Sunteți pe pagina 1din 11

ANALOG COMPUTER DIGITAL COMPUTER

Analog Computers work with ana- Digital Computers work with digital
log data. data.
These are used to calculate analog These are used to perform mathemati-
quantities like speed, weight, height
cal and logical operations like addi-
etc. tion, subtraction, less than, equal to
etc.
These computers have fast speed. These computers have slow speed.
These computers have low accura- These computers have more accuracy.
cy.
These are special-purpose comput- These are general-purpose computers.
ers.
These computers are less reliable. These computers are more reliable.
These computers have no state. These computers have two states ON
(1) and OFF (0).
These are difficult to use. These are easy to use.
These are mainly used in engineer- These are used in all fields of life.
ing and science.
Examples: thermometer, analog Examples: digital clocks, laptop com-
clock etc. puters and microcomputers.

iv- Ahmed, a class IX student is asking his father to replace his home computer CRT
monitor with LCD monitor. How will you justify his demand?

Ans: CRT (Cathode Ray Tube) monitor is big in size and heavy in weight. It also consumes much
power and has low display quality. On the other hand, LCD (Liquid Crystal Display) monitor
is slim and light in weight. It also consumes less power and has better display quality than CRT
monitor.

v- What will happen if storage devices are removed from a computer?

Ans: Storage devices are used to store programs and data permanently. They have huge storage ca-
pacity. If we remove storage devices from a computer, we become unable to store programs
and data permanently. Mainly we cannot have space for operating system without storage de-
vices.
vii- How a student can use computer to improve academic performance?

Ans: A student can use computer in different ways to improve his/her academic performance. Com-
puter technology eases the process of learning. Many programs are available for students to
learn all type of subjects. Multimedia software makes the process of learning interactive and
interesting for the students. A student can get information on any topic using internet.

viii- Give any three uses of computer in a school library?


Ans: Computer is used for maintaining the record of all the books available.
It is used to maintain the database of all the members of the library.
In modern libraries, it is being used to maintain and make E-Books available for study.

ix- Name few household appliances in which microprocessor is used?


Ans: Following are the few household appliances in which microprocessor is used:
Microwave Oven Washing Machine Television Refrigerator

Q 2: Write short answers of the following questions.

i- Why is operating system important software for a computer? Give any five reasons?
Ans: Operating system is important software for a computer because of the following reasons:

 It is the lowest level of software and manages all basic operations of computer
 It handles all hardware resources.
 It facilitates program execution.
 It provides a Use Interface (UI).
 It handles system security.
ii- Give any three objectives of operating system?

Ans: Following are the objectives of operating system:

1) It makes the computer more convenient to use.


2) It allows computer resources such as CPU, memory, input/output devices and Internet to be
used in an efficient manner.
3) It can be viewed as a resource manager.
4) It also allows us to communicate with the computer.
iii- Mention few disadvantages of using DOS?

Ans: Disadvantages of using DOS: Following are the main disadvantages of using DOS:

 User has to type the commands to perform any task which are difficult to remember.
 It is a single user operating system.
 It is a single tasking operating system.
 It is not a user-friendly operating system.

iv- Name two operating systems which are used in modern mobile phones?

Ans: Android and windows operating systems are used in modern mobile phones.

v- What difficulties a student may face if he/she is not familiar with the operating system
of a computer?

Ans: Following are the difficulties a student may face if he/she is not familiar with the operating
system:

a. He/she may not be able to use the available resources efficiently.


b. He/she may fail to get desired work properly done by using computer.
c. He/she may spend more time to perform any task.

viii- What is meant by managing data and why is it important?

Ans: Managing Data: (Files/Folders)


Managing data means storing data (files and folders) in secondary storage devices in an orga-
nized way. It makes it easy for the user to find required file or folder quickly and saves time.

ix- What is meant by resources of computer?

Ans: Resources of computer:


All devices connected to a computer system are called resources of computer.
These devices include micro-processor (CPU), Input /Output devices, storage devices, and the
motherboard etc.

x- What types of problems may a student face if no antivirus is installed in his/her com-
puter system?

Ans: If no antivirus is installed in computer system, his/her computer can easily get attacked by dif-
ferent types of malware due to which he/she will have to face the following problems:

 He/she may loss personal data due to viruses.


 His/her computer does not start or reboots automatically when it is on.
 He/she may get different types of error messages appear on screen.
 He/she will find that new files and folders are created on the hard disk.
 His/her computer will run slow.

Eventually, he/she may have to install new Operating System.


Q 2: Write short answers of the following questions.

i. What is a word processor? Write some advantages of it over a type-writer?


Ans: Word Processor:
“Word processor is application software that is used for the creation of different types of doc-
uments on computer.”

Advantages of Word Processor:


Following are some advantages of word processor over a type-writer:
a) It allows user to delete, modify and rearrange document without retyping any of the exist-
ing text.
b) It reduces time to prepare documents.
c) It provides features to create appealing professional documents.
ii. Name any three types of documents which can be prepared in Word?

Ans: A user can prepare following three types of documents using Word:
Letters Resumes Newsletters Memos Flyers

Notices Reports

iv. Why header and footer are important in a Word document?


Ans: Header refers to the information that appears at the top of a page.
Footer refers to the information that appears at the bottom of a page.
Header and footer are important in a word document because they show different type of in-
formation about a document like book title, document title, chapter title and number, page
number, company name etc.

v. What is the purpose of control buttons in Word window?

Ans: CONTROL BUTTONS


 Minimize Button: A user can minimize a window from the view by clicking the Minimize
button when currently it is not required but must remain running.
 Maximize Button: A user can maximize a window by clicking the Maximize button that en-
larges the window to fill the entire screen.

When a window is maximized, a Restore button appears in its place. With this button a user
can return the window to its original size.
 Close Button: A user can close a window by clicking Close button.
vi. Why hyperlinks are created in word document?

Ans: Hyperlink: A hyperlink is a word, phrase or image that a user can click on to jump to a new
document or a new section within the current document.

Hyperlinks are often used to implement reference mechanisms such as tables of contents, foot-
notes, bibliographies, indexes, letters and glossaries.

vii. Name any three areas of application of Excel?

Ans: Areas of application of Excel


1) Business: Excel is used by corporations/companies to track profit and losses.
2) Economics: Economists use Excel to generate growth graphs of country’s economy.
3) Statistics: Statisticians use Excel to calculate probability of different conditions of the
market.

ix- What are the advantages of protecting an Excel worksheet?


Ans: Following are the advantages of protecting an Excel worksheet:
a. When a worksheet is protected, other users can only view the information in it but
changes cannot be made.
b. When a worksheet is protected, a user can limit which cells can be used for data entry.
x- How graphical representation of spreadsheet data can be helpful in business?

Ans: Graphical representation can create a clearer picture/understanding of spreadsheet data. It al-
lows business management to incorporate this understanding into analysis and future planning.

ii. Why digital signals are used in computer systems?

Ans: Digital signals are used in computer systems because computers can understand and work only
with digital form. These signals also provide:

 high transmission speed


 low error rates
 high efficiency
iii. Name the properties of a good communication system?

Ans: Characteristics of a good communication system: Following are the properties of a good
communication system:

 Delivery: The system must deliver the message to the correct destination.
 Accuracy: The system must deliver the message accurately without any change.
 Timeliness: The system must deliver the data without significant delay in a timely manner.
iv. Give any three reasons why guided communication medium is more reliable than un-
guided medium?

Ans: Guided communication medium is more reliable than unguided medium due to following rea-
sons:

 Guided communication medium uses cabling system that guides the data signals along a spe-
cific path.
 It is more secure medium as compared to unguided medium.
 It provides higher data transmission speed than unguided medium.
Q 2: Write short answers of the following questions.
i. Describe any three difficulties a company may face in running a business without having
computer network?

Ans: Following are three difficulties a company may face in running a business without having
computer network:

1) Exchange of information among employees (computer users) will not be possible.


2) It will not be possible to share resources.
3) Separate Internet connection will be required for each computer.
4) Separate copy of same software will have to be purchased for each computer.

vii. Why star topology is more reliable than bus or ring topologies?

Ans: Star topology is more reliable than bus or ring topology in the following ways:

 It provides fast transmission between computers.


 It is easy to maintain and modify.
 It is easy to connect new devices to the network in star topology.
 It is easy to detect and fix faults in star topology.
 In star topology, failure of one computer does not stop functioning of the entire network.
viii. Mention any three problems which may occur if peer-to-peer network is used for a large
number of users in an organization?

Ans: Following are the three problems which may occur if peer-to-peer network is used for a large
number of users in an organization:

1) It will be difficult to manage large peer-to-peer networks.


2) It will slow down the performance of the user.
3) There will be more security issues.

vi. Which authentication methodology provides highly secure identification and verifica-
tion? Justify your answer.

Ans: Biometrics provides highly secure identification and verification because of the following
reasons:

 It provides more accurate authentication than using username and password or Personal
Identification Number (PIN).
 Biometrics is associated with a particular individual that is why it cannot be borrowed, sto-
len or forgotten.
 Forging in biometrics is practically impossible.
vii. What is meant by information privacy?
Ans: Information Privacy: It is referred to an individual’s right to the privacy of personal infor-
mation. People are concerned that computers may be taking away their privacy.

The Data Protection Act protects the rights of the individuals against misuse of personal infor-
mation by organizations. Organizations that hold the information should not allow unauthorized
people to have access to information or disclose it to anyone outside the organization.

viii. Give any three drawbacks of software piracy?


Ans: Following are three drawbacks of software piracy:

 Illegal copies of software are made for use or sale for financial benefit.
 Prices for software increase.
 Illegal software is usually accompanied with a serious computer virus.
 Pirated/Illegal software is ineligible for updates.
ix. What type of problems may be faced if computer users do not comply with the moral
guidelines of computer ethics?

Ans: Following are problems that may be faced if computer users do not comply with the moral
guidelines of computer ethics:

 Harming other people: Computer may be used to harm other people.


 Hacking: Computer users may break into others’ computer systems to steal, change or de-
stroy information.
 Malicious Software: Computer experts may create malicious software and spread it.
 Software Piracy: Illegal copies are made and sold.
x. Name any three places where authentication of people is required?

Ans: Following are three places where authentication of people is required:


i. Login to E-mail account
ii. Using ATM card
iii. Activating a new SIM.

v. Define computer ethics and write some important moral guidelines for ethical use of
computer technology?

Ans: Computer Ethics: It means an acceptable behavior for using computer technology. It is a
code of behavior for moral and social issues while using computer technology, particularly Internet.
 Computer user should be honest, respect the rights of others on the Internet and obey laws that
apply to online behavior.
 We should not use bad language while chatting and social networking.
 We should respect others’ views.
 We should not pretend as someone else and fool others.
 We should not download copyrighted material.
 People should not do anything illegal.
Guidelines for Ethical use of computer technology: Following are some important moral guidelines
for ethical use of computer technology:

 Computer users should not use computer to harm others.


 Computer users should respect the privacy of others.
 People should not make illegal copies of copyrighted software and sell it for financial benefit.
 People with professional skills should not develop malicious software/malware and spread it to
other computers.
 Computer users should not read documents and E-mails of other users without their consent.
 Computer users should not break into others’ computer systems to steal, change or destroy in-
formation.
 People should not commit any type of crime using computer technology.

Single-user operating system Multi-user operating system


It allows a single user to login and use
It allows many users to login and use
the computer at a time. a single big computer at the same
time.
It does not allow sharing of computer It allows sharing of computer re-
resources with other computers. sources with other computers over the
network.
It is used in Micro-computers. It is used in Mini-computers and
Mainframe computers.
It requires less memory. It requires large memory.
It does not require a powerful CPU. It requires a powerful CPU.
It does not support time-sharing. It supports time-sharing.
Examples: DOS, Windows 95, Win- Examples: Windows NT, UNIX,
dows 7 etc. LINUX etc.
Analog Signals Digital Signals
Analog signals are in continuous form. Digital signals are not in continuous form.
These signals vary continuously within a These signals switch between two dis-
range. crete, low and high voltage levels.
These signals provide lower transmission These signals provide higher transmission
speed than digital signals. speed than analog signals.
These signals provide higher error rates These signals provide lower error rates
than digital signals. than analog signals.
These signals are slower and less effi- These signals are faster and more efficient
cient than digital signals. than analog signals.

Server Client
It is a main computer in a network that is It is a computer in a network that access-
used to manage network resources and es services made available by a server.
facilitate other computers.
It replies to the requests sent by the cli- It sends requests to the server.
ent.
It can be accessed by multiple clients at a It can be accessed by one user at a time.
time.

LAN WAN
LAN stands for Local Area Network. WAN stands for Wide Area Network.
It is restricted to a limited geographical It covers large geographical area and can
area and can connect computers at one connect computers between cities and
place. countries.
Data transmission speed is fast i.e. from Data transmission speed is slow i.e. from
10 Mbps to 1000 Mbps. 56 Kbps to 50 Mbps.
Data communication problems rarely oc- Data communication problems often oc-
cur in LAN. cur.
Transmission medium is owned by the Transmission medium is leased lines or
user organization. public systems such as telephone lines or
satellite links.
LAN is used to share files and hardware WAN is used to share only data and in-
like scanner, printer, modem etc. formation like file transfer and E-mail.

S-ar putea să vă placă și