Computer

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

‫ رضا محمد‬:‫إعداد الطالب‬ ‫ملخص اسئلة الحاسوب‬ ‫ الحاسوب‬:‫المادة‬

‫ملخص اسئلة الفصل االول‬

:‫* مالحظة‬
.‫ لكن تكون اجابة صحيحة وقريبة من المعنى‬،‫عادي تكون اجابتك باللغة العربية‬

:‫* مالحظة‬
.ً‫عادي تكتب الجواب حسب فهمك مو اال نصا‬

Q. What are the main components of CPU? Briefly write the function of each part?
A. • Registers: They save the temporary information that is needed by a program.
• ALU: The ALU implements all the arithmetic, logical, and shift operations by supporting
important circuitry that provides these evaluations.
• Control Unit: The control unit fetches the instructions from the main memory, decodes the
instructions, and then executes them.

Q. What is the difference between single-core and multi- core processors? Briefly state the
advantages of using multi-core processors?
A. Single Core Processor:
- Core
- Memory
- Bus Interface
Chip Boundary
- Off-Chip Components
Multi-Core Processor:
- Core 1, Core 2
- Individual Memory, individual Memory
- Shared Memory
- Bus Interface
Chip Boundary
- Off-Chip Components
Advantages of multicore processors:
• Multicore processors can complete more work than single-core processors.
• Can complete simultaneous work as low frequency.
• They can process more data than single-core processors.
• They can complete more work while consuming low energy as compared to the single-core
processor.
• You can do complex works like scanning of the virus by anti-virus and watching a movie at
the same time.
• Needs less space in case of using multicore processors.

Q. Briefly, explain what is the CACHE. For what purpose is it used?


A. Cache memory is a chip-based computer component that makes retrieving data from the
computer's memory more efficient. It acts as a temporary storage area that the computer's
processor can retrieve data from easily.
Q. Compare these two processors in terms of core, generation, and main function designed
for. Which one should I choose if I'm a gamer?
Intel® Core™, i7, 8650, U, processor
Intel® Core™, i7, 9750, Η, Processor
A. Intel® Core™ i7, 8650 U processor, Ultra-low power.
U-Power Efficiency: Processors with the "U" suffix prioritize energy efficiency, offering longer
battery life in mobile devices.
Intel® Core™ i7, 8650 HK processor, High performance graphics. Unlocked
H-High-Performance Graphics: CPUs with the "H" designation feature enhanced integrated
graphics capabilities for demanding applications.
Intel® Core™ i7, 8650u, HK, processor is best for gaming.

Q. Explain the key differences between a Hard Disk Drive (HDD) and a Solid-State Drive
(SSD) in terms of structure, performance, usage, capacity, and resistance to shocks and
vibrations?
A. SSD Server:
• Improves performance with quick delivery of content.
• Large capacity SSD server are available but not common.
• Highly priced.
• No moving Parts and resistant to shock and vibrations. HDD Server:
• Takes time to Read and Write the Content.
• 1TB HDD Server is a norm nowadays.
• Affordable pricing.
• A moving disk with an arm and prone to damage.

Q. What is a computer software? Then explain briefly the function of the operating system
(OS)?
A. A computer is an electronic device that can:
- accept data (input)
- manipulate data (process)
- produce information (output) and
- store the results for future use (storage).
Generally, the term is used to describe a collection of devices that function together as
a system. Operating system software tells the computer how to perform the functions of
loading, storing and executing an application and how to transfer data. Today's operating
systems have a graphical user interface (GUI) that provide visual clues such as icon
symbols to help the user.
- Windows
- MAC
- Linux

Q. Compare Hard disk and CACHE in terms of size, speed, files storing duration, price and
the type of files being stored?
A. Hard Disks:
■ A hard disk is the main device for auxiliary storage.
■ Storage capacities of hard disks for personal computers range from 40 GB to 1 TB (around
1 trillion bytes!).
CACHE:
• Function: Frequently used programs, instructions and data.
• Speed: 10-100 times faster.
• Capacity: Less.
• Cost: Higher.

‫حل اسئلة الصباحي الفصل االول‬

Q.1 Answer ALL the following multiple-choice questions:


1. Any information stored in ______ is lost when the computer is turned off.
a. ROM b. RAM c.CD/DVD d. Floppy
2. ______ is an example of the operating systems (OS)
a. Windows 10 b. Photoshop c. Power Point d. Excel
3. Computers have a ______ error/failure rate.
a. zero b. moderate c. high d. low
4. Information is encoded in the______ system to be stored on the computer.
a. Decimal b. Binary c. Octal d. Hexadecimal
5. One of the following is NOT a component of CPU:
a. ALU b. Registers c. RAM d. Control unit

Q.2 Read the statements below and write (T) for the TRUE one and (F) for the False one:
1. The microphone is an output device. (F)
2. Cache memory is much faster than RAM (T)
3. ALU implements all the arithmetic and logical operations. (T)
4. A computer has the ability to communicate with other computers (T)
5. Intel® Core™ i7-1355U Processor is a10th generation processor (F)

Q3: Complete the comparison in the following table: RAM, CACHE


Cost, Capacity, Main function, Speed
A. RAM:
• Cost: High
• Size (physical): It depends on your OS. Presuming you are running windows, you can find
out by looking at the system properties.
• Capacity: More than Cache
• Function: OS applications, data in use
• Speed: Fast
CACHE:
• Cost: Higher than RAM
• Size (physical): storage capacity of the cache memory, typically measured in kilobytes
(KB), megabytes (MB), or gigabytes (GB)
• Capacity: Less than RAM
• Function: Frequently used programs, instructions and data
• Speed: 10-100 times faster than RAM

Q4: Briefly explain what the CPU is. Then state TWO advantages of using multi-core
processors?
A. The CPU interprets instructions to the computer and performs the logical and arithmetic
operations. It is considered the "brain" of the computer.
• They can process more data than single-core processors.
• Needs less space in case of using multicore processors.

‫حل اسئلة المسائي الفصل االول‬

Q1: Answer ALL the following multiple-choice questions:


1. ______ is a chip-based computer component that stores the frequently used files.
a. Cache b. RAM c. SSD d. CPU
2. ______ stores data and instructions for the computer to start up.
a. ROM b. RAM c.CD/DVD d. Floppy
3. Processors with the ______ suffix prioritize "Power Efficiency"
a. X b. K c. U d. T
4. ______ can be considered as a hybrid device (input and output).
a. Speaker b. Touch-screen c. Printer d. Flash drive
5. Excel is a computer ______
a. Operating system b. Program c. Driver d. Virus

Q2: Read the statements below and write (T) for the TRUE one and (F) for the False one:
1. Multi-core processors process more data than single-core processors (T)
2. Accuracy is one of computer features (T)
3. All computers have a GPU (T)
4. The binary system is represented by four digits 0-3 (T)
5. Intel® Core™ i7-1122X Processor is a type of GPU (F)

Q3: Complete the comparison in the following table: SSD, HDD


A. SSD:
• Cost: Highly priced.
• Usage: When you need high speeds or handle frequent read/writes on a large data volume.
• Capacity: Large capacity SSD server are available but not common.
• Resistant to shocks and vibrations: No moving Parts and resistant to shock and vibrations.
• Performance: Improves performance with quick delivery of content.
HDD:
• Cost: Affordable pricing.
• Usage: To store and retrieve digital information from and on fast-spinning discs.
• Capacity: 1TB HDD Server is a norm nowadays.
• Resistant to shocks and vibrations: A moving disk with an arm and prone to damage.
• Performance: Takes time to Read and Write the Content.

Q4: What are the main components of the CPU? Briefly write the function of TWO of them?
A. • Registers: They save the temporary information that is needed by a program.
• Control Unit: The control unit fetches the instructions from the main memory, decodes the
instructions, and then executes them.
• ALU.
‫ملخص اسئلة الفصل الثاني‬

Q. State Three signs indicate that your device is infected with a virus?
A. 1. Speed of the System: In case a virus is completely executed into your device, the time
taken to open applications may become longer and the entire system processing may start
working slowly.
2. Pop-up Windows: One may start getting too many pop up windows on their screen
which may be virus affected and harm the device even more.
3. Self Execution of Programs: Files or applications may start opening in the background of
the system by themselves and you may not even know about them.

Q. State Three ways to protect your PC from viruses?


A. 1. Use a Trusted Antivirus Product: Trusted computer antivirus products are crucial to stop
malware attacks and prevent computers from being infected with viruses. These antivirus
concepts will protect devices from being infected through regular scans and identifying and
blocking malware.
2. Avoid Clicking Pop-up Advertisements: Unwanted pop-up advertisements are more than
likely to be linked to computer viruses and malware. Never click on pop-up advertisements
because this can lead to inadvertently downloading viruses onto a computer.
3. Scan Your Email Attachments: A popular way to protect your device from computer
viruses is to avoid suspicious email attachments, which are commonly used to spread
malware. Computer antivirus solutions can be used to scan email attachments for potential
viruses.

Q. Classify the viruses based on its function and mention an example for each of them?
A. 1. File Infector Viruses: These viruses attach themselves to executable files and can
spread when the infected file is executed. Example: CIH/Chernobyl - Also known as the
"Chernobyl virus," it targeted Windows 95 and 98 systems, damaging the system BIOS and
rendering the computer inoperable.
2. Boot Sector Viruses: These viruses infect the master boot record or boot sector of a
storage device, making them active when the system is booted. Example: Stone Virus - This
virus infects the boot sector and spreads through infected floppy disks.
3. Macro Viruses: These viruses are written in macro language and attach themselves to
documents or templates, typically in word processing or spreadsheet applications. Example:
Melissa - A macro virus that spread through Microsoft Word documents, infecting documents
and emailing itself to the top 50 contacts in the user's address book.

Q. What is the virus? State all of its components?


A. A computer virus is a program which can harm our device and files and infect them for no
further use. When a virus program is executed, it replicates itself by modifying other
computer programs and instead enters its own coding. This code infects a file or program
and if it spreads massively, it may ultimately result in crashing of the device. Computer
viruses aim to:
• Disrupt systems
• Cause major operational issues
• Result in data loss and leakage.
Q. What are the boot-sector viruses? Briefly explain it with an example?
A. Boot Sector Viruses: These viruses infect the master boot record or boot sector of a
storage device, making them active when the system is booted. Example: Stone Virus - This
virus infects the boot sector and spreads through infected floppy disks.

Q. What are the macro viruses? Briefly explain it with an example?


A. Macro Viruses: These viruses are written in macro language and attach themselves to
documents or templates, typically in word processing or spreadsheet applications. Example:
Melissa - A macro virus that spread through Microsoft Word documents, infecting documents
and emailing itself to the top 50 contacts in the user's address book.

Q. What is the virus? And briefly explain the Trojans?


A. - A computer virus is a program which can harm our device and files and infect them for
no further use. When a virus program is executed, it replicates itself by modifying other
computer programs and instead enters its own coding. This code infects a file or program
and if it spreads massively, it may ultimately result in crashing of the device.
- A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named
after. The Trojan Horse, at first glance will appear to be useful software but will actually do
damage once installed or run on your computer.

‫حل اسئلة الصباحي الفصل الثاني‬

Q1: Answer ALL the following multiple-choice questions:


1. ______ will appear to be useful software but will actually do damage once installed on PC.
a. Trojan b. Worm c. Excel d. Photoshop
2. ______ might not be owned by one organization.
a. WAN b. LAN c. MAN d. Anti-virus
3. Computer ______ aim to Cause major operational issues.
a. Networks b. LAN c. Processor d. Viruses
4. Use a trusted antivirus product to______ your computer from viruses.
a. Protect b. Infect c. Inject d. None of them
5. One of the following is NOT a component of a Virus:
a. Header b. Protection c. Trigger d. A replication mechanism

Q2: Read the statements below and write (T) for the TRUE one and (F) for the False one:
1. Speed of the System is a sign to identify computer viruses. (T)
2. LAN covers small areas such as college, school, hospital, and so on. (T)
3. Repeater is capable of filtering local area network traffic. (F)
4. Pop-up Advertisements are very safe and useful for end users. (F)
5. Chernobyl is an operating system. (F)

Q3: Complete the comparison in the following table:


A. Ring Topology:
• Configuration: Ring
• Central device: Not available
• Data Transmission: One direction
• Installation and maintenance: Difficult
• Node failure: If one node fails the entire network will be down
Star Topology:
• Configuration: HUB
• Central device: Hub or switch
• Data Transmission: Both direction
• Installation and maintenance: Easy
• Node failure: If one node fails will not affect the rest

Q4: What is a virus? Then classify the viruses based on their function?
A. A computer virus is a program which can harm our device and files and infect them for no
further use. When a virus program is executed, it replicates itself by modifying other
computer programs and instead enters its own coding. This code infects a file or program
and if it spreads massively, it may ultimately result in crashing of the device.
1.File Infector Viruses: These viruses attach themselves to executable files and can spread
when the infected file is executed.
2.Boot Sector Viruses: These viruses infect the master boot record or boot sector of a
storage device, making them active when the system is booted.
3. Macro Viruses: These viruses are written in macro language and attach themselves to
documents or templates, typically in word processing or spreadsheet applications.

‫حل اسئلة المسائي الفصل الثاني‬

Q1: Answer ALL the following multiple-choice questions:


1. ______viruses infect the master boot record or boot sector of a storage device
a. Boot Sector b. Macro c. All d. File infector
2. The ______ can perform error checking before forwarding data.
a. switch b. router c. repeater d. hub
3. In ______ topology, if one node fails the entire network will be down.
a. ring b. bus c. star d. None of them
4. ______ viruses attach themselves to documents such as word or spreadsheet.
a. Macro b. Worm c. File infector d. All
5. Computer virus aims to______:
a. harm your device b. result in data loss and leakage c. disrupt systems d. All of them

Q2: Read the statements below and write (T) for the TRUE one and (F) for the False one:
1. All Computer viruses have a trigger/activation mechanism. (T)
2. Bus topology consists of a central device. (T)
3. NIC is a network adapter to improve the internet connection (F)
4. Avoid scanning your email attachments to protect your PC from viruses. (T)
5. Melissa is a virus. (T)

Q3: Complete the comparison in the following table:


A. LAN:
• Full form: LAN stands for local area network.
• Geographic Span: Operates in small areas such as the same building or campus.
• Ownership: LAN’s ownership is private.
• Transmission Speed: The transmission speed of a LAN is high.
• Congestion: There is less congestion in LAN.
WAN:
• Full form: WAN stands for wide area network.
• Geographic Span: Operates in larger areas such as country or continent.
• Ownership: While WAN also might not be owned by one organization.
• Transmission Speed: Whereas the transmission speed of a WAN is low.
• Congestion: Whereas there is more congestion than MAN in WAN.

Q4: State Three Signs to identify computer viruses and then briefly explain Two of them?
A. 1.Speed of the System: In case a virus is completely executed into your device, the time
taken to open applications may become longer and the entire system processing may start
working slowly.
2. Pop-up Windows: One may start getting too many pop up windows on their screen which
may be virus affected and harm the device even more.
3. Self Execution of Programs.

‫ رضا محمد‬:‫إعداد الطالب‬

You might also like