara. The book contains practice questions and answers to help readers study and prepare for the CCNA certification exam. It is divided into two parts that cover the ICND1 and ICND2 exam objectives. Each part contains multiple chapters that review topics like networking fundamentals, routing, switching, WAN technologies and network security. The document lists the chapter titles and topics covered in each one to help readers understand the scope of the material in the book.
Overview of data communication and networkingSisir Ghosh
The document provides an overview of data communication and computer networks. It discusses the key components of data communication including senders, receivers, transmission media, messages, and protocols. It then describes different types of network connections and topologies including point-to-point, multipoint, bus, star, ring, mesh, and hybrid networks. Finally, it discusses network classification based on scale, including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). The document also covers protocols, standards, and reference models like OSI and TCP/IP.
The document defines several computer-related terms:
RAM, byte, mouse, icons, software, control unit, LAN, modem, ALU, and registers. It also differentiates between terms like minicomputer and microcomputer, mainframe and supercomputer, hardware and software, byte and word, and RAM and cache memory. The document provides definitions for software and describes the procedure for how data is stored on a hard disk drive using binary code and read/write heads.
Project report on mesh hybrid topology network visionJignesh Ameta
This document provides a summary of mesh/hybrid network topologies. It discusses the key characteristics of mesh topologies, including that nodes are connected to multiple other nodes on the network. This creates redundant pathways between nodes and allows the network to dynamically route around failures. The document also notes that hybrid topologies combine elements of mesh and other topologies like bus or star, providing some of the redundancy of mesh with lower infrastructure costs. In summary, the document outlines mesh and hybrid network topologies and their advantages in providing multiple connections and redundancy between nodes.
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012Syahriha Ruslan
This document contains an exam paper for a Computer Network course from June 2012. It has two sections - Section A with 40 objective questions and Section B with 2 essay questions. Section A covers topics like network topologies, transmission modes, protocols, networking devices and troubleshooting. Section B includes questions about network design, cabling, wireless security and social engineering attacks. The document provides diagrams, scenarios and context to test understanding of key networking concepts.
1. A hub works on a single collision and broadcast domain while a switch works on per-port collision and a single broadcast domain. FQDN uniquely identifies a host within a DNS hierarchy. LMHOSTS files must be manually configured and updated like HOSTS files but resolve NetBIOS names to IP addresses.
2. The main qualities of an effective network are performance, reliability, and security. 10Base2 uses thin coaxial cable up to 100m, 10Base5 uses thick coaxial cable up to 500m, and 10BaseT uses twisted pair cabling.
3. Anonymous FTP allows users to connect without a login/password using "anonymous" or "guest" as the login and their email
This document provides an overview of computer networks and networking concepts. It begins with introducing data communications and defining networks. It then discusses the OSI model and TCP/IP protocol suite. The document outlines various networking topics such as bandwidth utilization, transmission media, switching techniques including circuit switching, datagram networks, and virtual circuit networks. It provides examples and illustrations to explain networking concepts and how different network components interact.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Film vocab for eal 3 students: Australia the movie
C. Science (I) solution.pdf
1. Page 1 of 14
Federal Board HSSC-I Examination
Computer Science Model Question Paper
(Curriculum 2009)
SOLUTION SECTION – A (Q:1)
Q.1 Choose the correct answer i.e. A / B / C / D by filling the relevant bubble for each
question on the OMR Answer Sheet according to the instructions given there.
Each part carries one mark.
(Answers are underlined)
1. Which one of the following is the most powerful digital computer system?
A. Mainframe Computer B. Minicomputer
C. Microcomputer D. Supercomputer
2. Which of the following is most suitable to print salary slips of 2000 employees
on very cheap cost?
A. Dot matrix printer B. Laser printer
B. Desk jet printer D. Plotter
3. Cache Memory works between:
A. RAM and Processor B. RAM and ROM
C. Processor and Hard Disk D. ROM and Hard Disk
4. Memory card used in mobile phone is an example of:
A. Magnetic Memory B. Secondary Memory
C. Optical Memory D. Flash Memory
5. How many memory locations can be addressed with 64-bit address bus?
A. 32 B. 64
C. 232
D. 264
6. How many different operations can be performed by CPU, if opcode of an
instruction format consists of 4 bits?
A. 4 B. 8
C. 16 D. 32
7. Which of these expansion slots has highest video performance?
A. PCI B. PCI Express
C. SATA D. AGP
8. Which of the following register holds the address of the next instruction to be
executed?
A. Program Counter B. Instruction Register
C. Counter Register D. Data Register
9. The IP Address 191.10.1.0 lies in:
A. Class A B. Class B
C. Class C D. Class D
10. Email sending mechanism is an example of the following mode of
communication.
A. Simplex B. Simple Duplex
C. Half Duplex D. Full Duplex
2. Page 2 of 14
11. Cellular communication divides the physical region into sections called:
A. Pods B. Cells
C. Cubes D. Sectors
12. Which wireless technology is used in TV remotes and Toys?
A. Infrared B. Bluetooth
C. Wi-Fi D. Wi-Max
13. What is the type of this statement? “Create table Student”
A. DCL B. DDL
C. DXL D. DML
14. The relationship between entities AUTHOR and BOOK is:
A. Unary B. Binary
C. Ternary D. Recursive
15. Identify the cardinality of following relationship:
One COLLEGE can have many DEPARTMENTs, One DEPARTMENT
belongs to one COLLEGE.
A. One-to-One B. One-to-Many
C. Many-to-Many D. Many-to-One
3. Page 3 of 14
SOLUTION SECTION – B (Q:2)
Part – i: Differentiate between hard copy and soft copy devices along with one example
of each. (1+2)
Answer:
Hard copy devices Soft copy devices
1. An output device that prints data in printed
form (on paper)
An output device that displays data in
electronic form
2. The output generated by these devices
cannot be modified
The output shown on these devices can be
easily modified
3. Example:
Printer or Plotter
Example:
Display screens
Part – ii: Write down any one application of the following scanner types: a. Handheld
scanner b. Flatbed scanner c. Optical scanner (1+1+1)
Answer:
a. Application of Handheld scanner
It is an input device used to scan books, newspapers, or magazines by dragging over
the image. It is used at homes or offices.
b. Application of Flatbed Scanner
It is an input device used to scan pages, images, or other documents by placing over it.
It is commonly used at offices or homes.
c. Application of Optical Scanner
It is a light sensing input device that reads printed text or graphics. It is commonly used
in ATMs.
Part – iii: Define utility software, language processor and device driver. (2+1)
Answer:
a. Utility software
It is a type of system software that helps user to maintain a computer system for
effective functioning e.g., virus scanning, disk compression
b. Language processor
It is a type of system software that translates a program written in human-
understandable form into machine-understandable format e.g., compiler
4. Page 4 of 14
c. Device driver
It is a type of system software that is used to familiarize the device with the computer
system. It controls the working of a device e.g., printer.
Part – iv: Differentiate between Intel P4 and AMD Athlon processors with reference to
clock speed, bus width and architecture. (3)
Answer:
Intel P4 processor AMD Athlon
1. Clock speed 1.7 to 3.0 GHz 1.4 to 2.33 GHz
2. Bus width 32/64 bits 32/64 bits
3. Architecture CISC / RISC RISC
Part – v: What is an Instruction Cycle? Illustrate with diagram. (2+1)
Answer:
Instruction Cycle steps
1. Fetch Operation
The control unit fetches/ takes the instruction from main memory and places it in
Instruction Register.
2. Decode Operation
The control unit decodes/ translates the instruction placed in Instruction register by
examining the instruction.
3. Execute Operation
The decoded instruction is executed by performing different operations like arithmetic.
Instruction Cycle
Fetch the
instruction
Execute the
instruction
Decode the
instruction
5. Page 5 of 14
Part – vi: Write down three differences between SIMM and DIMM memory chips. (3)
Answer:
SIMM DIMM
1. Single In-line Memory Module is a small
circuit board used in early computers of
1980s 90s.
Dual In-line Memory Module is a small
circuit board used in today’s computers.
2. It typically uses 32-bit bus, hence slower
data transfer rate.
It typically uses 64-bit bus, hence faster
data transfer rate.
3. Its storage capacity ranges from 256KB to
32MB.
Its storage capacity ranges from 64MB to
512MB.
Part – vii: The following Microprocessor diagram has three internal system buses,
observe the diagram carefully and name the Buses shown in the diagram. (3)
Answer:
Part – viii: Differentiate between Client-Server and Peer-to-Peer network architecture.
(3)
Answer:
Client-Server network architecture
1. A centralized network architecture based on server and clients.
2. A client requests for services and server responds with a service.
3. It is more stable and secure network, hence supports large network.
Names of Buses
1. Address bus
2. Data bus
3. Control bus
1.
2.
3.
6. Page 6 of 14
Peer-to-Peer network architecture
1. A de-centralized network architecture based on peers.
2. Each node can request for services and provides services.
3. It is less stable and secure network, hence supports small networks.
Part – ix: Categorize the following topologies as per their characteristics (Star, Ring,
Bus, Mesh). (1.5+1.5)
Answer:
Part – x: Give any three limitations of Mobile Communication System. (3)
Answer:
Limitations of Mobile Communication system
1. Mobile Communication system has slower speed or data transfer rate.
2. Mobile Communication has less protection and security.
3. Mobile Communication has interference due to bad weather or high buildings.
4. Mobile Communication has limited battery and CPU power.
Part – xi: Complete the required information in the following table against the said
satellites. (1+1+1)
Answer:
Satellite Distance from the Earth Purpose
GEO Above 35786 km Used for weather forecasting, satellite radio and
television
MEO From 2000 - 35786 km Used for GPS and navigation
LEO From Earth’s surface to
2000 km
Used for mobile telephones and video conferencing
Expensive (most expensive to least expensive) Least Cabling (least to most)
Mesh Bus
Star Ring
Ring Star
Bus Mesh
Satellites Distance from the Earth Purpose
GEO
MEO
LEO
7. Page 7 of 14
Part – xii: Write down any one usage of Wi Max, Bluetooth, and Infra-Red technologies.
Answer: (1+1+1)
1. Usage of Wi Max technology
It is a high-speed broadband wireless network used for communication over a city and
has a range of 40-50 km e.g., cable TV network of a city.
2. Usage of Bluetooth technology
It is a low-speed wireless network used for short range communication within 10 meters
e.g., exchange of data between two mobile devices.
3. Usage of Infra-Red technology
It is a high-speed wireless network used for short range communication e.g., TV remote
control, toys remote control, home security system.
Part – xiii: A team consists of many players and a player plays for only one team. Draw
an ER diagram and identify cardinality for the said situation. (2+1)
Answer: ER-Diagram
Cardinality: 1 to Many
Part – xiv: Understand the ER Diagram and write the answers to the following
questions: (3)
TEAM PLAYER
has
8. Page 8 of 14
i. List one example of one-to-many relationship.
ii. Mention Entities used in ER diagram.
iii. How many minimum cars supplier must supplies?
Answer:
i. Example of one-to-many relationship:
One SUPPLIER supplies many CARS or
One CAR has many AGREEMENTS
ii. Entities:
CLIENT, AGREEMENT, CAR, SUPPLIER
iii. Minimum cars supplier must supply:
Supplier must supply ONE car
Part – xv: What are Columnar, Tabular and Datasheet Form views? (3)
Answer:
1. Columnar Form view:
A columnar form is used to display one record at a time. It shows labels and text boxes
for all fields of one record.
2. Tabular Form view:
A tabular form is used to display multiple records at a time in different rows. It shows
labels on top of each column.
3. Datasheet Form view:
A datasheet form is used to display multiple records at a time. It shows records in
datasheet view of table with rows and columns.
Part – xvi: Specify the suitable data types for Roll No, DOB and Address. Identify the
suitable Primary key. Also write down the number of tuples and attributes in the table.
(1.5+0.5+1)
Registration
No.
Roll No. Name DOB Address Phone
CS12/05 1 ALI 12-05-1999 G-7 Islamabad 9233658721
CS34/21 2 AMNA 26-08-1999 Cantt Rawalpindi 9234737536
Answer:
i. Suitable data types: Roll No : Number
DOB : Date/Time
Address: Text
ii. Suitable Primary key: Roll No or Registration No.
iii. Number of tuples: 2
Number of attributes: 6
9. Page 9 of 14
SOLUTION SECTION – C
Q. No. 3 (a) Differentiate between Sequential access and Direct access storage. (4)
Answer:
Sequential access storage:
1. Sequential access storage, stores files and data in specific order or sequence.
2. This type of storage access data or files in the same sequence in which it is stored.
3. Its access time varies according to the required location; hence it has slow access
time.
4. This storage is suitable for applications like preparation of electricity bills, pay slips
etc.
5. An example of sequential access storage device is Magnetic Tape.
Direct access storage:
1. Direct access storage, stores files and data by placing at any location, wherever
space is available.
2. This type of storage access or reach any location by direct or random access.
3. Equal access time is required to access any location; hence it has fast access time.
4. This storage is suitable for applications like reservation of airline ticket, determine
balance in customer’s bank account etc.
5. An example of direct access storage device is Magnetic Disk.
Q. No. 3 (b) Which one of the following storage media is better and why? Support your
answer with three reasons. (i) Magnetic (ii) Optical (1+3)
Answer:
Better storage media: Magnetic storage
Reason 1: Speed:
Magnetic storage has faster read and write operations and hence high speeds than optical
storage.
Reason 2: Storage Capacity:
Magnetic storage has larger storage capacity and space. It comes with terabyte capacities, but
optical disks have much smaller space as compared to magnetic storage.
Reason 3: Multiple partitions:
Due to larger storage capacity, multiple partitions can be used to store data.
10. Page 10 of 14
Q. No. 4 Describe the following types of Ports: (2+2+2+2)
a. Serial Port b. Parallel Port
c. USB Port d. Fire wire Port
Answer:
a. Serial Port:
A serial port is an interface or connection that allows transmission of one bit at a time. It
has 9 or 25 pins and has slower data transfer rate. It is one of the oldest types of port that is
usually used to connect devices that do not require fast data transmission like mouse,
keyboard etc.
b. Parallel Port
A parallel port is an interface or connection that allows transmission of multiple bits at a
time. It has 25 pins to carry data. It has faster data transfer rate. It is usually used to connect
devices that require fast data transmission like scanner, printer etc.
c. USB Port
A Universal Serial Bus is a plug and play interface or connection that automatically
determines the type of device attached. It allows communication of variety of devices in
modern computers like keyboard, mouse, scanner, printer, flash drive, digital camera etc.
It has fast data transmission.
d. Firewire Port
A firewire port is a high-speed connecting device used for connecting peripherals like hard
drives, digital audio/ video devices including camcorders, digital cameras. It can also
provide power to some devices without any other interface. It has 4 or 6 pins. It allows fast
transfer rates.
11. Page 11 of 14
Q. No. 5 (i) Compare the TCP suite with OSI model. (4)
Answer:
OSI Model layers TCP/IP Model Layers
OSI model TCP/IP suite
1 OSI model is a logical and conceptual
model that defines network
communication used by systems for
interconnection and communication with
other systems.
TCP/IP suite helps to determine how a
specific computer should be connected to
the internet.
2 Session and presentation layers are part of
this model.
There are no session and presentation
layers.
3 In this model, the data link layer and
physical layer are separate layers.
In this model, data link and physical layers
are both combined as a single internet
layer.
4 It helps to standardize router, switch, and
other hardware.
It helps to establish a connection between
different types of computers.
Application
Application
Presentation
Network
Transport
Session
Physical
Data Link
Transport
Internet
Network
Interface
12. Page 12 of 14
Q. No. 5 (ii) Differentiate between circuit switching and Packet switching. (4)
Answer:
Circuit switching Packet switching
1. Circuit switching is a network that
transmits data by creating a
dedicated path or circuit between
two nodes.
In Packet switching, each packet containing the
information that needs to be processed goes
through the dynamic route. No dedicated
connection or circuit is required.
2. A uniform path is followed
throughout the session.
There is no uniform path that is followed end to
end through the session.
3. Since a dedicated channel has been
used, the transmission of other data
becomes impossible.
Multiple users can use the same channel while
transferring their packets.
4. An example of circuit switching is
Telephone network.
An example of this type is Message switching
network
Q. No. 6 Observe the table STUDENT, apply normalization rules, and convert the table
up to 3NF by showing step by step procedure of 1NF, 2NF and 3NF. (2+3+3)
STUDENT
St ID Name Class Section Gender Group Practical Subject
1 MUHAMMAD TALHA XI G MALE ICS-PHY Physics, Computer
2 HAMZA AZIZ XI G MALE ICS-PHY Physics, Computer
3 MUHAMMAD SUFYAN XI G MALE ICS-PHY Physics, Computer
4 KOMAL SAMUAIL XI F FEMALE ICS-STATS Stats, Computer
5 ISHA SHAUKAT XI F FEMALE ICS-PHY Physics, Computer
13. Page 13 of 14
Answer:
First Normal Form (1NF):
A relation is in 1NF if every row and column intersection contain atomic/single values only.
The following relation is in 1NF after remove repeating groups.
STUDENT
St ID Name Class Section Gender Group Practical Subject
1 MUHAMMAD TALHA XI G MALE ICS-PHY Physics
1 MUHAMMAD TALHA XI G MALE ICS-PHY Computer
2 HAMZA AZIZ XI G MALE ICS-PHY Physics
2 HAMZA AZIZ XI G MALE ICS-PHY Computer
3 MUHAMMAD SUFYAN XI G MALE ICS-PHY Physics
3 MUHAMMAD SUFYAN XI G MALE ICS-PHY Computer
4 KOMAL SAMUAIL XI F FEMALE ICS-STATS Stats
4 KOMAL SAMUAIL XI F FEMALE ICS-STATS Computer
5 ISHA SHAUKAT XI F FEMALE ICS-PHY Physics
5 ISHA SHAUKAT XI F FEMALE ICS-PHY Computer
Second Normal Form (2NF):
A relation is in 2NF if it is in 1NF, and all non-key attributes are fully functional dependent
on primary key. These relations are in 2NF after removing partial functional dependencies.
STUDENT
St ID Name Class Section Gender
1 MUHAMMAD TALHA XI G MALE
2 HAMZA AZIZ XI G MALE
3 MUHAMMAD SUFYAN XI G MALE
4 KOMAL SAMUAIL XI F FEMALE
5 ISHA SHAUKAT XI F FEMALE
GROUP
Group ID St ID Group Practical Subject
1 1 ICS-PHY Physics
2 1 ICS-PHY Computer
3 2 ICS-PHY Physics
4 2 ICS-PHY Computer
5 3 ICS-PHY Physics
6 3 ICS-PHY Computer
7 4 ICS-STATS Stats
8 4 ICS-STATS Computer
9 5 ICS-PHY Physics
10 5 ICS-PHY Computer
14. Page 14 of 14
Third Normal Form (3NF):
A relation is in 3NF if it is in 2NF, and no transitive dependency exists. These relations are in
3NF after removing transitive dependencies.
………………….
NOTE:
This is suggested (proposed) solution or answers to the questions given in
SECTION-B and C. Students can write any valid alternate answers.
STUDENT
St ID Name Gender ID Section ID Group ID
1 MUHAMMAD TALHA MALE 1 1
2 HAMZA AZIZ MALE 1 1
3 MUHAMMAD SUFYAN MALE 1 1
4 KOMAL SAMUAIL FEMALE 2 2
5 ISHA SHAUKAT FEMALE 2 1
SECTION
Section ID Section Class
1 G XI
2 F XI
GROUP
Group ID Group
1 ICS-PHY
2 ICS-STATS
STUDENT SUBJECT
St ID Practical Subject
1 1
1 2
2 1
2 2
3 1
3 2
4 3
4 2
5 1
5 2
PRACTICAL SUBJECT
Subject ID Practical Subject
1 Physics
2 Computer
3 Stats