Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

NAME: KAINAT MIR

COURSE: INTRODUCTION TO INFORMARTION COMMUNICTATION TECHNOLOGY (ICT)

PROGRAM: ADP (ACOCCIATED DEGREE PROGRAM)

STUDENT ID: 10394

COURSE TEACHER: NASEER AHMED

FINAL EXAMINATION OF SPRING 2021


QUESTION NO: 01

ANSWER: 01 PART (A)

DIFFERENCES BETWEEN COLD AND WARM BOOT:

COLD BOOT WARM BOOT

1. Cold booting is the process of starting 1. Warm boot is the process of restarts the
computer which is already off. computer without turning off computer.

2. It is usually done when system does not 2. It is usually done when a system was hang
respond to a warm boot. or freeze.

3. Cold boot is also called as hard boot. 3. Warm boot is also called as soft boot.

QUESTION NO: 01

ANSWER: 01 PART (B)

.edu = Educational institution

.gov = United states Government websites

.org = Organizational websites (non-profit organizations)

.com = Commercial or business websites, everyone use this now

QUESTION NO: 02

ANSWER: 02 PART (A)

NETWORK TOPOLOGY:
Network topology is the design of a network. It comprises of two types; physical and logical.
The Physical part depicts the physical layout of a Network while the consistent part portrays how
the information streams in that network. Both, physical and logical parts are otherwise called the
Physical topology and the logical topology.
PHYSICAL TOPOLOGY: LOGICAL TOPOLOGY:

The design of the cables interfacing the The manner by which PCs and systems
Network devices and PCs. administration devices send information.

 Actual Layout of the computer The way in which the network appears to
cables and other networks. the devices that use it.
 Physical topologies describe how Logical topologies describe how the
the cables are run. network messages travel.

QUESTION NO: 02

ANSWER: 02 PART (B)

HYBRID TOPOLOGY:
A Hybrid Topology is a kind of Network topology that utilizes at least two contrasting network
topology. These Network can incorporate a blend of Bus topology, mesh topology, ring
topology, star topology, and tree topology.

The decision to utilize a Hybrid Topology over a standard topology relies upon the necessities of
a business, school, or the clients. The quantity of computers, their area, and network organization
execution are on the whole factors in the choice.

TWO TYPE OF TOPOLOGY USED IN ABOVE IMAGE:

 STAR-RING HYBRID TOPOLOGY


 STAR-BUS HYBRID TOPOLOGY

STAR-RING HYBRID TOPOLOGY

A star-ring HYBRID TOPOLOGY is a mixture of the star topology and ring topology. At least
two star topology are associated together through a ring topology.

STAR-BUS HYBRID TOPOLOGY

A star-Bus hybrid Topology is a blend of the start topology and transport topology. At least two
star topologies are associated together through a transport topology.
QUESTION NO: 03

ANSWER: 03 PART (A)


a) Choose two developments which arises because of mobile phone

1. Sending Emails

2. Text Messaging

3. Sending Photos as soon as it has been taken

4. Using internet

5. Making phone call where ever you are

6. Leaving messages when somebody is not available.

Answer:

The two developments which arises because of mobile phone are follows:

 Sending Photos as soon as it has been taken.


 Making phone call where ever you are.

QUESTION NO: 03

ANSWER: 03 PART (B)


Name the method used to represent information on A, B, C and D.

There are the methods which is used in A,B,C and D.

1. Magnetic script.
2. Barcode.
3. Chip card.
4. Pin Code.

Credit Card:
We are use credit card for shopping.

Cheque:

We are Using Cheque for Deposit and Withdraw Money.

Debit Card:

We are Using Debit Card for withdraw money from any ATMs.

Entry Test Form:

Entry Test is used for the selection of students of higher education and either the student is
eligible for the seat or not.

QUESTION NO: 04
Explain the data transmission mode? List its different types

ANSWER: 04 PART (A)


DATA TRANSMISSION MODE:

Data Transmission mode characterizes the direction of the progression of data between two
specialized devices. It is likewise called Data Communication or Directional Mode. It determines
the heading of the flow of data starting with one spot then onto the next in a PC network.

There are the 3 types of the data transmission mode which discuss bellow:

Simplex mode, half duplex modes, full duplex modes.

SIMPLEX MODE:

In simplex mode, Sender can send the data but that sender can’t receive the data. It is a
unidirectional communication.

FOR EXAMPLE:

ONE DIRECTION ONLY


HALF-DUPLEX MODES:

In half-duplex mode, Sender can send the data and also can receive the data but one at a time. It
is two-way Directional communication but one at a time.

FOR EXAMPLE:

X is sending, Y is receiving
X Y

x is receiving, y is sending
X Y

FULL-DUPLEX MODE:
In full duplex mode, sender can send the data and also can receiving the data simultaneously. It
is tow-way directional communication simultaneously.

FOR EXAMPLE:

Bidectional Simultaneously
X Y
QUESTION NO: 05
a) What is the difference between quantitative data and qualitative data?

b) Figure 42 is a quantitative data, in which situations could this figure 42 be considered as qualitative
data?

c) Discuss the three primary components of information technology?

ANSWER: 05 PART (A)


DIFFERENCE BETWEEN QUANTITATIVE DATA AND QUALITATIVE DATA:

QUANTITATIVE DATA: QUALITATIVE DATA:

Quantitative data is numeric. Qualitative data is descriptive.

The result of a measurement, count, or some The no 32 could be qualitative if it is a


other mathematical calculation. designation instead of a measurement, count,
or calculation.
For example:
For example:
That player’s jersey has number 32 on it.
That player’s jersey has number 32 on it.

QUESTION NO: 05
b) Figure 42 is a quantitative data, in which situations could this figure 42 be considered as qualitative
data?

ANSWER: 05 PART (B)


Figure 42 is quantitative data or somehow qualitative data as well so we can say that figure 42 is
also an example of Qualitative data.

QUESTION NO: 05
c) Discuss the three primary components of information technology?

ANSWER: 05 PART (C)


The three primary components of information technology are as follows:

1 Hardware
5. Software
6. Data

All, fall under the category of technology.

QUESTION NO: 06
A company wants all its offices to be able to communicate using communication systems. They are
considering using fax, email and bulletin board. Discuss the advantages and disadvantages of these
methods?

1. Fax

2. Email

3. Bulletin boards

ANSWER: 06

ADVANTAGES OF FAX:
 There is no need to spend time and money traveling to meetings.
 You can have ‘meeting’ with people from many different offices/ countries without any
of them having to travel.
 The document can be emailed to all of the people at the meeting later on.

DISADVANTAGES OF FAX:
 Need a Separate space for the machine.
 Need a phone line.
 Need power/power Electricity
 Requires paper for getting and sending faxes.
 Machine should be on consistently to get faxes. On the off chance that the machine is off,
we may lose the faxes.

ADAVANTAGES OF EMAIL:

 It’s quick and easy to use. An email typically arrives seconds after it’s sent.
 Emails can have text, images, audio and video in them.
 Files can be sent with email, as attachments.
 All email providers work together. Regardless of provider, if you have a person’s email
address you can send them an email.
DISADVANTAGES OF EMAIL:

 Not everyone has internet.


 Student abbreviating and not learning to write the whole word.
 Your mail could be ignored or not answers in the moment you required it.
 No social contact
 Lack of verbal communication not helping on the pronunciation of words.

ADVANTAGES OF BULLETIN BOARD:

 Bulletin boards grant data and work with correspondence.


 Both customary and online bulletin boards up save time
 keep individuals educated and can fill an assortment of needs
 motivating student to giving data about local area assets

DISADVANTAGES OF BULLETIN BOARD:

 At time the collection of relevant material for certain specific topics may be difficult.
 Bulletin board cannot be used for all inclusive teaching.
 If not use properly. May fail in its purpose to convey the central theme.
 Bulletin board has to be used only as a supplementary aid.

QUESTION NO: 07
a) Explain the term Internet?

b) State four disadvantages of having an Internet connection at home.

c) Explain the purpose of web browser?

ANSWER: 07 PART (A)

TERM INTERNET:
Internet is a network of networks which connect million of users to one another.

Objectives of Internet:
 Characterize the web and expound on its utilization
 Recognize the distinctive segment needed to interface with the web
 Distinguish the features of various sorts of web associations
 Clarify the term data transmission according to the various kinds of web associations.

Advantages and disadvantages of internet:


Advantages:
Information:

The greatest advantage offered by the Internet is data. It's anything but a significant asset of data.
You can discover any kind of data regarding any matter with the assistance of the web engines
like Yahoo and Google.

Communication:

The primary goal of the Internet is correspondence. It has done incredibly well in this field,
anyway the advancement cycle is as yet proceeding to make it more trustworthy and fast. By
sending an email, we can contact an individual who is genuinely present thousand miles away
inside the small amount of a second time.

E-Commerce:

E-Commerce is the possibility that is executed for any type of business system or deals that
involves transmission of information starting with one corner of the world then onto the next.
Web based business has become an awesome choice through which you can shop anything.

Disadvantages:

 Freedom of speech on the internet is taken away


 User no longer have privacy, online secrets are revealed
 No more freedom of expression on the internet.
 Online profiling if internet users.
QUESTION NO: 07
b) State four disadvantages of having an Internet connection at home.

ANSWER: 07 PART (B)


INTERNET CONNECTIONS AT HOME DISADVANTAGES:

 Spending too much of time on the internet affect your eyes.


 People using too much internet get disconnect from the real world.
 Children are prone to the internet later dealing with stalking, trolling, violence, sensitive audio
and video contents.
 People can easily fall prey to phishing activities revealing their credit card number to the
fraudsters.

QUESTION NO: 07
Explain the purpose of web browser?

ANSWER: 07 PART (C)

PURPOSE OF WEB BROWSER:


 Web browser utilizes hyperlinks to show the assets and permit the clients to explore their
programs as indicated by the assets.
 Web browser is utilized to run the product application that permits recovering,
introducing and crossing the data starting with one spot then onto the next.
 Internet browser characterizes the application programming that is intended for the client
to get to and recover the records utilizing the Internet.
 Internet browser gives the assets utilizing the WWW (World Wide Web) this can be
recognized by URI (Uniform Resource Identifier).
 Internet browser gets the information like page, picture, video or other piece of substance
from the worker and presentations it likewise.
QUESTION NO: 08
Explain OSI Model and their layers?

ANSWER: 08

OSI MODEL AND THEIR LAYERS:


OSI model Stand for (Open System Interconnection) model. OSI model is a reference model and
utilized for speaking with frameworks that are open for correspondence with different
frameworks.

There are seven layers of OSI Model are as follows:

 Application layer
 Presentation layer
 Session layer
 Transport layer
 Network layer
 Data link layer
 Physical layer

Application Layer:
It is used to send email. It is also responsible for sending data or files from one place to another
place

Presentation Layer:
The presentation layer is the center layer between the Application layer and the Session layer
which is displayed underneath. It gets information from the application layer.

Session Layer:
The session layer is the middle layer between the Presentation layer.

Transport Layer:
The transport layer is the center layer between the Session layer and the Network layer. It gets
information or data from the Session Layer. In the event that we send whole information or data
together and assuming we lose that information while sending, we will lose the whole
information or data.

Network Layer:
The Network layer is the center layer between the Transport layer and the Data link layer.

Responsible for routing of packets.

Network layers adds a sequence number to each packets.

Data link layer:

The Data link layer is the center layer between the Network layer and the Physical layer. It gets
the Packets from the Network layer and converts them into outlines by cushioning error
rectification bits.

Physical Layer:

It is the primary layer of the OSI model. It is identified with sending information bits over the
correspondence medium or channel.

QUESTION NO: 09
The prolong use of computers can lead health problem and safety problems.

a) List two health problems

b) List two preventing health problems

c) List two safety problems

d) List two preventing safety problems

ANSWER: 09
a) List two health problems:

1. (Together with warmness burns and listening to loss) maybe related to computer systems and
associated technology.

2. Stress, burnout, computer or Internet addiction, and different emotional fitness troubles are
greater hard to quantity, although many experts believe computer related emotional health
problems are on the rise.

b) List two preventing health problems:

1. Make certain the display screen is not always too near your face.

2. Use an accurate set-up computer pc in preference to a computer as frequently as you can.

c) List two safety problems:

1. Electricity and water do now longer mix- maintain liquids and plant life nicely far from
computers.

2. Regularly check all- electric device for broken plugs or frayed cables.

d) List two preventing safety problems:

1. Make sure you hide wire under the table.

2). You must keep drinks away from equipment.

QUESTION NO: 10
Tick TRUE and False next to each statements.

ANSWER: 10 PART (A)

STATEMENTS TRUE FALSE


Measuring software is used to write letters 
PDA cannot be used unless plugged in the electricity socket 
Database software used to create slides shows 
A working knowledge of HTML is help when creating web page 
A Graphic user interface is an part of an operating system 
A laptop computer cannot be carried around 
Computer user should take regular break 
An email attachment can be edit electronically 
QUESTION NO: 11
Complete each sentence below using one item from the list.

A virus A web page Control


Data logging e-mail
Evaluation MICR Photocopier
Unsolicited mail

ANSWER: 11 PART (A)


1. A Virus

2. MICR

3. Evaluation

4. e-mail

QUESTION NO: 12
S. No. Hardware Use

1 Bar code reader in a car designer’s office

2 Graphics tablet in a bank for reading cheques

3 Joystick at a point of sales terminal

4 Magnetic Ink Character reader in a computer controlled greenhouse

5 Temperature sensor in a flight simulator

6 Word processor Accounting

7 Database writing letters

8 Spreadsheet storing records

ANSWER: 12 PART (A)


SNO HARDWARE USE
1 Bar code reader: Accounting
2 Graphics tablet: in a car designer’s office
3 Joystick: in a flight simulator
4 Magnetic Ink character reader: in a bank for reading cheques
5 Temperature sensor: in a computer controlled greenhouse
6 Word processor: writing letters
7 Database: at a point of sales terminal
8 Spreadsheet: storing records

QUESTION NO: 13
What are the different e-commerce business models?

ANSWER: 13

DIFFERENT E-COMMERCE BUSINESS MODEL:


A Companies business endeavor rendition characterizes it polices, activities and period in
creating income. E-exchange business endeavor molds regularly diagram the types of shoppers
and vendors included a portion of the most extreme, not strange spot e-exchange business
undertakings designs incorporate the business ventures – to-purchaser (B2C) , buyers – to –
business undertaking (B2B) ,customers – to-customer (C2C) and business – to – government
(B2G) styles with B2C, organizations sell items and administrations straightforwardly to buyers
with B2B, organizations offer items and administrations to different organizations C2C
exchanges are among buyers, and B2G exchange are among businesses and government offices.

QUESTION NO: 14

ANSWER: 14 PART (A)


List two items which are used to output data from a computer.
digitiser Joystick keyboard
mouse robot arm speaker

There is two items which is used to output data from a computer.


1. Robot Arm
2. Speakers

ANSWER: 14

PART (B)

b) List two items which contain personal data.

Burglar alarm car park ticket Credit Card digital speedometer library card remote control
There is two items are contain personal data.

1. Credit card
2. Library card

You might also like