[go: up one dir, main page]

0% found this document useful (0 votes)
859 views77 pages

Class 9th Computer Science Notes

This document contains notes from a computer science class on fundamentals of computers. It includes short questions and answers on topics like the characteristics of a database administrator, the purpose of registers and output devices, and the differences between RAM and ROM. It also includes longer questions and answers, such as defining what a computer is and providing a brief description of the evolution of computers through main features of each generation from first to fourth generation computers.

Uploaded by

Sofia Bano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
859 views77 pages

Class 9th Computer Science Notes

This document contains notes from a computer science class on fundamentals of computers. It includes short questions and answers on topics like the characteristics of a database administrator, the purpose of registers and output devices, and the differences between RAM and ROM. It also includes longer questions and answers, such as defining what a computer is and providing a brief description of the evolution of computers through main features of each generation from first to fourth generation computers.

Uploaded by

Sofia Bano
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 77

UNIT 01: Fundamentals

of computer.
Class: 9Th
Computer Science Notes

SHORT QUESTIONS

NOTE: Give Short answers to the following questions.


Q 1.What are the main characteristics of Database
Administrator?
Ans: The main characteristics of Database Administrator are the following.
(i).DBA maintaining database and ensuring its availability to users.
(ii).DBA controlling privileges and permissions to database users.
(iii).DBA monitoring database performance.
(iv).DBA is responsible for database backup and recovery.
(v). DBA is responsible for database security.
(vi). DBA is responsible for future developments.
Q 2.What is a register?
Ans: Register:
Register is a small high speed memory inside the processor. It is used to temporarily store
and pass the instructions to other parts of the processor or main memory during
processing.
There are a large number of registers located inside the processor and there number
varies from processor to processor.
The more is the number of register the faster is the instruction execution. Registers are
measured in by number of bits they can store like 8-bits.16-bits or 32-bits register.
Q 3. What is the purpose of output devices? Name any five
output devices.
Ans: Output Devices:
Output Devices are computer hardware which are used to communicate the results of
data processing carried out by the computer to the user. Is called Output Devices.
Name any five output devices are the following.
(i).Printer
(ii).Monitor
(iii).Speaker
(iv).Multimedia Projector
(v).Plotter
Q 4. What is the purpose of multimedia projector?
Ans: the purpose of multimedia projector:
A multimedia projector takes the image from a computer and displays it onto a larger
screen so that people can see the image clearly.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 1


Q 5. State three difference between RAM and ROM.
Ans: three difference between RAM and ROM.
S.No RAM ROM
1 RAM memory requires a power ROM memory does not require a power
source to retain information. source to retain information.
2 In RAM memory when power In ROM memory when power source is
source is disconnected. disconnected. Information is not deleted.
Information is lost or deleted.
3 In RAM memory often used for In ROM memory often used for long term
temporary retention of data. Such retention of data, such as files and folders.
as with RAM, or for retention of
sensitive data.

Q 6. Differentiate between system software and application


software.
Ans: Differentiate between system software and application software.
S.No System Software Application Software
1 It is general-purpose software. It is specific purpose software.
2 It is used to manage computer It is used to solve particular problems.
resources.
3 It executes all the time in It executes as and when required.
computer.

4 The number of system software is The number of application software is much


less than application software. more than system software.

5 System Software is essential for a Application Software is not essential for a


computer to work. computer to work.

Q 7.Define Operating System and List main functions of the


operating system with examples.
Ans:Operating system:
An Operating system is a set of programs that manages the computer operations and all
components. is called operating system.
The operating system performs the basic functions.
 Operating system receiving input from the keyboard.
 Operating system processing instructions.
 Operating system sending output to the screen.
 Operating system controlling peripheral devices such as disk drives and printers.
 Operating system keeping track of files and directories on the disk.
 Operating system detects equipment failure.
 Operating system maintains security.
Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 2
 Operating system manages storage space.
 Operating system allocates system resources.
 Operating system supports application software.
Example of operating system are:
 Windows.
 Unix
 DOS
 Linux
Q 8. What is open source software?
Ans: Open Source Software:
Open source software is computer software that is available to users free of cost in source
code form with rights to study, change, and improve the software. Open source software
are very often developed in collaborative manner.
For examples of open source software are:
Linux, Apache, Firefox, Open office.
Q 9.Who is a Database Administrator?
Ans: Database Administrator:
A database administrator (DBA) is a key person responsible for the design,
implementation, maintenance and repair of an organizations database. Their role includes
the development and design of database strategies, monitoring and improving database
performance and capacity, and planning for future expansion requirements.
Q 10.Who is a Web Designer?
Ans: Web Designer:
Web designers are the professionals who design and develop websites. They are the
specialist in this field and know all the web development tools.
The intent of web design is to create a website. A website may include text, images,
sounds, and other contents.
Q 11.What are the main duties and Responsibilities of
Information Security Analyst?
Ans: duties and Responsibilities of Information Security Analyst Include:
(i).Develop plans to meet emergency data processing needs.
(ii).Safeguard computer files against accidental or unauthorized access and loss.
(iii).Pre-empt Accidental or unauthorized modification, destruction, and disclosure.
(iv).Carry out and evaluate investigative work regarding potential threats.
(v).Ensure training in security matters is provided to all levels of staff.

LONG QUESTIONS

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 3


NOTE: Give detailed answers to the following questions.
Q 1. What is a Computer? Give brief description of Computer
evolution.
Ans: Computer:
Computer is stands for Common Operating Machine Particularly United and Used under
Technical and Educational Research. A computer is an electronic machine that accepts
input data and instructions with the help of input devices, stores them until needed,
processes it and then produces the output as a result with the help of output devices. is
called computer.
Brief description of computer evaluation:
(i).For thousands of years, mathematicians, scientists and businessmen have searched for
computing machines that could perform calculations quickly and efficiently.
(ii). One of the first tools used to express numbers was the “Abacus”, developed in
“Babylonia” about 5000 years ago. it was built out of wood and beads.
It consists of frame ten sliding beads, simple addition and subtraction can be carried out
rapidly and efficiently.

(iii).In the early 1600, john Napier, a mathematician from Scotland, invented calculating
rods, called Napier’s Bone. This device allowed quick and accurate multiplication of large
numbers.

(iv).One of the first mechanical calculators was developed about 1642 by 19 years old
Blasé Pascal, “Pascale”. This machine could add and subtract numbers and had the ability
to “carry” digits.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 4


(v).Charles Babbage, a British Professor of Mathematics at a Cambridge university
invented a large mechanical calculator called Difference Engine in 1823.the Difference
Engine is a calculating machine which could do mathematical computations in an
automatic way. it also prepares numerical tables using a mathematical technique.

(vi).After 10 years Charles Babbage constructed analytical engine which was the first fully-
automatic computing device and due to which he is called father of the modern digital
computers.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 5


Q 2 . Give main features of each computer generation.
Ans: First Generation Of Computer (1946-1958)
Main Features
(i) Major Innovation: Vacuum Tubes
(ii) Main Memory: Punched Cards
(iii) Input Output Devices: Punched cards and papers
(iv) Languages: Low level machine language
(v) Operating System: No operating system, human operators to set switches
(vi) Size: Main frame for example ENIAC, EDVAC, UNIVAC
Second Generation of Computers (1959-1964)
Main Features
(i) Major Innovation: Transistors as main component.
(ii) Main Memory: RAM and ROM.
(iii) External Storage: Magnetic tapes and Magnetic Disk.
(iv) Input Output Devices: Magnetic tapes and Magnetic Disk.
(v) Languages: Assembly language, some high level languages for Example BASIC,
COBOL, FORTRAN.
(vi) Operating System: Human handles punched card.
(vii) Size: Main frame for example IBM-1401, NCR-300, IBM-600 etc.
Third Generation of Computers (1965-1970)
Main Features
(i) Major Innovation: Integrated circuit (ICs) as basic electronic component.
(ii) Main Memory: PROM and DRAM.
(iii) External Storage: Improve disk (Floppy Disk)
(iv) Input and Output Devices: Keyboard for input, monitor for output.
(v) Languages: More high level languages.
(vi) Operating System: Complete operating systems were introduced.
(vii) Size: Mini, for example: IBM SYSTEM / 360, ICH-360, HONEY WELL-316 etc.
Fourth Generation of Computers (1971-1981)
Main Features
(i) Major Innovation: LSIC and VLSIC (Micro Processor)
(ii) Main Memory: EPROM and SRAM.
(iii) External Storage: Floppy Disk and Hard Disk.
(iv) Input and Output Devices: Monitor for output.
(v) Operating System: MS-DOS and PC-DOS
(vi) Size: Micro computer e.g. IBM-PC, Apple Macintosh etc.
Fifth Generation (1981-Onward)
Main Features
(i) Major Innovations: ULSIC (Ultra large scale integrated circuit)
(ii) Main Memory: EEPROM, SIMM and DIMM.
(iii) External Storage: Modified magnetic and Optical disks.
(iv) Input/output Devices : Keyboard, Pointing Device, Scanner as input and
Monitor as main output.
(v) Languages: AI (Artificial Intelligence) Expert systems.
(vi) Operating System: GUI based e.g. Windows 95, Windows NT.
(vii) Size : Very small in size example: Laptop, Note book, Digital Diary, Palm top and
Pocket PC.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 6


Q 3. Explain different types of digital computers.
Ans: Different types of digital computers are the following.
(i).Super computers:
The super computers are the largest, fastest, and most expensive than all types of
computers. The price of super computer ranges from $5 to $20 million dollars.
These computers are 50,000 times faster than the micro computer.
They are five times faster than the large mainframe computers.
60 miles of wiring is used while constructing a super computer.

They can calculate 400 million numbers per second where as mainframe can 10 millions
numbers.
There accuracy is up to 14 decimal places.
it can process 1 billion instruction in a second.
1000 individual PCs can be attached to a super computer.
They are used in the oil exploration, weather prediction etc.
Example of the super computer is IBM Deep Blue.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 7


(ii).Mainframe computers:
They are less expensive, less powerful and slower than the super computer. They are
faster than the other types of computer. They can process 10 million numbers per second.
The cost of the normal mainframe computer ranges from several hundred dollars. These
computers are mainly use for networking purposes.
The mainframe computer are used in banks, hospitals, universities, Airline companies etc.
Example of mainframe computer s are:ATM,IBM-4381,ICL-2900 and NEC-610 etc.

(iii). Mini Computers:


As compared to mainframe, mini computers are:
• Small in size.
• Occupy small room.
• Less peripheral devices.
• Less Expensive
• Small in memory
• Less Powerful
• Used in small organizations
• Perform multiple jobs
• Support fewer users

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 8


(iv).Microcomputers:
Microcomputers are more commonly known as personal computers (PCs).the
microcomputer is generally the smallest and least expensive of the computer family.
it is called Home PC or personal computer(PC) Because it is a single user computer. it
supports many software ,multimedia, graphics and games.

IBM, HP, Apple, Compact are some well known companies which manufacture
microcomputers.
Microcomputers include the following four types:
 Desktop Computers
 Notebook Computers
 Laptop Computers
 Handheld Computers

 Desktop Computers:
This is the most commonly used computer.
it consists of a keyboard, mouse, monitor and system unit.
the desktop computer are reliable and easy to repair.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 9


many people use desktop computer at work, home, school, or library.
 Notebook Computers:
A notebook computer is smaller than laptop and easily used in airplanes, cars, temporary
offices, and at meetings.

Notebook computers are especially designed for mobile computing, wireless


communication and internet access.
 Laptop Computers:
The laptops are also known as “Portable Computers “Due to the small size and light
weight, they become popular among the computer users. A laptop computer has all the
facilities including rechargable battery.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 10


 Handheld Computers:
Portable computers that can easily be placed on top of the palm are small, portable
devices that offer users many of the same features and capabilities as desktop computers.

Hand –held computers are also called Personal Digital Assistants (PDAs),and smartphones,
iPhones, palmtops and pocket computers.
Q 4. Give uses of computers in the following fields
(i).Education (ii).Business (iii).Defense (iv).Media
Ans: (i).Education:
 Computer education is now a part of the school and college curricula.
 Students find it easier to refer to the internet than searching for information in
reference books.
 The process of learning has gone beyond learning from prescribed textbooks.
 It is easier to store information on computers than maintaining hand-written notes.
(ii).Business:
 Computers are extremely important in today’s business.
 ordering products , shipping information, price checks in retail stores, etc. is done
using computers.
 computers have become a requirement in the business industry.
(iii).Defense:
There are many uses of computers in defense such as:
 Controlling unmanned air-crafts.
 They are also used on intercontinental Ballistic Missiles(ICBMSs) that use GPS (Global
Positioning System) and computers to help the missile get to the target.
 Computers are used to track incoming missiles and destroy them.
 Computers are used in tanks, planes and ships to target enemy forces.
 Computers are used in designing and testing of arms and other equipment’s.
(iv).Media:
 Now days computers are extensively used in both print and electronic media.
 computer are extensively used in the “print media” that includes newspapers,
magazines etc.
 electronic media is using the latest computer technology.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 11


 internet has opened up several new opportunities for mass communication which
include email, websites, blogging, internet, TV and many other mass media which are
booming today.
Q 5. Explain the scope of the following careers in IT.
(i).Software Engineer (ii).Programmer (iii).System Analyst
(iv).Hardware Engineer (v).Network Administrator
(vi).Multimedia Designer (vii).Information Security Analyst
Ans. (i).Software Engineer:
 Software engineer is an engineer who applies the principles of software engineering to
the design, development, testing, and evaluation of the software.
 Software engineers work with businesses, government agencies (civilian or military),
and non-profit organizations.
 Software engineers are highly paid personal in any organization.
(ii).Programmer:
 A computer programmer is a person who has a sound knowledge of computer
languages and utilizes his knowledge to develop programs according to the design
provided by the software engineer.
 Programmers get handsome salaries from their employers.
(iii).System Analyst:
 A system analyst plays a key role in any organization.
 He/she researches problems, plans solutions; recommend software and systems, and
coordinates development to meet business or other requirements.
 They are familiar with multiple approaches to problem-solving.
 Analysts are often familiar with a variety of programming languages, operating
systems, and computer hardware platforms.
 System analysts are also highly paid employees of any organization.
(iv).Hardware Engineer:
 He is a person who design and manufacture computer hardware.
 He also do repairing and maintenance of computers.
 He has deep knowledge of computers, processors, circuit boards, input & output
devices etc.
(v).Network Administrator:
 He is a person, who install configure and maintain the computer network.
 He is incharge of computer hardware and software used at the network.
 He gives password to network users to access the network.
(vi).Multimedia Designer:
 He is a person, who presents information in attractive manner.
 He creates digital images and videos using various software.
 He can edit, split and combine images and videos.
(vii).Information Security Analyst:
 Information security means protecting information and information systems from
unauthorized access, use disclosure, modification, recording or destruction.
 Security analyst’s work for almost any company or organization concerned with data
security.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 12


Q 6.Write note on any five input devices.
Ans: Input Devices:
Input devices are the external hardware components that are used to enter or accept data
and instructions into computer memory for processing. is called input devices.
The following are some important types of input devices.
(i).Keyboard:
A computer keyboard is an input device used to enter characters and functions into the
computer system by pressing buttons, or keys. Keyboards usually have from 101 to 105
keys. it has capital alphabetic keys for A, B, C…Z or small alphabetic keys for a, b, c…z. it
has numeric keys like 0, 1, 2…9.it has function keys F1, F2…F12.
Used to perform specific tasks. it has other keys used for editing like Delete, Backspace,
Home, End, etc. A keyboard is connected to a computer system using a cable or a wireless
connection.

(ii).Scanner:
Scanner is an input device. it is an electronic device that scans printed or handwritten text
documents, images, or a particular object to convert them into a digital file format. is
called Scanner.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 13


(iii).Microphone:
A Microphone, also called a mic a voice input device. it uses special sensor that converts
sound into an electrical signal. is called Microphone. Microphone are use in Telephones,
Tape Recorders and hearing aids etc.

(iv).Digital Camera:
A Digital Camera is an input device that takes videos, or still photographs, or both,
digitally by recording images via an electronic image sensor. is called Digital Camera.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 14


(v).Touch Screen:
A Touch Screen is an electronic visual display that can detect the presence and location of
a touch within the display area with the help of pressure sensitive sensors. is called Touch
Screen. it can be touched with a finger. it is used as mobile screens, in airports and large
shopping malls to guide people.

Q 7.What is system unit? Explain main parts of system unit.


Ans: System Unit:
System Unit is the computer case with the motherboard and all other parts. Cases are
normally made of steel or aluminum, but plastic can also be used. System unit holds all
the other components together and protect the sensitive electronic parts from the outside
elements.

Main parts of system unit:


(i).Motherboard:
The motherboard is sometimes called the system board or main board. It is the main
circuit board of a microcomputer. This component contains the connectors for attaching
additional boards. All other parts connect in one way or another to the motherboard. This
part typically contains the CPU, BIOS, memory, mass storage interfaces, serial and parallel
ports, expansion slots, and all the controllers required to control standard peripheral
devices,
Such as the display screen, keyboard, mouse, and disk drive.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 15


(ii).Hard Disk Drive:
A hard disk drive is a high capacity, non-volatile, magnetic data storage device with a
volume (disk) that is usually non-removable. Data is magnetically read and written on the
platter by read/write heads that float on a cushion of air above the platters.

(iii).Floppy Disk Drive:


This is a disk drive that can read and write floppy disks, although they are
obsolete now a days. These drives have been replaced by the USB flash disk
drives in modern machines.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 16


(iv). Power Supply Unit:
The power supply unit (PSU) is used to convert AC currents from the main supply to the
different DC voltages required by various computer components. Power supplies are
quoted as having a certain power output specified in watts, A standard power supply
would typically be able to deliver around 350 watts. You will need more power from the
power supply if your PC has more operating components.

(v). CD-ROM Drive:


This is a high capacity optical data storage device with a removable disk. It writes data
onto or reads data from a storage medium. A CD-ROM drive may be connected to the
computer via an IDE (ATA), SCSI, SATA, Fire wire, or USB interface or a proprietary
interface.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 17


Q 8.What is CPU? Explain the main parts of CPU.
Ans: CPU :
CPU is the brain of computer. Just like human brain which controls all the operations of
computer.
CPU is also called processor which is located on motherboard. A computer cannot work
without CPU. it processes all the instructions and also controls the storage of data, input
output activities and functions of different devices.

Main Parts of CPU:


CPU consists of the following three main parts.
(i). Control Unit (CU)
(ii). Arithmetic and logic unit (ALU)
(iii). Registers
(i). Control Unit(CU):
CU is an important component of CPU. CU does not actually process or store the data but
it manages and coordinates all the units of a computer.
It tells the computer’s memory, arithmetic /logic unit, and input and output devices how
to reply programs instructions.
The CU fetches an instruction by sending an address and command to the memory unit.
The instruction is then transferred to the CU for decoding.
Finally it generates the important signals to execute the instruction.
(ii). Arithmetic and logic unit(ALU):
ALU performs all arithmetic operations. i.e. addition, subtraction, multiplication, and
division and also logical operations.
logical operations means comparing two data items to find which data item is greater
than, equal to, or less than the other.
The data required to perform the arithmetic and logical functions are received from the
registers and then results are also stored in registers.
modern CPUs have more than one ALU to improve speed and performance of computer.
(iii). Registers:
Register are fast speed storage locations within the processor that are used to temporarily
store the data during processing.
All data must be represented in a register before it can be processed.
For example:
If two numbers are to be multiplied, both numbers must be in register, and the result is
also placed in a register.
Different registers store different size of data. e.g. 8-bits ,16 bits or 32 bits.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 18


Registers temporarily store binary information and pass it to the other parts of the
processor or main memory during program execution.
Q 9.Write short note on any three storage devices.
Ans: Secondary storage devices :
Secondary storage devices are used for storing data permanently. Secondary storage
devices are those devices into which information can be stored and retrieved. The
information can also be erased. is called secondary storage devices.
(i).Hard disks:
Hard disks have been most popular storage devices since 1960.
These are nonvolatile, direct access storage device for digital data. Hard disk has been
most popular storage device for digital data.
today Hard disks operate on high speed serial interfaces like serial ATA(Advanced
Technology Attachment) (SATA)( Serial Advanced Technology Attachment) or serial
Attached SCSI(Small Computer System Interface )(SAS)( Statistical Analysis System).
Hard disks consist of a spindle that holds flat circular platters which store the data.
Today the platters in Hard disk are revolving at a speed from 42, 00 RPM (Revolutions per
Minute) to 15,000 RPM depending on disks quality and performance.
Today, most Hard disks operate at a speed of 72, 00 RPM.
An actuator (motor) arm moves the heads across the platters as they revolve, as a result
the head is able to read or write data on platters.

(ii).Compact disk:
A compact disk is a thin, circular disk of plastic about 12 cm in diameter.
It’s actually made of three layers a Caddis an optical storage medium with digital data
recorded on it.
the digital data can be in the form of audio, video, or computer information.
A CD can stores about 700MB of data.
while CDs are played they rotates around and a laser beam is used to read the data.
compact disk is an optical disk designed to support one of three recording types.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 19


read only(e.g. CD_ROM),recordable(write_once , e.g. CD_R),and re_recordable
(re_writable, e.g. CD_RW).
Write once optical disks commonly have an organic dye recording layer.
Rewritable disks typically contain an alloy recording layer.
(iii).Memory Cards:
A Memory Cards is a small storage device used to store data such as text, picture, audio
and video.
it is used in many electronic devices like ,Mobile phones,MP3 players, laptops and digital
cameras. they are highly portable and can hold easily hold for several years.

Q 10.What is computer memory? Explain different types of


computer memory in detail.
Ans: Computer memory:
A computer memory is used to store data and instructions on temporary or permanent
basis.
it is the storage space inside computer where data is to be processed and instructions
required for processing are stored is called computer memory.
There are three types of computer memory.
(i).Random Access Memory(RAM):
The data in this part of memory can be read, changed or erased completely.
RAM is called “Random Access Memory “because any storage location can be accessed
directly, RAM is volatile memory, it means that information written to it can be accessed

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 20


as long as power is on and when power is off everything stored in RAM is lost, RAM stores
data temporarily until the processor needs them.
RAM is small; both in physical size and in the amount of data it can hold .it is much smaller
than hard disk.
RAM comes in the form of separate microchip and also in the form of modules that plug
into slots in the computers motherboard.

(ii).Read Only Memory(ROM):


ROM is a type of memory in which instructions have been prerecorded and these
instructions in ROM prepare the computer for use.
The information in ROM is stored by the manufacturer.
once data has been written onto a ROM chip, it cannot be changed or deleted but can only
be read.
ROM stores data and instructions permanently.
the instructions stored in ROM are not lost even if the power supply goes off. that is why
ROM is known as non volatile memory.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 21


(iii).Cache Memory:
It is very fast memory located in between processor and RAM.
the CPU uses cache memory to store instructions and data that are repeatedly required to
run programs, improving overall system speed.
When any information is required by the processor, first it well look up in cache memory,
and if it is not available in the cache then it will fetch it from the RAM.

Levels Of Cache Memory:


(i).L1 (Level 1) Cache
(ii).L2 (Level 2) Cache
(iii).L3 (Level 3) Cache
(i).L1 (Level 1) Cache:
L1 Cache is built into the actual processor core. A processor core is a processing unit which
reads instructions to perform specific actions.
It is a part of high speed memory which operates at high speed as CPU. it is very expensive
and can store very limited data.
I.e.8 to 128 kbytes. it holds data that the processor needs to execute instructions.
(ii).L2 (Level 2) Cache:
L2 Cache pulls information from RAM, Which is then accessed by the L1 Cache. it is
bigger in size and slower in speed than L1 Cache.
It can store up to normally 64 KB to 16 MB data and instructions.
The basic purpose of L2 Cache is to regularly read somewhat larger quantities of data from
RAM which is then available to L1 cache.
(iii).L3 (Level 3) Cache:
L3 Cache is specialized memory that works hand in hand with L1 and L2 Cache to improve
computer performance.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 22


it is the larger cache and faster than RAM but slower than L1 and L2 Cache.L3 Cache has
typically been built into the motherboard while L1 and L2 Cache are built into the
processor.
processor first looks for the instructions in L1 Cache, and then it checks L2 and L3 Cache
respectively.
Q 11: What are expansion slots? Name different types of slots.
Ans:Expansion Slots:
An expansion slot allows the CPU to communicate with peripheral devices. An expansion
slot is a socket where a circuit board, or expansion card, can be inserted into the
motherboard to add new devices, or capabilities, to the computer is called expansion slot.

Name different types of slots include:


(i).ISA(Industry Standard Architecture)

(ii).AGP(Accelerated Graphic Port)

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 23


(iii).PCI(Peripheral Component Interconnect)

Q 12.What is expansion card? Explain the purpose of the


following cards.
(i).Video Card (ii). Sound Card (iii). Modem Card (iv). NIC
Ans: Expansion Card:
Expansion Card are circuit boards which are inserted into expansion slots on the
motherboard .is called Expansion Card.

(i).Video Card:
A video card also known as video adapter, graphic accelerator card, display card or
graphics card is an expansion card whose function is to generate output images to a
display unit. Some cards contain dual CPUs for additional performance. Because graphic
cards work hard they generate heat. For this reason most high-performance video cards
utilize built-in fans or heat sinks to pull heat away from the CPU.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 24


(ii).Sound Card:
Sound Card also known as an audio card is an internal expansion card that facilitates the
input and output of audio signals to and from a computer. A sound card plays voice as
well as music files, and can handle various audio file formats. The typical sound card has
an interface available at the back of the computer with various input and output ports.

(iii).Modem Card:
The term modem is derived from modulator and demodulator. The main purpose of
modem is to convert digital data into analog signals before sending it over the
transmission line and convert it to digital signal on the receiving computer.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 25


(iv).Network Interface Card:
A NIC also known as network interface controller, network adapter and LAN adapter is
computer hardware component that connect a computer to a computer
Network. Usually NIC is installed as expansion card in the expansion slot, but most
modern computers have built-in network interface cards on the motherboard.

Q 13: Explain the four basic operations performed by a computer.


Ans: Input Operation:
i. A computer works in the light of instructions (input) given to it.
ii. Input is given by a user using keyboard or mouse.
iii. The input is stored in memory for further processing.
Processing Operation:
i. Microprocessor processes the data according to instructions (input).
ii. Microprocessor fetches the data from memory and Control Unit (CU) decodes the
instructions.
iii. After decoding, it sends signals to other parts of computer to execute it.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 26


Storage Operation:
The result produced after processing are stored in memory before sending to output
device or hard disk.
Output Operation:
The Control Unit displays the results on the monitor or print it on paper. Results can also
be saved on hard disk for future use.

Q 14: Explain different types of system software.


Ans: System Software:
System software are set of programs that operate and control the computer system. is
called system software.
Types of system software:
There are four types of system software:
(i).Operating system.
(ii).Device Driver.
(iii).Utility program.
(iv).Language processor.
(i).Operating system:
An Operating system is a set of programs that manages the computer operations and all
components. is called operating system.
The operating system perform the basic tasks.
 Operating system receiving input from the keyboard.
 Operating system processing instructions.
 Operating system sending output to the screen.
Example of operating system are:
 Windows.
 Unix
 DOS
 Linux
(ii).Device driver:
A device driver is a program that controls a particular device that is connected to the
computer. is called device driver.
Typical devices are :

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 27


 Keyboard.
 Printers.
 Scanners.
 Digital cameras.
 External storage devices.
Each of these needs a driver in order to work properly. Without device drivers, the
computer would not be able to send and receive data correctly to these devices.
(iii).Utility program:
Utility programs help manage, maintain and control
Computer resources. is called utility programs. These programs are available to keep
performance of computer excellent running under heavy load .
Example of Utility program are:
 Antivirus.
 Disk Defragmentation.
 Disk Cleaner.
 Backup.
 Scandisk.
(iv).Language Processor:
Language Processor or translator is a type of system software that translates a source
program (other than Machine Language) into object program (Machine Language).is called
Language processor.
There are three types of language processor:
 Compiler.
 Assembler.
 Interpreter.
 Compiler:
The language processor that translates the complete high level language source
program as a whole in machine code before execution is called Compiler.
Example of languages that use compilers include are:
 COBOL.
 FORTRAN.
 C/C++.
 JAVA.
 Assembler:
An Assembler is a translator which is used to convert an assembly language program
into a machine language program for later execution. is called Assembler.
 Interpreter:
A language processor that translates a high level language program line by line
(statement by statement) and carries out the specified action in sequence. is called
interpreter.
Example of languages that use interpreters include are:
 BASIC.
 LISP.
 SMALLTALK.
 PHP.
 PERL.
Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 28
Q 15: What is application software? Give few examples.
Ans:Application Software:
Application software is a type of software that can be used for a variety of tasks for users.
is called Application software. it helps to solve problems in the real world.
Most application software is available as packaged software that can be purchased in
retail stores or on the web.
Example of Application software are:
 Accounting software.
 Graphic software.
 Education software.
 Entertainment software.
 Spreadsheet software.
 Word processing software.
Q 16.Write short note on the following.
(i).Shareware (ii).Freeware
Ans:(i).Shareware:
Shareware is usually offered either with certain features only available after the license is
purchased, or as a full version but for a limited trial period of time. Once the trial period has
passed the program may stop running until a license is purchased. Sharewares give users a
chance to try the software before buying it. Most of the times, all features are not available,
or have limited use to use all the features of the software. User has the purchase the
software. Shareware may or may not be distributed freely. in many cases, authors
permission is needed, to distribute the shareware.
Example of Shareware software are: Winzip, Gettright, Cuteftp.
(ii).Freeware:
Freeware refers to software that anyone can download from the internet and use for free.
All the features are free and available for use. Freeware programs can be distributed free of
cost. Freeware usually carries a license that permits redistribution but may other restriction,
such as limitations on its commercial use. For example the license can say that the program
may be freely copied, but never sold.
Example of Freeware software are: Adobe PDF, Google Talk, Yahoo,
messenger, MSN messenger.

The End OF Unit No:01

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 29


Chapter 2: Fundamentals
of operating system.
Class: 9Th
Computer Science Notes

SHORT QUESTIONS
NOTE: Give Short answers to the following questions.
Q 1: Write objectives of an operating system.
Ans:The main objectives of operating systems are:
i. OS provide a next interface.
ii. OS transfer programs between secondary storage and main memory.
iii. OS manage common computer hardware function.
iv. OS manage system memory.
v. OS manage processing tasks.
vi. OS provide networking capabilities.
vii. OS control access to system resources.
viii. OS manage files
ix. OS provide protection facilities.
Q 2: List main features of Linux operating system.
Ans: main features of linux operating system:
i. Linux is free open-source operating system introduced by Linus Torvalds in 1991.
ii. It is faster but difficult to use as compared to Macintosh and Windows operating
systems.
iii. It is not a popular operating system.
iv. Millions of programmers around the world working on Linux to improve it.
v. Its source code is freely available on Internet.
vi. Linux OS can be installed on PCs, laptops, notebooks, mobile and tablet devices, video
game consoles, servers, supercomputers and more.
vii. Popular Linux OS distributions include Debi an, Ubuntu, Fedora, Red Hat and opens
USE etc.
Q 3: What is time sharing processing system?
Ans: Time-sharing processing System:
 In this system, multiple users can run different programs at a same time on a large-
scale computer.
 In a time sharing processing system, the central processing unit is switched rapidly
between the programs so that all the user programs are executed simultaneously.
 The, operating systems used in minicomputers and mainframe computers support
timesharing processing system.
 This system is used in organizations like airline, bank, hotel, university, etc.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 30


where many users need access to the central computer at the same time.
 For example, hundreds of students access the university’s mainframe computer at the
same time to check their result / date sheet etc.
Q 4: Define file and folder.
Ans:File:
A file is a collection of related information, or resource for storing information. it can be
stored permanently on backing storage device like a hard disk. Every file has a name for its
identity.is called file.
Folder:
A folder is a named collection of related files that can be retrieved, moved, and
manipulated as one entity. it can be used to store and manage files or sub-folders.is called
folder.
Q 5: Differentiate between Copy and Cut command.
Ans:Copy Command:
Copy commands makes duplicate of the data is selected. is called Copy Command.
Cut Command:
Cut commands moves the selected data from one location to other location. is called Cut
Command.
Q 6: What is installation process?
Ans: installation process:
The process by which programs and data of a software are copied and installed to the
hard disk of a computer system is called installation process.
Q 7: What is Batch processing system?
Ans: Batch Processing System:
 In this system, jobs are grouped in batches & computer executes them one by one.
 Computer automatically loads the next job when one job terminates.
 This system is suitable where large amount of data has to be collected and processed
on a regular basis.
 For example, data of credit card holders is collected & held till end of billing cycle.
 Another example is printing of report cards of all students of a school as a batch.
Q 8: What is Real processing system?
Ans: Real-time System:
 This system must process information and produce a response within a specified time.
 These operating systems are developed for special applications.
 For example a measurement of temperature from an oil refinery indicating high
temperature might demand quick response to avert an explosion.
 There are a number of real-time operating systems used in military and space research
programs.
 For example, real-time operating system is used to monitor the position of rocket in the
space.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 31


LONG QUESTIONS

NOTE: Give detailed answers to the following questions.


Q 1: What is an operating system? Explain some common task
or functions of an operating system.
Ans: Operating system:
An Operating system is a set of programs that manages the computer operations and all
components. is called operating system.
The following are the main functions of operating system.
Process Management:
 A process is a program in execution which needs resources like processing resource,
memory and I/O resources.
 The Operating System must allocate resources to processes the data.
Memory Management:
 It is the process of allocating memory space to different programs.
 When programs are run by users, the operating system allocates portions of free
memory these programs.
 When a program is closed, operating system will free the memory portion used by that
program.
Input/output Management:
 User communicates with computer through input/output devices such as keyboard,
mouse, monitor, printer etc.
 Operating system uses Input/output controller to manage all the input/output
devices.
File Management:
 It is the process in which operating system organizes, stores and keeps track of files and
folders.
 Operating System perform various operations on these files/folders like creating,
opening, editing, renaming, moving, copying, deleting and searching etc.
Resource Management:
 The resources of a computer include microprocessor, memory and all the devices
attached to the computer.
 Operating system automatically manages the resources of a computer when
application programs are executed by user.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 32


User Management:
 User management is an important feature of operating system for a secure computer
system.
 The operating system gives full control to administrator only who can installs various
programs and can creates new users.
 Operating system does not allow the users to install programs or create new users.
Q 2:Explain the following types of operating systems.
( i ) Command Line Interface(CLI) ( ii ) Menu Driven Interface
(iii) Graphical User Interface
Ans: (i).Command Line Interface:
 In CLI, commands are given with keyboard.
 The user types a command and presses the ENTER key to execute it.
 Examples of CLI are DOS (Disk Operating System) and UNIX.
 CLI is difficult to use because users have to remember the commands.
(ii). Menu-driven Interface:
 It presents a menu, user makes a choice and then the next menu appears.
 The user makes another choice and so on.
 It is very easy to use.
 Menus contain the commands to use the operating system.
Examples are Novell’s Netware and Pro DOS etc.
(iii). Graphical User Interface:
 It is a graphical interface and uses windows, icons, menus and pointer.
 In 1984, the Apple Company introduced the first GUI computer.
 Icon is a graphical symbol that represents a file, folder, program, device, etc.
 To perform a task, the user has to select icons or make choices in menus.
 Examples of GUI are Macintosh, Linux and Windows.
Q 3: Write short note on the following.
( i ) DOS (ii) UNIX (iii) Macintosh ( iv ) Windows
Ans: ( i ) DOS:
 DOS (Disk Operating System) was the first widely-installed operating system for
personal computers.
 DOS is a non-graphical command line operating system created for IBM compatible
computers.
 Although the DOS operating system is not commonly used today, the command shell is
used through Microsoft Windows to support existing DOS applications.
Few DOS commands are given below.
C:\>DIR
C:\>CLS
C:\>COPY asd.doc D:
( ii ) UNIX:
 UNIX is a multi-user CLI operating system.
 It was introduced in 1960s.
 It allows multiple users to run different programs at the same time.
Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 33
 UNIX is used on large computer system (Mainframe).
It uses a command line interface but later on GUI was also introduced.
(iii) Macintosh:
 Mac OS is a series of operating systems developed by Apple Incorporation.
 It was introduced in 1984.
 The latest version is Mac OS X.
 It is a UNIX based user-friendly operating system.
 There are some specialized versions of Mac OS X used on devices such as iPhone, iPod,
pad and new Apple TV.
( iv ) Windows:
 It is the most popular operating system.
 It is a Graphical User Interface (GUI) operating system which contains graphics and
icons and is commonly navigated by using computer mouse.
 It was developed by Microsoft.
 It has many versions over the period of time like Windows 95, Windows 98, Windows
Millennium, Windows XP, Windows Vista, Windows 7, 8 and 10.
 The latest version is Windows 10.
Q 4: Explain single user and multi user operating systems with
examples.
Ans: Single-user Operating System:
A single-user operating system is a type of operating system (OS) that will only have a
single user at any given time. This is the most common type of OS used on a home
computer, as well as on computers in offices and other work environments.
Some examples of single – user OS include: MS - DOS, Windows 95, Windows XP,
Windows 7, etc.
Multi-user Operating System:
A multi – user operating system differs from a single – user operating system in that each
user is accessing the same OS at different machines. A multi – user operating system is
often used in businesses and offices where different users need to access the same
resources cannot be installed on every system. In a multi – user operating system, the OS
must be able to handle the various needs and requests of all of the users effectively.
Some examples of multi – user OS include: Windows NT, UNIX, window 2000, window
server family and Linux etc.
Q 5: Explain different components/features of graphical user
interface (GUI).
Ans:The following different components/features of graphical user interface
(GUI).
(i).Recycle Bin Icon:
It keeps files that have been deleted, whether accidentally or intentionally. Users can
restore the contents of Recycle Bin before deleting the items permanently.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 34


(ii).Computer Icon:
The computer icon is the source of all resources in the computer including drives, control
panel and data.

(iii).Network Icon:
This icon is used to view and set the network resources of the computer.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 35


(iv).Control Panel:
Control Panel is virtually the control center of the computer. it allows users to change
settings for programs, hardware devices, set up network connections and user accounts
etc. Basically it is used to custom i.e. the computer.

The End OF Unit No:02

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 36


Chapter 3: Office
Automation.
Class: 9Th
Computer Science Notes

SHORT QUESTIONS
NOTE: Give Short answers to the following questions.
Q 01: Define a word processor.
Ans: word processor:
A word processor is application software used for the composition, editing, formatting,
and printing of documents. is called word processor. Word processors are used to create
and edit various kinds of documents such as letters, notes, books, newspapers, magazines
and advertisements, etc. They can also use to add images, sounds, charts and graphics in
documents. They also have the capabilities of removing spelling and grammatical mistakes
from documents.
Q 02: Give few examples of word processing software.
Ans: Examples of word processing software:
i. Microsoft word
ii. Open office
iii. Word perfect
iv. Lotus word pro
v. Word star
vi. Apple works for Macintosh
vii. Abe word
viii. Word pad
ix. Atlantis nova
x. Rag time
Q 03: Differentiate between Save and Save As command.
Ans:Save Command:
If the user wants the document have to the same name and same storage location then
Save command is used.
Save As Command:
If the user has made changes to the file and would like to either give it a new file name or
storage location then Save As command must be selected to give new name and location
to the document.
Q 04: How you can insert a symbol in a word document?
Ans:
i. Place your cursor in the file at the spot where you want to insert the symbol.
ii. On the Insert tab, click Symbol.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 37


iii. If you see the symbol you want listed on that gallery, just click it to insert. Otherwise,
click More Symbols to open the Symbol dialog box.

iv. Scroll up or down to find the symbol you want to insert.


v. When you find the symbol you want, double-click it. The symbol will be inserted in
your file. You can click Close now unless you want to insert additional symbols.
Q 05: Give the importance of page break and section break in a
word document.
Ans: importance of page break and section break in a word document.
 Page Breaks help to separate content between pages. After a page break, the text will
start at the beginning of the next page.
 Section Breaks split your document into sections, enabling you to have different
formatting for each section: for example - different page numbering, margins,
header/footers, page orientation and borders.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 38


Q 06: How a user can insert header, footer and page break in
a word document?
Ans: Insert header and footer in a word document in the following steps:
i. Click Header button from Header & Footer Group in Insert Tab.
ii. Select style from drop & drown list.
iii. Type the required text in Header Section.
iv. Click the Close Header & Footer Button from Close group.

Insert a page break in a word document in the following steps:


i. Click at the position in a document.
ii. Click on Page Layout Tab.
iii. Click on Breaks.
iv. Select Page from drop down list.

Q 07: What is word Art?


Ans: Word Art:
Word Art is a gallery of text styles that user can add to the documents to create
decorative effects, such as shadowed or mirrored (reflected) text. User can also convert
existing text into Word Art’s called Word Art.
Q 08: What is the use of hyperlink in a word document?
Ans: A hyperlink is a piece of text or an image in a document that can connect readers to
another portion of the document or a web page.
Q 09: What is the purpose of using Urdu editor?
Ans: the purpose of using Urdu editor:

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 39


Urdu editor is application software to create documents in Urdu language, the national
language of Pakistan. These software is very useful to develop documents like Urdu,
newspapers, magazines, pamphlets and leaflets, etc.

LONG QUESTIONS

NOTE: Give detailed answers to the following questions.


Q 1: What is a function? Explain different parts of function
with one example.
Ans: function:
A function is a predefined formula that is used to perform common mathematical
functions quickly and easily is called functions. Excel includes many common functions
that can be useful for quickly finding the sum, average, count, maximum value,
and minimum value for a range of cells.
The parts of a function:
In order to work correctly, a function must be written a specific way, which is called
the syntax. The basic syntax for a function is the equals sign (=), the function name (SUM,
for example), and one or more arguments. Arguments contain the information you want
to calculate.
Working with arguments:
Arguments can refer to both individual cells and cell ranges and must be enclosed
within parentheses. You can include one argument or multiple arguments, depending on
the syntax required for the function.
For example, the function =AVERAGE(B1:B9) would calculate the average of the values in
the cell range B1:B9. This function contains only one argument.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 40


Multiple arguments must be separated by a comma. For example, the
function =SUM(A1:A3, C1:C2, E1) will add the values of all the cells in the three arguments.

Creating a function:
 Excel has a variety of functions available. Here are some of the most common
functions you'll use:
 SUM: This function adds all of the values of the cells in the argument.
 AVERAGE: This function determines the average of the values included in the
argument. It calculates the sum of the cells and then divides that value by the number
of cells in the argument.

 COUNT: This function counts the number of cells with numerical data in the
argument. This function is useful for quickly counting items in a cell range.

 MAX: This function determines the highest cell value included in the argument.
 MIN: This function determines the lowest cell value included in the argument.
To create a function using the AutoSum command:
The AutoSum command allows you to automatically insert the most common functions
into your formula, including SUM, AVERAGE, COUNT, MIN, and MAX. In our example
below, we'll create a function to calculate the total cost for a list of recently ordered items
using the SUM function.
1. Select the cell that will contain the function. In our example, we'll select cell D12.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 41


2. In the Editing group on the Home tab, locate and select the arrow next to
the AutoSum command and then choose the desired function from the drop-down
menu. In our example, we'll select Sum.

3. The selected function will appear in the cell. If logically placed, the AutoSum
command will automatically select a cell range for the argument.
In our example, cells D3:D11 were selected automatically and their values will
be added together to calculate the total cost. You can also manually enter the
desired cell range into the argument.

4. Press Enter on your keyboard. The function will be calculated, and the result will
appear in the cell. In our example, the sum of D3:D11 is $606.05.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 42


The AutoSum command can also be accessed from the Formulas tab on the Ribbon.

You can also use the Alt+= keyboard shortcut instead of the AutoSum command. To use
this shortcut, hold down the Alt key and then press the equals sign.

Q 02: Explain different components of word window.

Ans: components of word window:


(i).Title bar:
The title bar is a bar located at the top of a window or a dialog box that displays the name
of the window or software program being used.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 43


(ii). The Ribbon:
The Ribbon is a user interface element which was introduced by Microsoft in Microsoft
Office 2007. It is located below the Quick Access Toolbar and the Title Bar. It comprises
seven tabs; Home, Insert, Page layout, References, Mailing, Review and View. Each tab
has specific groups of related commands.

(iii).The Microsoft Office Button:


The Microsoft Office Button in MS Word. In Word 2007, the upper-left corner of the
window is this Microsoft Office button. On clicking this button, a drop down menu
appears which can be used for creating a new file, for opening an existing file, for saving a
file, and for performing many other tasks.

(iv).The Quick Access Toolbar:


It is located next to the Microsoft Office button.it contains different commands for quick
access like Save, Undo, and Redo, etc. More commands can also be added in this bar by
customizing it.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 44


(v).Document View Buttons:
They are used to view a document in five different layouts. These are:
(i).Print Layout:
It gives the print layout of a document.
(ii).Full Screen Reading:
In this layout a document can be viewed in two page layout on full screen.
(iii).Web Layout:
This gives the view of the document as it appears in a web browser.
(iv).Outline:
It gives the outline of a document in bullets form.
(v).Draft:
This view does not display pictures or layouts, it just displays text.
(vi).The Ruler:
It is used to vertically /horizontally align the text in a document. It can be hide or unhide
by pressing view ruler button found on the right most side of the top Ruler.

(vii).Document Window:
A document window is a section of the screen used to display the contents of a document
file on a GUI (graphical user interface) operating system. Below is an example of
a document window in the Microsoft Word software word processor program.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 45


(viii).The Vertical and Horizontal Scroll Bars:
They are used to move around the document vertically and horizontally.

(ix).Zoom Slider:
It is used to zoom in or zoom out the view of the document. The zoom range varies from
10% to 500 %.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 46


(x).The Status Bar:
It is located at the bottom of the word window. it gives information about the present
status of the document such as the current page and the number of words in the
document.

Q 03: Define the following.


(i).Spreadsheet (ii).Workbook (iii).Worksheet (iv).Cell
(v).Cell address (vi).Cell reference (vii).Formula
(viii).Function
(ix).Chart
Ans:(i).Spreadsheet:
Spreadsheet is a document that stores data in a grid of rows and columns. is called
Spreadsheet.
(ii).Workbook:
Workbook is a collection of multiple worksheets saved together in one excel file Is called
Workbook.
(iii).Worksheet:
An excel worksheet is a single spreadsheet that is made of rows and columns. Is called
Worksheet.
(iv).Cell:
A cell is the intersection of a row and a column. A cell can contain a label, a numeric value,
or a formula. Is called Cell.
(v).Cell address:
A cell address is the location of a cell on a worksheet and is defined by the column letter
and the row number. is called cell address.
For Example: cell A1 is where column A and row 1 intersect.
(vi).Cell reference :
A cell reference, or cell address, identifies a particular cell, such as cell B5.Cell references
are used in formulas to indicate where a value is stored. is called cell reference.
(vii).Formula:
A formula is a mathematical expression used to perform mathematical
Operation. is called formula.
(viii).Function:
A function is a predefined formula that is used to perform common mathematical
functions quickly and easily is called functions.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 47


(ix).Chart:
A Chart is a graphical representation of the data in the worksheet is called chart.
Q 04:label different parts of the following word window.
Ans:

The End OF Unit No:03

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 48


Chapter 4: Data
Communication.
Class: 9Th
Computer Science Notes

SHORT QUESTIONS

NOTE: Give Short answers to the following questions.


Q 1: What is Data Communication?
Ans: Data Communication:
Data communication is the exchange of data between devices (Computers) through some
form of transmission medium such as wire cable, wireless system, microwave system,
satellite system etc. using standards methods.
The communication system may consist of hardware and software. Example of data
communication is personal computer connected to the internet with a modem.
Q 2: Differentiate between Analog and Digital Signals.
Ans:
 Analog Signals:
The continuous signals in wave form are called analog signals. Light waves, sound
waves or radio waves are examples of analog signals.
 Digital Signals:
A digital signal consists of individual and discrete electrical pulses that represent
bits grouped into bytes. For example the digital watch, which offers the time of day
and other information using a numerical display.

Q 3: Define the following terms: i. Data ii. Information,


iii. Data Transmission
Ans:

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 49


i. Data:
Data is any raw facts and figures given to the computer as input for processing. Data
can be in the form of text, numbers, graphics, sounds and videos.
ii. Information:
The processed form of data is called information.
iii. Data Transmission:
Sending and receiving data through transmission medium is called data transmission.
Mediums of data transmission include cables, wireless like microwave, infrared and
satellite etc.
Q 4: Define the following properties of a good communication
system.
i. Delivery ii. Accuracy iii. Timeliness
Ans:
i. Delivery:
In a communication system the data must be delivered from source to the
correct destination.
ii. Accuracy:
The communication system must deliver the data accurately. If any error
occurred during transmission, the data must be retransmitted.
iii. Timeliness:
The communication system must deliver the data in timely manner. The late
delivered data is useless.
Q 5: Differentiate between Guided and Unguided transmission
media?
Ans.
(a) Guided Transmission Media:
The transmission media in which the communication devices are directly linked with each
other through physical materials (cables, etc.) is called guided transmission media. It is
also called physical or wired transmission media.
The following are the examples of such media:
i. Twisted pair cable
ii. Coaxial cable
iii. Fiber optic cable
(b).Unguided transmission media :
The transmission media in which the communication devices communicate with each
other through the air or space, broadcast radio signals, microwave signals and infrared. is
called Unguided transmission media. It is also called wireless transmission media.
The commonly used wireless transmission media are:
i. Radio Waves
ii. Microwaves
iii. Infra-red
iv. Satellite

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 50


Q 6: What is the purpose of communication devices?
Ans: The purpose of communication devices:
The communication devices are used to send and receive data on the network. They are
used on both ends of the connections.
Q 7: What is Signal-to-Noise Ratio?
Ans:Signal-to-Noise Ratio:
Signal-to-Noise Ratio (S/N) is the ratio of the relative power levels of a voice/data
communications signal and the noise on a line, expressed in decibels (dB).
SNR=Signal/noise
SNR is actually the ratio of what is wanted (signal) to what is not wanted (noise). A high
SNR means the signal is less corrupted by noise; a low SNR means the signal is more
corrupted by noise.
Q 8. How Data Rate and Baud Rate can be linked through
formulae?
Ans: Data Rate (bps) and Baud Rate (baud per second) have the following connection:
Data Rate (bps) = Baud Rate (baud per second) x the number of bits per baud.
Baud Rate (baud per second) = Data Rate (bps) / the number of bits per baud.
Q 9: What is meant by the following terms?
i. Analog Data Transmission ii. Digital Data Transmission
Ans:
i. Analog Data Transmission:
The transfer of data from one place to another in the form of continuous waves is
called analog data transmission.
ii. Digital Data Transmission:
The transfer of data from one place to another in the form of digital signals is called
digital data transmission.
Q 10: What is real-time transmission?
Ans: Real-time Transmission:
In communication system, the audio and video must be delivered in the same
order as they are produced, without significant delay. This is called real-time
transmission. For example: in live television transmission etc.
Q 11: What do you mean by up-linking and down-linking in
satellite communication?
Ans.: Transmitting a signal from earth station to satellite station in space is called up-
linking and the reverse is called down-linking.
Q 12: What is crosstalk?
Ans.: Crosstalk:
It is the effect of one wire on the other. One wire acts as a sending antenna and
the other wire as the receiving antenna. is called Crosstalk.
Q 13: What is Transceiver?
Ans: Transceiver:
It is a special device which is used to send and receive messages in the form of
radio signals. is called Transceiver.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 51


LONG QUESTIONS

NOTE: Give detailed answers to the following questions.


Q:1:What is Data Communication? Explain the basic components of a
communication system.
Ans: Data Communication:
Data communication is the exchange of data between devices (Computers) through some
form of transmission medium such as wire cable, wireless system, microwave system,
satellite system etc. using standards methods.
The basic components of a communication system are:
 Sender
 Receiver
 Message
 Protocol
 Transmission Medium
Sender:
The device which is used to send data to another device is called sender, transmitter or
source. The sender may be a computer, camera, mobile phone etc.
Receiver:
The device which is used to receive data from another device (sender) is called receiver
or sink. The receiver may be a computer, mobile phone, printer, fax machine etc.
Message:
The information or data that is sent from one place to another place is called message. It
may be text, numbers, sounds, pictures, videos etc.
Protocol:
A protocol is a set of rules the guides (or governs) data communication. It is an agreement
between two communicating devices.
Transmission Medium:
The medium through which a message is transmitted or received from one location to
another in a communication system is called transmission medium.
Q2: Explain Synchronous and Asynchronous transmission modes
with examples.
Ans:
a .Synchronous Transmission:
In this type of transmission, data is transmitted block-by-block or word-by-word
simultaneously at regular intervals without any start/stop signals.
Each block may contain several bytes of data. Synchronous transmission requires that
both the sending and receiving devices be synchronized before data is transmitted. For
this purpose of synchronized clock is required to schedule the transmission of
information.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 52


Most network protocols such as Ethernet, SONET, Token Ring etc. use synchronous
transmission.
b .Asynchronous Transmission:
In asynchronous transmission, data is transmitted one byte at a ‘time’. The data is
transmitted character-by-character as the user types it on a keyboard. The asynchronous
transmission is not synchronized so the timing of the signal is unimportant. A start bit
marks the beginning of a byte and a stop bit marks the end of the byte. A parity bit is
sometimes included at the end of each byte to allow for error checking. Asynchronous
transmission is relatively slow. Asynchronous transmission is used commonly
for communications over telephone lines.
Q3: What is Guided Transmission Media? Explain different types of guided
media with advantages and disadvantages of each.
Ans: Guided Transmission Media:
The transmission media in which the communication devices are directly linked with
each other via physical materials (cables, etc.) is called guided transmission media. It is
also called physical or wired transmission media.
Types of Guided Transmission Media:
i. Twisted Pair Cable
ii. Coaxial Cable
iii. Fiber Optic Cable
i. Twisted Pair Cable:
It consists of two separate copper wires that are covered by insulation material
(Plastic etc.) and are twisted together to form a cable.
Advantages:
 Most flexible,
 cheapest cable,
 easy to install,
 easy to add users
Disadvantages:
 Shortest usable cable length,
 susceptible to electrical interference,
 unsecure
ii. Coaxial Cable:
It consists of a single solid copper wire which is called the inner conductor.
The inner conductor is surrounded by three layers:
 An insulating material
 An outer conductor of solid metal foil
 An insulating material which covers the outer conductor
The whole cable is protected by an external plastic cover.
Advantages:
 It is Flexible and easy to install,
 Relatively good resistance to
Electronic interference.
Disadvantages:
 Short cable length,
 More expensive than UTP,
 Unsecure,
Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 53
 Hard to change configuration.
iii. Fiber Optic Cable:
It consists of tubes of glass or thin
glass fibers through which data is transmitted as pulses of light.
The data transmission speed is very high in this cable, but it is more expensive than
coaxial cable.
Advantages:
 Fastest transmission rate,
 Not susceptible to electrical interference,
 Secure,
 light weight,
 low attenuation,
 high bandwidth,
 Good for use between buildings.

Disadvantages:
 Relatively expensive,
 Relatively difficult to work with.
Q4: Explain the following unguided transmission media.
i. Radio waves ii. Cellular Radio iii. Satellite
iv. Infra-Red v. Microwave
Ans.: i. Radio waves:
It is a wireless transmission medium that is used to communicate information
through radio signals in air, over long distance such as between cities and countries.
A transmitter and a receiver are required to send and receive messages. The data
transmission speed of broadcast radio is 54 mbps.
ii. Cellular Radio:
Radio communication based on a network of transmitters each serving a small area
known as a cell, used in personal communications systems.
iii. Satellite:
The communication satellite is launched about 22300 miles above the earth. It is a
space station that receives microwave signals from one earth microwave station and

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 54


amplifies the signals and sends them to another earth station. The data transmission
speed of communication satellite is very high.
iv. Infra-Red:
This technology allows computers to communicate through short range wireless
signals. Infrared network adapters both transmit and receive data. For example
sending signals from remote control to TV set.
v. Microwave:
These are the radio waves that provide high speed transmission. In microwave
transmission, the data is transmitted from one station to another. Each station
contains a transceiver to send and receive data. The microwave stations need to be
placed within 20 to 30 miles of each other.
Q5: What are Transmission impairments? Explain different
causes of transmission impairments.
Ans: Transmission impairments:
The loss of information during transmission is called transmission impairments.
Communication lines are usually not perfect, so the data may be lost during
travelling from source to sink.
Causes of Transmission impairments:
i. Attenuation
ii. Distortion
iii. Noise
i. Attenuation:
It is the loss of energy as the signal propagates outwards. If the attenuation is too
much the receiver may not be able to detect the signal.
ii. Distortion:
The change of shape or form of a signal is called distortion. The distortion occurs
due to the difference of speed of multiple frequencies of a signal.
iii. Noise:
Several types of noises disturb the transmission of signals through transmission
medium, for example crosstalk etc.
Q6: Explain any five communication devices.
Ans. The most important communication devices are:
i. Dialup Modem
ii. Network inter face card (NIC)
iii. Router
iv. Switch / Access point
v. Gateways
i. Dialup Modem:
Modem stands for modulator and demodulator. The Modem (dialup modem) is an
electronic device that converts the digital signals received from computer to analog
signals and transmits these through telephone line and reverses the process in the
Reverse direction. It is used on both ends of the connection. Modem can be internal
or external.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 55


ii. Network interface card (NIC):
It is also called LAN adapter or simply LAN card. It is used in local area network to
establish the communication link between the devices (computers, Printers & other
devices) attached on the network.

iii. Router:
Router is intelligent device which routes data to destination computers. It helps in
connecting two different logical and physical networks together. Some routers also
support wireless communications.

iv. Switch / Access point:


It is used in networking environment to connect computers to the same network.
Switch uses MAC (Media Access Control) address for communication. It is also called
Hub or access Point.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 56


v. Gateways:
Gateway device connects LAN with internet. Its basic functionality is to provide
security to the network. By using gateways incoming/out-going traffic can be
monitored for any harmful activity within the network.

Q7: What is Bandwidth? Explain different types of Bandwidths.


Ans: Bandwidth:
Bandwidth is the amount of data that can be transmitted in a fixed amount of time.
For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes
per second. For analog devices, the bandwidth is expressed in cycles per second, or Hertz
(Hz).Is called Bandwidth.
Different types of Bandwidth are the following:
(i) .Voice Band or low speed channels:
The frequency band, or range, specified for voice communications in the public
switched telephone network (PSTN).The total bandwidth of a voice grade channel
is nominally 4 kHz. So, a single-channel voice grade circuit supports a frequency
band of 0. These media are faster than narrow band. Most telephone lines which are used
to carry microcomputer transmission are voice band.
(ii)Medium Band or medium speed channels:
Medium wave (MW) is the part of the medium frequency (MF) radio band used mainly for
AM radio broadcasting. For Europe the MW band ranges from 526.5 kHz to 1606.5 kHz,
using channels spaced every 9 kHz, and in North America an extended MW broadcast
band ranges from 525 kHz to 1705 kHz, using 10 kHz spaced channels.
(iii)Broad Band or high speed channels:
These media transmit large volume of data at a high speed via microwave, satellite,
coaxial cable, and fiber optic cable. In telecommunications, broadband is wide bandwidth
data transmission which transports multiple signals and traffic types. The broadband is
used to mean any high-speed Internet access that is always on and faster than dial-up
access over traditional analog services.
Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 57
Q8: Describe some important communication terminologies?
Ans: Important communication terminologies:
a. Data Rate:
Data Rate is the speed at which the binary digits are transmitted over a communication
path. It is expressed in “bits per second” (bps).
b. Baud Rate:
It is the amount of times per second a signal changes state within a communication
channel. Or, baud rate is the speed at which data is transmitted.
c. Bandwidth:
Bandwidth is the amount of data that can be transmitted in a fixed amount of time.
For digital devices, the bandwidth is usually expressed in bits per second (bps)
or bytes per second. For analog devices, the bandwidth is expressed in cycles per second,
or Hertz (Hz).
Types of Bandwidth:
i. Voice Band or low speed channels
ii. Medium Band or medium speed channels
iii. Broad Band or high speed channels
d. Signal-to-Noise Ratio:
Signal-to-Noise Ratio (S/N) is the ratio of the relative power levels of a voice/data
communications signal and the noise on a line, expressed in decibels (dB).
SNR=Signal/noise
SNR is actually the ratio of what is wanted (signal) to what is not wanted (noise).
A high SNR means the signal is less corrupted by noise; a low SNR means the signal is
more corrupted by noise.

The End OF Unit No:04

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 58


Chapter 5
Computer Networks
Class: 9Th
Computer Science Notes

SHORT QUESTIONS

NOTE: Give Short answers to the following questions.


Q1: What is a Computer Network?
Ans: Computer Network:
A Computer Network is a collection of computers and devices interconnected by
communication channels. It facilitates communication among users and allows users to
share hardware resources, programs and data files.
Q2: List various components of communication network.
Ans. Components of communication network:
o Servers,
o Clients,
o Transmission Media,
o Shared Data,
o Shared devices,
o Network interface card,
o Hub/Switch,
o Operating Systems.
o Routers
o Modems
Q3.What is the importance of “Servers” in a computer network?
Ans.: Servers are computers that hold shared files, programs, and the network operating
system. Servers provide access to network resources to all the users of the network.
There are many different kinds of servers. For example, file servers, print servers, mail
servers, communication servers, database servers, fax servers and web servers etc.
Servers typically perform the following functions:
o Sharing information,
o Storing files centrally,
o Controlling user access,
o Keeping software updated,
o Managing security risks.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 59


Q4.Differentiate between LAN and WAN.
Ans.: LAN:
o LAN stands for Local Area Network.
o LANs are for smaller, more localized networking - in a home, business, school, etc.
LANs are typically faster and more secure than WANs.
o LANs tend to be owned, controlled and managed in-house by the organization where
they are deployed.
WAN:
o WAN stands for Wide Area Network.
o WANs enable more wide spread connectivity; they cover larger areas, such as a
country or even allow computers in different nations to connect.
o WAN may utilize public, leased or private communication equipment, usually in
combination.
Q5. What are the advantages and disadvantages of star
topology?
Ans.: Advantages of Star Topology:
o It is very easy to install and manage the star network topology.
o It is easy to troubleshoot this network type.
o The data transfer is fast.
o The data is safer.
o Adding new machines or replacing the old ones is easy.
Disadvantages of Star Topology:
o It is highly dependent on the functioning of the central hub.
o The size of the network is dependent on the capacity of the Hub.
o The expenses of star topology are relative high than that of Bus topology.
o If the server is slow, it will slow down the entire network.
o If the hub fails its functioning, the entire network will stop functioning.
Q6. Write few advantages and disadvantages of DSL.
Ans: DSL Advantages:
o Independent services.
o Security: Each subscriber can be configured so that it will not be on the
same network.
o Integration: DSL will easily interface with ATM, Nx64, and WAN
technology. Telecommunicating may get even easier.
o High bandwidth.
o Cheap line charges from the phone company.
DSL Disadvantages:
o Expensive.
o Distance dependence: The farther you live from the DSLAM (DSL
Access Multiplexer), the lower the data rate.
o Access.
o Asymmetry. Downstream/Upstream ratios may be unacceptably high
(3 or more).
o Limited availability.
o Reliability and potential down time issues makes DSL a very risky
choice for mission critical systems.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 60


LONG QUESTIONS

NOTE: Give detailed answers to the following questions.


Q1.What are different uses of Computer Networks? Explain in
detail.
Ans: The following are some uses of Computer Networks:
a. Resource Sharing:
Resource sharing is the most popular use of computer networks. For example a
printers, scanners and fax machines can be shared to many computers on a network.
So it saves a lot of investment in hardware.
b. Communication:
Communication is a great advantage of a computer network. People from near and
remote area communicate to exchange the work activities. In offices and organizations
computer networks are used for daily work and communication. People communicate
through messages and E-Mails on computer network.
c. Data Sharing:
All the data such as documents, files, accounts information, reports, multimedia etc.
can be shared with help of computer networks.
d. Video Conferencing:
LAN and WAN have made possible for the organizations, business sectors, relatives,
friends from remote areas to call the live video conferencing for discussions and
meetings.
e. Internet Service:
Internet Service is made possible through computer network. Information can be
shared in every field through internet service. Internet service made the whole world
a global village.
Q2. Explain different modes of data transmission with
examples.
Ans: Transmission Modes in Computer Networks:
The way in which data is transmitted from place to another is called data
transmission mode.
There are three modes of data transmission:
o Simplex Mode:
In this mode of transmission data flows in one direction i.e. from sending device
to the receiving device. So, it is a unidirectional communication.
Examples of simplex mode is loudspeaker, television and remote, keyboard,
monitor etc.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 61


o Half Duplex Mode:
In half duplex transmission, data can flow in both directions but only in one
direction at a time. In this mode data is sent and received alternatively.
Example of half duplex is a walkie-talkie.

o Full Duplex Mode:


In full duplex mode, data can flow in both directions at the same time. It is the
fastest mode of communication.
Example of Full Duplex is a Telephone Network.

Q3.What is network architecture? Explain different types of


network architecture.
Ans: Network Architecture:
Network Architecture is a framework for the specification of a network’s physical
components and their functional organization and configuration, its operational
principles and procedures.
Types of Network Architecture:
Three types of network architecture are:
o Client and Server network
o Peer to peer network
o Point to point network
a. Client and Server network:
In this network architecture there is one dedicated computer which is called
server. All other computer (clients) are connected to that server through hub or
switch. Server is responsible to perform activities according to the request sent
to it by clients.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 62


b. Peer to peer (P2P) network:
In this network there is no server to control and monitor the network. All the
computers are inter-connected. This network is very cost effective. Data files,
printers, scanners etc. can be share through this network.

c. Point to point network:


In this network, only two nodes are connected with one connection line. It is
simplest, cheapest and most effective network architecture. For example a
computer is connected to a local printer by USB cable.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 63


Q4. Explain different types of networks on the basis of spatial
distance.
Ans: Types of networks on the basis of spatial distance:
Networks are divided into three main types on the basis of spatial distance:
a. Local Area Network (LAN):
A local area network (LAN) connects computers and devices in a limited
geographic area such as one building, one office, or group of buildings close
together.
In a LAN resources can be shared between personal computers or workstations.
In LAN one computer may act as a server.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 64


b. Metropolitan Area Network (MAN):
A metropolitan area network (MAN) is a communication network covering
a city or state. It may be a single network such as a cable television network
or it may be a network of LANs. A MAN may be fully private or Government
Company or it may be a service provider by a public company.

c. Wide Area Network (WAN):


It is a communication network that covers a wide geographic area such a
country or the world. A WAN may use a combination of satellites, fiber
optic cable, microwave and copper wire connections. WANs may utilize
public, leased or private communication equipment.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 65


Q5. What is network topology? Explain different types of
network topologies.
Ans: Network topology:
Network topology is defined as the physical layout of joining a number of
computers in the form of a network. is called Network topology.
Types of network topologies:
o Bus topology:
In Bus Topology, all nodes are connected to a central cable. This central cable is
called Bus. This bus links all the devices to the network. A device called
Terminator is attached at the start and end points of the central cable or bus. A
terminator stops the signals. is called Bus topology.

o Ring topology:
In ring network, each node is connected to two adjacent nodes in the form of
a closed ring. The last node connects to the first node to complete the ring.
Data travels from source device passing through each node on its way to
destination device. is called Ring topology.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 66


o Star topology:
The Star Topology is the most common topology in use today. In this
network, each node is directly connected to the central switch or hub. So,
information or data is communicated from one computer to another
through hub. is called Star topology.

o Mesh topology:
In mesh network, every device has a dedicated point to point link to every
other device. Therefore, a fully connected mesh network has n(n-1)/2
physical channels to link n devices and every device must have n-1
input/out ports. is called Mesh topology.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 67


Q6.What is hybrid Network?
Ans: A network in which more than one topologies are used to connect devices is called
hybrid network.

Q7.Explain different types of Modems.


Ans: Types of Modems:
a. Dialup Modem
b. DSL Modem
c. ISDN Modem
d. Cable Modem

a. Dialup Modem:
It is a type of modem that uses the facilities of the public switched telephone
network (PSTN) to establish a connection to an Internet service provider (ISP)
by dialing a telephone number on a conventional telephone line. is called
Dialup Modem.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 68


b. DSL Modem:
A digital subscriber line (DSL) modem is a device used to connect a computer or
router to a telephone line which provides the digital subscriber line service for
connectivity to the Internet. is called DSL Modem.

c. ISDN Modem:
It is a device used for ISDN (Integrated Services Digital Network) connection
that can transmit data, voice and video over a normal telephone line. It works
faster than a dialup modem. is called ISDN Modem.

d. Cable Modem:
A cable modem is a hardware device that allows your computer to
communicate with an Internet Service Provider over a landline connection. It
converts an analog signal to a digital signal for the purpose of granting access
to broadband Internet. is called Cable Modem.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 69


Q8.Compare different data communication lines in terms of data
transfer rate and cost.
Ans: Telephone lines for data communication:
o Dialup lines
o Digital Subscriber Line (DSL)
o Integrated Services Digital Network Line
o CDMA
a. Dialup Line:
In dialup line the device is connected to the Internet through Internet Service
Provider (ISP). This form of Internet access is low cost but has relatively poor
speed. Dialup modem supports less than 56kbps bandwidth.
b. Digital Subscriber Line(DSL):
DSL is a technology that brings high-speed network access to homes and small
businesses over ordinary telephone lines. DSL is very high speed connection.
DSL sends data packets with speeds ranging from 128Kbps to over 100 Mbps
using latest DSL standards .
c. Integrated Services Digital Network Line(ISDN):
ISDN is a type of digital phone, data and Internet service. ISDN transmits voice
and data through a single line. ISDN is somewhat more expensive than DSL.
d. CDMA:
CDMA stands for Code Division Multiple Access. CDMA is a channel access
method used by various radio communication technologies. It is a form of
multiplexing, which allows numerous signals to occupy a single transmission
channel. This technology is mostly used for cellphones.

The End OF Unit No:05

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 70


Chapter 6
Computer Security and Ethics
Class: 9Th
Computer Science Notes

SHORT QUESTIONS

NOTE: Give Short answers to the following questions.


Q1: What is Computer Security?
Ans: Computer Security:
Computer security or information security is applied to computers and networks. It is also
known as cyber security or IT security.
The objective of computer security is the protection of information systems from theft or
damage to the hardware, the software, and to the information on them, as well as from
disruption or misdirection of the services they provide.
Q2: What is the difference between a computer crime and
conventional crime?
Ans: Computer Crime:
Cybercrime or computer crime refers to any crime that uses computer and a
network.
Cybercrime is also defined as crime committed on the network or the Internet
using the computer as either a tool or a targeted victim. It leaves very little
evidence about the cybercrime.
Conventional or Traditional crime:
It is the crime which needs no computer or network. Traditional criminals usually
leave traces of a crime, through either fingerprints or other physical evidences. It is
difficult for traditional criminals to fake their gender, race, or age. The criminals
usually leave evidence that can be used to spot them.
Q3: Define the terms: (b) Hacker (b) Hacking (c) Cracker
(d) Cracking
OR
Differentiate between Hacking and Cracking.
Ans: Hacker:
A professional, who do hacking, is called hacker.
Hacking:
Gaining an unauthorized access to computers or telecommunications systems is
called hacking. Hacking is a cybercrime.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 71


Cracker:
The person who modifies software to remove or disable features which are
considered undesirable is known as cracker.
Cracking:
Software cracking is the process of bypassing the registration and payment options
on a software product to remove copy protection safeguards or to turn a demo
version of software into fully functional version without paying for it.
Q4: What is the difference between a virus and a worm?
Ans: Virus:
Computer virus is malicious software written intentionally to enter a computer
without the user’s permission/knowledge. It has the ability to replicate itself.
A virus is dependent upon the host file or boot sector. It spreads with the transfer
of files between computers.
Worm:
Computer worms are programs that produce, execute independently and travel
across the network connection. A computer worm spreads on its own accord
through network connections.
Q5: What is adware? How a user can get rid off and remove
adware?
Ans: Adware:
Adware is advertising-supported software, which gets the online ads to play
automatically. It downloads itself without users’ knowledge or permission.
A user can remove adware through the following methods:
STEP 1 : Uninstalling the program responsible for the pop-up ads.
STEP 2: Removing adware from computer with Adwa Cleaner.
STEP 3: Removing any browser hijacker with Junk ware Removal Tool.
STEP 4: Removing potentially unwanted programs and malware with Malware
bytes Anti-Malware.
STEP 5: Double-check for malware with Hit man Pro.
Q6: How virus spread through internet in computers?
Ans: i. Email Attachments:
If an infected file is received in email and the receiver download and open the file
the virus is copied to the computer.
ii. Rogue Websites:
When un-trusted websites are visited, they attempt automatically to access the
visiting computer and viruses are copied to pc automatically.
Q7: Differentiate between authentication and authorization.
Ans: Difference between authentication and authorization.

Authentication Authorization
In authentication, the identification of Authorization is the checking that
a user is verified through a password, whether the user is permitted to use
device or biometric way. that particular part of the system or
not.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 72


Q8: Compare authorized access with unauthorized access.
Ans: Comparison between authorized access and unauthorized access:

Authorized access Unauthorized access


1 Authorized access is the use of Unauthorized access is the use of
computers or network with computers and network without
permission. permission.
2 Authorized use is the use of a Unauthorized use is the use of a
computer or its data for approved or computer or its data for unapproved or
legal activities illegal activities.

Q9:What is biometrics technology? Give one example.


Ans: Biometrics technology:
Biometrics technology is technology which can use physical characteristics for
authentication, like human face, fingerprints, irises, or behavioral characteristics like
human voice, handwriting or typing rhythm.
Fingerprint biometric readers in laptops, is an example of biometric technology.
Biometric systems use the three components:
(i). A sensor that detects the characteristic being used for identification
(ii).A computer that reads and stores the information
(iii).Software that analyses the characteristic.
Q10: What is multimodal authentication?
Ans: Using more than one authentication method when logging on to a server or a
workstation is called multimodal or multifactor authentication. This provides
additional security to applications or computers.

LONG QUESTIONS

NOTE: Give detailed answers to the following questions.


Q1:What is the importance of Computer Security?
Ans.: Computer security is very important. In everyday life, there is a possibility for
online documents and information of being stolen. Therefore, processes are
adopted by which valuable data can be protected and preserved.
Q2: What is Cybercrime? Explain different types of
cybercrime.
Ans: Cybercrime :
Any crime that involves a computer and a network is called cybercrime.
Types of Cybercrime:
o Changing input in an unauthorized way.
o Altering, destroying, suppressing, or stealing output.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 73


o Changing or deleting stored data without permission.
o Misusing system tools or software packages, or changing or writing code for
fraudulent purposes.
o Facilitating bank fraud, identity theft, extortion, and theft of information using
computer systems.
Q3: “Virus is a great deal to computers “Why? Explain different
types of computer viruses.
Ans: Virus is a great deal to computers because it can harm data, programs,
performance of the system or even the hardware severely.
Types of viruses:
 Resident Viruses:
These are permanent viruses which stay in the RAM. They corrupt the
programs and files that are opened, closed, copied or renamed etc.
 Boot Virus:
It affects the boot sector of a hard disk which is the most important part of a
disk.
 Trojans or Trojan Horses:
They show as they are useful software to be downloaded from internet. But
they are Harmful programs. They do not replicate their selves.
 Logic Bomb or Time Bomb Virus:
It is a piece of code inserted into software that do a malicious function in some
specified conditions or on a specific data and time.
 Email Viruses:
An e-mail virus travels as an attachment to e-mail messages. It replicates and
automatically mails itself to other people present in e-mail address book.
Q4: Write a note on spyware and malware.
Ans: Spyware:
This is a malicious program that collects various types of personal information.
Spyware has the capability to change computer settings to make the connections
speed slow, break the internet connection or some other type of disorder. It can
install additional software and can redirect web browser activity.
Malware:
Malware stands for computer viruses, worms, Trojan horses, spyware, dishonest
adware, and other malicious and unwanted software. Malware works to remain
unnoticed by hiding itself from the user.
Trojan horses downloaded automatically from websites, and virus-infected files
downloaded from peer-to-peer connections.
Q5: What are different ways of spreading virus in computers?
Ans: Different ways of spreading virus in computers:
a. Through infected flash drives/CD’s:
Virus can easily be copied on CD/DVD or flash drive, if they are used in infected
computers. These infected removable mediums infect other computers when
they are used in them.
b. Through Pirated Software:
Gaining illegal access to protected software is called software piracy. Pirated
software usually contains viruses.
Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 74
c. Through Networks and Internet:
Files shared on network, or downloaded from internet are sources of computer
virus infections.
d. Through E-mail Attachments:
Viruses are mostly spread on the computer through e-mail attachments. When
the user opens the email and the attachment the virus executes itself and
begins to infect the computer system.
Q6: How a computer virus affects a computer system?
Elaborate your answer by listing various symptoms of an
attack by viruses.
Ans: Effects of virus (Symptoms) on computer system:
 The computer stops responding or freezes
 The computer runs slowly
 The computer restarts on its own and then fails to run normally
 The computer crashes and restarts every few minutes
 Disks or disk drives are not accessible
 Applications on the computer do not work correctly
 The computer shows unusual errors
 Users can not print correctly
 The computer shows unreadable menus and dialog boxes
Q7: How a computer can be protected against virus?
Ans: A computer can be protected against viruses by installing antivirus software on the
computer. Antivirus are programs which are capable of locating, preventing and
removing the viruses from the computer system. Antivirus programs are very
useful in keeping the computer clean from malicious programs. They protects the
computer system from viruses and worms. It is essential to update Antivirus
Software on regular bases.
Q8: Explain different Authentication Methodologies in detail.
Ans: Authentication Methodologies:
a. User name and Password:
In this method user name and password is used for authentication. The user
name is the identification name for the user. Passwords are codes which need
to be complex. Passwords should not be shared.
b. Personal Identification Number:
A personal identification number (PIN) is a secret numeric password that can
be used to authenticate the user to the system. Pins are often used for ATMs,
point of sale, debit cards and credit cards.
c. Access Cards:
Access cards are also called security cards. They are used to gain entry into
restricted areas. Access cards may be for general access or they may be
containing information about the card holder i.e. Name, ID#, Access level.
d. Biometrics:
Biometrics can use physical characteristics, like human face, fingerprints, irises,
or behavioral characteristics like human voice, handwriting or typing rhythm.
These personal traits are very difficult to lose, forget or being copied.
Biometrics is more secure than keys or passwords.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 75


Biometric systems use the three components:
(i). A sensor that detects the characteristic being used for identification
(ii). A computer that reads and stores the information
(iii). Software that analyses the characteristic
Q9: What are computer ethics? Give a sample code of conduct
suggested by the computer Ethics Institute(CEI).
Ans: Computer ethics:
Computer ethics are the issues concerning the legal, professional, social and moral
responsibilities of computer professionals and end users. For example, the
computer ethics suggests that it is wrong to copy copyrighted electronic content
without author’s approval.
A sample code of conduct suggested by the Computer Ethics Institute (CEI):
(i) Do not use the computer to harm other people.
(ii) Do not snoop around in other people’s computer files.
(iii) Do not use a computer to steal.
(iv) Do not use a computer to bear false witness.
(v) Do not use or copy proprietary software for which you have not paid.
(vi) Do not use other people’s computer resources without authorization or proper
compensation.
(vii) Always think about the social consequences of the program you are writing or the
system you designing.
(viii) Always use a computer in ways that ensure consideration and respect for you
fellow humans.
Q10: Explain different areas of computer ethics.
Ans: Areas of Computer Ethics:
a. Information Accuracy:
Information accuracy concerns with the correct handling of ‘personal
information’ i.e. the information about a person or organization.
This information may be about a business, a non-profit organization, a
consumer or government. This information may be used by a number of people
and for different purposes.
b. Copyright and Intellectual Property rights:
Intellectual property refers to creations of the intellect. It may include
inventions, literary, and artistic works, symbols, names, images and designs
etc. Intellectual property may be industrial property or copyright. The
copyrights are protected for the owner.
c. Software Piracy:
Software piracy is the illegal copying of the copyright or licensed software.
It is software piracy When:
 someone reproduces a copy of the software and sells it for profit
 Produces exactly the same version without giving proper credit to
the original author
 Or simply produces it and distributes it to others
d. Information Privacy:
Information privacy or data privacy is the relationship between collection and
distribution of data, technology and the other issues related to them.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 76


Data privacy is to share data while protecting personally identifiable
information and not to misuse or mishandle it.
Examples of such data are:
o Healthcare records
o Criminal justice investigations and proceedings
o Financial institutions and transactions
o Residence and geographic records
o Ethnicity
Q11: Why antivirus software is necessary for a computer?
Ans: Different viruses harm the computers software and hardware in different ways.
Therefore, Antivirus Software is very necessary for computers. If antivirus software
is not installed in a computer and this computer get infected by a virus then the
valuable data files, important maps, designs, diagrams, important records may be
lost. etc
Therefore, antivirus software is necessary to keep the computer safe and secure
from such type of problems.

Written & Composed By : Mr. Muhammad Amjid (MCS, M.Ed). Page 77

You might also like