Click here to load reader
Upload
naveen-chandra
View
72
Download
0
Embed Size (px)
Citation preview
Course Title : Fundamentals and PC Software
There are five questions in this assignment. Answer all the questions. You may use illustrations and
diagrams to enhance explanations.
Question 1: Explain the memory hierarchy. Give characteristics of group of memory at each level.
Hint: The term memory hierarchy is used in the theory of computation when discussing performance issues in
computer architectural design, algorithm predictions, and the lower level programming constructs such as
involving locality of reference. A 'memory hierarchy' in computer storage distinguishes each level in the
'hierarchy' by response time. Since response time, complexity, and capacity are related, the levels may also be
distinguished by the controlling technology.
The many trade-offs in designing for high performance will include the structure of the memory hierarchy, i.e.
the size and technology of each component. So the various components can be viewed as forming a hierarchy of
memories (m1,m2,...,mn) in which each member mi is in a sense subordinate to the next highest member mi-1
of the hierarchy. To limit waiting by higher levels, a lower level will respond by filling a buffer and then
signaling to activate the transfer.
There are four major storage levels.
Internal – Processor registers and cache.
Main – the system RAM and controller cards.
On-line mass storage – Secondary storage.
Off-line bulk storage – Tertiary and Off-line storage.
This is a most general memory hierarchy structuring. Many other structures are useful. For example, a paging
algorithm may be considered as a level for virtual memory when designing a computer architecture.
Question 2: .Explain the differences between followings:
i) Compiler and interpreter
Hint:
An interpreter translates some form of source code into a target representation that it can immediately execute
and evaluate. The structure of the interpreter is similar to that of a compiler, but the amount of time it takes to
www.solutioncab.com (A complete solution site)
produce the executable representation will vary as will the amount of optimization. The following diagram
shows one representation of the differences.
Compiler characteristics:
spends a lot of time analyzing and processing the program
the resulting executable is some form of machine- specific binary code
the computer hardware interprets (executes) the resulting code
program execution is fast
Interpreter characteristics:
relatively little time is spent analyzing and processing the program
the resulting code is some sort of intermediate code
the resulting code is interpreted by another program
program execution is relatively slow
The above characteristics are typical. There are well-known cases that are somewhere in between, such as Java
with it's JVM.
ii) Spooling and buffering
Hint:
www.solutioncab.com (A complete solution site)
Spooling Buffering
1. spooling is the process in which
there is a overlapping of output
device and input device on the
particular data.
2. Spooling means execution of one
program and output will be the
another program.
3. Buffer is a memory which stores
data faster so processed data is put
into the buffer for use of slow
device which can access it later.
4. Buffering means there is execution
of one program and output will be
the same program
iii) Message switching and Circuit switching
Hint:
Circuit switching Message switching
A circuit switching network physically
changes the connection before it sends a
message. this would be like the old pulse
phone relay system. . When you spun the
dial on your phone for each number, there
would be a switch that would physically
move at the other end of the line. Each
number switched you to a different set of
switches which would in turn combine to
make a physical route to your destination.
A message switching network is which
modern phone systems and computers use
to communicate. Most computers use a
"Store and Forward" type of switching.
Once a network switch receives a message,
it stores the entire message in memory,
then sends it towards its destination. With
message switching, there is no physical
switching of the wires. All wires are
connected to a processor which determines
how to handle the message.
Question 3: (a) What is ISDN? Explain various services provided by ISDN.
Hint: ISDN (Integrated Services Digital Network) is an all digital communications line that allowsr the
transmission of voice, data, video and graphics, at very high speeds, over standard communication lines. ISDN
provides a single, common interface with which to access digital communications services that are required by
varying devices, while remaining transparent to the user. Due to the large amounts of information that ISDN
lines can carry, ISDN applications are revolutionizing the way businesses communicate.ISDN is not restricted
to public telephone networks alone; it may be transmitted via packet switched networks, telex, CATV networks,
etc
Basic Rate Interface
The entry level interf e Basic(s) Rate Interface (BRI), a 128 kbit/s service delivered over a pair of standard
telep hone copper wires. The 144 kbit/s payload rate is broken down into two 64 kbit/s bearer channels ('B'
channels) and one 16 kbit/s signaling
channel ('D' channel or delta channel). This is sometimes referred to as 2B+D.
Primary Rate Interface
The other ISDN access available is the Primary Rate Interface (PRI), which is carried over an E1 (2048 kbit/s)
in most parts of the world. An E1 is 30 'B' channels of 64 kbit/s, one 'D' channel of 64 kbit/s and a timing and
alarm channel of 64 kbit/s. In North America PRI service is delivered on one or more T1 carriers (often referred
to as 23B+D) of 1544 kbit/s (24 channels).
Signaling channel
The signaling channel (D) uses Q.931 for signaling with the other side of the link.
X.25
www.solutioncab.com (A complete solution site)
X.25 can be carried over the B or D channels of a BRI line, and over the B channels of a PRI line. X.25 over the
D channel is used at many point-of-sale (credit card) terminals because it eliminates the modem setup, and
because it cts to the central system over a B channel, thereby eliminating the need for modems and making
much better use of the central system's telephone lines.
Consumer and industry perspectives
There are two points of view into the ISDN world. The most common viewpoint is that of the end user, who
wants to get a digital connection into the telephone/data network from home, whose performance would be
better than an ordinary analog modem connection.
SDN and broadcast industry
ISDN is used heavily by the broadcast industry as a reliable way of switching low latency, high quality, long
distance audio circuits.
India
Bharat Sanchar Nigam Limited, Reliance Communications and Bharti Airtel, are the largest communication
service providers, offers both ISDN BRI and PRI services across the country. Reliance Communications and
Bharti Airtel uses the DLC technology for providing these services. With the introduction of broadband
technology, the load on bandwidth is being absorbed by ADSL. ISDN continues to be an important backup
network for point-to-point leased line customers such as banks, Eseva Centers, Life Insurance Corporation of
India, and SBI ATMs
Data channel
The bearer channel (B) is a standard 64 kbit/s voice channel of 8 bits sampled at 8 kHz
with G.711 encoding. B-Channels can also be used to carry data, since they are nothing more than digital
channels.
(b) What is computer virus? What are different types of computer virus? Explain how you can protect your
machine from computer viruses.
Hint: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is
also commonly but erroneously used to refer to other types of malware, including but not limited to adware and
spyware programs that do not have the reproductive ability. A true virus can spread from one computer to
another (in some form of executable code) when its host is taken to the target computer; for instance because a
user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD,
DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a
network file system or a file system that is accessed by another computer.
Type of computer virus.
Nonresident viruses
Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder
module is responsible for finding new files to infect. For each new executable file the finder module encounters,
it calls the replication module to infect that file.
Resident viruses
Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses.
This module, however, is not called by a finder module.
How to protect from virus
The first thing you can do is download or purcha se an anti-virus software. The top tow recommended anti virus
programs are Mcafee, kespersky and Norton etc. They can get pricey, If you find that money is an issue there
are free, and consequently less secure types of protection, available from various sites on the web. One of the
top recommendedfree programs is AVG anti-virus available from download.com . Most current virus scanners
and removers, purchased or free, can scan your hard drive. If viruses are found then most scanners quarantine
www.solutioncab.com (A complete solution site)
the virus, keeping it in a special place until you decide what to do with it.(Delete the file or repair it, which then
the program attempts to delete the virus from within the file without deleting it. If the virus you happen to have
is real disastrous, meaning it infects hundreds or thousands of files, keeps popping up after you've quarantined it
x amount of times, or it keeps deleting key files, then your last resort is to reformat the entire hard drive
including any second hard drives or partitions. In most cases reformatting gets rid of everything on the drive
which can save the computer. Although in most cases when reformatting has to be done any files you want have
to be backed up, although there can be cases your drive may be too infected and it can be too risky to save any
files. However, if viruses invade the boot sector of the drive and infect it, then the simple task of instructing to
boot from the cd-drive first may be impossible since the BIOS may get screwed up as well.
Question 4: Explain how you will handle following problems
(i) You have to insert header and footer in presentation.
Hint: In MS PowerPoint 2007 :- go to Insert tab and choose “Header & Footer”
In MSPowerPoint 2003 :- go to View menu and choose “Header and Footer….”
(ii) You need to perform mail merge
Hint: Step 1: Write or create your message in Word new documents.
Then to begin the Mail Merge follow the steps:
MSword 2003: Tools > Letters and Mailings > Mail Merge
MSWord 2007: Mailings > Start Mail Merge > Step by Step Mail Merge Wizard
Step 2: Navigate to your database.
If you want to use the document you are currently in select; Use the current document.
If you have another saved word file you’d like to use select; Start from existing document and then navigate to
that file.
since we’re already in the document we want to use just move on and click Next: Select recipients at the bottom
of the banner.
now select the people whom we want to send our letter / email. Select; Use an existing list. Click on browse
Step 3: Select your database and recipients.
When your database is selected a window similar to the one above (yours will have different values in it), will
appear (if this doesn’t happen, you haven’t set up your database correctly).
Step 4: Edit your recipients.
The following screen (above) will appear with all of your data fields selected. Now is the
time to add or remove recipients. Uncheck the ones you don’t want to print/send and click
OK.
Step 5: Inserting your merge fields (personalization)
Move the cursor on your letter/email to the place you want to insert the merge field. Click merge
Step 6: Preview your results and print or open in new document
(iii) You need to insert calendar in your presentation
Hint:Step1. 2003/2007 :- Choose Object from Insert menu/tab.
Step2. 2003/2007 :- Choose Create new and select Microsoft Office Word
Step3. 2003 :- in Word’s menu choose Table Insert >Autoformat > select appropriate calander table
Step3. 2007 :- in Word’s tab choose Quick tables fro m Table from Insert tab > select appropriate calendar
table
(iv) You need to share a newly created folder with other users.
ght Click on folder choose “Sharing and Securities…” Step1. XP/Win7 :- Ri
tep2. XP/Win7 :- Check on “Share this folder on the network” S
www.solutioncab.com (A complete solution site)
Step3. XP/Win7 :- Check on “Allow network users to change my file” if you want to allow users to
editing is the folder
(v) You to change printer settings
Hint:Win XP/Windows7 :- 1. choose Printer and Faxes from Control Panel.
2. Select printer
3. Choose properties from it’s right click menu
4. Adjust your appropriate settings
Question 5: (a) Explain how graph is created in MS-Word.
Hint:2003: Choose Chart from Insert menu or click Chart Icon on Standard Toolbar
2007:- Choose Char from Insert Tab
Follow these steps to create a graph, such as a bar chart or a pie chart.
1. On the Insert menu, click Object, and then click the Create New tab.
2 In the Object type box, click Microsoft Graph Chart, and then click OK.
Microsoft Graph displays a chart and its associated sample data in a tab le called a datasheet
3. To replace the sample data, click a cell on the datasheet, and then type the new text or
numbers. If needed, you can import data from a text file, a Lotus 1-2-3 file, or a Microsoft Excel worksheet.
You can also copy data from another program.
4. To return to Microsoft Word, click the Word document.
NOTE If you close the datasheet you can reopen it by double-clicking the chart and then clicking Datasheet
on the View menu.
(b) What are Macros? Write steps for recording, running and editing macros, with the help of an example.
Hint: A macro is a shortcut to a task you do repeatedly. Think about the Centre align operation. You first
highlight the word you want centred, then click the centre icon in the toolbar. Thisis a macro. It's the short way
of performing the centre task.
• Open a new Word document
• From the menu bar, click on Tools
• From the drop down menu click on Macro
• A sub menu appears
• Click on Record New Macro
When you click on Record New you get the Macro dialogue box popping up. The reason the little floating
toolbar says Stop is because your macro is already being recorded. The process has started. You don't have to
panic, and hurry it along. Take your time and think about what you're going to do.
o Type “Hello World”
o Click the Stop button on your floating Macro Recorder
o The macro will stop recording, and the process is finished: You have recorded the Macro
o Choose Run from Macro from Tools menu