VELAMMAL VIDYALAYA
HIGH SCHOOL COMPARTMENT 2020-2021
FUNDAMENTALS OF COMPUTER- QUESTION BANK
CLASS : IX SUBJECT: Information Technology
I. ANSWER THE FOLLOWING:
1. List the main components of the computer system.
The main components of computer are – CPU,CU,ALU, Primary Memory, Input devices,
Output Devices, and Secondary Storage.
2. Write short notes on serial port and USB port.
Serial port is used to connect external modems or an older computer mouse to the
computer.But today these ports are replaced with USB port.Universal Serial Bus(USB) port
can be used to transfer data, act as an interface for peripherals and even act s a power
supply for devices cnnected to it.
3. What is microprocessor?
A microprocessor is a computer processor on a microchip. It’s sometims called a logic chip.
It is the engine that goes into motion when you turn your computer on. A microprocessor is
designed to perform arithmetic and logic operations that make use of small number
holding areas called registers.
4. What is the function of control unit and ALU?
Control Unit controls all hardware operations that is those of input –output units, storage
and of the processor itself.Arithmetic and Logic Unit(ALU) performs most of fundamental
arithmetic operations, logic operations and comparison operators.
5. How many parts of primary memory are there? Write names.
There are two aprts of primary memory – RAM and ROM.
6. Write the full form for the following: RAM,CD-ROM,EEPROM
RAM-Random Access Memory
CD-ROM Compact Disk – Read OnlyMemory
EEPROM- Electrically Erasable Programmable Read Onlly Memory.
7. Which memory is volatile in nature?
RAM is a volatile memory
8. Write the types of ROM memory.
There are three types of ROM-PROM, EPROM and EEPROM.
9. What is RAM?
RAM is Random Access Memory . RAM chip is made with metal oxide semiconductor.We
can select any location on this chip randomly and we can also use it to store directly ,
retrieve data and instructions.
10. What is PROM?
PROM is Programmable Read Only Memory that can be programmed once.
11. Name two types of RAM.
12. Two types of RAM are Dynamic Random Access Memory(DRAM) and Static Random Access
Memory(SRAM).
13. Define the term ROM.
This is the part of primary memory. In this memory information can only be read. No writing
operation can take place in ROM.
14. Name some basic components that you will find in a motherboard.
The motherboard includes many components such as; the CPU, the BIOS ROM chip, and the
CMOS Setup information, random access memory(RAM), firmware, and internal and
external buses.
15. Name the unit which helps to measure the computer’s processing speed.
The computer’s processing speed is measured in terms of GHz(Giga Hertz)
16. Write four characteristics of a computer.
Four characteristics of a computer are Accuracy, Automation, Reliability and Versatility.
17. Distinguish between digital and analog computer.
A digital computer is a computer that can store and process information in the form of
numbers and digits.Whereas an analog computer is a kind of computer that works with
analog or continuous values.
18. Classify the computer purpose wise.
Computers are classified purpose wise into general and special purpose.
19. Classify the computer size and speed wise.
Computers are classified into micro, mini, mainframe, and super.
20. What is super computer ?
super computer systems are characterized by their very large size and very high processing
speeds generally used for complex scientific applications.
21. What is a software?
software is a of instructions that directs the computer to process information.
22. What is system software?
the software which monitors basic activities of a system is called system software.It
coordinates the complete system hardware and provides an environment or platform for all
the other types of software to work in.For example Microsoft Windows XP, Ubuntu etc
23. What is operating system?
Operating system is the interface between the user and the hardware of the computer.
operating system is a set of programs which manages the resources of the computer,
processes commands, and controls program execution.
24. What is an application software?
The software which is used for specific application is called application software.
25. What are utility software?
Utility programs help manage,maintain and control computer resources. For example Disk
Defragmenter,Antivirus etc
26. What is compiler?
Compiler translates the program written in high level language into machine language.
27. What is Assembler?
Assembler is a language processor which converts the program written in assembly
language into machine language.
28. What is interpreter?
Interpreter is a language processor which converts a HLL program into machine language by
converting it line by line. If there is any error in any line, it reports it at the same time and
program execution cannot resume until the error is rectified.
29. Define kernel
The kernel is the heart of the operating system. It is a collection of programs which
communicate with hardware directly.
30. Define shell
A shell is a command interpreter. It is a program that either process the command you enter
in your terminal emulator or process shell scripts.
31. What is network ?
A network consists of two are more computers that are linked in order to share resources,
exchange files or allow electronic Communications.
32. How are the computers linked with each other in a network?
The computers in hay network may be linked through cables, telephone lines, radio waves,
satellites or infrared light beams.
33. What is LAN?
Local area network is a network that is confined to a relatively small area. It generally
limited to a geographic area such as a writing lab,school or building.
34. What is WAN?
The network which connects to a larger Geographic areas, cities,states and countries or
even continents in the world through cabling or satellite uplinks is called WAN.
35. What is MAN?
Metropolitan Area Network connects multiple geographically nearby LAN's to one another
at high speeds.Thus a MAN lets two remote nodes communicate as if they were part of the
same local area network.A MAN is made from switches or routers connected to one another
with high speed links.
36. What is the purpose of a modem?
Modem is a device that converts analog to digital signals and vice versa.
37. What is NIC?
A network interface card connects your computer to a local data network or the internet.A
network interface card is also known as a network interface controller,network adaptor or
local area network adaptor.
38. Define the term bandwidth. Give any one unit of bandwidth.
Bandwidth refers to the volume of information per unit of time that a transmission medium
can handle. For digital devices the bandwidth is usually expressed in bits per second or
bytes per second. For analog devices the bandwidth is expressed in cycles per second or
Hertz(Hz).
39. What is a bridge?
Bridges used to connect two LANs which are physically separated but logically same.
40. What are repeaters?
Repeaters are used to regenerate data and voice signals when they become weaker before
reaching destination node. Repeater read the incoming packet and amplifies it and
transmits it to another segment of the network.
41. What are routers?
On Internet it is not necessary that all the packets will follow the same path from source to
destination. A special machine called router tries to load balance between various parts that
exist on networks. Routers can attach physically different networks.
42. What is a Gateway?
Gateway is a special machine which allows different electronic networks to talk to internet
that uses TCP/ IP.
43. What is internet?
Internet is a global collection of computers which are linked together by cables and
telephone lines making communication possible among them in a common language. It can
be defined as a global network over a million of similar heterogeneous computer networks.
44. What can a user do with WWW?
Using WWW a user can download files, listen to sounds, and view video files and jump to
other documents on Net sites by using hypertext links.
45. How are the files represented in WWW?
The WWW represent text documents, pictures, videos, sounds, programs, interactive
environments etc.
46. Name two Communication protocols of internet.
The two protocols are TCP and IP.
47. Why is the Internet not the world wide web?
The internet is a huge network of computers all connected together. The world wide web is
a collection of web pages found on this network of computers when your web browser uses
internet to access the web.
48. Write name of any two internet service providers in India.
VSNL, Airtel, Reliance jio ,etc
49. What do you understand by Web Server?
A web server is simply a computer with an Internet connection that run software designed
to send out HTML ,DHTML and XML or Java based pages and other file formats.
50. What is the purpose of web browser?
Web Browser is used to navigate resources on Net. Web Browser enables a user to fully
experience the hypertext, photographs, sound, video etc available on the world wide web.
51. Names for broadband ISPs in India.
Four broadband ISPs in India are MTNL, VSNL, Airtel, Reliance jio.
52. What is the purpose of internet protocol?
Main purpose of internet protocol is to provide a significant addressing technique to the
network and its elements.
53. Write down any two advantages of DSL connection?
The two advantages are:
You can leave your internet connection open and still use the phone line for voice calls.
DSL doesn't necessarily require new wiring it can use the phone line you already have.
54. Define Wi-Fi and WiMAX
Wi-Fi means wireless fidelity, it is the technology which is the way of getting Broadband
Internet without wires or cables. Wi-Fi allows you to connect several computers at once
anywhere in the house or if you have a laptop to even use your computer in the garden.It is
always connected to internet much like DSL it uses radio waves just like TV or mobile
phones.
WiMAX (worldwide interoperability for microwave Access ) is a wireless communication
standard for broadband wireless access networks. It offers a far greater signal range than
100 feet provided by most conventional Wi-Fi modems.
55. What is Internet address?
Internet address denotes the place where the account of a person can be found .The
combination of the IP numeric address and the domain name in which the IP numeric
address is translated into text based address for example 198.171.166.
56. Define Domain Name Resolution
Domain Name Resolution is the process of getting the corresponding IP address of the
server from a domain name.If this address is present then with the help of this address the
corresponding server is contacted and then the website opens in your browser.
57. What is DNS?
DNS domain name system is the internet address where the account of a person can be
found. DNS is a distributed database system for translating computer names
like gaisbm01.vsnl.net.in into a numeric IP address like 202.54.1.30 and vice versa.
58. Give the full form of the following:
a.URL
b.ISP
c.FTP
a. Uniform Resource Locator
b.Internet Service Provider
c.File transfer protocol
59. what is the purpose of Telnet?
Telnet is an internet facility that facilitates remote login.
60. What is web address?
It is the internet address which denotes the place where the account of a person can be
found. For example the web address format is like: protocol://host.domain.first-
leveldompin/path/ filename.ext
61. Explain the following terms
URL
WWW
FTP
HTTP
URL
Uniform Resource Locator,it is address of the world wide web
WWW
World Wide Web is a collection of millions of files stored in thousands of computers all over
the world
FTP
File Transfer Protocol is a specific set of protocols used by computers connected over the
internet to transfer files
HTTP
Hyper Text Transfer Protocol is a protocol that transfers information between two or more
computers from the web server to display in the users web browser. The world wide web
encompasses the Universe of information that is available through http.
62. What is a protocol? Name any one protocol used on the internet.
Protocols are the rules that computers have to follow when you ask them to do a certain
job. If you ask your computer to email a message it has to follow the protocol for email. For
example SMTP.
63. What is a virus?
A virus is an application with the ability of multiplying itself which can cause great danger
and damage to files or other software on the same machine.
64. What is a trojan horse?
A Trojan Horse is a computer program which carries out malicious operations without the
user's knowledge.
65. What is a worm?
A computer worm is a program is copies itself across a network. Worms normally move
around any effect on the Machines through computer networks. Using a network a worm
can expand from a single copy incredibly quickly.
66. What is Spam? name its types?
Spam is all kinds of unsolicited mail sent electronically. There are two types of spam
cancellable and email.
67. What is security?
The protection of sensitive data and personal information from unintentional and
intentional attacks and disclosure is called security.
68. What is data security?
In simple terms data security is the practice of keeping data protected from corruption and
unauthorised access. The focus behind data security is to ensure privacy while protecting
personal or corporate data.
69. What do you mean by hacker?
Hacker means an expert computer programmer who enjoys figuring out the inner workings
of computer systems or networks. Some have a reputation for using their expertise to
illegally break into secure programs in computers hooked up to the internet or other
networks.
70. What is spyware?
It is a type of Malware that is installed on computers and collect information about users
without their knowledge. The presence of spyware is typically hidden from the
user.Typically spyware is secretly installed on the user's personal computer.
71. What is adware?
Adware is a software that installed in your computer without your consent or
knowledge.Once the software is installed on your computer it tracks your internet browsing
habits and send you popups containing advertisements related to the sites and topics you
have visited.
72. Who is spying your computer?
The people who use spyware include online attackers, organised crimes, marketing
organisations and trusted insiders.
73. What is information security?
Information security is all about protecting and preserving information. It's all about
protecting and preserving the confidentiality, integrity, authenticity, availability and
reliability of information.
74. Name few points where by you can protect yourself from spam.
These are few points where you can protect yourself from spam:
■Be careful while giving email address to anyone
■ Consider using two or more email address
■ choose a less vulnerable email address
■Dont advertise email address
■ check privacy policies and marketing opt-out carefully.
■ do not hesitate to use rights of access and cancellation of data with these companies
■ make children aware about the use of mail and instant messaging.
75. What is email virus?
Email virus moves around in email messages and usually replicates itself by automatically
mailing itself to dozens of people in the victim's email address book.
76. What is Firewall?
It is a hardware device or software program that prevents unwanted traffic from entering or
exiting your computer. When properly configured these devices allow your computer to
send and receive data from the internet and block unwanted traffic from hackers, viruses
and other undesirable sources.
77. What do you mean by Malware? What does it include?
Malware is a generic term for bad software. Malware includes computer viruses, worms,
Trojan horses, most rootkits ,spyware, dishonest adware ,crime ware and other malicious
unwanted software including true viruses.
78. What is cybercrime?
Cybercrime is an evil having its origin in the growing dependence on computers in modern
life. It consists of email spoofing and cyber defamation, sending threatening emails , etc.
79. Define Data encryption
Encryption scrambles data and is used to protect information that is being held on a
computer, copied into CDs or DVDs or transmitted over a network. It uses technologies such
as virtual private networks and Secure socket layers.
80. How is firewall useful in ensuring network security?
alls are software programs or hardware devices that are useful to filter the traffic that flows
into PC internet connection.