Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
CUSTOMER_CODE SMUDE DIVISION_CODE SMUDE EVENT_CODE Jan2017 ASSESSMENT_CODE MCA111_Jan2017 QUESTION_ DESCRIPTIVE_QUESTION TYPE QUESTION_ 492385_1 ID What is magnetic tape? Describe the advantages of magnetic tape. QUESTION_ TEXT Magnetic Tape - Magnetic tape drive is a device that stores computer data on magnetic tape, especially for backup and archiving purposes. Like an ordinary tape recorder, a tape drive records data on a loop of flexible celluloid-like material that can be read and also erased. One of the common aspects of modern computer hardware technology is known as a magnetic storage device. SCHEME OF (2 marks) EVALUATI Advantages of Magnetic Tape ON Compact: A 10-inch diameter reel of tape is 2400 feet long and is able to hold 800, 1600 or 6250 characters in each inch of its length. Economical: The cost of storing characters is very less as compared to other storage devices. Fast: Copying of data is easier and fast. Long term Storage and Re-usability: Magnetic tapes can be used for long term storage and a tape can be used repeatedly without loss of data. (3 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 492386_2 Describe the steps to select and configure a playback device. QUESTION_TEXT SCHEME OF EVALUATION In order to select and configure a playback device you should: 1. Click Start → Settings → Control Panel. 2. Double-click Multimedia or Sounds and Multimedia. 3. In the Playback box, click the playback device that you want to use in the Preferred Device list, and then move the Volume slider to the value you want. 4. In the Recording box, click the playback device that you want to use in the Preferred Device list, and then move the Volume slider to the value you want. 5. Verify that your speakers are properly connected to the sound card, and that the speakers are turned on (5 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 492387_3 Describe the following: i. System Software ii. Programming Software iii. Application Software QUESTION_TEXT There are three major types of computer software: System Software SCHEME OF EVALUATION System software is used to run the computer hardware. It includes mainly the Operating system and device drivers. System software refers to the files and programs that make up your computer's operating system. The programs that are part of the system software include assemblers, compilers, file management tools, system utilities, and debuggers. (2 marks) Programming Software Programming software usually provides tools to assist a programmer in writing computer programs and software using different programming languages. (1 mark) Application Software It allows end users to accomplish one or more specific tasks. Typical applications include industrial automation, business software, educational software, medical software, databases, and computer games. (2 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 492388_4 Describe the following application software: i. Embedded software ii. Artificial Intelligence software QUESTION_TEXT Embedded software: Embedded software resides only in read-only memory and is used to control products and systems for the consumer and industrial markets. Embedded software can provide very limited and esoteric functions or provide significant function and control capability. (2.5 marks) SCHEME OF EVALUATION Artificial Intelligence software: Artificial Intelligence software makes use of non numerical algorithms to solve complex problems that are not amenable to computation or straightforward analysis. Expert systems, also called knowledge based systems, pattern recognition, game playing are representative examples of applications within this category. (2.5 marks) QUESTION_ DESCRIPTIVE_QUESTION TYPE QUESTION_I 492389_5 D Explain the follow services provided by operating system. i. QUESTION_ ii. TEXT File system manipulation Communication process File System Manipulation The output of a program may need to be written into new files or input taken from some files. The operating system provides this service. The user does not have to worry about secondary storage management. User gives a command for reading or writing to a file and sees his/her task accomplished. Thus operating system makes it easier for user programs to achieve their task. This facility involves secondary storage management. The speed of I/O that depends on secondary storage management is critical to the speed of many programs and hence I think it is best relegated to the operating systems to manage it than giving individual users the control of it. SCHEME OF (2.5 marks) EVALUATIO N Communications Process There are instances where processes need to communicate with each other to interchange information. It may be between processes running on the same computer or running on the different computers. By providing this service the operating system relieves the user from the worry of passing messages between processes. In case where the messages need to be passed to processes on the other computers through a network, it can be done by the user programs. The user program may be customized to the specifications of the hardware through which the message transits and provides the service interface to the operating system. (2.5 marks) QUES TION_ DESCRIPTIVE_QUESTION TYPE QUES TION_ 492390_6 ID QUES Draw the diagram of OSI model layers explain last two layers of OSI model. TION_ TEXT The diagram of OSI model layer is given below: SCHE ME OF Figure: The OSI Model Layers EVAL UATI ON (2 marks) Presentation layer: This layer is anxious with the syntax and semantics of the information exchanged between two systems. The specific responsibilities of this layer include Translation, Encryption, and Compression. (1.5 mark) Application layer: This layer enables the user, whether human or software to access the network. It provides user interfaces and support for services such as electronic mail, remote file access and transfer, shared database management, and other types of distributed information services. (1.5 mark) QUEST ION_T DESCRIPTIVE_QUESTION YPE QUEST 492391_7 ION_ID QUEST Define computer generation. Explain the different generations of computer ION_T development. EXT Marks: Definition -1, Generations- 9 Computer Generation - A generation refers to the state of improvement in the product development process. This term is also used in the different advancements of new computer technology. With each new generation, the circuitry has gotten smaller and more advanced than the previous generation before it. (1 mark) Different Computer Generations: 1. First Generation (1940-1956): Vacuum Tubes The first generation computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms. A magnetic drum, also referred to as drum, is a metal cylinder coated with magnetic iron-oxide material on which data and programs can be stored. Magnetic drums were once used as a primary storage device but have since been implemented as auxiliary storage devices. SCHE ME OF 2. Second Generation (1956-1963): Transistors EVALU ATION Transistors replaced vacuum tubes and ushered in the second generation computer. Transistor is a device composed of semiconductor material that amplifies a signal or opens or closes a circuit. Invented in 1947 at Bell Labs, transistors have become the key ingredient of all digital circuits, including computers. Today's latest microprocessor contains tens of millions of microscopic transistors. 3. Third Generation (1965-1971): Integrated Circuits The development of the integrated circuit was the hallmark of the third generation of computers. Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and efficiency of computers. 4. Fourth Generation (1971- Present): Microprocessors The microprocessor brought the fourth generation of computers, as thousands of integrated circuits we rebuilt onto a single silicon chip and this will contains a Central Processing Unit. In the world of personal computers, the terms microprocessor and CPU are used interchangeably. At the heart of all personal computers and most workstations sits a microprocessor. 5. Fifth Generation Computer Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. Artificial Intelligence is the branch of computer science concerned with making computers behave like humans. The term was coined in 1956 by John McCarthy at the Massachusetts Institute of Technology. (9 marks) QUESTION_TYPE DESCRIPTIVE_QUESTION QUESTION_ID 492392_8 QUESTION_TEXT What are the uses of internet? SCHEME OF EVALUATION • Search for information: In the Internet, there are sites that have electronic versions of classic literature pages and pages of movie facts, stock quotes, collection of music and other interactive contents and mountains of additional information. Since there is awful lot of information, you may have trouble finding a place to start. (2.5 marks) • Electronic Mail: One of the widely used features on the Internet is electronic mail (e-mail). With e-mail you can send and receive mails without even leaving the keyboard. Messages can be sent globally just by paying local telephone charges. When someone sends you an e-mail, it is stored in your mailbox (on service provider’s computer). Using the e-mail program, connect to your ISP, download your message to your local hard disk. E-mail eliminates the need of postage stamps and greatly reduces the time taken to send and receive messages. (2.5 marks) • Chat with Other People: If you like talking to complete strangers and making new friends, Internet is the best place. With chat programs you can chat with a group of people, whose geographical location you need not know. (2.5 marks) • Telnet to other Computers: With telnet program, you can connect to another computer and use it as if you were sitting at its keyboard. When the telnet program connects your computer to a remote computer, the remote computer usually asks you to enter a user name and a password. On telnet sites that allow anonymous access you can enter anonymous as your user name and your e-mail address as the password. (2.5 marks) QUESTION DESCRIPTIVE_QUESTION _TYPE QUESTION 492393_9 _ID QUESTION _TEXT Describe five architectural performance enhancement features for the processor. The different features of performance enhancement are as follows: 1. Superscalar Architecture This architecture implements a base for parallel computing. This is the measure of the number of operations executed in a computer simultaneously. This is called Instruction level parallelism. The main capability of CPU is to allow multiple executions. This helps CPU to process many instructions simultaneously with every clock cycle. This is super scalar architecture. 2. Pipelining Pipelining a technique to construct faster CPUs. Using pipelining you can execute more than oneoperation at a time. When one instruction is already in execution state, the pipelining allows another instruction to start execution while the first instruction is still being executed. This helps in working out many instructions in the same clock cycle. SCHEME OF 3. Super Pipelining EVALUATI ON Super Pipelining is similar to normal pipelining but with series of operations are unblocked so that as many instructions execute at a single clock time. This is an enhancement over the earlier simple pipelining. As you are aware a CPU works on pipelining concepts. If we make the pipelines longer which is nothing but increasing the number of stages, then each step will perform less work so that the processor can be scaled to high frequency. This is super pipelining. 4. Speculative Execution and Branch Prediction Speculative execution and branch prediction is used to give the probable prediction on branching the instruction in the CPU. The basic difficulty in pipelining of CPU lies in branches. For example, when we use branches in the conditions, the sequence of the program execution also changes or jumps form one level to another at any given time. This challenges the pipelining as it is not linear. Though the CPUs have the ability to execute multiple instructions at a time however, due to this branching it cannot be maintained always. 5. Dynamic Execution Dynamic Execution is a collection of different techniques for predicting the nested or multiple branches. The performance of the CPU also depends on the kind of program written for the instructions. Sometimes system software assembly and the linking process may disturb the best program code. Therefore, the dynamic execution helps the CPU to order the levels of the instruction execution according to the branches and helps in improving the performance. 6. Register Renaming and Write Buffers When the multiple executions take place there should not be any kind of confusion in program execution. This is taken care of by register renaming by differentiating the registers. This helps in avoiding the pipeline overloading or jam. When the instruction is executed, the result needs to be stored someplace until they can be stored in the memory locations. Write buffers do this. Several buffers help in the execution of various instructions and avoid the jam or stalling of pipeline. 7. Multiprocessing This is the technique of running more than one processor in a system. Increasing the number of processors will double the system performance.. The increasing of system performance is directly proportionate to the increase in the number of processors. 8. Multimedia Extensions The multimedia extension is an add-on to CPU performance. For technocrats, knowledge alone is not sufficient for success in their work. They also depend on making effective presentations by taking the help of graphics, animations etc. It was in late 90s that Intel added 57 new instructions that support graphics with the MMX extensions using the technique called Single instruction Multiple Data (SIMD). (10 marks) QUESTI ON_TYP DESCRIPTIVE_QUESTION E QUESTI 492394_10 ON_ID QUESTI Describe the CD-ROM drive under the following headings: ON_TEX T i. Basics ii. CD Media iii. CD Data iv. EFM Basics v. Data Storage i. Basics of CD-ROM drive -CD-ROM (Compact Disc, read-only-memory) is an adaptation of the CD that is designed to store computer data in the form of text, graphics and stereo sound. The digital approach allowed excellent stereo sound quality which does not degrade the quality when the disk is played each time. CDROM drive is originated from digital audio recording. (2 marks) ii. CD Media: CD’s are produced by stamping the pattern of pits and lands onto a molded polycarbonate disc which is also known as substrate. The substrate is covered with a silvered coating which allows in reflecting the laser light. A tough scratch resistant is coated on a disc after silvering. (2 marks) iii. CD data: CD’s are recorded as single continuous spiral track running from the spindle area. The inside dotes lines shows the relationship between the pits and lands. CD’s use a highly focused laser beam and laser detector to sense a presence or SCHEM absence of pits. When laser light strikes the land it reflects light towards the detector E OF which produces a very strong output signal. When the laser light strikes a pit the light EVALU is slightly out of focus. (2 marks) ATION iv. EFM Basics: EFM stands for eight to fourteen modulations is a complex decoding process that convert sequence of pits and land into meaningful binary information. EFM is used by CD to obtain the ability of placing a large number of bits into a limited number of flux transitions, user data, error correcting information, address information and synchronization pattern are contained in the form of bits stream which is represented by pit and land. (2 marks) v. Data storage: A CD-ROM contains twenty four synchronization bits, fourteen control bits, twenty four data symbols and eight complete error correction symbol (EC). You must always keep in mind that three merged additional bit separates each symbol by bringing the total number of bit in the frame to 588. (2 marks)