BBA
First year First semester examination, 2010
Introduction to Computer
Subject
code: 1103
Time
– 3 hours
Full
marks- 70
[N.B.
– the
figures in the right margin indicate full marks. Answer any five questions from Part A and Four questions from part B]
Part
– A – Short Question
Marks-
6*5=30
1. (a) Identify four
categories of computer hardware.
(b)Describe two most
common input and output devices.
(c) Name and
differentiate the two main categories of storage devices.
2. (a) What is the
difference between data and information?
(b) What is the
difference between arithmetic operations and logical operations?
(c) Why it is important
to have a standard text code?
3. (a) What is a
backbone? List eight of the internet’s
major services.
(b) List two ways you
can specify a URL in your web borrower.
(c) How was ARPANET
created, and what was its goal?
4. (a) Define
ergonomics. What do you understand by piracy?
(b) How computer virus
can harm an individual and an organization?
(c) What do you
understand about ethics in use of computer?
5. (a) Write the
differences between EPROM and EEPROM?
(b) Write the difference between primary
and secondary memory.
6. (a) What do you know
about impact and non-impact printers? Describe with examples.
7. (a) Calculating the
capacity of a hard disk having 1632 cylinders, 12 heads, 60sectors/track
(b) What are the
necessities of formatting a disk?
PART-B-
Broad Questions
(Answer
any four questions)
Marks-
10*4=40
8.
(a) Describe briefly, how two computer are communicated over a network.
(b)
Write the basic tasks of each layers of OSL model.
9.
(a) Define and classify software.
(b)
Briefly describe the steps in program development in order to solve a problem.
10.
(a) what is a package program? Write the advantages of package programs.
(b) What is a LAN? Write the common topologies
of LAN.
11.
(a) Describe the major data management functions.
(b)
Describe the different hardware elements of a network.
12.
(a) Describe the major methods that could be used for identify theft.
(b)
Discuss the different kinds of threat to hard ware.
13.(a)
Describe the steps you will follow in using a search engine. Use an Example
from your life.
(b)
Explain with example how Boolean operators can be used in searching the
internet.
0 comments:
Post a Comment