Ignou Solution Guide 2018-19
Ignou Solution Guide 2018-19
Ignou Solution Guide 2018-19
CPUs contain a control unit (CU). Most of the operations of a CPU are
performed by one or more ALUs, which load data from input registers. A
register is a small amount of storage available as part of a CPU. The
control unit tells the ALU what operation to perform on that data, and
the ALU stores the result in an output register. The control unit moves
the data between these registers, the ALU, and memory.
(iii) Port and connector
ANS. . A port is a connector located on the motherboard or on a
separate adapter, ports and connectors allow the computer to
communicate with different devices and peripherals attached with it.
(iv) Motherboard
ANS. A motherboard is one of the most essential parts of a computer
system. It holds together many of the crucial components of a
computer, including the central processing unit (CPU), memory and
connectors for input and output devices. The base of a motherboard
consists of a very firm sheet of non-conductive material, typically some
sort of rigid plastic. Thin layers of copper or aluminum foil, referred to
as traces, are printed onto this sheet. These traces are very narrow and
form the circuits between the various components. In addition to
circuits, a motherboard contains a number of sockets and slots to
connect the other components.
b) What is an instruction in the context of a Microprocessor? How
does a microprocessor instruction specify data and operations?
IGNOU ASSIGNMENT WALA
The communication between the IOP and the devices is similar to the
program control method of transfer. And the communication with the
memory is similar to the direct memory access method. In large scale
computers, each processor is independent of other processors and any
processor can initiate the operation. The CPU can act as master and
the IOP act as slave processor. The CPU assigns the task of initiating
operations but it is the IOP, who executes the instructions, and not the
CPU. CPU instructions provide operations to start an I/O transfer. The
IOP asks for CPU through interrupt. Instructions that are read from
memory by an IOP are also called commands to distinguish them from
instructions that are read by CPU. Commands are prepared by
programmers and are stored in memory. Command words make the
program for IOP. CPU informs the IOP where to find the commands in
memory.
(references-https://www.studytonight.com/computer-architecture/inp
ut-output-processor)
d) Convert the following numbers as directed
(i) Decimal 198.25 into binary and hexadecimal
ANS. Decimal to binary= ( 11000110)2
Decimal to hexadecimal = ( c6) 16
(ii) Decimal 444566 into binary and hexadecimal
ANS. Decimal to binary = ( 1101100100010110)2
decimal to hexadecimal = ( c6 896)16
IGNOU ASSIGNMENT WALA
(iii) String “Maximum Limit 500%" to ASCII and Unicode string
ANS. The datastore has two distinct data type for storing strings of text
short strings and long strings. short strings are indexed , that is they
can be the subject of queries as a search every person entity with a
given value for a last - name property. Short string value must be less
than 500 bytes in length. long string can be longer than 500 bytes but
are not indexed.
Text string , short and long are strings of character from the unicode
character set . Internally , the data store store unicode string using
UTF-8 encoding, which rep resent some characters using multiple
bytes. this means that 500- byte limit for short string is not necessarily
the same the same as 500 unicode characters . The actual limit on the
number of characters depends on which are in the string .
The python api distinguishes between short strings and long string
using python data types. The python built in types unicode and str re
present short string values. St values use are assumed to be text
encoded as ASCII, and are treated as UTF -8 ( which is equivalent to
ASCII for the first 128 characters in the character set.
IGNOU ASSIGNMENT WALA
(iv) Hexadecimal ABCDEF to decimal and binary
ANS. Hexadecimal to decimal = ( 11259375)10
hexadecimal to binary= ( 101010111100110111101111)2
e) How are the tracks on magnetic disk different than that of
Optical disks? Consider one optical and one magnetic disks have
identical number of tracks and equal size sectors, will these two
disks have same size? Justify your answer.
AnS. The key differences between optical storage media, such as cds
and DVDs and magnetic storage media such as hard drives and old
fashion floppy disc is im how computer read and write information to
them.
Significance
computer are binary ,meaning that for them to understand
information . it has to be boiled down to a series of digits each of
which is a 1 or a 0 storage media a use different methods of
representing those digits.
Storage
magnetic charge , the direction of that charge determines whether it
IGNOU ASSIGNMENT WALA
Ans.
➡SRAM is an on-chip memory whose access time is small while DRAM
is an off-chip memory which has a large access time. Therefore SRAM is
faster than DRAM.
➡DRAM is available in larger storage capacity while SRAM is of smaller
size.
➡SRAM is expensive whereas DRAM is cheap.
➡The cache memory is an application of SRAM. In contrast, DRAM is
IGNOU ASSIGNMENT WALA
(iii) joystick and mouse
IGNOU ASSIGNMENT WALA
ANS.
A mouse is moved a mouse is moved back and forth and up and down
buy a person's hand. The mouse device moves across the table surface.
A joystick on the other hand stays stationary and is basically composed
of a base and a stick. A vertical stick which is held in the hand and
tilted forward backwards left and right. But the only thing that moves
with a joystick is the center stick
( iv) projection display and led display
ANs. An LED display is a flat panel display, which uses an array of
light-emitting diodes as pixels for a video display. Their brightness
allows them to be used outdoors where they are visible in the sun for
store signs and billboards, and in recent years they have also become
commonly used in destination signs on public transport vehicles, as
well as variable-message signs on highways. LED displays are capable
of providing general illumination in addition to visual display, as when
used for stage lighting or other decorative (as opposed to informational)
purposes.
A digital projector, also called a digital projection display system, is a
specialized computer display that projects an enlarged image on a
movie screen. Such devices are commonly used in presentations. There
are two main types of digital projection display systems. The older, less
expensive type employs three transparent liquid-crystal-display ( LCD )
panels, one for each of the primary colors (red, green, and blue). The
light transmissivity of each pixel varies depending on the image data
received from the computer. The light from a lamp is directed through
IGNOU ASSIGNMENT WALA
the LCD panels, collimated using a lens, and projected onto a screen.
g) Explain the characteristics/functions of the following I/O
devices:
(i) Inkjet printer
ANS.
An inkjet printer is a computer peripheral that produces hard copy by
spraying ink onto paper. A typical inkjet printer can produce copy with
a resolution of at least 300 dots per inch ( dpi ). Some inkjet printers
can make full color hard copies at 600 dpi or more. In the inkjet
printing mechanism, the print head has several tiny nozzles, also called
jets. As the paper moves past the print head, the nozzles spray ink onto
it, forming the characters and images. An inkjet printer can produce
from 100 to several hundred pages, depending on the nature of the
hard copy, before the ink cartridges must be replaced. There is usually
one black ink cartridge and one so-called color cartridge containing ink
in primary pigments (cyan, magenta, and yellow).
(ii) Power Connecter
ANs. Power connectors are devices that allows an electrical current to
pass through it for the exclusive purpose of providing power to a device
(not a data stream, for example, or anything more complex). Although it
can be used with many different types of electronics, customers must
find the specific type of connector that best matches their electronics’
geometry and electrical needs.
IGNOU ASSIGNMENT WALA
(iii)Video Card
ANS.
Alternatively known as a display adapter, graphics card, video adapter,
video board, or video controller, a video card is an expansion card that
connects to a computer motherboard. It is used to creates a picture on
a display; without a video card, you would not be able to see this page.
More plainly, it is a piece of hardware inside of your computer that
deals with processing images and video, along with some of the tasks
that the CPU is normally responsible for. Video cards are used by
gamers in place of integrated graphics due to their extra processing
power and video ram.
(iv)Magnetic Stripe Reader
AnS. A magnetic stripe reader, also called a magstripe reader, is a
hardware device that reads the information encoded in the magnetic
IGNOU ASSIGNMENT WALA
stripe located on the back of a plastic badge. Magnetic stripe readers
can be read by a computer program through a serial port , USB
connection, or keyboard wedge , and are generally categorized by the
way they read a badge. For instance, insertion readers require that the
badge be inserted into the reader and then pulled out. Swipe readers
require that the badge pass completely through the reader.
Question 2: (Covers Block 2) (7×4=28 Marks)
a) Explain the Internet Based Software Architecture with the help
of a block diagram. How is this architecture different than that of
3-tier client server architecture? Explain.
ANs. Software architecture refers to the high level structures of a
software system and the discipline of creating such structures and
systems. Each structure comprises software elements, relations among
them, and properties of both elements and relations.] The architecture
of a software system is a metaphor, analogous to the architecture of a
building. It functions as a blueprint for the system and the developing
project, laying out the tasks necessary to be executed by the design
teams. Software architecture is about making fundamental structural
choices which are costly to change once implemented. Software
architecture choices include specific structural options from
possibilities in the design of software. For example, the systems that
controlled the space shuttle launch vehicle had the requirement of
being very fast and very reliable. Therefore, an appropriate real-time
computing language would need to be chosen. Additionally, to satisfy
the need for reliability the choice could be made to have multiple
IGNOU ASSIGNMENT WALA
redundant and independently produced copies of the program, and to
run these copies on independent hardware while cross-checking
results.
3 - tier architecture
development teams the ability to replace or upgrade independent tiers
without affecting the other parts of the system. For example, the user
interface of a web application could be redeveloped or modernized
without affecting the underlying functional business and data access
logic underneath. This architectural system is often ideal for embedding
and integrating 3rd party software into an existing application.
b) What is a file and directory in the context of a computer? What
are the activities involved in the file management? Explain how
file management is different than the Memory Management.
ANS. A file is a container in a computer system for storing
information. Files used in computers are similar in features to that of
paper documents used in library and office files. There are different
types of files such as text files, data files, directory files, binary and
graphic files, and these different types of files store different types of
information. In a computer operating system, files can be stored on
optical drives, hard drives or other types of storage devices.
•
A directory (folder) is a location for storing files on your computer.
Directories are found in a hierarchical file system, such as Linux,
MS-DOS, OS/2, and Unix.
•
Navigation
People working with files have to be able to go to the folder where the
system has stored the file. File management programs have a
navigation system that lets users proceed through the file hierarchy to
IGNOU ASSIGNMENT WALA
the level where they can find their work. Navigation functions include
commands such as "Up" and "Down" to climb through the folder
structure and "Go To" if the user knows the location of the data. The
program often includes a bookmarking function to create direct links to
frequently accessed locations and "Expand/Collapse" functions to view
or hide folder details.
Operations
Operation functions let the users interact with the files. These functions
typically include "Open," "Save," "Close," "Copy," "Move," "Delete,"
"Rename," "New" and "Share." A "Print" function is sometimes included
if an associated printer is compatible with the file management
program, and a "Manage" or "Properties" function lets users configure
the program and how it stores the files.
Security
The security aspects of a file management program include access and
data integrity. The program can restrict access to itself or to particular
files with log-in procedures. It can specify a user name and a password
for program or folder access, or it can encrypt files and require a
password to access the data. With regard to data integrity, it can keep
track of modifications and deletions to make sure users can reverse
unauthorized changes.
Storage
While managing file storage generally, file management programs also
handle related tasks such as maintaining backups and reducing
duplication. They can perform these functions automatically or can
IGNOU ASSIGNMENT WALA
separate area of memory, which is protected from access by application
programs or other, less critical parts of the operating system. The
kernel performs its tasks, such as running processes, managing
hardware devices such as the hard disk, and handling interrupts, in
this protected kernel space. In contrast, everything a user does is in
user space: writing text in a text editor, running programs in a GUI, etc.
(ii) Command line interface and Graphical user interface of
Operating system
ANS.
GUI AND CLI
Ease:
If we talk about ease of use, the new users will pick up a GUI much
faster than a CLI. In a CLI, new users have some difficulty operating it
because they are not familiar with the commands
Control:
With a GUI, there’s control over files and the operating system – but
advanced tasks may still need to use the command line.
With a CLI, users have all the control over file system and operating
system, and the tasks become simple. For example, you can copy a file
or several with one command.
Speed:
If we talk about speed, in a GUI, using the mouse and the keyboard to
control the file system or the operating system is going to be slower
than using the command line.
In a CLI, the users only need to utilize the keyboard and may need to
IGNOU ASSIGNMENT WALA
Multitasking
Multitasking has the same meaning of multiprogramming but in a more
general sense, as it refers to having multiple (programs, processes,
tasks, threads) running at the same time. This term is used in modern
operating systems when multiple tasks share a common processing
resource (e.g., CPU and Memory). At any time the CPU is executing one
task only while other tasks waiting their turn. The illusion of
parallelism is achieved when the CPU is reassigned to another task (i.e.
process or thread context switching). There are subtle differences
between multitasking and multiprogramming. A task in a multitasking
operating system is not a whole application program but it can also
refer to a “thread of execution” when one process is divided into
sub-tasks.
(iv) Computer Virus and Computer Worms
ANs. Viruses are typically attached to an executable file or a word
document. They often spread via P2P file sharing, infected websites,
and email attachment downloads. Worms, on the other hand, don't
need a host program in order for them to run, self-replicate and
propagate. Once a worm has made its way onto your system, usually
via a network connection or as a downloaded file, it can then make
multiple copies of itself and spread via the network or internet
connection infecting any inadequately-protected computers and servers
on the network.
IGNOU ASSIGNMENT WALA
e) Draw a flow chart and write an algorithm for a program that
multiplies all two digit odd numbers. (You must use looping).
ANS.
IGNOU ASSIGNMENT WALA
e) Draw a flow chart and write an algorithm for a program that
multiplies all two digit odd numbers. (You must use looping).
ANS
IGNOU ASSIGNMENT WALA
Question 3: (Covers Block 3) (6×4=24 Marks)
(a) Explain the following terms in the context of computer
networks:
i) Message switching
ANS. Message switching is a network switching technique in which data
is routed in its entirety from the source node to the destination node,
one hope at a time. During message routing, every intermediate switch
in the network stores the whole message. If the entire network's
resources are engaged or the network becomes blocked, the
message-switched network stores and delays the message until ample
resources become available for effective transmission of the message.
Before the advancements in packet switching, message switching acted
as an efficient substitute for circuit switching. It was initially employed
in data communications such as telex networks and paper tape relay
systems.
ii) Simplex transmission
Alternatively referred to as simplex communication or simplex
transmission, simplex is a one-way only communication standard that
broadcasted information may only travel in one direction. This method
is different than duplex transmission, which allows for two-way
broadcasting. Examples of simplex include radio broadcasting,
television broadcasting, computer to printer communication, and
keyboard to computer connections
IGNOU ASSIGNMENT WALA
iii) Optical Fiber
Optical fiber is made by drawing glass or plastic to a desired length and
diameter (slightly larger than a human hair). This flexible and highly
pure fiber is most commonly used to transmit light for a wide range of
applications including visible light displays, sensors, and high-speed
communications networks . Optical fibers and cables have proven to be
more reliable than their metal wire counterparts, partially due to the
lower rate of loss or interruption of data, but largely in part to their
immunity to electromagnetic interference. In addition, optical fiber
allows for transmission of data over greater distances with higher
bandwidths than earlier wire cable.
IGNOU ASSIGNMENT WALA
Viruses and other types of malicious code are often spread as
attachments to email messages. Before opening any attachments, be
sure you know the source of the attachment.
Chat Clients
Internet chat applications, such as instant messaging applications and
Internet Relay Chat (IRC) networks, provide a mechanism for
information to be transmitted bi-directionally between computers on
the Internet. Chat clients provide groups of individuals with the means
to exchange dialog, web URLs, and in many cases, files of any type.
Because many chat clients allow for the exchange of executable code,
they present risks similar to those of email clients.
Overseas Money Transfer Scam
If an email sounds too good to be true, then it is. You'll receive an email
from someone claiming to represent a foreign government or someone
formerly involved with a foreign government.
(ii) E-learning processes
Since, any e-learning project checks your achievements against a
learning outcome, therefore, it starts with identification and verification
process. The common process used for this purpose is the use of
Username and Password. You are asked to login to the e-learning
system before you start using it.Once you are successfully logged in to
the system. The e-leaning topics or contents are presented to you topic
by topic. This content may include text, graphics, video, audio,
animation, link to other references. In general, such content may be
followed by some quiz or questions that try to access your
IGNOU ASSIGNMENT WALA
understanding about the topic that you have studies. The e-learning
systems may be a Learning Management System (LMS) or Content
Management System (CMS) running as the base system.
(
references- h ttp://egyankosh.ac.in/handle/123456789/10970)
IGNOU ASSIGNMENT WALA