Showing posts with label CS101. Show all posts
Showing posts with label CS101. Show all posts

Monday, October 25, 2010

CS101 Assignment # 1 Solution

Differentiate Between Static RAM and Dynamic RAM in Tabular form. ANY TWO Differences

( 2.5 + 2.5 = 5)

SRAM (static RAM). This type of memory maintains data in storage as long as it is powered. Because it is faster and more reliable and expensive than DRAM, SRAM is most often used as cache memory. Earlier forms of SRAM were classified as Async or Sync RAM if they were synchronized with the system clock. The most common type of SRAM today is pipeline burst SRAM, which can operate at higher bus speeds.

DRAM (dynamic RAM). This type of RAM retains its data by being continuously rewritten every few milliseconds. Like SRAM, the data in storage is volatile, meaning it is lost when the system is not powered. DRAM is the most common type of expandable company memory in workstations and servers today, but there are several different types of DRAM.

Another Solution:-

Static RAM (SRAM)
1. 4 times more expensive

2. Very low access time

3. Can store ¼ as much

4. Information stored on RS flip-flops

5. No need for refreshing

Dynamic RAM (DRAM)
1. Low cost

2. Consumes less power

3. Can store 4 times as much

4. Information stored on FET transistors

5. Needs to be refreshed

Another Solution:-

STATIC RAM vs DYNAMIC RAM

Firstly we anxious with static RAM

1)it does not loose signal strength.

2)no refreshing.

3)They made of transistors.

Where as Dynamic RAM

1)looses its signal 1 becomes 0

2)periodic refreshing of memory is needed.

3)These are mostly made of capacitors

Friday, July 2, 2010

CS101 Assignment # 5 Solution

Q.1 XYZ is an organization, wants to develop the network. Total numbers of computers are 7. Which topology is best suitable for the network? Justify your answer. 4 Marks
Answer:
Bus is a possible selection for networking of 7 computers due to following:
 No server required.
 If one node is down, the overall functionality of network is not affected.
 All computers can receive the message at same time and respond accordingly.

Q.2 If computer A wants to transmit the data to computer F, then 6 Marks
What condition should A satisfy?
What protocol should be used?
And how the data will transmit?

Answer:
1. 1st Part (Conditions):
 Data transmission may be counter clockwise.
 Nodes should not fail during the process.
2. 2nd Part (Protocol):
 Sensing idle connection before data transmission.
 Re-send data if packet data is corrupted or lost.
3. 3rd Part (Data transmission):
 Data is transmitted by computer A and received by computer H.
 Computer H receives it and then re-sends it to next computer which is computer H.
 Computer H also receives it and finds it to be not related to computer
H. Therefore, it passes the data to next computer which is F.
 Computer F receives the data and processes it.

Monday, June 21, 2010

CS101 Assignment # 4 Solution

Solution:Pseudocode:


The following can help explain the concept of algorithms in relation to programming.
Problem: Calculate the average of three given numbers.
Let the given numbers be a, b, c
Step 1: Set aside memory for all values (a, b, c,)
Step 2: Assign the values to a memory location (the given numbers)
Step 3: Calculate the average of the values using the formula (a+b+c)/3
Step 4: Display the answer in the proper format, in this case the average.

The problem statement is programmatically solved with the use of four steps in the algorithm.
Problem:Find the gain or loss of an item, as the case may be, and compute the gain or loss percentage, given the cost price and the selling price.
Gain = S.P. (sell price) - C.P (cost price).
Gain % = (Gain * 100)/C.P.
Loss = C.P. - S.P.
Loss % = (Loss * 100)/C.P.
(Percentage gain or loss is calculated on the C.P.)

Algorithm:
Step 1: Obtain the values of S.P. and C.P. Set aside memory for S.P. and C.P., gain percent and loss percent.
Step 2: Assign values to memory location.
Step 3: Perform mathematical computations.
Step 4: Display results in the proper format.

If C.P. = S.P, then
Declare "There is neither gain nor loss in the transaction"
Stop
If S.P. > C.P., then
Calculate Gain = S.P - C.P
Calculate Gain % = (Gain * 100)/C.P
Write "Answer: Gain is $" followed by value of Gain
Write "Answer: Gain % is" followed by value of Gain %
Stop
Else

Calculate Loss = C.P. - S.P
Calculate Loss % = (Loss * 100)/C.P.
Write "Answer: Loss is $" followed by value of Loss
Write "Answer: Loss % is" followed by values of Loss %
Stop
The algorithm is executed in order, starting with Step 1:
In step 1, we set aside memory locations for S.P. and C.P
In step 2, we assign the numerical values of S.P. and C.P. to the memory locations.

In step 3, the answer to the phrase If C.P. - S.P. could be yes or no. If the answer is yes, then only the instructions following the word "then" are executed.

In step 3, if the answer to the phrase S.P. > C.P. is yes, then steps to a to e before else are executed. If the answer to S.P. > C.P. is no, implying that C.P. >= S.P., steps a to e after else are executed.

Step 4 is the last in the process. The result of the computations is displayed and the algorithm is terminated after its execution.

Words such as "IF", "THEN", and "ELSE are used to emphasize their distinctive nature in executing the algorithm.

Flowcharts

When thinking of a Flowchart think of a visual representation of how a process works, depicting the sequence of steps at a minimum. A flowchart offers many advantages including the following.

Helps locate the key elements of a process. It draws clears lines between the end of one process and the start of another.

Brings clarity and improvement to a process.
Helps identify appropriate areas for improvement in a program.
The following shows a format of a sample flowchart that identifies the starting and ending points of a sequential process with decision points.



Pseudocode, aka false code, is an informal language for relating problem solving steps. The steps used in pseudocode are simple and can be implemented with ease into any programming language. Pseudocode uses a combination of English words, mathematical notations, and a set of capitalized keywords such as BEING, END, READ, PRINT, FREAD, FPRINT, IF, ELSE, ELSEIF, ENDIF, WHILE, DO and ENDWHILE.

Pseudocode consists of:
Fundamental control structures such as Sequence, Selection and Repetition.
Three other types of statements, which include Input, Output and Assignment.
Subroutines or small programs that can be added to modularize pseudocode. The subroutines are also written using the pseudocode notation.

Here is an example of pseudocode.
Begin procedure
Input Widget Price
Taxes = 0.06 x Widget Price
Amount Due = Widget Price + Taxes
Output Taxes and Amount Due
End procedure
The following shows the flowchart of gain and loss for a business.

Flowcharts depict different types of actions and steps in a process through special shapes. The sequence of steps and the relationships between these steps is shown using arrows. The following is a list of the different shapes in a flow chart and what they represent.






Wednesday, May 26, 2010

CS101 Paper

CS101 Introduction To Computer: 26-05-2010

Total Question: 23

16 Objectives and 7 Subjective Questions:

Q1. what is vector graphics and bit-mapped graphics?(5marks)

Q2. write down five tips to write good pseudocode ?(5marks)

Q3. MAIL ME  is above code is correct ?if not then correct it (2marks)

Q4.what concept was used in computing before operating system ?(2marks)

Q5.what are the three methods of "window" object?(3marks)

(not the exact one but seems like it to some extent )

Q6. in SW development life cycle what is the purpose of concept and feasibility ?(2marks)

Q.7 which is the best practice for embedding javascript in page?

Thursday, April 22, 2010

CS101

Question No. 1


Ali is a manager in a multi-national organization. As part of his job, he needs to interact and provide updates of his work to the head office on regular basis, which input/output devices can he use to complete his daily tasks? (Marks 2)



Answer:-



Input:

1-Keyboard

2-Webcam

3-Mouse

4-Microphone

5-Scanner



Output:

1-Printer

2-Monitor

3-Speakers







Question No. 2

How WebPages are different from a website? (Marks 2)

Note: List down two most important differences in this regard.



Answer:-

A website is a collection of one or more web pages designed to convey information on a particular subject or theme to a web user. (e.g. a company will have a web site providing structured information about the company, designed to inform particular groups of its stakeholders - investors, customers, technical support, sales, employment, news items etc.)

A web page is one screen full of information (from a web site) that may contain links to other pages in the web site or links to external information. The web page will normally be written as (or rendered as) an HTML document

Tuesday, February 9, 2010

CS101

Cyber Crime:-
Cyber crime is criminal activity done using computers and the Internet. This includes
anything from downloading illegal music files to stealing millions of dollars from online
bank accounts. Cyber crime also includes non-monetary offenses, such as creating and
distributing viruses on other computers or posting confidential business information on
the Internet.
OR
Issues surrounding computer crime have become high-profile, particularly those
surrounding hacking, copyright infringement, child pornography, and child grooming.
There are also problems of privacy when confidential information is lost or intercepted,
lawfully or otherwise.
Two Types of Cyber Crime…
Computer crime encompass a broad range of potentially illegal activities. Generally,
however, it may be divided into one of two types of categories:
(1) crimes that target computer networks or devices directly;
(2) crimes facilitated by computer networks or devices, the primary target of which is
independent of the computer network or device.
Examples of crimes that primarily target computer networks or devices would include,
• Malware (malicious code)
• Denial-of-service attacks
• Computer viruses
Examples of crimes that merely use computer networks or devices would include,
• Cyber stalking
• Fraud and identity theft
• Phishing scams
• Information warfare
More Examples…..
*Fraud achieved by the manipulation of computer records.
* Spamming wherever outlawed completely or where regulations controlling it
are violated.
* Deliberate circumvention of computer security systems.
* Unauthorized access to or modification of
o programs (see software cracking and hacking).
o data.
* Intellectual property theft, including software piracy.
* Industrial espionage by means of access to or theft of computer materials.
* Identity theft where this is accomplished by use of fraudulent computer
transactions.
* Writing or spreading computer viruses or worms.
* Salami slicing is the practice of stealing money repeatedly in extremely small
quantities
* Denial-of-service attack, where company websites are flooded with service
requests and their website is overloaded and either slowed or crashes completely
* Making and digitally distributing child pornography
Now take Examples which one u like and give very briefly
the methods that can be used to minimize the ill effects of
listed crimes.

Thursday, January 28, 2010

CS101 GDB

CS101 GDB:

Definition of Distance Learning:
"Distance learning or education is a field of education that focuses on the pedagogy and andragogy, technology and instructional systems design that aim to deliver education to students who are not physically "On site"
WEB TECHNOLOGY ROLE IN DISTANCE LEARNING:
"Distance learning has received a boost due to the low price of internet communication and the availability of web-based interactive content."
The students who want to continue their jobs with their current jobs this is very convenient option available to them. Physical locating is less of hindrance now. We are turning more and more toward online resources of information
Example:
VU institute is the best example and it better explains the web technology role in distance learning because:
.
VU student are not take lectures through physically teacher presence.
.All their dealings, papers, assignments, quizzes are taken from the student through web technology.
.Students can interact with the other students and the teachers with the help of internet which is actually web technology.

Saturday, December 19, 2009

CS101 Paper

MIDTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing s2
Question No: 1 ( Marks: 1 ) - Please choose one
Human are better than computers at:
► Efficiency
► Accuracy
Pattern recognition
► None of the given choices

Question No: 2 ( Marks: 1 ) - Please choose one
Cray-1 was first commercial _________ computer
Super
► Mini
► Micro
► Personal

Question No: 3 ( Marks: 1 ) - Please choose one
URL is a/an ________
► Device
► Component
Address
► Tool

Question No: 4 ( Marks: 1 ) - Please choose one
Mainframe Computers are also called _____
Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers

Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is NOT a category of Mobile Computers?
► Laptop
► Palmtop
Desktop
► Wearable

Question No: 6 ( Marks: 1 ) - Please choose one
Preliminary exploration of possible solutions, technologies, suppliers is called

► Viability
Feasibility
► Specification
► Integration

Question No: 7 ( Marks: 1 ) - Please choose one
__________ give us the ability to manipulate data through reference instead of actual value.

► Constants
Variables
► Data Types
► Operators

Question No: 8 ( Marks: 1 ) - Please choose one
Consider the following statement written in JavaScript:
str = ”Hello” + ” World”

What will be the value of str ?
HelloWorld
► Hello World

► Hello + World
► It will result in error

Question No: 9 ( Marks: 1 ) - Please choose one
A tool that helps you to find the synonyms is called ______________.

► Language
► Paragraph
Thesaurus
► Symbol

Question No: 10 ( Marks: 1 ) - Please choose one
Communication protocol is a __________that governs the flow of information over a network
► Set of protocols
Set of rules
► Device
► Set of methods

Question No: 11 ( Marks: 1 ) - Please choose one
If a computer could pass the Turing test then it would be able to:
think like human beings
► do the things faster
► win a million dollar prize
► store more information

Question No: 12 ( Marks: 1 ) - Please choose one
The first Web browser with a GUI was generally available in:
► 1992
1993
► 1994
► 1995

Question No: 13 ( Marks: 1 ) - Please choose one
Web is a unique invention by humans in terms that it is:
► accessible to only the owners who control it
► accessible from particular locations only
accessible to all humans
► accessible to only the educational institutes

Question No: 14 ( Marks: 1 ) - Please choose one
In this URL http://www.msn.com , _____identifies the domain name
► http
► www
msn
► com

Question No: 15 ( Marks: 1 ) - Please choose one
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
► Freeware
► Shareware
Firewire
► Firmware

Question No: 16 ( Marks: 1 ) - Please choose one
Which of the following is NOT supported by PC's power supply.
► -12 and +12 V DC
► -10 and +10 V DC
► -5 and + 5 V DC
► All are supported

Question No: 17 ( Marks: 1 ) - Please choose one
In which case Cache Memory is used
► To increase RAM speed
To overcome BUS speed
► To overcome Speed rate between RAM and CPU
► To overcome CPU speed

Question No: 18 ( Marks: 1 ) - Please choose one
To display a single line text area on the web page, we use ___ tag
► TEXT
► TEXTBOX
INPUT
► INPUTBOX

Question No: 19 ( Marks: 1 ) - Please choose one
If an algorithm is syntactically correct, but semantically incorrect then this situation is
► Very good situation
Very dangerous situation
► Not very bad
► Neutral situation

Question No: 20 ( Marks: 1 ) - Please choose one
Users communicate with the computer using a consistent user interface provided by the OS.
True
► False

Question No: 21 ( Marks: 1 ) - Please choose one
Application developers do not need to know much about the HW, especially the microProcessor, while they are developing their application.
True
► False

Question No: 22 ( Marks: 1 ) - Please choose one
The first spread sheet program was invented by
► Charles Babbage
Dan Bricklin
► Paul Graham
► John von Neumann

Question No: 23 ( Marks: 1 ) - Please choose one
Which representation technique of algorithm is more suitable for developer to make actual code___________.


pseudo code
► flow chart

► both pseudo code and flow chart

► Heuristics



Question No: 24 ( Marks: 1 ) - Please choose one
_____________ is used to terminate all JavaScript statements.
► Colon
Semicolon
► Underscore
► Apostrophe

Question No: 25 ( Marks: 1 ) - Please choose one
In java script cookies can be created for future use_____.


► Easily

► No facility at all

► This is not possible without Java language.
Cookies are files so java script can not handle it.

Question No: 26 ( Marks: 1 ) - Please choose one
When the microprocessor desires to look at a piece of data, it checks in the __________ first.
► RAM
► ROM
► hard disk
cache


Question No: 27 ( Marks: 1 )
What is the basic difference between 'magnetic tapes' and 'floppy disks' ?


Question No: 28 ( Marks: 1 )
What was the name of first microprocessor built by Intel ?




Question No: 29 ( Marks: 2 )
What was the name of first super computer. When it was introduced?

Question No: 30 ( Marks: 3 )
Write a short note on blue pacific Super Computer.

Question No: 31 ( Marks: 5 )
What are JavaScript literal and what are its types?


Question No: 32 ( Marks: 5 )
Can you say that URL and semantic web sites are same? Justify your answer by defining the both terms?