Imd113 Final Exam Exercise

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

PART A

1.False
2.False
3.True
4.True
5.False
6.True
7.True
8.True
9. False
10.True
11.True
12.True
13.False
14.True
15.True

PART B

Q.1)

1. Web browser make it easier to surf the internet. You can use these to quickly find
information on the internet such as google chrome.

2. Presentation software enables the simple visual presentation of data through the use of
various tools. By making slides are simple way to present information. Such as PowerPoint.

3. Database software often known as a DBMS (Database Management System), is a


collection of data related with any application. This aids in data organization by constructing
and administering a database by storing, changing, extracting, and searching for information
inside a database. For example, Microsoft SQL Server.

4. Multimedia software allows users to produce, edit, or record pictures, audio, and video
files. This form of application software is a major player in the entertainment, media, and
telecommunications industries. They are intended to improve the visual and audio aspects of
the existing material. For example, VLC media player.
5. Word processing software allows users to enter, edit, format, and output text material.
This sort of software tool forms and enriches text by processing words with pages and
paragraphs. It also improves the 'wording' experience by providing quick access to thesaurus,
synonyms, and antonyms. Such as Microsoft word docs.

Q.2)

1. Fingerprint reader: A scanner that recognizes a person's fingerprint for security purposes. If
a fingerprint matches that of a previously stored sample, access to a computer or other system
is granted. For example, it is used in laptop

2. Hand geometry: Hand geometry is a biometric that uses the shape of the user's hands to
identify them. Hand geometry readers take measurements of a user's palm and fingers in a
variety of dimensions such as length, width, deviation, and angle and compare them to
measurements stored in a file. For example, use in safety box

3. Face recognition system: Facial recognition is a method of identifying or verifying a


person's identity by using their face. People can be identified using facial recognition
systems in photos, videos, or in real time. Such as use in smartphone

4. Iris recognition: Iris recognition is the method of capturing a high-contrast image of a


person's iris using visible and near-infrared light. It is a type of biometric technology similar
to face and fingerprint recognition. This technology is typically used in banks and safe
deposit boxes.

5. Voice verification system - Voice verification is the process of authenticating a user's


identification via the use of voice. For example, Google Voice allows us to search for
information and ask questions using our phones or computers.

Q.3)

1. The motherboard is the computer's backbone; it organises various devices and serves as a
mounting point for other critical computer components.

2. RAM is one of the most fundamental components of a computer. RAM is the ultra-fast and
temporary data storage capacity that a computer currently or in the near future requires.
3. The power supply and batteries convert AC electricity from the wall socket to DC power.
A power supply or batteries can be used to power a mobile computer.

4. Buses allow different components within and outside the system unit to connect with one
another.

5. The processor's processor control unit directs and coordinates the majority of the
computer's functions.

Q. 4)

1.- Warm booting is when the system starts from the beginning or from the starting state,
which is what we do when we start our system.

- Cold booting is when the system starts up automatically while we are using it.

2. - A personal firewall monitors and protects a computers and its data from unwanted
commands.

- The purpose of an antivirus application is to safeguard a computer from viruses by


detecting and eliminating any computer viruses discovered in memory.

- Malware removal is a tool that identifies and removes spyware and other related
programmes.

Q. 5)

1. Cloud storage has far larger storage capabilities than USB flash drives and other physical
solutions. This eliminates the need to trawl through each device to find the correct file.

2. External storage refers to digital storage devices that are not connected to computers.
These are typically used to boost storage capacity on a computer that is running low on
space, to provide better mobility, or to allow file transfers from one device to another.

3. A USB flash drive can be used to store important files and data backups, to transport
favourite settings or apps, to run diagnostics to diagnose computer problems, or to boot an
operating system.
4. A hard disc drive is the magnetic storage media of a computer. Hard discs are flat circular
discs made of aluminium or glass that are coated with a magnetic material.

5. Faster SSDs can process data at the ultra-high rates necessary in today's business
environment, especially when running programmes that access enormous amounts of data,
such as an operating system.

PART C

A supercomputer is a computer that performs at a higher level than a general-purpose


computer. FLOPS (floating-point operations per second) are used to quantify the
performance of a supercomputer rather than MIPS (million instructions per second).
Supercomputers are huge computers with tens of thousands of processors that can do
billions or trillions of computations per second. Some supercomputers can perform up to
100 quadrillion FLOPS. In compared to distributed computing systems, supercomputers are
suitable for real-time applications because information moves quickly between processors.
There are several types of supercomputers, such as Jaguar, Titan, Kraken, and K Computer.

In addition, a personal computer is a general-purpose computer whose size,


capabilities, and initial purchase price make it acceptable for individual use, and which is
meant to be operated directly by the end-user without the need for an intermediary computer
operator. In contrast, batch processing or time-sharing methods enabled several workers to
use bigger, more expensive minicomputer and mainframe systems at the same time. A
personal computer consists of a CPU for data processing, a keyboard for data entering, a
monitor for data display, and a data storage device. There are several sorts of personal
computers, such as laptops, desktop computers, and netbooks.

Furthermore, a mobile computer is a portable personal computer that is meant to be


readily transported from one location to another. A mobile computer, often known as a
notebook computer, is a small, lightweight computer with a screen in the lid and a keyboard
in the base. Designed to fit on your lap and carry easily. Input devices on mobile computers
include a keyboard, a touchpad, and a camera. In addition, mobile computers have output
devices such as a screen and speakers. There are two sorts of mobile computers: regular
laptops and ultrathin laptops. There are several sorts of mobile computers, such as laptops,
mobile phones, and tablets.
A smartphone is an internet-capable phone that often contains a calendar, an address
book, a calculator, a notepad, games, a browser, and a plethora of other apps. Touch
displays are common on cellphones. Some phones include a built-in small keyboard on the
front of the phone instead of an on-screen keyboard, or a keyboard that slides in and out
from behind the phone. On-screen keyboards, swipe keyboard apps, micro keyboards,
keypads, slides out keyboards, portable keyboards, virtual keyboards, and speech to text are
just a few examples of phone keyboards.

You might also like