Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Directorate of Online Education

INTERNAL ASSIGNMENT

NAME KARTIK PACHISHIYA


ROLL NO 2214502783

Note:
 There will be two sets of assignments for every course and all questions are compulsory in both sets.
 Average of both assignments’ marks scored will be considered as Internal Assessment Marks.
 Answers for 10 marks questions should be approximately of 400-500 words.

SET-I
Q. No Questions Marks Total Marks
a. Define Computers?
1. b. What are the key characteristics of each generation of 2+8 10
computers. Explain
Convert (1D7F)16 to an Octal system number and
2. 5+5 10
(5A9.63)16 to a decimal system number
Discuss the advanced formatting options available in
MS Word.
3. 4+6 10
How would you create a custom template and apply it
quickly to slides?
SET-II
Explain various design strategies for Software System
Design.
4. 5+5 10
What are the four quality measures for building
software products?
Enlist the main functions of the operating system.
5. 5+5 10
Describe various components of operating systems.
Discuss the TCP/IP protocol layers with the help of a
6. 6+4 10
diagram. Explain how the internet works.

SET-I
Answer1: A. The word compute is derived from the Latin word ‘computare’, was meaning
“arithmetic, accounting”.
The Computer meaning is the digital device that stores information in memory using input
devices and manipulate information to produce output according to given instructions.

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
Below are few applications of computers:
Business
Banking
Education
Marketing
Advertising
Home Shopping
Communication
Budgets
Government

B. Here are a few characteristics about computer are:


1. Speed: – As you know computer can work very fast. It takes only few seconds for calculations
that
we take hours to complete. You will be surprised to know that computer can perform millions
(1,000,000) of instructions and even more per second.
Therefore, we determine the speed of computer in terms of microsecond (10-6 part of a second)
or
nanosecond (10 to the power -9 part of a second). From this you can imagine how fast your
computer
performs
2. Accuracy: – The degree of accuracy of computer is very high and every calculation is
performed
with the same accuracy. The accuracy level is 7.
determined on the basis of design of computer. The errors in computer are due to human and
inaccurate data.
3. Diligence: – A computer is free from tiredness, lack of concentration, fatigue, etc. It can work
for
hours without creating any error. If millions of calculations are to be performed, a computer will
perform every calculation with the same accuracy. Due to this capability it overpowers human
being
in routine type of work.
4. Versatility: – It means the capacity to perform completely different type of work. You may use
your computer to prepare payroll slips. Next moment you may use it for inventory management
or to
prepare electric bills.
5. Power of Remembering: – Computer has the power of storing any amount of information or
data.
Any information can be stored and recalled as long as you require it, for any numbers of years. It
depends entirely upon you how much data you want to store in a computer and when to lose or
retrieve these data.
6. No IQ: – Computer is a dumb machine and it cannot do any work without instruction from the

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
user. It performs the instructions at tremendous speed and with accuracy. It is you to decide what
you
want to do and in what sequence. So a computer cannot take its own decision as you can.
7. No Feeling: – It does not have feelings or emotion, taste, knowledge and experience. Thus it
does
not get tired even after long hours of work. It does not distinguish between users.
8. Storage: – The Computer has an in-built memory where it can store a large amount of data.
You
can also store data in secondary storage devices such as floppies, which can be kept outside your
computer and can be carried to other computers.

Answer 2:

(1D7F) -> (16577)

(5A9.63) -> (1449.386)

Explanation:
To convert hexadecimal to octal we need to follow the following steps:

Step1: Hexadecimal-> Decimal


Step2: Decimal-> Octal

Step1:
1D7F
=1(16’3)+D(13'2)+7(16'1)+F(16")
=1(4096+13(256)+7(16)+15(1)
=4096+3328+112+15
=7551

Step2
8 7551 7
8 943 7
8 117 5
8 14 6
8 1 1
0

(1D7F)10 > (16577)8

=5A9.63

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
=5(16'2)+A(16'1)+9(16"0)+6(16'1)+3(16"2)
=5(256)+160+9+0.375+0.0117
=1280+160+9+0.375+0.0117
=1449.386
(5A9.63)16 > (1449.386)10

Answer3: A → There are many advanced formatting options available in Microsoft Word that
can help you customize the look and feel of your documents.

→ Some of these options include:

(1.) Styles: Styles allow you to quickly apply consistent formatting to your text, such as font,
size, colour, and alignment. You can create custom styles or modify existing ones to suit your
needs.

(2.) Themes: Themes allow you to apply a consistent colour scheme and design elements, such
as fonts and backgrounds, to your document. You can choose from a variety of predefined
themes or create your custom theme.

(3.) Page backgrounds: You can add a background colour or image to your document pages to
give them a unique look.

(4.) Headers and footers: Headers and footers allow you to add consistent information, such as
page numbers or a company logo, to the top or bottom of every page in your document.

(5.) Watermarks: Watermarks are faint images or text that appear behind your document's text.
You can use watermarks to add a professional touch or to indicate the status of a document, such
as "Draft" or "Confidential."

B. To create a custom template in Microsoft Word, follow these steps:

(1.) Open a new blank document in Word.


(2.) Apply any formatting or design elements that you want to include in your templates, such as
styles, themes, page backgrounds, and watermarks.

(3.) Go to the File menu and select "Save As."


(4.) In the Save As window, select "Word Template" from the Save As Type drop-down menu.
(5.) Give your template a name and click "Save."

→ To apply your custom template to a document in Word, follow the following steps:

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
(1.) Open a new or existing document in Word.
(2.) Go to the File menu and select "New."
(3.) In the New window, click "My Templates" in the left-hand menu.
(4.) Select your custom template from the list and click "Create."

Your custom template will be applied to the new document, and you can begin adding your
content and formatting as needed.

SET-II
Answer4:
A good system design is to organize the program modules in such a way that are easy to
develop and change. Structured design techniques help developers to deal with the size and
complexity of programs. Analysts create instructions for the developers about how code should
be written and how pieces of code should fit together to form a program.
Importance:
1. If any pre-existing code needs to be understood, organized, and pieced together.
2. It is common for the project team to have to write some code and produce original
programs that support the application logic of the system.
There are many strategies or techniques for performing system design. They are:
 Bottom-up approach:
The design starts with the lowest level components and subsystems. By using these
components, the next immediate higher-level components and subsystems are created or
composed. The process is continued till all the components and subsystems are composed
into a single component, which is considered as the complete system. The amount of
abstraction grows high as the design moves to more high levels.
By using the basic information existing system, when a new system needs to be created, the
bottom-up strategy suits the purpose.

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education

Advantages:
 The economics can result when general solutions can be reused.
 It can be used to hide the low-level details of implementation and be merged with the top-
down technique.
Disadvantages:
 It is not so closely related to the structure of the problem.
 High-quality bottom-up solutions are very hard to construct.
 It leads to the proliferation of ‘potentially useful’ functions rather than the most appropriate
ones.
 Top-down approach:
Each system is divided into several subsystems and components. Each of the subsystems is
further divided into a set of subsystems and components. This process of division facilitates
in forming a system hierarchy structure. The complete software system is considered as a
single entity and in relation to the characteristics, the system is split into sub-system and
component. The same is done with each of the sub-systems.
This process is continued until the lowest level of the system is reached. The design is
started initially by defining the system as a whole and then keeps on adding definitions of
the subsystems and components. When all the definitions are combined together, it turns
out to be a complete system.
For the solutions of the software that need to be developed from the ground level, top-down
design best suits the purpose.

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education

Advantages:
 The main advantage of the top-down approach is that its strong focus on requirements
helps to make a design responsive according to its requirements.
Disadvantages:
 Project and system boundaries tend to be application specification-oriented. Thus it is more
likely that advantages of component reuse will be missed.
 The system is likely to miss, the benefits of a well-structured, simple architecture.
 Hybrid Design:
It is a combination of both the top-down and bottom-up design strategies. In this, we can
reuse the modules.

B: Software Quality Assurance (SAQ) assures the quality of the software. Set of activities in
SAQ are continuously applied throughout the software process. Software Quality is measured
based on some software quality metrics.

There is a number of metrics available based on which software quality is measured. But among
them, there are few most useful metrics which are most essential in software quality
measurement. They are –

1. Code Quality
2. Reliability
3. Performance
4. Usability
5. Correctness
6. Maintainability
Mail id: helpdesk@mujonline.edu.in
Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
7. Integrity
8. Security

Answer5: There are various components of an Operating System to perform well defined tasks.
Though most of the Operating Systems differ in structure but logically they have similar
components. Each component must be a well-defined portion of a system that appropriately
describes the functions, inputs, and outputs.

There are following 8-components of an Operating System:

Process Management
I/O Device Management
File Management
Network Management
Main Memory Management
Secondary Storage Management
Security Management
Command Interpreter System

Following section explains all the above components in more detail:

Process Management
A process is program or a fraction of a program that is loaded in main memory. A process needs
certain resources including CPU time, Memory, Files, and I/O devices to accomplish its task.
The process management component manages the multiple processes running simultaneously on
the Operating System.

A program in running state is called a process.


The operating system is responsible for the following activities in connection with process
management:

Create, load, execute, suspend, resume, and terminate processes.


Switch system among multiple processes in main memory.
Provides communication mechanisms so that processes can communicate with each others
Provides synchronization mechanisms to control concurrent access to shared data to keep shared
data consistent.
Allocate/de-allocate resources properly to prevent or avoid deadlock situation.
I/O Device Management
One of the purposes of an operating system is to hide the peculiarities of specific hardware
devices from the user. I/O Device Management provides an abstract level of H/W devices and
keep the details from applications to ensure proper use of devices, to prevent errors, and to
provide users with convenient and efficient programming environment.

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education

Following are the tasks of I/O Device Management component:

Hide the details of H/W devices


Manage main memory for the devices using cache, buffer, and spooling
Maintain and provide custom drivers for each device.
File Management
File management is one of the most visible services of an operating system. Computers can store
information in several different physical forms; magnetic tape, disk, and drum are the most
common forms.

A file is defined as a set of correlated information and it is defined by the creator of the file.
Mostly files represent data, source and object forms, and programs. Data files can be of any type
like alphabetic, numeric, and alphanumeric.

A files is a sequence of bits, bytes, lines or records whose meaning is defined by its creator and
user.
The operating system implements the abstract concept of the file by managing mass storage
device, such as types and disks. Also files are normally organized into directories to ease their
use. These directories may contain files and other directories and so on.

The operating system is responsible for the following activities in connection with file
management:

File creation and deletion


Directory creation and deletion
The support of primitives for manipulating files and directories
Mapping files onto secondary storage
File backup on stable (nonvolatile) storage media
Network Management
The definition of network management is often broad, as network management involves several
different components. Network management is the process of managing and administering a
computer network. A computer network is a collection of various types of computers connected
with each other.

Network management comprises fault analysis, maintaining the quality of service, provisioning
of networks, and performance management.

Network management is the process of keeping your network healthy for an efficient
communication between different computers.
Following are the features of network management:

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
Network administration
Network maintenance
Network operation
Network provisioning
Network security
Main Memory Management
Memory is a large array of words or bytes, each with its own address. It is a repository of quickly
accessible data shared by the CPU and I/O devices.

Main memory is a volatile storage device which means it loses its contents in the case of system
failure or as soon as system power goes down.

The main motivation behind Memory Management is to maximize memory utilization on the
computer system.
The operating system is responsible for the following activities in connections with memory
management:

Keep track of which parts of memory are currently being used and by whom.
Decide which processes to load when memory space becomes available.
Allocate and deallocate memory space as needed.
Secondary Storage Management
The main purpose of a computer system is to execute programs. These programs, together with
the data they access, must be in main memory during execution. Since the main memory is too
small to permanently accommodate all data and program, the computer system must provide
secondary storage to backup main memory.

Most modern computer systems use disks as the principle on-line storage medium, for both
programs and data. Most programs, like compilers, assemblers, sort routines, editors, formatters,
and so on, are stored on the disk until loaded into memory, and then use the disk as both the
source and destination of their processing.

The operating system is responsible for the following activities in connection with disk
management:

Free space management


Storage allocation
Disk scheduling
Security Management
The operating system is primarily responsible for all task and activities happen in the computer
system. The various processes in an operating system must be protected from each other’s
activities. For that purpose, various mechanisms which can be used to ensure that the files,

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
memory segment, cpu and other resources can be operated on only by those processes that have
gained proper authorization from the operating system.

Security Management refers to a mechanism for controlling the access of programs, processes, or
users to the resources defined by a computer controls to be imposed, together with some means
of enforcement.
For example, memory addressing hardware ensure that a process can only execute within its own
address space. The timer ensure that no process can gain control of the CPU without
relinquishing it. Finally, no process is allowed to do it’s own I/O, to protect the integrity of the
various peripheral devices.

Command Interpreter System


One of the most important component of an operating system is its command interpreter. The
command interpreter is the primary interface between the user and the rest of the system.

Command Interpreter System executes a user command by calling one or more number of
underlying system programs or system calls.

Command Interpreter System allows human users to interact with the Operating System and
provides convenient programming environment to the users.
Many commands are given to the operating system by control statements. A program which
reads and interprets control statements is automatically executed. This program is called the shell
and few examples are Windows DOS command window, Bash of Unix/Linux or C-Shell of
Unix/Linux.

Other Important Activities


An Operating System is a complex Software System. Apart from the above mentioned
components and responsibilities, there are many other activities performed by the Operating
System. Few of them are listed below:

Security − By means of password and similar other techniques, it prevents unauthorized access
to programs and data.

Control over system performance − Recording delays between request for a service and response
from the system.

Job accounting − Keeping track of time and resources used by various jobs and users.

Error detecting aids − Production of dumps, traces, error messages, and other debugging and
error detecting aids.

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
Coordination between other software’s and users − Coordination and assignment of compilers,
interpreters, assemblers and other software to the various users of the computer systems.
Answer6: The TCP/IP (Transmission Control Protocol/Internet Protocol) protocol is a set of
communication rules that govern how devices on a network exchange data. The TCP/IP protocol
is organised into four layers, each of which performs a specific function in the process of
transmitting and receiving data.

The layers of the TCP/IP protocol, from bottom to top, are as follows:

1. The physical layer: This layer is responsible for transmitting and receiving the actual bits of
data over the physical medium, such as a copper wire or optical fiber. This layer specifies the
electrical, mechanical, and procedural characteristics of the data link, such as the type of cable
and the data rate.
2. The data link layer: This layer is responsible for providing a reliable link between two devices
on the same network. This layer performs error detection and correction, as well as flow control
to ensure that data is transmitted at a rate that the receiving device can handle
3. The network layer: This layer is responsible for routing data packets from the source device to
the destination device across multiple networks. This layer uses logical addressing, such as IP
addresses, to identify the source and destination devices, and it determines the best path for the
data to take based on factors such as network congestion and available bandwidth.
4. The transport layer: This layer is responsible for establishing end-to-end communication
between the source and destination devices. This layer provides services such as segmentation
and reassembly of data, error checking, and flow control to ensure that the data is delivered
reliably and efficiently.

The internet is a global network of interconnected networks that use the TCP/IP protocol to
communicate. When a device, such as a computer or smartphone, wants to send data to another
device on the internet, it sends the data to the network layer of the TCP/IP protocol stack. The
network layer then uses the destination device's IP address to route the data across multiple
networks, known as internet service providers (ISPs), until it reaches the destination device. The
destination device then receives the data and sends a response back to the source device,
following the same process in reverse. This process allows devices on the internet to
communicate with each other and exchange data.

Mail id: helpdesk@mujonline.edu.in


Phone: +91 79966 00444 (Toll Free)

You might also like