Assignment DBB1105 BBA 1 Set-1 and 2 Nov 2022
Assignment DBB1105 BBA 1 Set-1 and 2 Nov 2022
Assignment DBB1105 BBA 1 Set-1 and 2 Nov 2022
INTERNAL ASSIGNMENT
SET-I
Q. No Questions Marks Total Marks
a. Define Computers?
1. b. What are the key characteristics of each generation of 2+8 10
computers? Explain
Convert (1D7F)16 to an Octal system number and
2. 5+5 10
(5A9.63)16 to a decimal system number
Discuss the advanced formatting options available in MS
Word.
3. 4+6 10
How would you create a custom template and apply it
quickly to slides?
SET-II
Explain various design strategies for Software System
Design.
4. 5+5 10
What are the four quality measures for building software
products?
Enlist the main functions of the operating system.
5. 5+5 10
Describe various components of operating systems.
Discuss the TCP/IP protocol layers with the help of a
6. 6+4 10
diagram. Explain how the internet works.
SET I
Q.NO.1) a. Define Computers?
b. What are the key characteristics of each generation of computers. Explain
There have been many generations of Computer since the inception of its idea and their key
characteristics can be detailed as below:
The First generation of computers were initially used as vacuum tubes as circuit and magnetic
drums for the memory. These devices relied upon the binary code language to function and had
limited in solving one problem at a time. They were large and bulky and consumed a lot of space
for installation. These first generation computers started a revolution however lacked in
versatility and pace. They were difficult to program and use because of usage of machine
language. They performed several arithmetic calculations using the vacuum tubes and had a huge
consumption of electricity. They were used for solving scientific problems at the time. Thy were
expensive to maintain due to fre quent breakdown etc however could solve problems in few
milliseconds.
Few examples are UNIVAC (Universal Automatic computer) , ENIAC (Electronic Numerical
Integrator and Calculator) , EDVAC (Electronic Discrete Variable Automatic Computers)
The Second generation computers were an improved version and were transistors. Here the
vacuum tubes now were replaced by the transistors that were made of the semiconductor
Mail id: [email protected]
Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
materials like germanium and silicon. They generated lot of heat however much less in
comparison to the first generation. The size was reduced and these were much faster and
economic in expense. These generation computers used the magnetic cores as the primary
memory and magnetic disks as secondary memory storage devices. The speed improved too and
could resolve problems in microsecond’s now. The input was still through the punched cards and
output in printouts like the first generation. Examples are PDP-8, IBM 1401 and CDC 1604.
Now comes the third generation of computers that used much less energy or power and
generated lesser heat than the first and the second generation computers. The cost of the
computer was much reduced, as individual components of the computer were not required to be
assembled manually unlike done earlier.. The breakdowns and maintenance cost of the
computers was also less compared to their predecessors.
Examples are PDP-11, IBM 370
The use of microprocessors has resulted in the fourth generation computers to be much more
efficient, smaller and cheaper than their earlier generations. These are also more reliable and
portable. The pointing devices make it easy to learn and use the computers. Also networking has
resulted in resource sharing and communication across various computers. They are more energy
efficient, use les power and generate much lesser heat. This generation uses microprocessors i.e.
circuits containing millions of transistors as the basic processing device. They led to the growth
of large scale integration very large scale integration and finally ultra large scale integration
respectively. This technology could squeeze thousands of transistors on a single piece of silicon
called chip. The computers became easier to carry, portable and popular now. IBM introduced
personal computers in 1981 October along with Microsoft and a software called ‘Microsoft Disk
Operating system” The Microsoft windows were announced and subsequently led to various
developments and innovations over two decades.
Example: Apple II, cray 1
The goal of the fifth generation computers is to develop knowledge based problem solving
techniques and intelligent programming like Artificial intelligence. These will be capable of self-
learning and is the next generation continuously evolving. The input and outputs would be in
graphic images form or speeches. At the moment they are used in limited sectors like health,
medicine etc.
Q.no.2) Convert (1D7F)16 to an Octal system number and (5A9.63)16 to a decimal system number
Answer: We are required to convert a hexadecimal no. to an octal system number, this can be done
in two ways both explained below.
By converting the hexadecimal no. to binary equivalent or by converting it onto decimal equivalent
and then to octal by using the division –remainder method.
Method 1:
To convert (1D7F)₁₆ into an octal system number, we will use the binary table and convert the
digits into their binary forms having four bits each.
1 - 0001
D - 1101
7 - 0111
F - 1111
Now this can be rearranged by forming groups of three from right to left as mentioned below.
001 - 1
110 - 6
101 - 5
111 - 7
111 - 7
Hence, answer shall be equivalent octal number is (16577)₈ for (1D7F) ₁₆.
Method 2:
We need to convert hexadecimal to its equivalent decimal number first and then we will convert
decimal to its equivalent octal system number
(1D7F) radix or base 16 to its equivalent in decimal no. means radix or base would be 10
Now to translate the number 755110 to an octal no. system we can use the division-remainder
method:
DIVISION REMAINDER
8 7551
7
8 943
7
8 117
5
8 14
6
Hence arranging the remainder to get the value as (16577) with radix 8 =755110= (1D7F) 16
Answer: To convert hexadecimal nos. here we need to calculate the decimal equivalent,
To convert (5A9.63)₁₆ into a decimal system number, we multiply each digit with the increasing
powers of 16 starting from multiplying 16⁰ to the unit's place. We multiply the digits after the
decimal point by decreasing powers of 16. We then add the results.
= (1449.387)₁₀
Q.no. 3) Discuss the advanced formatting options available in MS Word. How would you create a
custom template and apply it quickly to slides?
Answer: The various advanced formatting options available in MS Word are useful in saving time,
it can also help create a document unique and stand out among many. In MS Word there are
multiple types of formatting primarily basic formatting and advanced ones, we can apply several
advanced formatting options to a given set of text such as styles, size, highlights, color, clearing,
change case etc. for the fonts.
Few more important advanced formatting options available in MS word can be explained below:
1. Working with tables: Tables consists of rows and columns and are used for variety of purpose
like storing and displaying data, texts, pictures etc. in a tabular form.
• One can use the icon to draw a table manually
-This option is slightly difficult for a user as the drawing and adjustments have to be done
manually
• Alternately as a quick option, One can use the table menu and choose options accordingly
One can easily format the tables by various available style options for example adjusting
the rows/columns as desired, selecting auto fit, table properties, inserting additional or
removing rows and columns, modifying table styles etc.
2. Working with various Styles: Styles are a shortcut to formatting. Style is a very useful feature,
can be selected by the user and applied to the entire document easily. It is available in Home tab
as a subheading. Various types of styles can be defined as Paragraph styles, Character styles,
automatic update (applies to the entire document) , only in this document style(applied only to the
selected document by the user) , New documents based on a certain previously used template or
styles, Style inspector dialogue box with various formatting options etc.
Managing styles can be done by using the dialogue box for same in the Home tab-Styles-Managing
styles.
A template is a document which is pre-formatted with pre-defined themes and styles by the user.
The pre-selected themes and styles are applied to the entire document and user just has to select
and open the document with a pre-defined template. The template is used for the entire word
document.
Application of a template to a whole document:
A user can create its own customized template by opening a anew document and format as the
document as per the requirements.
After making the desired changes in document, select “save document as”. Name the template in
the save dialogue box and save the document as …selected the word template and save. The
document is saved now as a template. To save the template created in default area of word, select
trusted templates option at the right hand of save as dialogue box.
Application of a template to a new document
Click on the office –New- dialog box-click on installed templates listed on top-select the desired
template-click on create-a new document with the desired template will open.
Q.no. 4) Explain various design strategies for Software System Design. What are the four quality
measures for building software products?
Answer: Software system design is a process to conceptualize the software requirements into
the implementation of same. Software design takes the user requirements as challenges and
tries to find an appropriate solution. While the software is being conceptualized, a plan is
chalked out to find the best possible design for implementing the intended solution. There are
multiple variants of software system design.
Various design strategies for Software System Design are explained below
• Objects - All entities involved in the solution design are known as objects. For example,
person, banks, company and customers are treated as objects. Every entity has some
attributes associated to it and has some methods to perform on the attributes.
• Classes - A class is a generalized description of an object. An object is an instance of a class.
Class defines all the attributes, which an object can have and methods, which defines the
functionality of the object.
In the solution design, attributes are stored as variables and functionalities are defined by
means of methods or procedures.
Mail id: [email protected]
Phone: +91 79966 00444 (Toll Free)
Directorate of Online Education
• Encapsulation - In OOD, the attributes (data variables) and methods (operation on the
data) are bundled together is called encapsulation. Encapsulation not only bundles
important information of an object together, but also restricts access of the data and
methods from the outside world. This is called information hiding.
• Inheritance - OOD allows similar classes to stack up in hierarchical manner where the
lower or sub-classes can import, implement and re-use allowed variables and methods
from their immediate super classes. This property of OOD is known as inheritance. This
makes it easier to define specific class and to create generalized classes from specific
ones.
• Polymorphism - OOD languages provide a mechanism where methods performing similar
tasks but vary in arguments, can be assigned same name. This is called polymorphism,
which allows a single interface performing tasks for different types. Depending upon
how the function is invoked, respective portion of the code gets executed.
• Reliability
• Performance efficiency
• Security
• Maintainability
1. RELIABILITY is the risk of software failure and the stability of a program when exposed to
unexpected conditions. Reliable software has minimal downtime, good data integrity,
and no errors that directly affect users.
3. SECURITY assesses how well an application protects information against the risk of
software breaches. The quantity and severity of vulnerabilities found in a software
4. MAINTAINABILITY is the ease with which you can modify software, adapt it for other
purposes, or transfer it from one development team to another. Compliance with
software architectural rules and use of consistent coding across the application combine
to make software maintainable.
Q.no. 5) Enlist the main functions of the operating system. Describe various components of
operating systems.
Answer: An operating system is a software component that acts as a core of a computer system. It
is basically the interface between the computer and its support components. The main functions of
an operating system carried out is allocation of the resources, services and programs e.g. memory
management, file system etc. This basically handles the responsibility of storing any form of data,
various system programs, and user programs in the memory.
The important functions can be described below:
• Security.
• Control over system performance.
• Job accounting.
• Error detecting aids.
• Coordination
• Memory management.
• Processor management
• Device management.
• File management
3. Job accounting –
The Operating system also tracks the time and resources used by various tasks, this
information is further used to track the resource usage for a particular individual or a group
of users.
6. Memory Management –
The operating system manages the Primary Memory as well. The primary memory is also
called a Main memory and is made up of a large array of bytes or words where each byte or
word is assigned a particular address. Main memory is fast storage and it can be accessed
directly by the CPU. For any program to be executed, it should be first loaded in the main
memory. An Operating System performs the following activities for memory management:
It keeps track of the primary memory, i.e., which certain bytes of memory are used by
certain user program. The memory addresses that have already been assigned and the
various addresses of the memory which is yet not been used. In multiprogramming, the OS
decides the sequence by which the processes are granted access to the memory for a
particular time or duration. It allocates the memory to a process as and when requested and
deallocates the memory after the termination of the process or the operation.
7. Processor Management –
In a multi-programming environment, the OS decides the sequential order by which the
various processes would have access to processor, and the processing time for each
process. This function of OS is also called process scheduling. It keeps track of the status
of processes. The program which performs this task is called a traffic controller, it allocates
8. Device Management –
An OS manages the device communication via various drivers. It performs some activities
for device management and also tracks all the devices connected to the system. It
designates a program responsible for every device known as the Input/output controller and
decides which process gets access to a certain device and the time duration for the access.
The OS allocates devices in an effective way and deallocates devices as and when they are
not required any longer.
9. File Management –
A file system is organized into directories for a convenient navigation and usage. These
directories may have more sub directories and many other files. An Operating System
carries out the following file management activities like tracking where information is
stored, user access settings and status of every file. Such facilities are collectively known
as the file system.
An operating system is a complex system. We can only create the operating system by dividing it
into several smaller parts or fractions. Each part must be a well-defined portion of the system
that can suitably describe the functions, inputs, and outputs etc.
There are various types of operating system components:
1. Process Management
2. File Management
3. Network Management
4. Main Memory Management
5. Secondary Storage Management
6. I/O Device Management
7. Security Management
8. Command Interpreter System
1. Process Management
The Process management is defined as a mechanism used to handle multiple processes that are
running in the operating system simultaneously. Each software application program contains
processes associated with the software application program while they are running.
Synchronization Process
Suspension and Resumption.
Communication Process
Process Creation and Deletion.
2. File Management
A file is defined as a set of correlated information and is most suitably is defined by the creator
of the file. Data files can be alphabetic, numeric or alphanumeric and mostly represent data,
source, object forms, and programs.
3. Network Management
Network management is the process of managing and administering the computer network. It
comprises of fault analysis, maintaining the quality of service, provisioning of networks and
performance management.
The collection of a computer/processors is known as a distributed system. A distributed system
does not share its memory. In a distributed system, each processor would have its separate
memory, and the communication between the processors takes place with the help of various
communication lines such as telephone lines, fibre optics, etc.
With the help of the computer network, computers are connected, and it is configured in various
ways. Network management provides the facility of network connection, whether it is a fully or
partially connected network and it helps to design routing and connection strategies that
overcomes the issues of security and connection.
The main task performed by the operating system is to execute the programs. And along
with the data, these programs are helpful to access the programs, which are present in the
main memory at the time of execution. The memory size is too small, so we cannot store
all the programs and data in the memory permanently. So, the computer system provides
the facility of secondary storage. In today’s scenario, hard drives/SSD are used in most of
the computer system as the primary memory for both data as well as programs. Although
we also use secondary storage management with various storage devices such as
CD/DVD drives and USB flash drive. There are various programs such as compilers,
assemblers, etc. that are stored on a disk till the program is loaded into the memory, and
then for processing, programs use the disk as a source and the destination.
The operating system is responsible to hide the details of the hardware devices from the user.
Functions of the I/O Management
7. Security Management
In an operating system, there are several processes that are required to be secured from different
activities. For this purpose, there are different types of procedures we use, which ensures that the
processes that you want to operate for the hardware resources such as memory CPU, files, etc.
must have appropriate authorization from the operating system.
Q.no. 6) Discuss the TCP/IP protocol layers with the help of a diagram. Explain how the internet
works.
Answer: The TCP/IP or the transmission control protocol and Internet protocol layers are
explained below
1. Application Layer: The application layer is the topmost layer of the TCP/IP protocol. It also
performs the role of the session layer and presentation layer in TCP/IP model. This topmost layer
allows users to access the network services, use and establish network-based applications.
The protocols of this layer are Hypertext transfer protocol (HTTP), File transfer protocol
(FTP), TELNET, simple network management protocol, Domain name system protocol
and simple mail transfer protocol (SMTP).This layer promotes the user to utilize the
utilities of the network. It gives users utilities like user log in, initializing messages, emails
and transmission of files.
2. Transport Layer
This layer is designed to allow the computers on the source side and destination side to
start a communication.
The transport layer regulates the flow of the bits through a flow regulate mechanism and
gives a reliable and error-free connection between two or more devices.
The protocols of these layers are Transmission control protocol (TCP), User datagram
protocol (UDP) and Stream control transmission protocol (SCTP).
The transport layer gives an interface for the operators to the primary network.
3. Internet Layer
This layer defines the protocol for the logical transfer of data across the globe.
The protocols of this layers are internet protocol (i.e., responsible for delivering packets),
internet control message protocol (i.e., responsible for allowing hosts with data regarding
This layer is the combination of the physical layer and data link layer.
It relates to physical layer functions such as bits and the medium used to carry bits and
also relates to data link layer functions like converting bits into MAC addresses and
Ethernet frames.
The network access layer is allocated an address from the internet layer because of this, it
can connect with computers on another network.
• This layer checks out for hardware addressing, and the protocols of this layer permit the
actual transmission of bits.
IP ICMP
INTERNETWORK
ARP RARP
Internet is a global network that connects billions of computers across the world with each other
and to the World Wide Web. It uses standard internet protocol suite (TCP/IP) to connect billions
of computer users worldwide. It is set up by using cables such as optical fibres and other wireless
and networking technologies. At present, internet is the fastest mean of sending or exchanging
information and data between computers across the world. The internet is often described as a co-
operative anarchy. Each network individually has its own rules and communication between two
or more networks is possible only because of cooperating, there is no central administrative body
of internet but several smaller formal bodies within the internet that performs coordinating
functions. Internet uses the basic units of measurements called packets .There are Routers on the
internet that are special purpose computers that decide what shall be the best path to a destination
to send the packets. These packets are reassembled into the original message once they reach their
destination.