Download CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
CUSTOMER_CODE
SMUDE
DIVISION_CODE
SMUDE
EVENT_CODE
Jan2017
ASSESSMENT_CODE MCA111_Jan2017
QUESTION_
DESCRIPTIVE_QUESTION
TYPE
QUESTION_
492385_1
ID
What is magnetic tape? Describe the advantages of magnetic tape.
QUESTION_
TEXT
Magnetic Tape - Magnetic tape drive is a device that stores computer data on
magnetic tape, especially for backup and archiving purposes. Like an ordinary
tape recorder, a tape drive records data on a loop of flexible celluloid-like
material that can be read and also erased. One of the common aspects of modern
computer hardware technology is known as a magnetic storage
device.
SCHEME OF
(2 marks)
EVALUATI Advantages of Magnetic Tape
ON
Compact: A 10-inch diameter reel of tape is 2400 feet long and is able to hold 800, 1600
or 6250 characters in each inch of its length. Economical: The cost of storing characters
is very less as compared to other storage devices.
Fast: Copying of data is easier and fast.
Long term Storage and Re-usability: Magnetic tapes can be used for long term storage
and a tape can be used repeatedly without loss of data.
(3 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
492386_2
Describe the steps to select and configure a playback device.
QUESTION_TEXT
SCHEME OF
EVALUATION
In order to select and configure a playback device you should:
1.
Click Start → Settings → Control Panel.
2.
Double-click Multimedia or Sounds and Multimedia.
3. In the Playback box, click the playback device that you want to use
in the Preferred Device list, and then move the Volume slider to the
value you want.
4. In the Recording box, click the playback device that you want to
use in the Preferred Device list, and then move the Volume slider to the
value you want.
5. Verify that your speakers are properly connected to the sound card,
and that the speakers are turned on
(5 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
492387_3
Describe the following:
i.
System Software
ii.
Programming Software
iii.
Application Software
QUESTION_TEXT
There are three major types of computer software:
System Software
SCHEME OF
EVALUATION
System software is used to run the computer hardware. It includes mainly
the Operating system and device drivers. System software refers to the
files and programs that make up your computer's operating system. The
programs that are part of the system software include assemblers,
compilers, file management tools, system utilities, and debuggers.
(2 marks)
Programming Software
Programming software usually provides tools to assist a programmer in
writing computer programs and software using different programming
languages.
(1 mark)
Application Software
It allows end users to accomplish one or more specific tasks. Typical
applications include industrial automation, business software, educational
software, medical software, databases, and computer games.
(2 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
492388_4
Describe the following application software:
i.
Embedded software
ii.
Artificial Intelligence software
QUESTION_TEXT
Embedded software: Embedded software resides only in read-only
memory and is used to control products and systems for the consumer and
industrial markets. Embedded software can provide very limited and
esoteric functions or provide significant function and control capability.
(2.5 marks)
SCHEME OF
EVALUATION
Artificial Intelligence software: Artificial Intelligence software makes
use of non numerical algorithms to solve complex problems that are not
amenable to computation or straightforward analysis. Expert systems, also
called knowledge based systems, pattern recognition, game playing are
representative examples of applications within this category.
(2.5 marks)
QUESTION_
DESCRIPTIVE_QUESTION
TYPE
QUESTION_I
492389_5
D
Explain the follow services provided by operating system.
i.
QUESTION_
ii.
TEXT
File system manipulation
Communication process
File System Manipulation
The output of a program may need to be written into new files or input taken from
some files. The operating system provides this service. The user does not have to worry
about secondary storage management. User gives a command for reading or writing to
a file and sees his/her task accomplished. Thus operating system makes it easier for
user programs to achieve their task.
This facility involves secondary storage management. The speed of I/O that depends on
secondary storage management is critical to the speed of many programs and hence I
think it is best relegated to the operating systems to manage it than giving individual
users
the
control
of
it.
SCHEME OF
(2.5 marks)
EVALUATIO
N
Communications Process
There are instances where processes need to communicate with each other to
interchange information. It may be between processes running on the same computer
or running on the different computers. By providing this service the operating system
relieves the user from the worry of passing messages between processes. In case
where the messages need to be passed to processes on the other computers through a
network, it can be done by the user programs. The user program may be customized to
the specifications of the hardware through which the message transits and provides
the service interface to the operating system.
(2.5 marks)
QUES
TION_ DESCRIPTIVE_QUESTION
TYPE
QUES
TION_ 492390_6
ID
QUES
Draw the diagram of OSI model layers explain last two layers of OSI model.
TION_
TEXT
The diagram of OSI model layer is given below:
SCHE
ME OF Figure: The OSI Model Layers
EVAL
UATI
ON
(2 marks)
Presentation layer: This layer is anxious with the syntax and semantics of the
information exchanged between two systems. The specific responsibilities of this layer
include Translation, Encryption, and Compression.
(1.5 mark)
Application layer: This layer enables the user, whether human or software to access the
network. It provides user interfaces and support for services such as electronic mail,
remote file access and transfer, shared database management, and other types of
distributed information
services.
(1.5 mark)
QUEST
ION_T DESCRIPTIVE_QUESTION
YPE
QUEST
492391_7
ION_ID
QUEST Define computer generation. Explain the different generations of computer
ION_T development.
EXT
Marks: Definition -1, Generations- 9
Computer Generation - A generation refers to the state of improvement in the product
development process. This term is also used in the different advancements of new
computer technology. With each new generation, the circuitry has gotten smaller and
more advanced than the previous generation before
it.
(1 mark)
Different Computer Generations:
1.
First Generation (1940-1956): Vacuum Tubes
The first generation computers used vacuum tubes for circuitry and magnetic
drums for memory, and were often enormous, taking up entire rooms. A magnetic
drum, also referred to as drum, is a metal cylinder coated with magnetic iron-oxide
material on which data and programs can be stored. Magnetic drums were once used as
a primary storage device but have since been implemented as auxiliary storage devices.
SCHE
ME OF 2.
Second Generation (1956-1963): Transistors
EVALU
ATION
Transistors replaced vacuum tubes and ushered in the second generation
computer. Transistor is a device composed of semiconductor material that amplifies a
signal or opens or closes a circuit. Invented in 1947 at Bell Labs, transistors have
become the key ingredient of all digital circuits, including computers. Today's latest
microprocessor contains tens of millions of microscopic transistors.
3.
Third Generation (1965-1971): Integrated Circuits
The development of the integrated circuit was the hallmark of the third
generation of computers. Transistors were miniaturized and placed on silicon chips,
called semiconductors, which drastically increased the speed and efficiency of
computers.
4.
Fourth Generation (1971- Present): Microprocessors
The microprocessor brought the fourth generation of computers, as thousands of
integrated circuits we rebuilt onto a single silicon chip and this will contains a Central
Processing Unit. In the world of personal computers, the terms microprocessor and
CPU are used interchangeably. At the heart of all personal computers and most
workstations sits a microprocessor.
5.
Fifth Generation Computer
Fifth generation computing devices, based on artificial intelligence, are still in
development, though there are some applications, such as voice recognition, that are
being used today.
Artificial Intelligence is the branch of computer science concerned with making
computers behave like humans. The term was coined in 1956 by John McCarthy at the
Massachusetts Institute of Technology.
(9 marks)
QUESTION_TYPE
DESCRIPTIVE_QUESTION
QUESTION_ID
492392_8
QUESTION_TEXT
What are the uses of internet?
SCHEME OF
EVALUATION
•
Search for information: In the Internet, there are sites that have
electronic versions of classic literature pages and pages of movie facts,
stock quotes, collection of music and other interactive contents and
mountains of additional information. Since there is awful lot of
information, you may have trouble finding a place to start.
(2.5 marks)
•
Electronic Mail: One of the widely used features on the Internet is
electronic mail (e-mail). With e-mail you can send and receive mails
without even leaving the keyboard. Messages can be sent globally just by
paying local telephone charges. When someone sends you an e-mail, it is
stored in your mailbox (on service provider’s computer). Using the e-mail
program, connect to your ISP, download your message to your local hard
disk. E-mail eliminates the need of postage stamps and greatly reduces the
time taken to send and receive messages.
(2.5 marks)
•
Chat with Other People: If you like talking to complete strangers
and making new friends, Internet is the best place. With chat programs
you can chat with a group of people, whose geographical location you
need not know.
(2.5 marks)
•
Telnet to other Computers: With telnet program, you can connect
to another computer and use it as if you were sitting at its keyboard. When
the telnet program connects your computer to a remote computer, the
remote computer usually asks you to enter a user name and a password.
On telnet sites that allow anonymous access you can enter anonymous as
your user name and your e-mail address as the password.
(2.5 marks)
QUESTION
DESCRIPTIVE_QUESTION
_TYPE
QUESTION
492393_9
_ID
QUESTION
_TEXT
Describe five architectural performance enhancement features for the processor.
The different features of performance enhancement are as follows:
1.
Superscalar Architecture
This architecture implements a base for parallel computing. This is the
measure of the number of operations executed in a computer simultaneously. This
is called Instruction level parallelism. The main capability of CPU is to allow
multiple executions. This helps CPU to process many instructions simultaneously
with every clock cycle. This is super scalar architecture.
2.
Pipelining
Pipelining a technique to construct faster CPUs. Using pipelining you can
execute more than oneoperation at a time. When one instruction is already in
execution state, the pipelining allows another instruction to start execution while
the first instruction is still being executed. This helps in working out many
instructions in the same clock cycle.
SCHEME
OF
3.
Super Pipelining
EVALUATI
ON
Super Pipelining is similar to normal pipelining but with series of operations
are unblocked so that as many instructions execute at a single clock time. This is
an enhancement over the earlier simple pipelining. As you are aware a CPU works
on pipelining concepts. If we make the pipelines longer which is nothing but
increasing the number of stages, then each step will perform less work so that the
processor can be scaled to high frequency. This is super pipelining.
4.
Speculative Execution and Branch Prediction
Speculative execution and branch prediction is used to give the probable
prediction on branching the instruction in the CPU. The basic difficulty in
pipelining of CPU lies in branches. For example, when we use branches in the
conditions, the sequence of the program execution also changes or jumps form one
level to another at any given time. This challenges the pipelining as it is not linear.
Though the CPUs have the ability to execute multiple instructions at a time
however, due to this branching it cannot be maintained always.
5.
Dynamic Execution
Dynamic Execution is a collection of different techniques for predicting the
nested or multiple branches. The performance of the CPU also depends on the kind
of program written for the instructions. Sometimes system software assembly and
the linking process may disturb the best program code. Therefore, the dynamic
execution helps the CPU to order the levels of the instruction execution according
to the branches and helps in improving the performance.
6.
Register Renaming and Write Buffers
When the multiple executions take place there should not be any kind of
confusion in program execution. This is taken care of by register renaming by
differentiating the registers. This helps in avoiding the pipeline overloading or jam.
When the instruction is executed, the result needs to be stored someplace until they
can be stored in the memory locations. Write buffers do this. Several buffers help
in the execution of various instructions and avoid the jam or stalling of pipeline.
7.
Multiprocessing
This is the technique of running more than one processor in a system.
Increasing the number of processors will double the system performance.. The
increasing of system performance is directly proportionate to the increase in the
number of processors.
8.
Multimedia Extensions
The multimedia extension is an add-on to CPU performance. For
technocrats, knowledge alone is not sufficient for success in their work. They also
depend on making effective presentations by taking the help of graphics,
animations etc. It was in late 90s that Intel added 57 new instructions that support
graphics with the MMX extensions using the technique called Single instruction
Multiple Data
(SIMD).
(10 marks)
QUESTI
ON_TYP DESCRIPTIVE_QUESTION
E
QUESTI
492394_10
ON_ID
QUESTI Describe the CD-ROM drive under the following headings:
ON_TEX
T
i.
Basics
ii.
CD Media
iii.
CD Data
iv.
EFM Basics
v.
Data Storage
i.
Basics of CD-ROM drive -CD-ROM (Compact Disc, read-only-memory) is an
adaptation of the CD that is designed to store computer data in the form of text,
graphics and stereo sound. The digital approach allowed excellent stereo sound
quality which does not degrade the quality when the disk is played each time. CDROM drive is originated from digital audio
recording.
(2 marks)
ii. CD Media: CD’s are produced by stamping the pattern of pits and lands onto a
molded polycarbonate disc which is also known as substrate. The substrate is covered
with a silvered coating which allows in reflecting the laser light. A tough scratch
resistant is coated on a disc after silvering.
(2 marks)
iii. CD data: CD’s are recorded as single continuous spiral track running from the
spindle area. The inside dotes lines shows the relationship between the pits and lands.
CD’s use a highly focused laser beam and laser detector to sense a presence or
SCHEM absence of pits. When laser light strikes the land it reflects light towards the detector
E OF
which produces a very strong output signal. When the laser light strikes a pit the light
EVALU is slightly out of focus.
(2 marks)
ATION
iv. EFM Basics: EFM stands for eight to fourteen modulations is a complex
decoding process that convert sequence of pits and land into meaningful binary
information. EFM is used by CD to obtain the ability of placing a large number of bits
into a limited number of flux transitions, user data, error correcting information,
address information and synchronization pattern are contained in the form of bits
stream which is represented by pit and
land.
(2 marks)
v.
Data storage: A CD-ROM contains twenty four synchronization bits, fourteen
control bits, twenty four data symbols and eight complete error correction symbol
(EC). You must always keep in mind that three merged additional bit separates each
symbol by bringing the total number of bit in the frame to
588.
(2
marks)