SlideShare a Scribd company logo
1 of 24
Past paper comp-111-22
Prepared by:
Haider Ali
Prof: Shahid khan
Prof. Usama
• SRAM is mainly fixed on the processor or within the
memory and the processor.
• DRAM is fixed on the motherboard.
• The successor of the SRAM is the DRAM because it is
cheaper to produce.
• SRAM is available for purchase, but mainly for system
builders.
• The oldest version of the DRAM is DDR1, but it is only
available to industrial manufacturers and not consumers.
On the other hand, the latest version is the
• DDR4, which is available for both consumers and
industrial manufacturers.
• SRAM saves data on the memory when power is still
connected to the system.
• DRAM needs to be periodically refreshed.
• SRAM is an abbreviation for Static Random-Access
Memory.
• DRAM is an abbreviation for dynamic random access
memory.
A magnetic stripe card is
generally used in transportation
tickets, identity cards, and credit
cards. They can be read by
swiping it through a magnetic
reading head. Companies make
the use of the magnetic stripe
cards embedded with an RFID
tag or microchip to monitor
access of employees in the
business premises
• Machine language is the lowest level of programming
language, consisting of binary code that the computer's CPU
can directly execute. Machine language programs are executed
faster than programs written in high-level programming
languages because there is no need for translation or
interpretation of the code.
• Opening suspicious email attachments.
• Attaching unsecured removable or external storage
devices (e.g., flash drives, external hard drives, memory
cards)
• Accessing malicious websites.
• Clicking malicious ads.
• Downloading malicious and unlicensed applications.
• CPU registers are small, high-speed storage areas within
the central processing unit (CPU) of a computer. They
are used to temporarily store data and instructions that
the CPU is currently processing, and they are measured
in bits.
• Registers are located inside the CPU, and they are
designed to allow the CPU to access data and
instructions quickly. Because registers are part of the
CPU, they can be accessed much more quickly than
main memory or storage devices, which makes them
ideal for storing data that is needed frequently or data
that is needed quickly.
• CAD (Computer-Aided Design) and CAM (Computer-Aided
Manufacturing) are two related but distinct computer-aided
technologies used in the design and manufacturing processes.
• CAD refers to the use of computer software to create detailed digital
models of objects, products, or systems. It is primarily used for
designing and engineering new products or systems, as well as for
making modifications to existing designs
• CAM, on the other hand, It requires less labor intensive and saves
labor cost as it can perform work electronically which requires
minimum supervision. Machines are accurate, and the process is
repeated automatically with large quantities. The occurrence of
errors is less here, and it can run continually. A virtual machine can
help in evaluating the outcomes and routines effectively.
• Web publishing refers to the process of making web
content available to the public on the internet. This
includes creating, editing, and publishing web pages,
websites, and web applications.
• Web publishing can be done by individuals, businesses,
or organizations, and can range from simple personal
blogs to complex e-commerce websites or web-based
applications. The goal of web publishing is to make web
content accessible and easily available to the public, and
to provide a platform for sharing information and
communicating with others online.
There are two states of a cell,
i.e. active and passive. The
currently selected cell where
data can be entered or edited is
called the active cell.
When another cell is selected
or cell pointer is moved to
another cell, that cell becomes
the active cell. Actually, at a time
a single is active and other cells
of worksheet are inactive. The
inactive cells are known as
passive cells.
• Yes, it is possible to recover a deleted file in Windows if it
was accidentally deleted. The first step you should take is
to check the Recycle Bin. When you delete a file in
Windows, it is usually moved to the Recycle Bin, where it
can be recovered easily. To restore a file from the
Recycle Bin, simply locate the file, right-click on it, and
select "Restore."
• Command Line Interface (CLI)
Operating Systems: These operating systems
require the user to interact with the computer
through a command prompt or terminal. The user
types commands into the prompt and the operating
system responds with text output. CLI operating
systems are often used by developers, system
administrators, and power users who require a high
degree of control over their systems. Examples of
CLI operating systems include Linux/Unix, MS-
DOS, and Windows Command Prompt.
• Graphical User Interface (GUI) Operating Systems: These
operating systems provide a graphical interface that allows users to
interact with the computer using a mouse, keyboard, and other input
devices. GUI operating systems are designed to be more intuitive and
user-friendly than CLI systems, and are used by most home and office
computer users. Examples of GUI operating systems include Windows,
macOS, and various Linux distributions such as Ubuntu and Fed
• An extended partition is a type of partition on a hard drive
that can be used to create logical partitions. In a
traditional partition scheme, a hard drive can be divided
into multiple primary partitions, each of which can contain
a file system and be used to store data.
• Formula: =A1+A2+A3+A4+A5
• Function: =SUM(A1:A5)
• Both the formula and function will produce the same
result, which is the sum of the values in cells A1, A2, A3,
A4, and A5. The SUM function is a built-in function in
Excel that adds the values in a range of cells, while the
formula simply adds the values in the cells together using
the plus (+) operator.
• DBMS stands for Database
Management System. It is a software
system that enables users to create,
manage, and manipulate databases.
A database is a collection of data that
is organized in a specific way to allow
for efficient retrieval and manipulation.
• A DBMS provides a user-friendly
interface for users to interact with the
database. It allows users to define the
structure of the database, store and
retrieve data, enforce data integrity
rules, and perform other operations
such as querying and updating the
data.
• Resolution is an important factor for display screens
because it determines the level of detail and clarity that
can be displayed on the screen. Resolution refers to the
number of pixels that make up the image on the screen.
The higher the resolution, the more pixels are present,
and the sharper and more detailed the image will appear.
• a foreign key is a field or combination of fields that is
used to establish a link between two tables. A foreign key
in one table points to the primary key of another table.
The use of foreign keys is an essential part of
maintaining data integrity and ensuring consistency in the
database.
• A video display adapter, also known as a graphics card, is a
hardware component that is used to generate and output
visual images to a display device, such as a monitor or
projector. It is responsible for rendering images, videos, and
animations on the computer screen.
• There are several types of video display adapters
available in the market, including:
• Integrated graphics: These are built-in graphics processors
that are integrated into the motherboard of a computer. They
are low-cost and suitable for basic computing tasks such as
web browsing, document editing, and video playback.
• Dedicated graphics: These are standalone graphics cards that
are installed in the computer's expansion slot. They have their
own memory and processing power, making them suitable for
demanding tasks such as gaming, video editing, and 3D
modeling.
• Workstation graphics: These are specialized graphics
cards that are designed for use in professional
workstations, such as those used in the fields of
architecture, engineering, and media production. They
offer advanced features such as multi-monitor support,
3D modeling, and high-end rendering capabilities.
• External graphics: These are graphics cards that are
connected to a computer via a USB or Thunderbolt port.
They are suitable for laptops or other mobile devices that
may not have a dedicated graphics card.
• Onboard graphics: These are graphics cards that are
installed on the computer's motherboard. They are similar
to integrated graphics but offer more advanced features
and performance.
• A computer virus is a type of malicious software that is
designed to replicate itself and spread from one
computer system to another, often causing damage to
data, hardware, or software. It typically spreads through
email attachments, downloads, or infected software.
• There are several types of computer viruses, including:
• File infectors: These viruses infect executable files, such
as .exe or .com files. When the infected file is executed,
the virus is activated and can spread to other files on the
system.
• Boot sector viruses: These viruses infect the boot sector
of a disk, making it difficult to remove them. They can
cause damage to the disk and prevent the system from
booting up.
• Macro viruses: These viruses are spread through macros
in applications, such as Microsoft Word or Excel. They
can cause damage to the documents and files that are
infected.
• Polymorphic viruses: These viruses can change their
code, making it difficult for antivirus software to detect
and remove them.
• Worms: These are self-replicating viruses that spread
through networks and can cause damage to data and
software.
• Trojan horses: These are programs that appear to be
legitimate but contain hidden malicious code. They can
be used to steal data or give unauthorized access to a
• Installing antivirus software: Antivirus software can detect and
remove viruses from a computer system. It should be updated
regularly to ensure that it can detect new threats.
• Keeping software updated: Software updates often contain
security patches that can prevent vulnerabilities from being
exploited by viruses.
• Avoiding suspicious emails and websites: Emails and websites
that are suspicious or come from unknown sources should be
avoided. They may contain links or downloads that can infect
the system with a virus.
• Using strong passwords: Strong passwords should be used to
prevent unauthorized access to a system.
• Backing up data: Regular data backups can help in the event
that data is lost or damaged due to a virus.
• Keyboard
• Mouse
• Scanner
• Barcode reader
• RFID reader
• Touch screen
• Joystick
• Biometric scanner (e.g.
fingerprint scanner)
• Microphone
• Camera
• Sensor
• Light pen
• Magnetic stripe reader
• Gamepad
• Graphics tablet
• Digital pen

More Related Content

What's hot

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summaryudemy course
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in CybersecurityRole of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in CybersecurityRachit Shah
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating systemMohammad Alam
 
Unit 1. Problem Solving with Computer
Unit 1. Problem Solving with Computer   Unit 1. Problem Solving with Computer
Unit 1. Problem Solving with Computer Ashim Lamichhane
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYRohitK71
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?culltdueet65
 

What's hot (20)

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Semaphore
Semaphore Semaphore
Semaphore
 
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in CybersecurityRole of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Parallel Computing
Parallel Computing Parallel Computing
Parallel Computing
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
Unit 1. Problem Solving with Computer
Unit 1. Problem Solving with Computer   Unit 1. Problem Solving with Computer
Unit 1. Problem Solving with Computer
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
AI
AIAI
AI
 
Protection and security
Protection and securityProtection and security
Protection and security
 
What Is An Antivirus Software?
What Is An Antivirus Software?What Is An Antivirus Software?
What Is An Antivirus Software?
 

Similar to comp-111-22 past paper analysis

Introductoin of computer hardware and software
Introductoin of computer hardware and softwareIntroductoin of computer hardware and software
Introductoin of computer hardware and softwareUttara University
 
Computer-Basics for B.ed Second Year.pptx
Computer-Basics  for B.ed Second Year.pptxComputer-Basics  for B.ed Second Year.pptx
Computer-Basics for B.ed Second Year.pptxkplkumar981
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfEYOHAICTMEDIA
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptxaytenewbelay1
 
Computer_Basics_computer_basics.pptx
Computer_Basics_computer_basics.pptxComputer_Basics_computer_basics.pptx
Computer_Basics_computer_basics.pptxJiaJunWang17
 
INTRODUCTION TO COMPUTER SOFTWARE
INTRODUCTION TO COMPUTER SOFTWAREINTRODUCTION TO COMPUTER SOFTWARE
INTRODUCTION TO COMPUTER SOFTWAREabiramiabi21
 
IGCSE_ICT_Chapter 1.pptx
IGCSE_ICT_Chapter 1.pptxIGCSE_ICT_Chapter 1.pptx
IGCSE_ICT_Chapter 1.pptxFatimaWaheed30
 
Presentation1
Presentation1Presentation1
Presentation1aterodz
 
Foundation of information system - Software
Foundation of information system - SoftwareFoundation of information system - Software
Foundation of information system - Softwarerh8g7p44p7
 
INTRODUCTIONTO BASICS OF PROGRAMMING.pptx
INTRODUCTIONTO BASICS OF PROGRAMMING.pptxINTRODUCTIONTO BASICS OF PROGRAMMING.pptx
INTRODUCTIONTO BASICS OF PROGRAMMING.pptxurvashipundir04
 
HARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptxHARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptxKhushiSinghal52
 
Intro to computer system
Intro to computer systemIntro to computer system
Intro to computer systembenchhood
 

Similar to comp-111-22 past paper analysis (20)

COMPUTER COMPONENTS
COMPUTER COMPONENTSCOMPUTER COMPONENTS
COMPUTER COMPONENTS
 
Introductoin of computer hardware and software
Introductoin of computer hardware and softwareIntroductoin of computer hardware and software
Introductoin of computer hardware and software
 
Unit-1 Part1.ppt
Unit-1 Part1.pptUnit-1 Part1.ppt
Unit-1 Part1.ppt
 
Computer-Basics for B.ed Second Year.pptx
Computer-Basics  for B.ed Second Year.pptxComputer-Basics  for B.ed Second Year.pptx
Computer-Basics for B.ed Second Year.pptx
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Computer_Basics_computer_basics.pptx
Computer_Basics_computer_basics.pptxComputer_Basics_computer_basics.pptx
Computer_Basics_computer_basics.pptx
 
INTRODUCTION TO COMPUTER SOFTWARE
INTRODUCTION TO COMPUTER SOFTWAREINTRODUCTION TO COMPUTER SOFTWARE
INTRODUCTION TO COMPUTER SOFTWARE
 
IGCSE_ICT_Chapter 1.pptx
IGCSE_ICT_Chapter 1.pptxIGCSE_ICT_Chapter 1.pptx
IGCSE_ICT_Chapter 1.pptx
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Presentation1
Presentation1Presentation1
Presentation1
 
Software
SoftwareSoftware
Software
 
Foundation of information system - Software
Foundation of information system - SoftwareFoundation of information system - Software
Foundation of information system - Software
 
INTRODUCTIONTO BASICS OF PROGRAMMING.pptx
INTRODUCTIONTO BASICS OF PROGRAMMING.pptxINTRODUCTIONTO BASICS OF PROGRAMMING.pptx
INTRODUCTIONTO BASICS OF PROGRAMMING.pptx
 
1.pptx
1.pptx1.pptx
1.pptx
 
HARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptxHARDWARE AND SOFTWARE.pptx
HARDWARE AND SOFTWARE.pptx
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Intro to computer system
Intro to computer systemIntro to computer system
Intro to computer system
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

comp-111-22 past paper analysis

  • 1. Past paper comp-111-22 Prepared by: Haider Ali Prof: Shahid khan Prof. Usama
  • 2. • SRAM is mainly fixed on the processor or within the memory and the processor. • DRAM is fixed on the motherboard. • The successor of the SRAM is the DRAM because it is cheaper to produce. • SRAM is available for purchase, but mainly for system builders. • The oldest version of the DRAM is DDR1, but it is only available to industrial manufacturers and not consumers. On the other hand, the latest version is the
  • 3. • DDR4, which is available for both consumers and industrial manufacturers. • SRAM saves data on the memory when power is still connected to the system. • DRAM needs to be periodically refreshed. • SRAM is an abbreviation for Static Random-Access Memory. • DRAM is an abbreviation for dynamic random access memory.
  • 4. A magnetic stripe card is generally used in transportation tickets, identity cards, and credit cards. They can be read by swiping it through a magnetic reading head. Companies make the use of the magnetic stripe cards embedded with an RFID tag or microchip to monitor access of employees in the business premises
  • 5. • Machine language is the lowest level of programming language, consisting of binary code that the computer's CPU can directly execute. Machine language programs are executed faster than programs written in high-level programming languages because there is no need for translation or interpretation of the code.
  • 6. • Opening suspicious email attachments. • Attaching unsecured removable or external storage devices (e.g., flash drives, external hard drives, memory cards) • Accessing malicious websites. • Clicking malicious ads. • Downloading malicious and unlicensed applications.
  • 7. • CPU registers are small, high-speed storage areas within the central processing unit (CPU) of a computer. They are used to temporarily store data and instructions that the CPU is currently processing, and they are measured in bits. • Registers are located inside the CPU, and they are designed to allow the CPU to access data and instructions quickly. Because registers are part of the CPU, they can be accessed much more quickly than main memory or storage devices, which makes them ideal for storing data that is needed frequently or data that is needed quickly.
  • 8. • CAD (Computer-Aided Design) and CAM (Computer-Aided Manufacturing) are two related but distinct computer-aided technologies used in the design and manufacturing processes. • CAD refers to the use of computer software to create detailed digital models of objects, products, or systems. It is primarily used for designing and engineering new products or systems, as well as for making modifications to existing designs • CAM, on the other hand, It requires less labor intensive and saves labor cost as it can perform work electronically which requires minimum supervision. Machines are accurate, and the process is repeated automatically with large quantities. The occurrence of errors is less here, and it can run continually. A virtual machine can help in evaluating the outcomes and routines effectively.
  • 9. • Web publishing refers to the process of making web content available to the public on the internet. This includes creating, editing, and publishing web pages, websites, and web applications. • Web publishing can be done by individuals, businesses, or organizations, and can range from simple personal blogs to complex e-commerce websites or web-based applications. The goal of web publishing is to make web content accessible and easily available to the public, and to provide a platform for sharing information and communicating with others online.
  • 10. There are two states of a cell, i.e. active and passive. The currently selected cell where data can be entered or edited is called the active cell. When another cell is selected or cell pointer is moved to another cell, that cell becomes the active cell. Actually, at a time a single is active and other cells of worksheet are inactive. The inactive cells are known as passive cells.
  • 11. • Yes, it is possible to recover a deleted file in Windows if it was accidentally deleted. The first step you should take is to check the Recycle Bin. When you delete a file in Windows, it is usually moved to the Recycle Bin, where it can be recovered easily. To restore a file from the Recycle Bin, simply locate the file, right-click on it, and select "Restore."
  • 12. • Command Line Interface (CLI) Operating Systems: These operating systems require the user to interact with the computer through a command prompt or terminal. The user types commands into the prompt and the operating system responds with text output. CLI operating systems are often used by developers, system administrators, and power users who require a high degree of control over their systems. Examples of CLI operating systems include Linux/Unix, MS- DOS, and Windows Command Prompt.
  • 13. • Graphical User Interface (GUI) Operating Systems: These operating systems provide a graphical interface that allows users to interact with the computer using a mouse, keyboard, and other input devices. GUI operating systems are designed to be more intuitive and user-friendly than CLI systems, and are used by most home and office computer users. Examples of GUI operating systems include Windows, macOS, and various Linux distributions such as Ubuntu and Fed
  • 14. • An extended partition is a type of partition on a hard drive that can be used to create logical partitions. In a traditional partition scheme, a hard drive can be divided into multiple primary partitions, each of which can contain a file system and be used to store data.
  • 15. • Formula: =A1+A2+A3+A4+A5 • Function: =SUM(A1:A5) • Both the formula and function will produce the same result, which is the sum of the values in cells A1, A2, A3, A4, and A5. The SUM function is a built-in function in Excel that adds the values in a range of cells, while the formula simply adds the values in the cells together using the plus (+) operator.
  • 16. • DBMS stands for Database Management System. It is a software system that enables users to create, manage, and manipulate databases. A database is a collection of data that is organized in a specific way to allow for efficient retrieval and manipulation. • A DBMS provides a user-friendly interface for users to interact with the database. It allows users to define the structure of the database, store and retrieve data, enforce data integrity rules, and perform other operations such as querying and updating the data.
  • 17. • Resolution is an important factor for display screens because it determines the level of detail and clarity that can be displayed on the screen. Resolution refers to the number of pixels that make up the image on the screen. The higher the resolution, the more pixels are present, and the sharper and more detailed the image will appear.
  • 18. • a foreign key is a field or combination of fields that is used to establish a link between two tables. A foreign key in one table points to the primary key of another table. The use of foreign keys is an essential part of maintaining data integrity and ensuring consistency in the database.
  • 19. • A video display adapter, also known as a graphics card, is a hardware component that is used to generate and output visual images to a display device, such as a monitor or projector. It is responsible for rendering images, videos, and animations on the computer screen. • There are several types of video display adapters available in the market, including: • Integrated graphics: These are built-in graphics processors that are integrated into the motherboard of a computer. They are low-cost and suitable for basic computing tasks such as web browsing, document editing, and video playback. • Dedicated graphics: These are standalone graphics cards that are installed in the computer's expansion slot. They have their own memory and processing power, making them suitable for demanding tasks such as gaming, video editing, and 3D modeling.
  • 20. • Workstation graphics: These are specialized graphics cards that are designed for use in professional workstations, such as those used in the fields of architecture, engineering, and media production. They offer advanced features such as multi-monitor support, 3D modeling, and high-end rendering capabilities. • External graphics: These are graphics cards that are connected to a computer via a USB or Thunderbolt port. They are suitable for laptops or other mobile devices that may not have a dedicated graphics card. • Onboard graphics: These are graphics cards that are installed on the computer's motherboard. They are similar to integrated graphics but offer more advanced features and performance.
  • 21. • A computer virus is a type of malicious software that is designed to replicate itself and spread from one computer system to another, often causing damage to data, hardware, or software. It typically spreads through email attachments, downloads, or infected software. • There are several types of computer viruses, including: • File infectors: These viruses infect executable files, such as .exe or .com files. When the infected file is executed, the virus is activated and can spread to other files on the system. • Boot sector viruses: These viruses infect the boot sector of a disk, making it difficult to remove them. They can cause damage to the disk and prevent the system from booting up.
  • 22. • Macro viruses: These viruses are spread through macros in applications, such as Microsoft Word or Excel. They can cause damage to the documents and files that are infected. • Polymorphic viruses: These viruses can change their code, making it difficult for antivirus software to detect and remove them. • Worms: These are self-replicating viruses that spread through networks and can cause damage to data and software. • Trojan horses: These are programs that appear to be legitimate but contain hidden malicious code. They can be used to steal data or give unauthorized access to a
  • 23. • Installing antivirus software: Antivirus software can detect and remove viruses from a computer system. It should be updated regularly to ensure that it can detect new threats. • Keeping software updated: Software updates often contain security patches that can prevent vulnerabilities from being exploited by viruses. • Avoiding suspicious emails and websites: Emails and websites that are suspicious or come from unknown sources should be avoided. They may contain links or downloads that can infect the system with a virus. • Using strong passwords: Strong passwords should be used to prevent unauthorized access to a system. • Backing up data: Regular data backups can help in the event that data is lost or damaged due to a virus.
  • 24. • Keyboard • Mouse • Scanner • Barcode reader • RFID reader • Touch screen • Joystick • Biometric scanner (e.g. fingerprint scanner) • Microphone • Camera • Sensor • Light pen • Magnetic stripe reader • Gamepad • Graphics tablet • Digital pen