Professional Documents
Culture Documents
Assignment - DBB1105 - BBA 1 - Set-1 and 2 - Nov - 2022
Assignment - DBB1105 - BBA 1 - Set-1 and 2 - Nov - 2022
INTERNAL ASSIGNMENT
Note:
There will be two sets of assignments for every course and all questions are compulsory in both sets.
Average of both assignments’ marks scored will be considered as Internal Assessment Marks.
Answers for 10 marks questions should be approximately of 400-500 words.
SET-I
Q. No Questions Marks Total Marks
a. Define Computers?
1. b. What are the key characteristics of each generation of 2+8 10
computers. Explain
Convert (1D7F)16 to an Octal system number and
2. 5+5 10
(5A9.63)16 to a decimal system number
Discuss the advanced formatting options available in
MS Word.
3. 4+6 10
How would you create a custom template and apply it
quickly to slides?
SET-II
Explain various design strategies for Software System
Design.
4. 5+5 10
What are the four quality measures for building
software products?
Enlist the main functions of the operating system.
5. 5+5 10
Describe various components of operating systems.
Discuss the TCP/IP protocol layers with the help of a
6. 6+4 10
diagram. Explain how the internet works.
SET-I
Answer1: A. The word compute is derived from the Latin word ‘computare’, was meaning
“arithmetic, accounting”.
The Computer meaning is the digital device that stores information in memory using input
devices and manipulate information to produce output according to given instructions.
Answer 2:
Explanation:
To convert hexadecimal to octal we need to follow the following steps:
Step1:
1D7F
=1(16’3)+D(13'2)+7(16'1)+F(16")
=1(4096+13(256)+7(16)+15(1)
=4096+3328+112+15
=7551
Step2
8 7551 7
8 943 7
8 117 5
8 14 6
8 1 1
0
=5A9.63
Answer3: A → There are many advanced formatting options available in Microsoft Word that
can help you customize the look and feel of your documents.
(1.) Styles: Styles allow you to quickly apply consistent formatting to your text, such as font,
size, colour, and alignment. You can create custom styles or modify existing ones to suit your
needs.
(2.) Themes: Themes allow you to apply a consistent colour scheme and design elements, such
as fonts and backgrounds, to your document. You can choose from a variety of predefined
themes or create your custom theme.
(3.) Page backgrounds: You can add a background colour or image to your document pages to
give them a unique look.
(4.) Headers and footers: Headers and footers allow you to add consistent information, such as
page numbers or a company logo, to the top or bottom of every page in your document.
(5.) Watermarks: Watermarks are faint images or text that appear behind your document's text.
You can use watermarks to add a professional touch or to indicate the status of a document, such
as "Draft" or "Confidential."
→ To apply your custom template to a document in Word, follow the following steps:
Your custom template will be applied to the new document, and you can begin adding your
content and formatting as needed.
SET-II
Answer4:
A good system design is to organize the program modules in such a way that are easy to
develop and change. Structured design techniques help developers to deal with the size and
complexity of programs. Analysts create instructions for the developers about how code should
be written and how pieces of code should fit together to form a program.
Importance:
1. If any pre-existing code needs to be understood, organized, and pieced together.
2. It is common for the project team to have to write some code and produce original
programs that support the application logic of the system.
There are many strategies or techniques for performing system design. They are:
Bottom-up approach:
The design starts with the lowest level components and subsystems. By using these
components, the next immediate higher-level components and subsystems are created or
composed. The process is continued till all the components and subsystems are composed
into a single component, which is considered as the complete system. The amount of
abstraction grows high as the design moves to more high levels.
By using the basic information existing system, when a new system needs to be created, the
bottom-up strategy suits the purpose.
Advantages:
The economics can result when general solutions can be reused.
It can be used to hide the low-level details of implementation and be merged with the top-
down technique.
Disadvantages:
It is not so closely related to the structure of the problem.
High-quality bottom-up solutions are very hard to construct.
It leads to the proliferation of ‘potentially useful’ functions rather than the most appropriate
ones.
Top-down approach:
Each system is divided into several subsystems and components. Each of the subsystems is
further divided into a set of subsystems and components. This process of division facilitates
in forming a system hierarchy structure. The complete software system is considered as a
single entity and in relation to the characteristics, the system is split into sub-system and
component. The same is done with each of the sub-systems.
This process is continued until the lowest level of the system is reached. The design is
started initially by defining the system as a whole and then keeps on adding definitions of
the subsystems and components. When all the definitions are combined together, it turns
out to be a complete system.
For the solutions of the software that need to be developed from the ground level, top-down
design best suits the purpose.
Advantages:
The main advantage of the top-down approach is that its strong focus on requirements
helps to make a design responsive according to its requirements.
Disadvantages:
Project and system boundaries tend to be application specification-oriented. Thus it is more
likely that advantages of component reuse will be missed.
The system is likely to miss, the benefits of a well-structured, simple architecture.
Hybrid Design:
It is a combination of both the top-down and bottom-up design strategies. In this, we can
reuse the modules.
B: Software Quality Assurance (SAQ) assures the quality of the software. Set of activities in
SAQ are continuously applied throughout the software process. Software Quality is measured
based on some software quality metrics.
There is a number of metrics available based on which software quality is measured. But among
them, there are few most useful metrics which are most essential in software quality
measurement. They are –
1. Code Quality
2. Reliability
3. Performance
4. Usability
5. Correctness
6. Maintainability
Mail id: helpdesk@mujonline.edu.in
Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
7. Integrity
8. Security
Answer5: There are various components of an Operating System to perform well defined tasks.
Though most of the Operating Systems differ in structure but logically they have similar
components. Each component must be a well-defined portion of a system that appropriately
describes the functions, inputs, and outputs.
Process Management
I/O Device Management
File Management
Network Management
Main Memory Management
Secondary Storage Management
Security Management
Command Interpreter System
Process Management
A process is program or a fraction of a program that is loaded in main memory. A process needs
certain resources including CPU time, Memory, Files, and I/O devices to accomplish its task.
The process management component manages the multiple processes running simultaneously on
the Operating System.
A file is defined as a set of correlated information and it is defined by the creator of the file.
Mostly files represent data, source and object forms, and programs. Data files can be of any type
like alphabetic, numeric, and alphanumeric.
A files is a sequence of bits, bytes, lines or records whose meaning is defined by its creator and
user.
The operating system implements the abstract concept of the file by managing mass storage
device, such as types and disks. Also files are normally organized into directories to ease their
use. These directories may contain files and other directories and so on.
The operating system is responsible for the following activities in connection with file
management:
Network management comprises fault analysis, maintaining the quality of service, provisioning
of networks, and performance management.
Network management is the process of keeping your network healthy for an efficient
communication between different computers.
Following are the features of network management:
Main memory is a volatile storage device which means it loses its contents in the case of system
failure or as soon as system power goes down.
The main motivation behind Memory Management is to maximize memory utilization on the
computer system.
The operating system is responsible for the following activities in connections with memory
management:
Keep track of which parts of memory are currently being used and by whom.
Decide which processes to load when memory space becomes available.
Allocate and deallocate memory space as needed.
Secondary Storage Management
The main purpose of a computer system is to execute programs. These programs, together with
the data they access, must be in main memory during execution. Since the main memory is too
small to permanently accommodate all data and program, the computer system must provide
secondary storage to backup main memory.
Most modern computer systems use disks as the principle on-line storage medium, for both
programs and data. Most programs, like compilers, assemblers, sort routines, editors, formatters,
and so on, are stored on the disk until loaded into memory, and then use the disk as both the
source and destination of their processing.
The operating system is responsible for the following activities in connection with disk
management:
Security Management refers to a mechanism for controlling the access of programs, processes, or
users to the resources defined by a computer controls to be imposed, together with some means
of enforcement.
For example, memory addressing hardware ensure that a process can only execute within its own
address space. The timer ensure that no process can gain control of the CPU without
relinquishing it. Finally, no process is allowed to do it’s own I/O, to protect the integrity of the
various peripheral devices.
Command Interpreter System executes a user command by calling one or more number of
underlying system programs or system calls.
Command Interpreter System allows human users to interact with the Operating System and
provides convenient programming environment to the users.
Many commands are given to the operating system by control statements. A program which
reads and interprets control statements is automatically executed. This program is called the shell
and few examples are Windows DOS command window, Bash of Unix/Linux or C-Shell of
Unix/Linux.
Security − By means of password and similar other techniques, it prevents unauthorized access
to programs and data.
Control over system performance − Recording delays between request for a service and response
from the system.
Job accounting − Keeping track of time and resources used by various jobs and users.
Error detecting aids − Production of dumps, traces, error messages, and other debugging and
error detecting aids.
The layers of the TCP/IP protocol, from bottom to top, are as follows:
1. The physical layer: This layer is responsible for transmitting and receiving the actual bits of
data over the physical medium, such as a copper wire or optical fiber. This layer specifies the
electrical, mechanical, and procedural characteristics of the data link, such as the type of cable
and the data rate.
2. The data link layer: This layer is responsible for providing a reliable link between two devices
on the same network. This layer performs error detection and correction, as well as flow control
to ensure that data is transmitted at a rate that the receiving device can handle
3. The network layer: This layer is responsible for routing data packets from the source device to
the destination device across multiple networks. This layer uses logical addressing, such as IP
addresses, to identify the source and destination devices, and it determines the best path for the
data to take based on factors such as network congestion and available bandwidth.
4. The transport layer: This layer is responsible for establishing end-to-end communication
between the source and destination devices. This layer provides services such as segmentation
and reassembly of data, error checking, and flow control to ensure that the data is delivered
reliably and efficiently.
The internet is a global network of interconnected networks that use the TCP/IP protocol to
communicate. When a device, such as a computer or smartphone, wants to send data to another
device on the internet, it sends the data to the network layer of the TCP/IP protocol stack. The
network layer then uses the destination device's IP address to route the data across multiple
networks, known as internet service providers (ISPs), until it reaches the destination device. The
destination device then receives the data and sends a response back to the source device,
following the same process in reverse. This process allows devices on the internet to
communicate with each other and exchange data.