ICS CST PART 1 Full Notes
ICS CST PART 1 Full Notes
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
AIMS COLLEGE LODHRAN COMPUTER DEPARTMENT NOTES ICS COMPUTER (PART 1)
Important Short Questions
The process of converting data into useful information is called data processing. Data processing is
also called computing.
The processed data is called information. As it gives clear and proper meaning, so it can be used for
decision making.
Information technology is the use of modern technology. This term is used for storage, processing,
analysis and high speed communication of information. Information can be represented by computer
in any form like text, photos, audio and video etc.
The electronic merging of different organizations, industries and institutions to exchange information
between them is called digital convergence.
It is a latest technology which is used in some electronic machines. These machines can think, decide
and communicate like humans.
A compute is an electronic device that can be programmed to accept data, process it into useful
information and also store it for later use.
The physical components of a computer are called hardware. Mouse and keyboard are examples of
hardware.
A set of instructions given to the computer to solve a particular problem or to perform a specific task
is called software. There are two types of software called system software and application software.
A program or set of programs that is specially designed to control different operations of computer
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
AIMS COLLEGE LODHRAN COMPUTER DEPARTMENT NOTES ICS COMPUTER (PART 1)
system is called system software. It controls the working of different parts of the computer. Operating
system and device drivers are some examples of system software.
A program or set of programs that is specially designed to solve the specific problem of a user is
Page | 2 called application software. It is also known as application package.
The type of application software that is developed for a particular organization or a customer is called
custom-built software. It is also known as customized software. A software developed for a particular
university is an example of customized software.
Package software is a type of application software that is developed for sale to the general public. It is
also known as off-the-shelf software. MS Word is an example of package software.
The devices that are used to enter data and instructions into the computer are called input devices.
For example, keyboard, mouse and microphone etc. are input devices.
In this method, data goes directly to the computer from the source. For example, a speech enters into
the computer directly through microphone.
In this method, some intermediate handling is required to enter data. The data entered in computer
through keyboard and mouse which are examples of indirect input.
The important input device to enter data or instructions into the computer is keyboard. A standard
arrangement of keys is the QWERTY arrangement.
A pointing device is an input device. It is used to control the movement of pointer or cursor on the
screen. Some common pointing devices are: - Mouse, Trackball, Pointing stick, Joysticks, Touch pad,
Touch screen, Light pen etc.
Mouse is a pointing device. It is an input device used to select, point, open or drag any type of icon.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
AIMS COLLEGE LODHRAN COMPUTER DEPARTMENT NOTES ICS COMPUTER (PART 1)
It is small hand held unit with two or three buttons. It rolls over the small ball. It is also used to draw
pictures or to play games in computer.
Trackball is a pointing device used as an alternative to a mouse. The user can control the cursor on the
Page | 3 screen by rolling a plastic ball with a fingertip or wrist. The body of the trackball is not moved.
Touch pad is a pressure-sensitive pointing device. It is also known as track pad. It is also stationary
device like trackball but it has no moving part. It has small surface over which we slide our fingertip
to move the pointer on screen.
The light pen is handheld pointing input device. It is a light sensitive stylus, or pen like device. It is
connected by a wire to the computer. The pen sends information to the computer when user touches
the pen on specific areas of a specially designed screen.
Stylus is a ballpoint like electronic pen. It is used to create sketches and images on a specially
designed graphics screen or digitizer. Styles is used in graphical applications such as Computer Aided
Design (CAD)
The devices that are used for direct data entry to the computer system are called direct data entry
devices. These devices are also known as direct input devices. The commonly used source data entry
devices are barcode reader, MICR, fax machine etc.
It is a pointing device mostly used for playing games. It consists of a base and a stick. The stick can
be moved in any direction to move an object around the computer screen.
It is a video display screen that receives input from the touch of finger. The screen is covered with
plastic layer and invisible beams of infrared light are present behind it. It is commonly used in ATM,
departmental stores and supermarkets.
It is a pressure sensitive pointing device. It is similar to a pencil eraser and exists between keys on the
keyboard. The cursor on the screen moves when the user pushes the pointing stick. It is normally used
with notebook computers.
It consists of a flat pad (the tablet) connected by wire to a stylus or puck. A stylus is a pen-like device
used to create sketches and images. A puck is a copying device used to copy an image.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
AIMS COLLEGE LODHRAN COMPUTER DEPARTMENT NOTES ICS COMPUTER (PART 1)
These devices are used to read information printed on paper. These devices convert this information
into a form that can be processed by the computer.
It stands for Optical Character Recognition. It reads printed characters in particular font and converts
them into digital code. Most OCR devices use a small optical scanner to read characters. OCR
characters appear on utility bills and price tags in departmental stores.
It stands for Optical Marks Recognition. These devices use light beam to read data. The data is
converted into digital signals. The signals are then sent to the computer for further processing. These
devices are used to check test such as SAT and GRE etc.
Magnetic Strip Card has a magnetically encoded data on its back. The Magnetic Strips are used in
many plastic cards such as personal identity cards. The Magnetic Strip can store the personal details
of the card owner. It can be used to access secure information such as bank account details etc.
Smart Card is similar to credit card or ATM card. It contains thin microprocessor and memory chip
that is embedded in the card. The card is inserted into a specialized card reader. Mobile SIM card and
ATM card are examples of smart cards.
Bar code is a unique identification code. It is in the form of light and dark vertical lines or bars with
spaces between them of different widths. Bar code is printed on most of the manufactured products.
The most popular and commonly used bar code is UPC (Universal Product Code).
A Bar-Code Reader is a special scanning device. It is used for reading bar codes printed on the
products or Books.
A fax machine is also known as facsimile transmission machine. A fax machine is used to send and
receive information through telephone line.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
AIMS COLLEGE LODHRAN COMPUTER DEPARTMENT NOTES ICS COMPUTER (PART 1)
It is a normal fax machine. It can send information to another fax machine. It can also receive
information from another fax machine.
It is a circuit board inside the system unit. It can send and receive information to and from another
Page | 5 computer. It can also send information to a fax machine.
The process of entering any sound into the computer is known as audio input. It may include speech
and music etc. Audio can be entered through microphone.
Q42: What do you know about audio input devices? (Lahore Board 2012)
The devices that are used to enter/record sound into the computer are called audio input devices.
Microphone is most commonly used as an audio-input device. The main purpose of audio input
device is to provide digital input for multimedia computers.
The process of entering video data into a computer is called video input. Video input consists of full-
motion images that create action and movements.
The devices that are used to enter video input into the computer are called video input devices. Mostly
these devices are used for recording movies and video images. VCR and Video camera are examples
of Video input devices.
A digital camera is an input device. It is used to take pictures in digital form. It does not use
traditional camera film. The pictures taken with digital camera can be transferred to a computer.
The processed data into a useful form is called output. The user can receive output from the computer
on a screen or print on the paper through printer.
The output received on the display screen such as monitor or LCD is called softcopy output. It can be
easily modified and duplicated without cost.
The output printed on the paper is called hardcopy. It may be in the form of text and graphics. The
output devices to produce hard copy are printers and plotters.
A hardware component which is used to receive the output from computer is called an output device.
It takes information from computer and converts it in a form that is understandable by user.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
AIMS COLLEGE LODHRAN COMPUTER DEPARTMENT NOTES ICS COMPUTER (PART 1)
Display screen is commonly used output device. It is used as softcopy output device. The output may
be in the form of text, graphics and video. Display screen is also referred as monitor or simply screen.
SVGA stands for Super Video Graphics Array. It has higher resolution than VGA. It has two graphics
modes such as 800 x 600 pixels and 1024 x 768 pixels. It supports 256 colors. It is called 8-bit color.
XGA stands for Extended Graphics Array. It supports up to 16.7 million colors at a resolution of
CRT stands for Cathode-Ray Tube. The most common of display screens is the CRT monitor. It looks
like TV set screen. It contains a cathode ray tube. A cathode ray tube is a vacuum tube. It creates the
image of the output and displays on the screen. The front of the tube is the screen.
Flat-panel displays are used in portable computers. They are much thinner, weightless, and consume
less power than CRT. Flat-Panel displays are made up of two plates of glass. These plates contain a
substance in between them.
LCD uses liquid crystal between the glass plates. The output image is formed by liquid crystal. When
an electronic current passes through liquid crystal, its molecules line up in such a way that lighting
behind the screen is blocked or allowed to create an image.
3. 3. GAS-Plasma Display
This display uses gas plasma technology. It is like a neon bulb. Gas plasma display uses gas between
the plates. The gas emits light when an electric current is supplied.
A printer is an output device that prints characters, symbols and graphics on paper. The printed output
is generally referred to as hardcopy.
The printers that produce output on paper with striking the paper are known as impact printers.
Page | 7
Examples of Impact printers:
The printers that produce output on paper without striking the paper are known as non-impact
printers.
Dot matrix printer is an impact printer. It has tiny pins arranged to hit the ribbon on the paper. Each
latter is formed with the combination of dots. Dot matrix printers have 9, 18, 24 or 32 pins arranged
vertically in a print head. These printers can print normally 50 to 600 characters per second.
Daisy wheel printers use a flat disk or wheel with petal like projections. The wheel rotates to bring the
desired character into position. A character is formed when hammer strikes the petal under it. Daisy
wheel printer is slower then dot matrix printer.
Line printers can print a complete line at a time. These are high speed printers developed to satisfy the
needs of large computer systems. They are further divided into drum printer and band or chain
printers. They produce 3000 lines per minute.
Inkjet printers work in the same way as dot matrix printer except that ink jet printers have fine nozzles
instead of tiny pins used in dot matrix print head. Nozzles spray a stream of ink on the paper.
The process used by laser printer is similar to that of office copying machine. Laser printer produces
variety of letters, graphics and diagrams by a pattern of very fine dots by the action of laser beam. The
laser beam writes the image on the surface of a drum or band in the form of pattern of electric
charged. Laser printers are capable of printing about 10 to 15 pages per minute.
Plotter is a special output device that produces graphics output in black and white or in different
colours form.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
AIMS COLLEGE LODHRAN COMPUTER DEPARTMENT NOTES ICS COMPUTER (PART 1)
Plotters produce large drawings or images such as construction plans of buildings or aircraft design
etc. They work just like inkjet printers.
Flatbed Plotter is used to plot or draw images. It contains pens for drawing images. The paper is
Page | 8 placed on table-like surface. Software instructs the pens to move down on the paper. The pen then
moves on the paper for creating images.
It uses a rotating drum or cylinder. The drawing pens are mounted on the drum. The pens move to the
left or right as the drum rotates. This movement creates the desired image.
A system can be defined as a combination of different related components that interact with each
other to perform some specific tasks.
A set of Activities or steps that are required to develop a system such as software is called system
development life cycle (SDLC). It is an organized way to develop a successful system.
It is flexible magnetic disk. It can only store a small amount of data. The standard size of floppy disk
is 3 1/2 inch. The capacity of floppy disk is 1.44MB.
It is a type of magnetic disk. It consists of several circular disks called platters. The platters are used
to store data. A platter in a hard disk is coated with a magnetic material.
It is a type of conversion in which both new and old systems operate together for a period of time. The
results of both systems are compared. The old system is used until all problems in new system are
removed.
It is a type of conversion in which one part of the organization uses the new system and the rest of the
organization uses the old system. When one part of the organization is satisfied with the new system,
the rest of the organization can start using it.
It is a type of conversion in which individual components of new system are implemented one by one.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
A computer network is a set of two or more computers connected together in order to share
information and other resources. Computer network is also called the information network.
Page | 9
Q2: Write some uses of computer network?
It allows multiple users to access and share programs and information at the same time.
It allows multiple users to share peripheral devices, such as printers and hard disks.
It allows sending e-mails along with files.
It allows the users to communicate via teleconferencing and video-conferencing.
A computer in the network that controls the overall functioning of a network is called server
computer. It is also known as central computer. The devices other than server computer within the
network are called terminals. Terminals are also known as nodes. A node may be a personal
computer, printer, or monitor etc.
A group of persons working together on a project and sharing information through computer networks
is called workgroups.
All computers (other than server computer) connected in the network are called clients. The clients
send requests to the server. Server receives the requests from clients and takes proper actions on these
requests.
In peer-to-peer arrangement, all nodes (or computers) on the network have equal status. No one has
control over other. It means that there is no central computer to control other computers on the
network. Each computer stores files on its own storage devices and has its own peripheral devices.
A dedicated server is used to perform a specific task. For example, Print Server is used to manage
printers and print job.
It is a combination of client/server model and peer-to-peer model. Many networks use a mixture of
both network models. This model can provide the advantages of both models.
In this network model, one or more computers work as servers and other computers work as clients.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
The client computer requests a service from the server computer and server computer provides the
requested service to the client computer.
The standards are the precise documents. These documents contain technical and physical
Page | 10 specification about the network being designed. Normally those standards are taken into
considerations that are worldwide acceptable.
De facto means “by tradition” or “by facts”. These standards were developed without any formal
planning. These standards came into existence because of historical developments. SNA is an
example of De Facto Standard.
De jure means “according to law or regulation”. These standards have been properly approved by the
networking governing body. These standards are designed according to the needs of data
communication.
There are many ways in which computers can be connected together in a computer network. The way
in which computers or other devices are connected in a network is called network topology.
In Bus topology, all nodes (or devices) are connected to a common communication medium or central
single cable. The central cable is the backbone cable. This cable is called Bus. The devices or nodes
are attached with the central cable (or Bus) through interface connector.
In a star network, each node is directly connected to a central connection point known as Hub. The
central connection may be an actual Hub or a switch. Star topology is most commonly used in LAN.
In a ring topology, each node is connected to two adjacent nodes or neighbours. It forms a closed ring
or loop. In this way, the last node is connected to the first node to complete the ring.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
In mesh topology, each node is directly connected to every other node on the network. This type of
network involves the concept of routes. Mesh topology is rarely used in LAN. Some WANs like the
Internet use mesh topology.
Page | 11 LAN stands for Local Area Network. It is a type of computer network that covers a small area. The
network of computers in computer laboratory of a college and network of computers in an office
building are examples of LANs.
A network interface card (NIC) is used to connect a computer to other computers in the local area
network. It is a circuit board that is installed inside the computer‟s internal expansion slots. The NIC
has a socket where the network cable is connected.
A bridge is an electronic device. It is used to connect two similar networks and to control the data
flow between them. When a bridge receives a packet of data; it looks the address where the packet of
data is to be sent. Each packet of data contains the block of actual data and the address of computer of
the computer network where data is to be sent.
A gateway is also an electronic device or system (collection of hardware and software resources). It is
used to connect two different types of networks. It translates data from one format to the other.
Router is also an electronic device. It is used to connect two or more different or similar networks. It
stores the addressing information (routing information) of each computer on the connected networks
(i.e. each computer on each connected LAN or WAN). Router uses the routing information (addresses
of all computers of all connected networks) to transfer data along the most efficient path.
It stands for „Wide Area Network‟. The word „wide‟ means large. WAN is a type of computer
networks that covers a large area. The computers (or terminals) connected to this type of network can
be in different cities or countries.
The large computer to which the terminal (or PC) is attached is called host computer. The terminal
can upload or download data files to and from the host computer.
A metropolitan area network (MAN) is a communication network system. It covers area of a single
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
city. Usually, MAN connects more than one LANs in a city or town. It covers a smaller geographical
area than a WAN. In this type of network, fiber optic cables are used as communication media. So it
is very high speed network. Mobile phones (cellular) systems often use MAN.
Ethernet is the most popular and commonly used LAN protocol. It uses a high speed network cable
and Bus topology. This protocol is very simple than other protocols.
A token is special electronic signal. It consists of a series bits. It is like a ticket. Only one token is
available on the network. When a node on the network wants to transmit data, it first gets the token,
and then it can transmit data. When the node has sent its message, it releases the token back to the
network.
Token ring is another widely used LAN protocol. It is used in local area network using ring topology.
A computer in the network (using ring topology) must get a token to transfer data to other computer
on the network.
When a node on the network wants to transmit data, it first gets the token, and then it can transmit
data. When the node has sent message, it releases the token back to the network. This method of
controlling access to the shared network cable is called token passing.
Q33: Write the names of different LAN protocols? (Multan Board 2012)
ARC net stands for Attached Resource Computer network. It is a LAN protocol. It is also a topology.
It uses twisted pair wire or coaxial cable, and the star topology with hub attached to the network.
OSI stands for Open System Interconnection. It is used for designing network architecture. It was
designed by the International Standard Organization (ISO). It provides a logical framework for data
communication through computer networks. This model provides the reference but not the reality.
Therefore, OSI model is also known as OSI Reference Model.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
The seven layers of OSI models are:
The Application layer is the topmost layer of OSI model. It provides services directly to the user
applications, to access the network. It provides user interfaces and support for services such as email,
remote file access and transfer, shared database management, and other types of distributed
information services.
This layer of OSI model performs data transformations to provide a common interface for user
applications. It is concerned with how data is converted and formatted for data transfer. Examples of
format conversions include ASCII text for documents and .gif and .jpg for images.
This layer of OSI model establishes maintains and manages connections between communicating
systems or devices, so that they can talk to each other. These connections are called sessions. A
session is actually an exchange of messages among computers.
Q40: What is the purpose of Transport Layer of OSI model? (Lahore Board 2012)
This layer of OSI model controls the flow of data. It ensures that messages are delivered error free. It
breaks large message received from the session layer into segments/packets to be sent to the
destination computer. At the destination computer, it reassembles the data segments/packets and
presents the data to the session layer. Transport layer also sends an acknowledgement of receiving of
data to the sender.
This layer of OSI model manages the delivery of data packet from source to destination. It determines
logical path between the sender and the receiver. There may be many networks between two
computers.
This layer of OSI model is responsible for carrying a packet of data from one computer (or router) to
the next. It is also responsible for the reliability of the physical link established at physical layer. This
layer provides the error free transfer of data from one computer to another. It checks whether the data
has arrived properly and safely at the destination. Data link layer must decide the following:
The physical layer of OSI model is the bottom-most. This layer controls and co-ordinates the
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
transmission of data in the form of bit steam over a physical medium such as coaxial cable, optic fiber
cable etc. Physical layer must decide the following:
Intranet contains the information of one organization while extranet may have the information of two
or more organizations. Similarly, intranet is used to provide information to the employees while
extranet is used to share information with other organizations.
It allows multiple devices to talk at the same time. A protocol is used to determine the priority of a
device.
It is a local area access method. It resolves contention between two or more stations by collision
detection. If two stations transmit data at same time, both stop and generate a signal that collision has
occurred. Each station waits for specified time and then retransmits.
In this method, a node listens to the bus for a specified time before transmitting the data. It waits until
the node has completed the transmission.
It stands for Integrated Services Digital Network. It is a set of standards for digital transmission of
data over standard copper telephone lines. One telephone line can carry three or more signals at one
time using the same line. ISDN requires ISDN modem at both sides.
It stands for Digital Subscriber Line. It provides high speed transmission over existing telephone
lines. The existing telephone lines are analog. That is why, a DSL modem is required to connect to
DSL. DSL is easier to install than ISDN. It is also faster than ISDN.
………………………………………………………………….
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Commutation means the exchange of information or messages. The process of transferring data from
one location to another is called data communication.
Page | 15
Q2: Write names of different elements of data communication system?
The basic components which are used in data communication system are:
The message is the information or data that is to be communicated. It may be in the form of text,
numbers, pictures, sounds, videos or any combination of these.
A device that is used for sending messages is called sender. It is also called transmitter. A sender may
be computer, fax machine, telephone or camera etc.
A device that is used for receiving message is called receiver. It may be a computer, a workstation, a
printer or television etc.
The path through which data is transmitted from one location to another is called transmission
medium. It is also called communication channel. It may be a wire, fiber optics, telephone line etc.
The encoder is an electronic device that converts digital signals in a form that can pass through a
transmission medium.
The decoder is an electronic device that converts signals from encoded form into digital form that are
understandable for receiver.
The data is transmitted from one place to another in the form of electromagnetic or light waves
through communication medium. The electromagnetic or light waves representing data are called
signals.
The analog signals are continues electrical signals in the form of waves. These waves are called
carrier waves. The light waves, sound waves or radio waves are examples of analog signals.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q11: Define two characteristics of analog signals? (Multan Board 2012)
Frequency: The number of times a wave repeats during a specific time interval is called frequency. It
is measured in Hertz (Hz).
Page | 16
Amplitude: The height of a wave within a given period of time is called amplitude.
A digital signal is a sequence of voltage represented in binary form. Actually, digital signals are on-
off electrical pulses in discontinuous form (or in discrete form). Most of the computers are digital.
Data is represented inside these computers in the form of binary numbers.
A computer accepts and processes data in binary form. Therefore, all data (numeric or non-numeric)
must be converted into binary form before entering inside the computer. The process of converting
data into binary form is called encoding of data.
EBCDIC stands for Extended Binary Coded Decimal Interchange Code. It is an 8-bit code. In this
binary coding system, (28 = 256) 256 different characters can be represented inside the computer. It is
used by IBM (International Business Machine) mainframe computers.
ASCII stands for American Standard Code for Information Interchange. It was developed by
American National standards Institute (ANSI). It is a standard code to represent alphanumeric data.
Unicode stands for Universal code. It is a 16-bit code. It can represent 65536 (216 = 65536) characters
or symbols. It is developed by following the ASCII coding scheme. The first 256 codes in Unicode
are identical to the 256 codes used by ASCII system.
It stands for Binary Coded Decimal. It is a 4-bit code. It means that each decimal digit is represented
by 4 binary digits. It was used by early computers.
The way in which data is transmitted from one place to another is called data transmission mode. It is
also called the data communication mode. It indicates the direction of flow of information. Sometimes
data transmission modes are also referred to as directional modes.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
In simplex mode, data is transmitted only in one direction. A device with simplex mode can either
send or receive data. Television broadcast is an example of simplex mode.
In half duplex mode, data can be transmitted in both directions but only in one direction at a time.
Page | 17 Speed of half-duplex is slow. Internet surfing is an example of half duplex transmission.
In full duplex mode, data can be transmitted in both directions at the same time on the same channel.
It is the fastest directional mode of communication. The telephone communication system is an
example of full duplex communication mode.
In parallel transmission, a group of bits of data flow at the same time (in parallel) through separate
communication lines. It is very fast data transmission. The automobile traffic on a multi-lane highway
is an example of parallel transmission.
In serial data transmission, a group of bits of data flow in sequential order through single
communication line. The flow of traffic on one lane residential street is an example of serial data
transmission mode.
In synchronous transmission, data is transmitted block by-block or word at the same time. Each block
may contain several bytes of data. In this mode, data is saved before sending. A large volume of data
can be transmitted at a time. The data transmission is very fast. It is most commonly used by remote
communication systems.
In asynchronous transmission, data is transmitted one byte at a time. The data is transmitted character-
by-character as the user types it on a key board. In this mode, data is not saved before sending.
The amount of data that can be transmitted through the transmission media within the given period of
time is called bandwidth.
Baseband is a communication technique in which digital signals are directly transmitted over
transmission line without changing into analog signals (i.e. without using modulation technique. In
this communication technique, there is no need to use any complex modem. The digital signals are
commonly called baseband signals.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Broadband is another communication technique in which large amount of data (such as voice and
video) is transmitted over long distance at the same time. The data is sent by modulation each signal
onto different frequency. For this purpose, FDM (Frequency Division Multiplexing) technique is
used, in which multiple signals can be transmitted at the same time.
In guided communication media, communication devices are directly linked with each other via
cables or physical media for transmission of data. The data signals are bounded to a cabling media.
Therefore, guided media is also called bounded media.
Twisted pair cable is one of the most commonly used communication media. It is used in local area
network (LAN) for data communication between different computers. It is also used in telephone lines
to carry voice and data signals.
Coaxial cable is also referred to as Coax. It carries signals of higher frequency ranges than twisted
pair cable. Coaxial cable consists of a single solid copper wire, which is called the inner conductor.
The bandwidth of coaxial cable is 80 times greater than twisted pair media. Coaxial cable is also
widely used in local area network (LAN).
In twisted pair cable and coaxial cable, data is transmitted in the form of electric frequencies. The
fiber optic cable uses light to transmit data. The data transmission speed is very high (because fiber
optic cable uses light to transmit data). The data transmission speed is up to billions bits per second.
Today, most of the telephone companies and cable TV operators are using fiber optic cables in their
networks.
In microwave transmission, data is transmitted through air or space unlike cables or wires.
Microwaves are high frequency radio waves. These waves can only travel in straight lines.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
A communication satellite is a space station. It receives microwave signals (or messages) from earth
stations. It amplifies the signals and retransmits them back to earth. It is established in space about
22,300 miles above the earth.
Modem stands for modulator/demodulator. It is an electronic device that converts digital signals into
analog signals and vice versa. Modems are used on both ends of the computers for data
communication between computers through telephone line.
This process to convert the digital signals into analog signal is called modulation. Similarly, to receive
the data from another computer through telephone line, in the form of analog signals, it must be
converted into digital form to store it into the computer. This process of converting the analog signals
into digital form is called demodulation.
Wireless modem transmits the data signals through air instead of using a cable. Wireless modem is
called radio frequency modem. This type of modem is designed to work with cellular technology, and
wireless local area networks.
External modem is attached to the system unit as an external device through telephone line. This
modem is connected to computer using serial cable to COM1 or COM2 port. It requires external
power supply. It is easy to setup.
Internal modem is a circuit board that is inserted into an expansion slot on the motherboard. It cannot
be moved from one computer to another easily. It is difficult to setup than other types of modems.
…………………………………………………………………
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
The main fields where computer is commonly used are given blow:
Today, computer technology is playing very important role in every field of life. Different problems
can be solved very easily and quickly by using computer. It saves a lot of time and cost to solve
problems. In an organization, it is used in every functional area. The IT systems are the integral parts
of these functional areas.
Q3: How computer can be useful for marketing the products in business? (Multan Board 2012)
In business, computer is very useful for the marketing of products of an organization. Many marketing
application are available that can be used to provide information about the products to the customers.
Computer is also used for advertising the products and to maintain the record of products.
Today, stock markets around the world are mostly computerized. Many stock markets launched the
computerized system. These systems make it possible for stockbrokers to do all their trading
electronically. Stockbrokers are interconnected through data communication networks. They submit
and receive offers using their interconnected computers, where brokers match buyers with sellers.
Today, most of the banks are computerized. Computerized banking has provided several benefits and
saved the time of customers. The accounts of customers are maintained through computer.
Office Automation (OA) refers to the process of automating office tasks using computers. In an
office, workers perform different tasks using computers. Many offices use the computer technology to
perform various tasks.
In an office, different types of tasks are performed using computers. These tasks include:
Many offices use the following computer-based systems to perform various tasks. These systems may
include:
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Document management system (DMS) consists of different applications that are used to prepare
Page | 21 documents. These applications are:
Archival storage
Image processing applications
E-commerce stands for electronic commerce. It is also known as e-trade or e-business. E-commerce is
a financial business transaction conducted electronically between business partners over computer
networks (such as on Internet). This saves time for participants on both ends. The users can buy, sell,
and exchange products or services via computer network.
ATM stands for Automated Teller Machine. It is installed in most of the banks. You can draw money
through ATM card from any branch of that bank at any time of a day.
A videoconference is a meeting between two or more people residing at various places. They can
watch and talk with each other. They use a network (i.e. Internet). To participate in a videoconference,
you need a video camera, a microphone, speaker, and software (special video conferencing software).
A robot is an automatic programmable machine. It can move and perform mechanical tasks. It means
that a robot acts like human beings. Robot can work in environment that is dangerous for human
beings such as opening chemical packages. It can perform repetitive tasks continuously without any
break at very high accuracy than human.
Computers are also used for designing of products. The computer-aided design (CAD) software is
used to design the samples or models of the products.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Computer-aided manufacture is software. It is used to control the manufacturing process of the
products. CAM software uses the output generated by CAD system.
A computer simulation is a special type of computer model. It is used to represent the real world
Page | 22 system. In other words, computer simulation is an artificial system, which represents the working of
an actual system.
The process of getting education through computer networks is called online education. There are
many websites that provide a lot of information about various topics. Online lectures are also
available on different topics on the Internet.
Computer is also used in weather forecasting. For this purpose, computer based weather forecasting
systems or models are used. The weather forecasting depends upon the accurate calculations on
metrological data. The accurate data is collected from different weather stations and weather satellites.
There are many reasons for using computers. Some common reasons are listed below:
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Business-to-consumer or B2C e-commerce consists of the sale of goods and services to the general
public. In this type, customers or consumers can visit the website and purchase goods online using
credit cards.
Business-to-business or B2B e-commerce takes place between two businesses. One business provides
services to the other business. For example, many advertising companies advertise the products of
another company.
………………………………………………………………….
The way in which various components of a computer are connected with one another is called
computer architecture.
CPU stands for Central Processing Unit. It is the most important component of the computer. It is also
known as processor. CPU is considered as the brain of the computer. It performs all operations on
data according to the given instructions. It executes instructions and tells other parts of computer what
to do.
It acts as a supervisor of the computer. It controls all parts of the computer. It fetches the instructions
and data from main memory. It interprets those instructions to find what operation is to be performed.
It controls the execution of instructions.
ALU stands for Arithmetic and Logic Unit. It is that part of CPU where actual execution of the
instructions takes place. It performs all the arithmetic and logical operations on the data.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q6: What is Main Memory?
It is used to store data and instructions that are currently in use. Sometimes, main memory is also
referred to as working area of computer. The main memory is divided into two parts ROM and RAM.
It stands for Programmable Read Only Memory. This form of ROM is initially blank. The
manufacturer can write its own programs or data by using specially devices. If there is any error in
writing the instructions, the error cannot be removed from PROM.
It stands for Erasable Programmable Read Only Memory. Like PROM, it is initially blank. The
manufacturer can write its programs or data by using special devices. The user can also erase
instructions or data written on EPROM chip with special devices using ultraviolet rays. The user then
can also write new programs on it.
It stands for Electrically Erasable Programmable Read Only Memory. The user can erase and write
instructions with electrical pulses. Its contents can be easily modified electronically.
The binary digit 1or 0 is called a bit. The „bit‟ stands for binary digit. It is the basic unit for storing
data in the computer memory. A combination of 8-bits is called byte. One character takes one byte of
memory. The storage capacity of the memory is expressed in terms of number of bytes.
I/O unit controls the processor‟s communication with peripheral devices such as monitor, printer etc.
A set of electrical paths through which computer sends and receives data and instructions is called a
computer bus. These are used to connect the CPU with other components of computer. Following are
three types of Buses: 1.Address Bus 2.Data Bus 3.Control Bus
The computer bus which is used to transfer data from one component of computer to another is called
data bus. It connects CPU with memory and other hardware devices. The number of lines in data bus
affects the speed of data transfer between different components.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
The amount of data that a bus can carry at one time from one component of computer to another is
known as bus width.
The computer bus which is used to connect CPU with memory to identify the different memory
Page | 25 locations within main memory is called Address bus. An address bus can travel 256 different values at
a time.
The computer bus which is used to send different commands or signals from one component to
another is called control bus. The control bus directly connects the CPU, main memory and I/O ports.
CPU contains small storage areas that are used to store data and instructions during program
execution. The storage areas or locations inside the CPU are called registers. The size of these
registers is 2, 4 or 8 bytes.
This register is used to store the address of the next instruction to be fetched for execution. When the
instruction is fetched, the value of PC is incremented. Thus this register always points or holds the
address of next instruction is to be fetched.
Once an instruction is fetched from main memory, it is stored in the Instruction Register. The control
unit takes instruction from this register, decodes and executes it by sending signals to the appropriate
component of computer to carry out the task.
This register holds the address of memory where CPU wants to read or write data. When CPU wants
to store some data in the memory or reads the data from the memory, it places the address of the
required memory location in the MAR.
This register is used to store data or instructions coming from the memory or going to the memory.
A stack represents a set of memory blocks. The data is stored in and retrieved from these blocks in an
order, i.e. First in and Last out (FILO). The stack pointer register is used to manage the stacks in
memory.
A CPU also has some general-purpose registers. These registers are used along with other registers to
perform arithmetic & Logical operations. These registers are also used for data movement purposes
inside the computer. These registers are called EAX, EBX, ECX and EDX.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q25: What is Segment Register?
A block of memory is called a segment. The segment register is used to store the addresses of the
memory blocks that are being currently used by CPU. This register is used to store base location for
program instructions, data and the stack. Segment register is also known as address register.
Page | 26 Q26: What is meant by Instruction Set?
A set of instructions that a CPU can execute to perform different operations on data is known as the
instruction set of that CPU. Normally, a modern CPU can execute 80 to 120 instructions.
The instructions that are used to transfer data from one unit of computer to another during program
execution are called Data Transfer Instructions.
The instructions that are used to write and read data to and from the I/O devices are called I/O
Instructions. I/O devices are also known as peripheral devices. The peripheral devices may include
keyboard, monitor, and disks etc.
The instructions that are used to transfer the execution control from one part of the program to another
during program execution are called Control Transfer Instructions. These instructions may be used to
execute a set of instructions repeated for a number of times.
An instruction consists of a group of bits that tells the computer to perform a specific operation. The
group of bits of an instruction is logically divided into different parts. Two main parts are:
1. Operand code & 2. Address of the operand. Each part is used to perform a specific action.
In zero-address instruction format, no address is specified. A stack-organized computer does not use
an address field for the instructions like ADD and MUL.
This format uses only one address field. It uses one accumulator register (AC) for all data
manipulation. A second register is required for multiplication and division.
The instruction of two-address format uses two address fields. Each address field can specify either a
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
register or a memory address. Two-address instructions are the most common in commercial
computers. Examples of such instructions are MOV, ADD, CMP and BIS.
The instruction of three-address format uses three address fields. Each address field can specify either
Page | 27 a register or a memory address. This type of instruction requires too many bits to specify three
addresses.
For every instruction of the program, the control unit (CPU) carries out three basic operations, known
as the Fetch-Decode-Execute Cycle. It is also called the Machine Cycle.
The process of transferring a program instruction from memory to CPU is called fetch instruction.The
CPU gets a program instruction from main memory for taking action on it.
The process of decoding the instruction so that the computer can understand it is called Decode
Instruction.
The process of taking action on the decoded instruction is called Execute Instruction.
A set of programs running in the background of a computer system and providing an environment in
which other programs can be executed and the computer system can be used efficiently.
Management of Hardware
Load and Execute Programs
Resources
Memory Management Data Security
1. Providing Interface to the User
Command prompt is also referred to as command line user interface. In this type of user-interface, the
operating system provides prompt line on the computer screen. The user communicates with the
computer (or operating system) by typing commands through keyboard. The user interface provided
by MS-DOS operating system is an example of command prompt.
A programming Language provides the way of communication between user and computer. A
computer program is written in a programming language. The programming language provides a set
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
of rules for writing computer programs. The instructions of the program are written in a specific
manner and according to the rules of the programming language.
The programming languages that are close to human languages (e.g. like English language) are called
Page | 28 high-level programming languages. They are easy to understand.
The programming languages that are very close to machine language are called low-level
programming languages. The program instructions written in these languages are in binary form i.e.
(0 and 1) and symbols.
Q46: What is the difference between source code and object code?
The program written in high level language is called source code. Source code is very easy to
understand and modify. The translated program into machine code is known as object code.
The special software that is used to translate the programs written in high level language (or assembly
language) into machine language programs is called language translator or language processor.
The language translator that translates the complete source program into machine code as a whole is
called compiler.
The language translator that translates the source code into machine code statement by statement is
called interpreter. It translates one statement of source program into machine code and executes it
immediately before translating the next statement.
The language translator that translates the programs written in assembly language into machine code
is called assembler.
It stands for Static Random Access Memory. Its memory cells are made from digital gates. Each cell
can store data without any need of frequent recharging. SRAM is more expensive and does not need
to be power-refreshed.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q53: What is DRAM? (Multan Board 2012)
It stands for Dynamic Random Access Memory. Each memory cell must be constantly refreshed to
keep data in DRAM. DRAM is least expensive RAM.
A serial port is used to connect devices to the system unit. A serial port transmits data one bit at a
time. It is usually used to connect devices that do not require fast data transmission like mouse and
keyboard etc.
Parallel port is used to connect devices that transfer many bits at a time. Printers are connected to
Assembly language is a low level computer language. It is one step higher than machine language. In
assembly language, symbols are used instead of binary code. These symbols are called mnemonics.
An interrupt is a signal. In this scheme, the processor issues a command to an I/O device for input or
output operation. The device generates an interrupt signal to processor when it becomes ready. When
CPU receives interrupt, it suspends all other processing and performs I/O operation.
DMA stands for Direct Memory Access. In this scheme, processor issues I/O command and then gets
busy in some other processing. A special hardware receives data from I/O device. It uses system bus
to store data in main memory directly without going through CPU.
A cache memory is a small and very fast memory. It is designed to speed up the transfer of data and
instructions. It is faster than RAM. The data and instructions that are most recently or more frequently
used by CPU are stored in cache.
The main memory consists of memory cells. Each memory cell has a unique number. This number is
called memory address.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
RAM is temporary memory. When the power is turned off, the information in this memory is lost.
Thus it is called volatile memory.
A computer system consists of different devices such as CPU, main memory and I/O devices. These
Page | 30 devices are connected to an internal communication channel of the computer system to transfer data
between these devices. The internal communication channel of the computer system is called bus
interconnection.
…………………………………………………………………
Security is a system of safeguards. It is designed to protect a computer system and data from being
damaged or accessed by unauthorized persons.
A small hidden program that may disturb the normal functioning of the computer is called computer
virus. It may also destroy the important data stored in the computer. The computer virus cannot
damage hardware, only data or software is corrupted.
Just like a biological virus, a computer virus can spread from one computer to another computer.
Usually viruses are transferred from one computer to another due to exchange of data and programs
through floppy disk, CD-ROM, and through computer networks.
There are many ways through which viruses may be transferred from one computer to another. Most
common ways are:
There are many types of viruses, but the most importance types of viruses are:
Boot Sector
Chernobal Virus Logic bomb Trojan Horse
Virus
Redlof
The boot sector virus is a type of virus. It modifies the program in the boot sector. It is loaded into
memory whenever computer is turned on. This virus is attached with the executable files, i.e. exe, .dll
files.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Trojan horse is a type of virus which hides itself in some computer programs. When these programs
are executed, the Trojan virus is activated. This virus affects the performance of the computer. An
example of Trojan horse is format C.
The special programs that are used to detect and remove the viruses from the computer are called
antivirus programs. Antivirus programs contain information about different known viruses. McAfee
and Norton are examples of most popular antivirus programs.
The protection of data is called data security. Most of the data of an organization stored inside the
computer is very important. The data can be lost or destroyed due to different reasons. It can be
Data encryption is a technique in which sensitive data is encoded before its storage or transmission
over a network. If anyone (unauthorized person) gets access to the data, he could not be able to
understand it.
Hiding data belonging to a person or organization from other persons or organizations is called data
protection.
A secret word or code assigned to documents and programs, or computer system to protect from
unauthorized access is called password. You have to type the correct password to open the system.
Copyright is the branch of law. It protects the creative work from illegal use. The categories of works
that copyright protects may include: software, books (or any other written material), recording films
and many other products etc.
This act came into force early in 1999. It is much broader in its scope than the 1984 act. It applies to
anything done to the personal data. It may include collection, use, disclosure and destruction or
simply holding the personal data.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
The principal law governing software piracy is the “Copyright Act 1976”. Some amendments were
made in this law in 1983. Now “software piracy” is believed to be a punishable crime. It may involve
huge amounts of penalties. Software is believed to be an “intellectual property”. It is developed and
brought into market after a lot of efforts and cost.
Q18: What is the difference between complete backup and incremental backup?
Backup of all data on the hard disk is called complete backup while incremental backup creates a
copy of only the data that is newly created or modified since the last backup.
Q19: Write down the names of different media used for data backup?
The purpose of password is to protect data stored on a computer. It protects data from being lost,
misused or deleted by any person. The system can be accessed by a person who knows the password.
This act prohibits agents of federal government from making unannounced searches of press office.
This act restricts cable companies in the collection and sharing of information about their customers.
This act makes actions that affect the computer security files and telecommunication illegal.
This act prevents the disclosure of a person‟s video rental records without a court order.
This act prevents the government from comparing certain records to find a match.
This act makes provision to secure computer material against unauthorized access or modification.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
It manages the software and resources of the system. These resources may include the
processor, memory, storage devices, Input/output devices etc.
Page | 33
It provides stable and efficient way to use the hardware without having to know all the details
of the hardware.
A GUI operating system provides the user a graphical user interface to communicate with the
computer. It provides graphical objects such as icons, menus, windows, buttons etc. to the user to
perform different tasks. Examples of GUI operating system are Windows, Linux, and Solaris etc.
A Command Line Operating System provides a command prompt to the user for typing different
commands to interact with the computer. The commands are given to the computer according to the
predefined format. It is not an easy way to interact with the computer. The user needs to memorize
commands to perform different tasks. Examples of Command line operating system are DOS (Disk
Operating System), and Unix etc.
The on-screen working area on which icons, menus, and dialog boxes appear is called desktop. It is
called desktop because the surface of screen looks like a desk with objects you might have on your
own personal desk.
My computer is a special icon on the desktop. It is very important object used for interfacing with
computer. It enables user to see easily what is in his computer. The user can access everything in his
computer such as hardware devices, disk drives, files & folders etc.
My Documents is also a special folder on the desktop. It is automatically created when windows is
installed. Many Windows based applications use „My Documents‟ folder as default folder for storing
files. These applications may include: Ms-Word, MS-Excel, MS-Access etc.
The Recycle Bin is a special folder of Windows on the hard disk. It has an icon on desktop. It contains
file and folders that are deleted from the hard disk. Any file or folder you delete from the hard disk,
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
are transferred to the Recycle Bin. These files or folders can be restored from the Recycle Bin to their
original location if required for use.
Internet Explorer is a web browser. It is a part of Microsoft Windows operating system. It is used to
Page | 34 access information on the Internet. It is a powerful web browser providing advance features to work
on www.
Windows Explorer acts as a File Manager in Windows. It provides an efficient way for locating and
managing files on computer. It also provides the most efficient way to manage the computer
resources.
The start button is located at the left most side of the taskbar. Start button is the gateway of accessing
most of the programs installed on the computer. When start button is clicked, a menu known as start
menu appears on the desktop.
The Control panel is special folder that contains the Administrative Tools (system software) used to
perform system management tasks such as installing or uninstalling hardware devices, managing
system resources, sharing printers, and setting up date and time etc.
Mouse events are the actions that can be performed by using the mouse. The most common events of
mouse are as follows:
This event occurs when you press the left mouse button and move the mouse while keeping the left
mouse button pressed. This event is used to select more than one item at a time. It can also be used to
move an object from one location to another.
Microsoft Windows is a complete operating system. Some important features of Windows are:
Loading multiple programs into memory and executing them at the same time is called multitasking.
In multiprocessing, multiple programs are executed on different processors at the same time. Some
COMPUTER DEPARTEMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
task among different processors.
Windows 2000 is a multi-user operating system. A multi-user operating system allows multiple users
to use the same computer at the same time (or at different times).
Page | 35
Q19: What do you meant by plug and play?
Some operating systems automatically detect and configure new devices when they are connected to
the computer. This capability of operating systems is referred to as plug and play.
The clipboard is a temporary space in the computer‟s memory used for holding data that is being
copied or moved. After data has been placed in the clipboard, it can be inserted from the clipboard
into other documents, in the same application or in a different application.
When multiple documents are sent to the printer for printing, they are added in a queue in an order in
which they are sent to the printer. This list of document waiting to be printed is called print queue.
Disk partition is a disk management technique. It is the logical division of the hard disk. It divides the
memory unit into sections. Partitioning is useful if the user wants to use multiple operating systems.
Primary partition is a type of partition that can be used as system partition. It can be created to occupy
the entire hard disk or a portion of it. Any hard disk can have a maximum of four partitions. Each
primary partition must be formatted after partitioning. The primary partition should be formatted as a
single logical drive only. It cannot be subdivided into multiple logical drives.
File management is a process of maintaining and organizing files in the computer. Files are
recognized by their extension. File extension is checked to determine what action should be taken.
It is a type of partition that can be further divided into sub-partitions. These sub-partitions are known
as logical partitions. It is done to use multiple operating systems. A hard disk can have only one
extended partition.
…………………………………………………………………
COMPUTER DEPARTEMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
The process of creating and editing word documents is called word processing. The word document
may contain text and graphical images. Word processing also involves formatting documents in
Page | 36
different forms.
Word processor is application software. It provides facility for creating and editing all kinds of
documents. Word processor also enables you to add images, charts and graphics in documents.
A word processor that provides only the basic features for creating and editing documents is called
text editor. A text editor is also called simple word processor. It is used for creating and editing simple
word documents. WordPad and Notepad are examples of text editors.
During text entering process into document, the cursor automatically shifts to the next line when it
reaches to the right margin. It means that text “wraps around” to the next line. The user does not need
to hit Enter key after typing one line. The word processor will also re-adjust text if you change the
margins.
WYSIWYG stands for What You See Is What You Get. It means that printout of document will be
similar as appears on the display screen.
Insertion point is the place or point where the text or graphics are to be inserted/paste.
The most important feature of Word processor is the mail-merge, in which the records of a database
can be merged into the document. It is a very shortcut method used to create form letters, mailing
labels, envelopes etc. For example to send result cards to all the students of a college; the mail-merge
method is used.
A macro is a small code. It represents a series of keystrokes or commands. Usually, a single key is
assigned to a macro. All commands in a macro are executed when a key assigned to a macro is
pressed.
Thesaurus means vocabulary. Microsoft Word has a complete dictionary and you can select a simple
word for a difficult word from a list of alternate words.
COMPUTER DEPARTEMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q10: What is Undo Command?
The command that is used to cancel an action is called Undo command. Each time the Undo
command is applied, the last action is cancelled.
The process of changing the appearance of the document is called document formatting. The
document is formatted to make it more attractive and beautiful.
The appearance of text in the document is referred to as font. It is also known as typeface. Same text
in different fonts has different appearances.
Formatting applied on a paragraph is called paragraph formatting. Paragraph formatting includes line
spacing, paragraph spacing, indents, alignment, tab stop, borders and shadings etc. Most of the
paragraph formatting is done using paragraph dialog box, horizontal and vertical Ruler elements.
The white space between two adjust lines of paragraph is called line spacing. The white space before
The white spaces on all sides of a document page are called margins. Margins define the boundaries
of the text. The text cannot cross these boundaries. In every document, all the four margins (top,
bottom, left and right) can be the same or different.
The white space between the page margin and the text in a paragraph is called indent. You may indent
some text in the document to highlight it.
Arrangement of lines of text in a paragraph with respect to left and right margins is called text
alignment. There are four alignment options: left, right, center and justified.
The layout of the page when it is printed on the printer is called page formatting. It includes page size,
page orientation, page margins, headers and footers etc.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Header is the information that is added to the top of every page of the document. Footer is the
information that is added to the bottom of each page of the document.
The direction in which a document is printed on paper through printer is known as page orientation.
Page | 38 You can also change the page orientation. In page orientation, printing direction of the document is
selected.
Most of the word processors provide the feature to create table into document. A table is used to
organize information in rows and columns. The intersection of a row and column is called cell.
The text of word document can be arranged into multiple columns. The number of columns that can
be created in document depends upon the size of paper. For example, in most of the newspapers and
in some of the magazines, the text appears in column form.
A text box is a rectangular box. The text or image is inserted into text box. You can set its size,
position, border and shade as well as alignment and orientation of text inside it. Text box can be set at
any location into the document. Text box along with text can be moved around the page.
…………………………………………………………………
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
A spreadsheet program provides worksheets to enter data. A worksheet is divided into a grid of
columns and rows. In Excel, a worksheet consists of 256 columns and 65536 rows. The columns are
labeled with letters A, B, C…. etc. The rows are labeled with numbers 1, 2, 3… etc.
In MS-Excel, the document or file in which data is permanently stored on the disk is called workbook.
It is a collection of worksheets. Like a book that contains many pages, a workbook may contain many
worksheets. Data is stored into the worksheets.
The intersection of a column and a row is called a cell. The data is entered into the cell of worksheet.
The currently selected cell where data can be entered or edited is called the Active Cell. When
another cell is selected or cell pointer is moved to another cell, then that cell becomes the Active cell.
A horizontal bar that has headings of columns with labels A, B and so on (It is from A to IV) is called
Column Header.
A vertical bar that has headings of rows with labels 1, 2, 3, and so on (It is from 1 to 65536) is called
Row Header.
When a formula is used into a cell, then the calculated result is displayed into the cell. The actual
formula is displayed into the Formula Bar. If a formula is not applied into the cell, then the contents of
cell are displayed into the Formula Bar. Formula Bar is also used to edit the contents of cell.
The process of changing the appearance of the text in the cell of worksheet is called cell formatting.
The default format assigned to a cell is the General format.
COMPUTER DEPARTEMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q11: What is formula?
A formula is a mathematical expression that is combination of numbers, constants, cell addresses (or
cell references) and arithmetic operators. In Excel, mostly the formula is build by using cell references
along with arithmetic operators. Formula is entered in the worksheet cell and must begin with an
equal sign “=”. The cell in which formula is written, displays the result of formula only.
Page | 40
Q12: What is cell address?
Every cell of a worksheet has a unique address. This address is called the cell address. The cell
address is also known as cell reference. Cell address represents the position of a cell in worksheet
with respect to the column and row number. For example, the cell reference A 12 represents the
column „A‟ and row „12‟.
Calling a cell with the reference to its address (such as “A1”) is called relative referencing. When a
formula contains relative referencing and it is copied from one cell to another, the spreadsheet does
not create an exact copy of the formula. It will change cell addresses relative to the row and column
they are moved to.
The cell references used in formula that do not change when you copy formula to another cell in the
worksheet are called the absolute references. An absolute references specified in the formula by using
$(Dollar) sign before column letter and row number.
The graphical representation of numerical data is known as Chart or Graph. It makes easy to compare
and to analysis the numerical data. A Chart is created with a range of data stored in the worksheet cell.
When the data values in the range of cell are changed, the Chart is automatically updated.
A function is a predefined or built-in formula. Excel provides different types of functions. A function
provides more efficient and quick way of performing calculations than formula.
Q18: Write the formula for calculating the average of cells B2 and B3? (Multan Board 2012)
COMPUTER DEPARTEMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
The Internet is a huge collection of computers all over the world that are connected to one another. It
is a global network of computers. These computers are connected through different
Page | 41
telecommunication links.
DARPA stands for Defense Advanced Research Project Agency. It is a defense department of USA.
DARPA worked to share data not only on single network but also among different networks.
During Cold War, America developed a network named ARPANET. It was developed for Advanced
Research Project Agency. It was used to send information to armed forces at long distances.
ISP stands for Internet Service Provider. It is a company that provides the internet connections to the
users. There are many ISP companies in each big city of each country of the world. You have to get
an internet connection from any ISP company of your local city to connect to the internet.
TC/IP stands for Transmission Control Protocol / Internet protocol. It is a real communication
protocol that drives the Internet. It is used to share and transfer data among different networks.
FTP stands for File Transfer Protocol. It is a way for transferring files from one computer to another.
The process of transferring a file from a server to your local computer is called downloading. The
process of transferring a file from your own computer to the server on the Internet is called uploading.
Gopher is an Internet service. It organizes resources into multilevel menus to make searching of
information easier in the Internet. Before Gopher, it was difficult to find information on the Internet.
IP stands for Internet protocol. It is a unique identifier for a host or node on the Internet. It is
numerical address with four numbers separated with dots. A typical IP address looks like this:
216. 27. 61. 137. The four numbers in an IP address are called octets. They can have values between 0
and 255.
COMPUTER DEPARTEMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q10: What is DNS addressing? (Sahiwal Board 2013)
Every server (or host) on the Internet also has a unique name. The human readable name assigned to
the computer (server) on the Internet is called the domain name. It is a common and unique text name
and is alternative to an IP address. For example, “hotmail.com” is a permanent, human readable name.
It is easier to remember that an IP Address.
Page | 42
Q11: What is Top-Level Domain (TLD)?
The domain name has two parts, a host name and domain. The domain is also known as top level
domain (TLD). The top-level domain specifies the type of domain such as type of organization. It
comes at the end of domain name separated with dot (.).
Software that allows the Internet users to search, retrieve, view and send information over the
Internet is known as web browser. It is also simply called a browser.
The World Wide Web is also known as Web. It was launched in 1989 at the European Particle
Physics Laboratory in Geneva. Web is the greatest network of Web Servers that stores web pages.
These pages are accessible on the Internet. The WWW uses Hyper Text Transfer Protocol (HTTP) to
link hypertext documents (web pages) on the World Wide Web.
The documents on the Web are called web pages. Web pages are written in Hyper Text Markup
Language (HTML). The web pages are also known as hypertext documents. A web page may contain
simple text, images, and hyperlinks (or simply links). The web pages are linked to one another using
hyperlinks.
A collection of related web pages is called a website. Websites or web pages are stored on computers
that are permanently connected to the Internet. These computers are called Web servers.
Q17: What is difference between uploading and downloading the page? (Multan Board 2012)
The process to store your Web page on the Web Server is called publishing the page or uploading the
page. Similarly, retrieving Web document from server to client computers is called downloading the
page.
URL stands for Uniform Resource Locator. Every web page has a unique address on World Wide
Web. This address is called the URL address of the web page. If you want to access a web page on the
World Wide Web, you will have to specify the URL of the required page in the web browser.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q19: What is search engine?
Search engines are the special websites that provide facility to Internet users to search information on
the Internet. A lot of information is available on the Internet in different websites. Search engines
maintain a list of billions of web pages containing information on various topics.
Page | 43 Q20: List some popular search engines?
The most popular search engines and their URL addresses are:
YAHOO http://www.yahoo.com
ASK http://www.ask.com
GOOGLE http://www.google.com
E-mail stands for electronic mail. It is the most popular service (or facility) provided by the Internet.
We can send and receive message anywhere in the world. One message can be sent to many persons
with a single e-mail. E-mail message takes very short time to reach its destination.
An e-mail program that is used to create, send and receive e-mail is called e-mail client.
E-mail is sent and received with the reference to e-mail address. Therefore, each Internet user must
have an e-mail server, to send and receive e-mails. E-mail address consists of user ID and Identity of
email service. For example, [email protected]
News Groups are discussion groups or forums. They provide the services to exchange messages on
the Internet about a particular subject. Newsgroups are classified according to different subjects. For
example, Heath, hobbies, celebrities, and cultural events etc, are the subjects of many newsgroups.
The news group facility is provided on the Internet on special servers known as news servers. A news
server is a host computer that exchanges articles with other servers on the Internet. These servers use
Network News Transfer Protocol (NNTP) to exchange messages.
FTP stands for File Transfer Protocol. This protocol is used to download and upload files on the
Internet. HTTP stands for Hypertext Transfer Protocol. It is used for accessing web pages or
documents to and from the Web servers. It was developed in 1990 when World Wide Web was
introduced. The browser requests document from server through this protocol. The server also returns
the required documents to the browser through this protocol.
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
Q27: Define web hosting?
Web hosting is a facility for providing space on Internet for storing web pages. Web hosting is
provided by different organizations commercially.
The required things to establish connection to Internet are: Computer, Modem, Dialup software, ISP
connection and Web Browser.
Q30: Write four problems associated with e-mail? (Multan Board 2012)
E-mail can be a threat to privacy. It can be faked. It cannot communicate emotions properly. It may be
delayed due to communication problems.
The process of developing and maintaining web pages is known as web publishing. Web development
does not require programming skills. Many tools are available to develop professional web pages.
Q32: Write any three positive impacts of computer and Internet on society?
1. The use of computer and Internet makes different tasks easier, quicker and efficient.
2. Computer and Internet is used by people to conduct financial transactions.
3. Computer and Internet is used in education to improve teaching and learning
Q33: Write any three negative impacts of computer and Internet on society?
1. The use of computer and Internet has increased unemployment as different tasks are
performed automatically.
2. Many people use computer without any purpose, which cause wastage of time and energy.
3. Computer and Internet is used to commit crimes.
Internet Corporation for Assigned Names and Numbers (ICANN) is a group that assigns and controls
the top-level domains. A method used to store domain names and corresponding IP addresses is called
Domain Name System (DNS).
……………………………………………..Best of Luck…………………………...……….…………
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
COMPUTER DEPARTEMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
18. Project 802 defines standards for which layers of the OSI model?
a) Application b) Physical c) Transport d) Network
and and data and network and data
presentation link layers layers link layers
layers
19. Terminal is a:
Page | 46 a) Device to b) Point at c) The last d) Any
give power which data instruction input/outpu
supply to enters and in a t device
computer leaves the program
computer
20. Software to peruse the internet
a) Gateway b) EFT c) Browser d) Teleconferencing
21. Microwave transmission, coaxial cables, and fiber optics are examples of:
a) Modems b) Communicating c) Gateways d) Ring
links networ
k
22. Data communication requires only a:
a) Sender b) Receiver c) Transmission d) All of
medium the
above
23. BIT stands for:
a) Binary b) Binary digit c) Binary d) None of the
Integer interval above
24. Communication between a computer and a keyboard involves transmission?
a) Simplex b) Half- c) Full- d) Automatic
duplex duplex
25. The is the physical path over which a message travels:
a) Protocol b) Medium c) Signal d) All of the
above
26. The electromagnetic or light waves representing data are called:
a) Information b) Signal c) Sender d) None of
the above
27. Television and radio broadcasts are examples of:
a) Full-duplex b) Half-duplex c) Simplex d) None of the
transmissio transmissio transmission above
n n
28. The internet surfing is an example of:
a) Simplex b) Half-duplex c) Full-duplex d) None of the
above
29. A communication technique to transmit large volume of data over long distances is:
a) Baseband b) Broadband c) Bandwidth d) None of
the
above
30. Which is an advantage of synchronous over asynchronous transmission?
a) Simplicity
b) Speed
c) No error checking
d) Two-way communications
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
b) Computer Based Training
c) Certificate Based Training
d) None of the above
32. The benefit of CAD may be summed up as:
a) Accuracy
b) Repeatability
Page | 47 c) Speed and flexibility of production
d) All of the above
33. Computers at home can be used:
a) Keeping b) Making c) Watching d) All of the
records budgets movies above
34. A word processor can be used to:
a) Write Text b) Edit Text c) Print Text d) All of the
above
35. CAL stands for:
a) Computer b) Computer c) Computer d) None of
Aided Learning Assist Learning Added the above
Learning
36. Typically, an ATM can be used to:
a) Keeping b) Making c) Watching d) None of the
records budgets movies above
37. Modern computer can perform calculations or process at high speed
a) Per second b) Per minute c) Nino second d) None of the
above
38. CAT stands for:
a) Computerized b) Computer c) Computer d) None of
Axial Topography Axial Aided the above
Topography Topography
39. Computer based weather forecasting depends on accurate collection of data from:
a) Television b) Weather c) Radar d) Antenna
stations
40. MICR stands for:
a) Magic in b) Magnetic Ink c) Magnetic Ink d) None of the
Character Character Character above
Redo Recorder Reader
41. Data and programs not being used by computer are stored in:
a) Secondary b) Cache c) Primary d) printer
storage storage
42. A set of instructions that run the computer are:
a) Hardware b) Document c) CPUs d) Software
43. The program that contains instructions to operate a device is called:
a) Device driver b) Device c) Device linking d) Device system
operator
44. CPU is an example of:
a) Software b) A program c) Hardware d) An output
unit
45. The address of instruction under the processor execution is contained within:
a) Program b) Current c) Memory d) Memory
counter Instruction Address Buffer register
register register
46. A computer drives its basic strength from:
a) Speed b) Memory c) Accuracy d) All of above
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
47. The arithmetic/logic unit performs the following actions:
a) Control computer operations
b) Performs arithmetic functions such as addition and subtraction etc.
c) Perform logical comparisons such as equal, greater than, less than
d) Both b and c
Page | 48 48. Which is a storage device:
a) CPU b) Clock c) Floppy disk d) Bus
49. Which component is responsible for comparing the contents of two pieces of data:
a) ALU b) Control unit c) Memory d) None of
above
50. Which one is faster:
a) RAM b) Cache c) Register d) Hard disk
51. A virus program is usually hidden in:
a) The operating system only
b) An application program only
c) The disk drive
d) The operating system or application programs
52. Most computer crimes are committed by:
a) Hackers
b) International spies
c) Highly trained computer consultants
d) Company insiders who have no extraordinary technical ingenuity
53. Types of software that can be freely distributed without violating copyright laws are
called
a) Shareware b) Public domain c) Copy d) a and b
protected
54. Information is:
a) A marketable commodity
b) Can be stolen while leaving the original behind
c) Should be free, according to the original hacker ethic
d) All of the above
55. A virus that replicates itself is called a:
a) Bug b) Worm c) Vaccine d) Bomb
56. Another name for free software:
a) Encrypted a) Copy b) Public c) Shareware
software protected domain
software software
57. Another name for antivirus is:
a) Vaccine b) Worm c) Trojan horse d) DES
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
61. An operating system is a:
a) System a) Application b) System c) Software
utility software software package
62. Ctrl + Alt + Del is
a) An invalid key combination
b) Recognized by windows only
Page | 49 c) Used to close the active window
d) Both b and c
63. As compared to command line operating system, a GUI operating system is
a) More efficient b) Easier to use c) More reliable d) All of these
64. The maximum number of primary partitions that can be created on a disk is
a) Two b) Three c) Four d) None of these
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
77. Clipboard stores:
a) Entered Text b) Copied Text c) Deleted Text d) Repeated Text
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
97. Who owns the Internet?
1. USA Government 2. Pak Telecom 3. United Nations 4. None of these
98. ISP stands for:
a) International Service Provider
b) Internet Service Provider
Page | 51 c) Interlinked Services Provision
d) Internet Service Party
99. A collection of related web pages is called:
a) Web-link b) Web site c) Internet d) Linking
100. DNS stands for:
a) Domain Name System
b) Decimal Number System
c) Dual Number System
d) Decimal Numeric System
……………………………………………………………………………………………………………
Unit 1 1. a 2. c 3. d 4. a 5. d 6. a 7. b 8. d 9. b 10. c
Unit 2 11. d 12. b 13. b 14. b 15. a 16. d 17. d 18. b 19. d 20. c
Unit 3 21. b 22. d 23. b 24. a 25. b 26. b 27. c 28. b 29. b 30. b
Unit 4 31. b 32. d 33. d 34. d 35. a 36. d 37. d 38. a 39. b 40. c
Unit 5 41. a 42. d 43. a 44. c 45. a 46. d 47. d 48. c 49. a 50. c
Unit 6 51. d 52. a 53. b 54. d 55. b 56. c 57. a 58. d 59. c 60. c
Unit 7 61. c 62. b 63. d 64. c 65. d 66. b 67. c 68. a 69. b 70. c
Unit 8 71. d 72. b 73. c 74. d 75. c 76. d 77. b 78. b 79. d 80. a
Unit 9 81. b 82. b 83. c 84. a 85. b 86. b 87. b 88. c 89. b 90. b
Unit 10 91. d 92. b 93. c 94. c 95. c 96. c 97. d 98. b 99. b 100. a
COMPUTER DEPARTMENT
AIMS COLLEGE LODHRAN (Address: Main Keror pacca road hawalyan Arain 03136916966
Notes For Computer ICS (part-I) By Rana M Fiaz (0300-7366785)
COMPUTER DEPARTMENT