bca-611

6

Click here to load reader

Upload: naveen-chandra

Post on 26-Mar-2015

72 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BCA-611

Course Title : Fundamentals and PC Software

There are five questions in this assignment. Answer all the questions. You may use illustrations and

diagrams to enhance explanations.

Question 1: Explain the memory hierarchy. Give characteristics of group of memory at each level.

Hint: The term memory hierarchy is used in the theory of computation when discussing performance issues in

computer architectural design, algorithm predictions, and the lower level programming constructs such as

involving locality of reference. A 'memory hierarchy' in computer storage distinguishes each level in the

'hierarchy' by response time. Since response time, complexity, and capacity are related, the levels may also be

distinguished by the controlling technology.

The many trade-offs in designing for high performance will include the structure of the memory hierarchy, i.e.

the size and technology of each component. So the various components can be viewed as forming a hierarchy of

memories (m1,m2,...,mn) in which each member mi is in a sense subordinate to the next highest member mi-1

of the hierarchy. To limit waiting by higher levels, a lower level will respond by filling a buffer and then

signaling to activate the transfer.

There are four major storage levels.

Internal – Processor registers and cache.

Main – the system RAM and controller cards.

On-line mass storage – Secondary storage.

Off-line bulk storage – Tertiary and Off-line storage.

This is a most general memory hierarchy structuring. Many other structures are useful. For example, a paging

algorithm may be considered as a level for virtual memory when designing a computer architecture.

Question 2: .Explain the differences between followings:

i) Compiler and interpreter

Hint:

An interpreter translates some form of source code into a target representation that it can immediately execute

and evaluate. The structure of the interpreter is similar to that of a compiler, but the amount of time it takes to

Page 2: BCA-611

www.solutioncab.com (A complete solution site)

produce the executable representation will vary as will the amount of optimization. The following diagram

shows one representation of the differences.

Compiler characteristics:

spends a lot of time analyzing and processing the program

the resulting executable is some form of machine- specific binary code

the computer hardware interprets (executes) the resulting code

program execution is fast

Interpreter characteristics:

relatively little time is spent analyzing and processing the program

the resulting code is some sort of intermediate code

the resulting code is interpreted by another program

program execution is relatively slow

The above characteristics are typical. There are well-known cases that are somewhere in between, such as Java

with it's JVM.

ii) Spooling and buffering

Hint:

Page 3: BCA-611

www.solutioncab.com (A complete solution site)

Spooling Buffering

1. spooling is the process in which

there is a overlapping of output

device and input device on the

particular data.

2. Spooling means execution of one

program and output will be the

another program.

3. Buffer is a memory which stores

data faster so processed data is put

into the buffer for use of slow

device which can access it later.

4. Buffering means there is execution

of one program and output will be

the same program

iii) Message switching and Circuit switching

Hint:

Circuit switching Message switching

A circuit switching network physically

changes the connection before it sends a

message. this would be like the old pulse

phone relay system. . When you spun the

dial on your phone for each number, there

would be a switch that would physically

move at the other end of the line. Each

number switched you to a different set of

switches which would in turn combine to

make a physical route to your destination.

A message switching network is which

modern phone systems and computers use

to communicate. Most computers use a

"Store and Forward" type of switching.

Once a network switch receives a message,

it stores the entire message in memory,

then sends it towards its destination. With

message switching, there is no physical

switching of the wires. All wires are

connected to a processor which determines

how to handle the message.

Question 3: (a) What is ISDN? Explain various services provided by ISDN.

Hint: ISDN (Integrated Services Digital Network) is an all digital communications line that allowsr the

transmission of voice, data, video and graphics, at very high speeds, over standard communication lines. ISDN

provides a single, common interface with which to access digital communications services that are required by

varying devices, while remaining transparent to the user. Due to the large amounts of information that ISDN

lines can carry, ISDN applications are revolutionizing the way businesses communicate.ISDN is not restricted

to public telephone networks alone; it may be transmitted via packet switched networks, telex, CATV networks,

etc

Basic Rate Interface

The entry level interf e Basic(s) Rate Interface (BRI), a 128 kbit/s service delivered over a pair of standard

telep hone copper wires. The 144 kbit/s payload rate is broken down into two 64 kbit/s bearer channels ('B'

channels) and one 16 kbit/s signaling

channel ('D' channel or delta channel). This is sometimes referred to as 2B+D.

Primary Rate Interface

The other ISDN access available is the Primary Rate Interface (PRI), which is carried over an E1 (2048 kbit/s)

in most parts of the world. An E1 is 30 'B' channels of 64 kbit/s, one 'D' channel of 64 kbit/s and a timing and

alarm channel of 64 kbit/s. In North America PRI service is delivered on one or more T1 carriers (often referred

to as 23B+D) of 1544 kbit/s (24 channels).

Signaling channel

The signaling channel (D) uses Q.931 for signaling with the other side of the link.

X.25

Page 4: BCA-611

www.solutioncab.com (A complete solution site)

X.25 can be carried over the B or D channels of a BRI line, and over the B channels of a PRI line. X.25 over the

D channel is used at many point-of-sale (credit card) terminals because it eliminates the modem setup, and

because it cts to the central system over a B channel, thereby eliminating the need for modems and making

much better use of the central system's telephone lines.

Consumer and industry perspectives

There are two points of view into the ISDN world. The most common viewpoint is that of the end user, who

wants to get a digital connection into the telephone/data network from home, whose performance would be

better than an ordinary analog modem connection.

SDN and broadcast industry

ISDN is used heavily by the broadcast industry as a reliable way of switching low latency, high quality, long

distance audio circuits.

India

Bharat Sanchar Nigam Limited, Reliance Communications and Bharti Airtel, are the largest communication

service providers, offers both ISDN BRI and PRI services across the country. Reliance Communications and

Bharti Airtel uses the DLC technology for providing these services. With the introduction of broadband

technology, the load on bandwidth is being absorbed by ADSL. ISDN continues to be an important backup

network for point-to-point leased line customers such as banks, Eseva Centers, Life Insurance Corporation of

India, and SBI ATMs

Data channel

The bearer channel (B) is a standard 64 kbit/s voice channel of 8 bits sampled at 8 kHz

with G.711 encoding. B-Channels can also be used to carry data, since they are nothing more than digital

channels.

(b) What is computer virus? What are different types of computer virus? Explain how you can protect your

machine from computer viruses.

Hint: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is

also commonly but erroneously used to refer to other types of malware, including but not limited to adware and

spyware programs that do not have the reproductive ability. A true virus can spread from one computer to

another (in some form of executable code) when its host is taken to the target computer; for instance because a

user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD,

DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a

network file system or a file system that is accessed by another computer.

Type of computer virus.

Nonresident viruses

Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder

module is responsible for finding new files to infect. For each new executable file the finder module encounters,

it calls the replication module to infect that file.

Resident viruses

Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses.

This module, however, is not called by a finder module.

How to protect from virus

The first thing you can do is download or purcha se an anti-virus software. The top tow recommended anti virus

programs are Mcafee, kespersky and Norton etc. They can get pricey, If you find that money is an issue there

are free, and consequently less secure types of protection, available from various sites on the web. One of the

top recommendedfree programs is AVG anti-virus available from download.com . Most current virus scanners

and removers, purchased or free, can scan your hard drive. If viruses are found then most scanners quarantine

Page 5: BCA-611

www.solutioncab.com (A complete solution site)

the virus, keeping it in a special place until you decide what to do with it.(Delete the file or repair it, which then

the program attempts to delete the virus from within the file without deleting it. If the virus you happen to have

is real disastrous, meaning it infects hundreds or thousands of files, keeps popping up after you've quarantined it

x amount of times, or it keeps deleting key files, then your last resort is to reformat the entire hard drive

including any second hard drives or partitions. In most cases reformatting gets rid of everything on the drive

which can save the computer. Although in most cases when reformatting has to be done any files you want have

to be backed up, although there can be cases your drive may be too infected and it can be too risky to save any

files. However, if viruses invade the boot sector of the drive and infect it, then the simple task of instructing to

boot from the cd-drive first may be impossible since the BIOS may get screwed up as well.

Question 4: Explain how you will handle following problems

(i) You have to insert header and footer in presentation.

Hint: In MS PowerPoint 2007 :- go to Insert tab and choose “Header & Footer”

In MSPowerPoint 2003 :- go to View menu and choose “Header and Footer….”

(ii) You need to perform mail merge

Hint: Step 1: Write or create your message in Word new documents.

Then to begin the Mail Merge follow the steps:

MSword 2003: Tools > Letters and Mailings > Mail Merge

MSWord 2007: Mailings > Start Mail Merge > Step by Step Mail Merge Wizard

Step 2: Navigate to your database.

If you want to use the document you are currently in select; Use the current document.

If you have another saved word file you’d like to use select; Start from existing document and then navigate to

that file.

since we’re already in the document we want to use just move on and click Next: Select recipients at the bottom

of the banner.

now select the people whom we want to send our letter / email. Select; Use an existing list. Click on browse

Step 3: Select your database and recipients.

When your database is selected a window similar to the one above (yours will have different values in it), will

appear (if this doesn’t happen, you haven’t set up your database correctly).

Step 4: Edit your recipients.

The following screen (above) will appear with all of your data fields selected. Now is the

time to add or remove recipients. Uncheck the ones you don’t want to print/send and click

OK.

Step 5: Inserting your merge fields (personalization)

Move the cursor on your letter/email to the place you want to insert the merge field. Click merge

Step 6: Preview your results and print or open in new document

(iii) You need to insert calendar in your presentation

Hint:Step1. 2003/2007 :- Choose Object from Insert menu/tab.

Step2. 2003/2007 :- Choose Create new and select Microsoft Office Word

Step3. 2003 :- in Word’s menu choose Table Insert >Autoformat > select appropriate calander table

Step3. 2007 :- in Word’s tab choose Quick tables fro m Table from Insert tab > select appropriate calendar

table

(iv) You need to share a newly created folder with other users.

ght Click on folder choose “Sharing and Securities…” Step1. XP/Win7 :- Ri

tep2. XP/Win7 :- Check on “Share this folder on the network” S

Page 6: BCA-611

www.solutioncab.com (A complete solution site)

Step3. XP/Win7 :- Check on “Allow network users to change my file” if you want to allow users to

editing is the folder

(v) You to change printer settings

Hint:Win XP/Windows7 :- 1. choose Printer and Faxes from Control Panel.

2. Select printer

3. Choose properties from it’s right click menu

4. Adjust your appropriate settings

Question 5: (a) Explain how graph is created in MS-Word.

Hint:2003: Choose Chart from Insert menu or click Chart Icon on Standard Toolbar

2007:- Choose Char from Insert Tab

Follow these steps to create a graph, such as a bar chart or a pie chart.

1. On the Insert menu, click Object, and then click the Create New tab.

2 In the Object type box, click Microsoft Graph Chart, and then click OK.

Microsoft Graph displays a chart and its associated sample data in a tab le called a datasheet

3. To replace the sample data, click a cell on the datasheet, and then type the new text or

numbers. If needed, you can import data from a text file, a Lotus 1-2-3 file, or a Microsoft Excel worksheet.

You can also copy data from another program.

4. To return to Microsoft Word, click the Word document.

NOTE If you close the datasheet you can reopen it by double-clicking the chart and then clicking Datasheet

on the View menu.

(b) What are Macros? Write steps for recording, running and editing macros, with the help of an example.

Hint: A macro is a shortcut to a task you do repeatedly. Think about the Centre align operation. You first

highlight the word you want centred, then click the centre icon in the toolbar. Thisis a macro. It's the short way

of performing the centre task.

• Open a new Word document

• From the menu bar, click on Tools

• From the drop down menu click on Macro

• A sub menu appears

• Click on Record New Macro

When you click on Record New you get the Macro dialogue box popping up. The reason the little floating

toolbar says Stop is because your macro is already being recorded. The process has started. You don't have to

panic, and hurry it along. Take your time and think about what you're going to do.

o Type “Hello World”

o Click the Stop button on your floating Macro Recorder

o The macro will stop recording, and the process is finished: You have recorded the Macro

o Choose Run from Macro from Tools menu