ITC Paper B - Part 1 - V1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

KINNAIRD COLLEGE FOR WOMEN

Final Examination – Fall 2020


DEPARTMENT OF COMPUTER SCIENCE

Course Title: Introduction to Computers


Total Time 2.5 Hours
Max. Marks: 55

Instructions:
 This is a closed book/notes/resource exam.
 You are required to hand-write your answers on neat answer sheets.
 Number your answer sheets and put your name on every sheet beforehand.
 Using computer/cell phone is NOT allowed for the first part, except for taking pictures before
submission.
 Scan clearly using CamScanner to create a pdf document. Rename it to your name, Turn-in on MS
Teams and email your scanned document at [email protected]
 For question on scratch, use Scratch tool and submit and email the project, saved in your name.
 Do not leave until you are told to do so.
Part 1
1. Compute and fill in the values of the missing cells. Show rough work to gain full credit. [4]
Binary Denary Hexadecimal
75
4E
11011010
1023

2. One of the students in a class stated, “Pipelined operation increases the efficiency of a
system”. State whether this statement is true or false. Justify your choice with an example.
[1+2+1]

3. An individual uses a variety of computer systems. Which system would you recommend to
an animator and why? Note that he looks for the optimal balance of price, reliability, and
most importantly, performance and compatibility with their mission-critical applications
like 3ds Max, and LightWave 3D. [1+2]

4. Two colleges in Lahore wish to connect their e-libraries with each other. If a link is
established between the two institutes, what kind of a network would be formed? [3]

5. The table shows the specifications of two laptop computers. [1+1+1]

(a) Identify the laptop with the greater processor speed.


(b) Laptop B has 512KB cache; while Laptop A has 1Mb cache. State the difference
between these two cache values.
(c) Each laptop has a pre-installed Windows. Window is an example of which type of
software? Name the other type of software that should be installed. Give an example.
6. Convert the existing Manual System used by a shop to calculate a customer’s bill and carry
out stock control to an automatic computer-controlled system. [5]

7. Consider the case of an MNC (Multinational Company) where the head office is situated in
Karachi and the regional offices are situated in Islamabad and Lahore. Mention the type
of network and network architecture they can use. Justify your choice. [2+2]
8. In class you studied, there is a network topology that requires a central controller. In
addition, you also studied there is also a network topology contains a backbone to which all
the nodes are connected to. State if these statements are true or false, elaborate your choice
by describing their similarities and differences (if any). [2+2]

9. Erica is building a website for her cake design business. Erica uses HTML to create her
website. Customers will use a web browser to access Erica’s website. Erica writes a
paragraph of text to explain how the website will be displayed on a customer’s computer.
Based on the given scenario, answer the following questions: [1+1+1]
a. The user enters the website address into the address bar. What that address is
called? Elaborate.
b. What protocol would be used? Justify
c. Where the browser sends a request to? As in, where the files for the website are
stored.

10. The Henslows Diner stores personal data on a computer. This computer is connected to the
Internet to allow the data to be backed up. There is currently one security method in place
to protect the data on the computer from unauthorised access. This is a password.
Give two other security method that could be added to improve the security of the data.
Describe how the methods will keep the data safe. [4]

11. Security issues’ descriptions are mentioned below, identify each security issue. [3]
Description Security Issue
Creator of code sends out a legitimate-looking email in
the hope of gathering personal and financial information
from the recipient; it requires the user to click on the link
in the email or attachment.
Program or code that replicates itself; designed to amend,
delete or copy data or files on a user’s computer; often
causes the computer to crash or run slowly.
Malicious code installed on the hard drive of a user’s
computer or on a web server; this code will re-direct the
user to a fake website without the user’s knowledge.

12. Create a database table, PCSTOCK, which is a part of the database in an electronics shop. They
have some of the desktop (DT), tablet (TB) and laptop (LT) computers in stock. Identify the four
fields and records required for the database (Fill in the table given below). Give each field a
suitable name and identify a primary key. Provide a sample of data that you could expect to see
in the field. [4+1]

Field 1: Field 2: Field 3: Field 4:

That’s it! Thank You!

You might also like