Monday, November 15, 2010
CS101 Assignment # 2 Solution
Download the Link: File name: CS101 Assignment # 2 Solution.doc
File size:1.24 MB
Monday, October 25, 2010
CS101 Assignment # 1 Solution
( 2.5 + 2.5 = 5)
SRAM (static RAM). This type of memory maintains data in storage as long as it is powered. Because it is faster and more reliable and expensive than DRAM, SRAM is most often used as cache memory. Earlier forms of SRAM were classified as Async or Sync RAM if they were synchronized with the system clock. The most common type of SRAM today is pipeline burst SRAM, which can operate at higher bus speeds.
DRAM (dynamic RAM). This type of RAM retains its data by being continuously rewritten every few milliseconds. Like SRAM, the data in storage is volatile, meaning it is lost when the system is not powered. DRAM is the most common type of expandable company memory in workstations and servers today, but there are several different types of DRAM.
Another Solution:-
Static RAM (SRAM)
1. 4 times more expensive
2. Very low access time
3. Can store ¼ as much
4. Information stored on RS flip-flops
5. No need for refreshing
Dynamic RAM (DRAM)
1. Low cost
2. Consumes less power
3. Can store 4 times as much
4. Information stored on FET transistors
5. Needs to be refreshed
Another Solution:-
STATIC RAM vs DYNAMIC RAM
Firstly we anxious with static RAM
1)it does not loose signal strength.
2)no refreshing.
3)They made of transistors.
Where as Dynamic RAM
1)looses its signal 1 becomes 0
2)periodic refreshing of memory is needed.
3)These are mostly made of capacitors
Friday, July 2, 2010
CS101 Assignment # 5 Solution
Answer:
Bus is a possible selection for networking of 7 computers due to following:
No server required.
If one node is down, the overall functionality of network is not affected.
All computers can receive the message at same time and respond accordingly.
Q.2 If computer A wants to transmit the data to computer F, then 6 Marks
What condition should A satisfy?
What protocol should be used?
And how the data will transmit?
Answer:
1. 1st Part (Conditions):
Data transmission may be counter clockwise.
Nodes should not fail during the process.
2. 2nd Part (Protocol):
Sensing idle connection before data transmission.
Re-send data if packet data is corrupted or lost.
3. 3rd Part (Data transmission):
Data is transmitted by computer A and received by computer H.
Computer H receives it and then re-sends it to next computer which is computer H.
Computer H also receives it and finds it to be not related to computer
H. Therefore, it passes the data to next computer which is F.
Computer F receives the data and processes it.
Monday, June 21, 2010
CS101 Assignment # 4 Solution
The following can help explain the concept of algorithms in relation to programming.
Problem: Calculate the average of three given numbers.
Let the given numbers be a, b, c
Step 1: Set aside memory for all values (a, b, c,)
Step 2: Assign the values to a memory location (the given numbers)
Step 3: Calculate the average of the values using the formula (a+b+c)/3
Step 4: Display the answer in the proper format, in this case the average.
The problem statement is programmatically solved with the use of four steps in the algorithm.
Problem:Find the gain or loss of an item, as the case may be, and compute the gain or loss percentage, given the cost price and the selling price.
Gain = S.P. (sell price) - C.P (cost price).
Gain % = (Gain * 100)/C.P.
Loss = C.P. - S.P.
Loss % = (Loss * 100)/C.P.
(Percentage gain or loss is calculated on the C.P.)
Algorithm:
Step 1: Obtain the values of S.P. and C.P. Set aside memory for S.P. and C.P., gain percent and loss percent.
Step 2: Assign values to memory location.
Step 3: Perform mathematical computations.
Step 4: Display results in the proper format.
If C.P. = S.P, then
Declare "There is neither gain nor loss in the transaction"
Stop
If S.P. > C.P., then
Calculate Gain = S.P - C.P
Calculate Gain % = (Gain * 100)/C.P
Write "Answer: Gain is $" followed by value of Gain
Write "Answer: Gain % is" followed by value of Gain %
Stop
Else
Calculate Loss = C.P. - S.P
Calculate Loss % = (Loss * 100)/C.P.
Write "Answer: Loss is $" followed by value of Loss
Write "Answer: Loss % is" followed by values of Loss %
Stop
The algorithm is executed in order, starting with Step 1:
In step 1, we set aside memory locations for S.P. and C.P
In step 2, we assign the numerical values of S.P. and C.P. to the memory locations.
In step 3, the answer to the phrase If C.P. - S.P. could be yes or no. If the answer is yes, then only the instructions following the word "then" are executed.
In step 3, if the answer to the phrase S.P. > C.P. is yes, then steps to a to e before else are executed. If the answer to S.P. > C.P. is no, implying that C.P. >= S.P., steps a to e after else are executed.
Step 4 is the last in the process. The result of the computations is displayed and the algorithm is terminated after its execution.
Words such as "IF", "THEN", and "ELSE are used to emphasize their distinctive nature in executing the algorithm.
Flowcharts
When thinking of a Flowchart think of a visual representation of how a process works, depicting the sequence of steps at a minimum. A flowchart offers many advantages including the following.
Helps locate the key elements of a process. It draws clears lines between the end of one process and the start of another.
Brings clarity and improvement to a process.
Helps identify appropriate areas for improvement in a program.
The following shows a format of a sample flowchart that identifies the starting and ending points of a sequential process with decision points.
Pseudocode, aka false code, is an informal language for relating problem solving steps. The steps used in pseudocode are simple and can be implemented with ease into any programming language. Pseudocode uses a combination of English words, mathematical notations, and a set of capitalized keywords such as BEING, END, READ, PRINT, FREAD, FPRINT, IF, ELSE, ELSEIF, ENDIF, WHILE, DO and ENDWHILE.
Pseudocode consists of:
Fundamental control structures such as Sequence, Selection and Repetition.
Three other types of statements, which include Input, Output and Assignment.
Subroutines or small programs that can be added to modularize pseudocode. The subroutines are also written using the pseudocode notation.
Here is an example of pseudocode.
Begin procedure
Input Widget Price
End procedure
Flowcharts depict different types of actions and steps in a process through special shapes. The sequence of steps and the relationships between these steps is shown using arrows. The following is a list of the different shapes in a flow chart and what they represent.
Wednesday, May 26, 2010
CS101 Paper
Total Question: 23
16 Objectives and 7 Subjective Questions:
Q1. what is vector graphics and bit-mapped graphics?(5marks)
Q2. write down five tips to write good pseudocode ?(5marks)
Q3. MAIL ME is above code is correct ?if not then correct it (2marks)
Q4.what concept was used in computing before operating system ?(2marks)
Q5.what are the three methods of "window" object?(3marks)
(not the exact one but seems like it to some extent )
Q6. in SW development life cycle what is the purpose of concept and feasibility ?(2marks)
Q.7 which is the best practice for embedding javascript in page?
Thursday, May 20, 2010
CS101
Download the Link: https://www.filesanywhere.com/fs/v.aspx?v=8971698d60646ea6a5a7
Download the Link: http://sharecash.org/download.php?file=762299
Saturday, May 15, 2010
Monday, May 10, 2010
Thursday, April 22, 2010
CS101
Ali is a manager in a multi-national organization. As part of his job, he needs to interact and provide updates of his work to the head office on regular basis, which input/output devices can he use to complete his daily tasks? (Marks 2)
Answer:-
Input:
1-Keyboard
2-Webcam
3-Mouse
4-Microphone
5-Scanner
Output:
1-Printer
2-Monitor
3-Speakers
Question No. 2
How WebPages are different from a website? (Marks 2)
Note: List down two most important differences in this regard.
Answer:-
A website is a collection of one or more web pages designed to convey information on a particular subject or theme to a web user. (e.g. a company will have a web site providing structured information about the company, designed to inform particular groups of its stakeholders - investors, customers, technical support, sales, employment, news items etc.)
A web page is one screen full of information (from a web site) that may contain links to other pages in the web site or links to external information. The web page will normally be written as (or rendered as) an HTML document
Tuesday, February 9, 2010
CS101
Cyber crime is criminal activity done using computers and the Internet. This includes
anything from downloading illegal music files to stealing millions of dollars from online
bank accounts. Cyber crime also includes non-monetary offenses, such as creating and
distributing viruses on other computers or posting confidential business information on
the Internet.
OR
Issues surrounding computer crime have become high-profile, particularly those
surrounding hacking, copyright infringement, child pornography, and child grooming.
There are also problems of privacy when confidential information is lost or intercepted,
lawfully or otherwise.
Two Types of Cyber Crime…
Computer crime encompass a broad range of potentially illegal activities. Generally,
however, it may be divided into one of two types of categories:
(1) crimes that target computer networks or devices directly;
(2) crimes facilitated by computer networks or devices, the primary target of which is
independent of the computer network or device.
Examples of crimes that primarily target computer networks or devices would include,
• Malware (malicious code)
• Denial-of-service attacks
• Computer viruses
Examples of crimes that merely use computer networks or devices would include,
• Cyber stalking
• Fraud and identity theft
• Phishing scams
• Information warfare
More Examples…..
*Fraud achieved by the manipulation of computer records.
* Spamming wherever outlawed completely or where regulations controlling it
are violated.
* Deliberate circumvention of computer security systems.
* Unauthorized access to or modification of
o programs (see software cracking and hacking).
o data.
* Intellectual property theft, including software piracy.
* Industrial espionage by means of access to or theft of computer materials.
* Identity theft where this is accomplished by use of fraudulent computer
transactions.
* Writing or spreading computer viruses or worms.
* Salami slicing is the practice of stealing money repeatedly in extremely small
quantities
* Denial-of-service attack, where company websites are flooded with service
requests and their website is overloaded and either slowed or crashes completely
* Making and digitally distributing child pornography
Now take Examples which one u like and give very briefly
the methods that can be used to minimize the ill effects of
listed crimes.
Monday, February 1, 2010
Thursday, January 28, 2010
CS101 GDB
CS101 GDB:
Definition of Distance Learning:
"Distance learning or education is a field of education that focuses on the pedagogy and andragogy, technology and instructional systems design that aim to deliver education to students who are not physically "On site"
WEB TECHNOLOGY ROLE IN DISTANCE LEARNING:
"Distance learning has received a boost due to the low price of internet communication and the availability of web-based interactive content."
The students who want to continue their jobs with their current jobs this is very convenient option available to them. Physical locating is less of hindrance now. We are turning more and more toward online resources of information
Example:
VU institute is the best example and it better explains the web technology role in distance learning because:
.
VU student are not take lectures through physically teacher presence.
.All their dealings, papers, assignments, quizzes are taken from the student through web technology.
.Students can interact with the other students and the teachers with the help of internet which is actually web technology.
Saturday, January 23, 2010
CS101
Download this link: http://sharecash.org/download.php?file=317244
Download this link: https://www.filesanywhere.com/fs/v.aspx?v=896f6a86596773b56b6d
Download the link: http://www.4shared.com/file/205763711/4388da95/cs101_assignment2.html
Saturday, December 19, 2009
CS101 Paper
Fall 2009
CS101- Introduction to Computing s2
Question No: 1 ( Marks: 1 ) - Please choose one
Human are better than computers at:
► Efficiency
► Accuracy
► Pattern recognition
► None of the given choices
Question No: 2 ( Marks: 1 ) - Please choose one
Cray-1 was first commercial _________ computer
► Super
► Mini
► Micro
► Personal
Question No: 3 ( Marks: 1 ) - Please choose one
URL is a/an ________
► Device
► Component
► Address
► Tool
Question No: 4 ( Marks: 1 ) - Please choose one
Mainframe Computers are also called _____
► Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is NOT a category of Mobile Computers?
► Laptop
► Palmtop
► Desktop
► Wearable
Question No: 6 ( Marks: 1 ) - Please choose one
Preliminary exploration of possible solutions, technologies, suppliers is called
► Viability
► Feasibility
► Specification
► Integration
Question No: 7 ( Marks: 1 ) - Please choose one
__________ give us the ability to manipulate data through reference instead of actual value.
► Constants
► Variables
► Data Types
► Operators
Question No: 8 ( Marks: 1 ) - Please choose one
Consider the following statement written in JavaScript:
str = ”Hello” + ” World”
What will be the value of str ?
► HelloWorld
► Hello World
► Hello + World
► It will result in error
Question No: 9 ( Marks: 1 ) - Please choose one
A tool that helps you to find the synonyms is called ______________.
► Language
► Paragraph
► Thesaurus
► Symbol
Question No: 10 ( Marks: 1 ) - Please choose one
Communication protocol is a __________that governs the flow of information over a network
► Set of protocols
► Set of rules
► Device
► Set of methods
Question No: 11 ( Marks: 1 ) - Please choose one
If a computer could pass the Turing test then it would be able to:
► think like human beings
► do the things faster
► win a million dollar prize
► store more information
Question No: 12 ( Marks: 1 ) - Please choose one
The first Web browser with a GUI was generally available in:
► 1992
► 1993
► 1994
► 1995
Question No: 13 ( Marks: 1 ) - Please choose one
Web is a unique invention by humans in terms that it is:
► accessible to only the owners who control it
► accessible from particular locations only
► accessible to all humans
► accessible to only the educational institutes
Question No: 14 ( Marks: 1 ) - Please choose one
In this URL http://www.msn.com , _____identifies the domain name
► http
► www
► msn
► com
Question No: 15 ( Marks: 1 ) - Please choose one
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Question No: 16 ( Marks: 1 ) - Please choose one
Which of the following is NOT supported by PC's power supply.
► -12 and +12 V DC
► -10 and +10 V DC
► -5 and + 5 V DC
► All are supported
Question No: 17 ( Marks: 1 ) - Please choose one
In which case Cache Memory is used
► To increase RAM speed
► To overcome BUS speed
► To overcome Speed rate between RAM and CPU
► To overcome CPU speed
Question No: 18 ( Marks: 1 ) - Please choose one
To display a single line text area on the web page, we use ___ tag
► TEXT
► TEXTBOX
► INPUT
► INPUTBOX
Question No: 19 ( Marks: 1 ) - Please choose one
If an algorithm is syntactically correct, but semantically incorrect then this situation is
► Very good situation
► Very dangerous situation
► Not very bad
► Neutral situation
Question No: 20 ( Marks: 1 ) - Please choose one
Users communicate with the computer using a consistent user interface provided by the OS.
► True
► False
Question No: 21 ( Marks: 1 ) - Please choose one
Application developers do not need to know much about the HW, especially the microProcessor, while they are developing their application.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
The first spread sheet program was invented by
► Charles Babbage
► Dan Bricklin
► Paul Graham
► John von Neumann
Question No: 23 ( Marks: 1 ) - Please choose one
Which representation technique of algorithm is more suitable for developer to make actual code___________.
► pseudo code
► flow chart
► both pseudo code and flow chart
► Heuristics
Question No: 24 ( Marks: 1 ) - Please choose one
_____________ is used to terminate all JavaScript statements.
► Colon
► Semicolon
► Underscore
► Apostrophe
Question No: 25 ( Marks: 1 ) - Please choose one
In java script cookies can be created for future use_____.
► Easily
► No facility at all
► This is not possible without Java language.
► Cookies are files so java script can not handle it.
Question No: 26 ( Marks: 1 ) - Please choose one
When the microprocessor desires to look at a piece of data, it checks in the __________ first.
► RAM
► ROM
► hard disk
► cache
Question No: 27 ( Marks: 1 )
What is the basic difference between 'magnetic tapes' and 'floppy disks' ?
Question No: 28 ( Marks: 1 )
What was the name of first microprocessor built by Intel ?
Question No: 29 ( Marks: 2 )
What was the name of first super computer. When it was introduced?
Question No: 30 ( Marks: 3 )
Write a short note on blue pacific Super Computer.
Question No: 31 ( Marks: 5 )
What are JavaScript literal and what are its types?
Question No: 32 ( Marks: 5 )
Can you say that URL and semantic web sites are same? Justify your answer by defining the both terms?