Multiple Ministry -
Assistant Programmer, 2017
1. Differentiate
between system software & application software.
S.No. |
System Software |
Application Software |
1. |
System software is used for
operating computer hardware. |
Application software is used
by user to perform specific task. |
2. |
System softwares are
installed on the computer when operating system is installed. |
Application softwares are
installed according to user’s requirements. |
3. |
In general, the user does not
interact with system software because it works in the background. |
In general, the user
interacts with application sofwares. |
4. |
System software can run
independently. It provides platform for running application softwares. |
Application software can’t
run independently. They can’t run without the presence of system software. |
5. |
Some examples of system
softwares are compiler, assembler, debugger, driver, etc. |
Some examples of application
softwares are word processor, web browser, media player, etc. |
2. Explain
the functions of ALU & Control Unit of a computer.
ALU stands
for Arithmetic Logical Unit, and it is a circuit component of the CPU that
deals with mathematics calculations, data processing and deducting all the
logical conclusions and outputs. Arithmetic operations include basic
calculations such as addition, subtraction, multiplication and division. CU on the other hand, stands for Control
Unit, and is one of the two main components of the computer processor; it deals
with the coordination between the hardware devices attached with each other and
works as an interactive bridge between software and hardware of the computer
system. Parts of the internal components that the control unit directs include
the arithmetic logical unit and buses.
3. Explain
URL, FTP, ASCII and BIOS.
A Uniform
Resource Locator (URL), colloquially termed a web address, is a reference to a
web resource that specifies its location on a computer network and a mechanism
for retrieving it. A URL is a specific type of Uniform Resource Identifier
(URI), although many people use the two terms interchangeably.
The File
Transfer Protocol (FTP) is a standard network protocol used for the transfer of
computer files between a client and server on a computer network. FTP is built
on a client-server model architecture using separate control and data
connections between the client and the server.
ASCII
-American Standard Code for Information Interchange, is a character encoding
standard for electronic communication. ASCII codes represent text in computers,
telecommunications equipment, and other devices.
BIOS (basic
input/output system) is the program a personal computer's microprocessor uses
to get the computer system started after you turn it on. It also manages data
flow between the computer's operating system and attached devices such as the
hard disk, video adapter, keyboard, mouse and printer.
4. Explain
how cache memory is used to increase the processing speed of a computer.
Cache is a
small amount of memory which is part of the CPU which is physically closer to
the CPU than RAM is. The more cache there is, the more data can be stored
closer to the CPU.
Cache
memory is beneficial because:
* Cache memory holds frequently used
instructions/data which the processor may require next and it is faster access
memory than RAM, since it is on the same chip as the processor.
* This reduces the need for frequent
slower memory retrievals from main memory, which may otherwise keep the CPU
waiting.
-The more
cache the CPU has, the less time the computer spends accessing slower main
memory and as a result programs may run faster.
5. What
do you mean by primary key and foreign key? What are the difference between
primary key & unique key?
Primary
Key
A column or
group of columns in a table which helps us to uniquely identifies every row in
that table is called a primary key. This DBMS can't be a duplicate. The same
value can't appear more than once in the table.
Foreign
key
A foreign key is
a column which is added to create a relationship with another table. Foreign
keys help us to maintain data integrity and also allows navigation between two
different instances of an entity. Every relationship in the model needs to be
supported by a foreign key.
Primary Key vs. Unique Key:-
6. A
block address is granted to a small organization. If one of the addresses is
205.16.37.39/28, what is the first and last address of the block.
7. Using examples explain data types used in C Language.
C Data Types are used to:
·
Identify the type of a
variable when it declared.
·
Identify the type of the
return value of a function.
·
Identify the type of a
parameter expected by a function.
ANSI C provides three types of data types:
1.
Primary(Built-in) Data
Types:
void, int, char, double and float.
2.
Derived Data Types:
Array, References, and Pointers.
3.
User Defined Data Types:
Structure, Union, and Enumeration.
8. Write
a program to read the coordinates of the end points of a line and to find its
length. Use a structure variable named ‘Line’ to store the relevant information
about its end points.
9. Write a program in C to calculate the sum of the series: 1+(1+2)+(1+2+3)+.......+(1+2+....+n).
Solution:-
#include<stdio.h>
int main()
{
int i,N;
unsigned long sum, total;
printf("Enter the value of N: ");
scanf("%d",&N);
sum=0;
for(i=1;i<=N;i++)
{
sum=0;
for(j=1;j<=i;j++)
{
sum=sum+j;
}
total=total+sum;
}
printf("Sum of the series is: %ld\n",total);
return 0;
}
10. There are 50 students in a class. The students
appear in an examinations considered of 10 subjects. Each subject having
maximum marks of 100. The roll number, name sex code (feamle and male) and the
marks obtained by her/him in various subjects
and supplied as input data. Write a program in C to calculate and print
the percentage marks obtained by the male students and the list of only those
female students who have passed in second division (obtained 45% or more but
less than 60%)
11. Explain the terms Domain, Bandwidth, Broadcast and Multicast.
Domain
A group of computers and devices on a network that
are administered as a unit with common rules and procedures. Within the
Internet, domains are defined by the IP address. All devices
sharing a common part of the IP address are said to be in the same domain.
Bandwidth is defined as a range within a band of frequencies or wavelengths. Bandwidth is also the amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second.
Broadcasting
Broadcasting is the distribution of audio or video content to a dispersed audience via any electronic mass communications medium, but typically one using the electromagnetic spectrum (radio waves), in a one-to-many model.
Multicast
In computer networking, multicast is group communication where data transmission is addressed to a group of destination computers simultaneously. Multicast can be one-to-many or many-to-many distribution. Multicast should not be confused with physical layer point-to-multipoint communication.
12. Consider
a noiseless channel with a bandwidth of 3Khz transmitting a signal with two
signal levels. What is the maximum bit rate?
13. Explain why subnet mask is used?
A subnet mask is used to do a bit wise operations on an IP address, in conjunction with a network address. If my memory serves me well, you take an IP address and do a bit wise AND on it and the subnet mask for a given network. If the result equals the network address, then the IP address is on that particular network. Routers that have routing tables of network addresses and subnet masks can use simple binary maths (which is very fast, if not the fastest for computers to handle) to find out which interface to punt a packet out of.
14. Explain IEEE 802.3 frame format.
Ethernet (IEEE 802.3) Frame Format –
This is a pattern of alternative 0's and 1's
which indicates starting of the frame and allow sender and
receiver to establish bit synchronization. Initially, PRE (Preamble) was
introduced to allow for the loss of a few bits due to signal delays.
15. Differentiate between microprocessor and microcontroller.
|
Microprocessor |
Microcontroller |
Application |
It used where intensive processing is required. It is used in
personal computers, laptops, mobiles, video games, etc. |
It used where the task is fixed and predefined. It is used in
the washing machine, alarm, etc. |
Structure |
It has only the CPU in the chip. Other devices like I/O port,
memory, timer is connected externally. The structure of the microprocessor is flexible. Users can
decide the amount of memory, the number of I/O port and other peripheral
devices. |
CPU, Memory, I/O port and all other devices are connected on
the single chip. The structure is fixed. Once it is designed the user cannot
change the peripheral devices. |
Clock speed |
The clock speed of the microprocessor is high. It is in terms
of the GHz. It ranges between 1 GHz to 4 GHz. |
The clock speed of the microcontroller is less. It is in terms
of the MHz. it ranges between 1 MHz to 300 MHz. |
RAM |
The volatile memory (RAM) for the microprocessor is in the
range of the 512 MB to 32 GB. |
The volatile memory (RAM) for the microcontroller is in the
range of 2 KB to 256 KB. |
ROM |
The hard disk (ROM) for the microprocessor is in the range of
the 128 GB to 2 TB. |
The hard drive or flash memory (ROM) is in the range of the 32
KB to 2 MB. |
Peripheral interface |
The common peripheral interface for the microprocessor is USB,
UART, and high-speed Ethernet. |
The common peripheral interface for the microcontroller is
I2C, SPI, and UART. |
Programming |
The program for the microprocessor can be changed for
different applications. The programming of the microprocessor is difficult
compared to the microcontroller. |
The program for the microcontroller is fixed once it is
designed. |
Bit size |
It is available in 32-Bit and 64-bit. |
It is available in 8-bit, 16-bit, and 36-bit. |
Cost |
The cost of the microprocessor is high compared to the
microcontroller. |
It is cheaper. |
Power consumption |
The power consumption for the microprocessor is high. |
The power consumption for the microcontroller is less. |
Size |
The overall size of the system is large. |
The overall size of the system is small. |
16. Explain
the instructions LDS, PUSHF, TEST and CLD.
LDS:
[ Load Pointer to DS.]
-Move a 32 bit content from the memory given as
source to 16 bit destination register specified and to DS register.
PUSHF: [Push the Flag. ]
-After the execution the content of the flag
register will be pushed to the stack. The higher byte to sp-1 and lower to
sp-2.
TEST: [ Logical Comparison. ]
-This will compare the source and the
destination specified. The result will be reflected only in the flag registers.
CLD: [ Clear Direction Flag. ]
-This will clear the direction flag.
17. “Pentium
processor has a superscalar architecture.” Explain the meaning of the
statement.
Solution:-
The
Pentium microprocessor is organized along with three execution units. Single
executes floating-point instructions, and the other two are U-pipe and V-pipe
executes integer instructions. It means that this is possible to execute three
instructions concurrently.
· while loop
· for loop
· do..while
While loop
In While Loop in C First check the condition if condition is true then control goes inside the loop body other wise goes outside the body. while loop will be repeats in clock wise direction.
Syntax
Assignment;
while(condition)
{
Statements;
......
Increment/decrements (++ or --);
}
For loop
For Loop in C is a statement which allows code to be repeatedly executed. For loop contains 3 parts Initialization, Condition and Increment or Decrements.
do-while
A do-while Loop in C is similar to a while loop, except that a do-while loop is execute at least one time.
A do while loop is a control flow statement that executes a block of code at least once, and then repeatedly executes the block, or not, depending on a given condition at the end of the block (in while).
Syntax :
do
{
Statements;
........
Increment/decrement (++ or --)
} while();

19. Write a program in C With recursive function to compute the value of n where n is a positive integer and x has a real value.
#include <stdio.h>
int power(int x, int n);
int main() {
int base, a, result;
printf("Enter base number: ");
scanf("%d", &base);
printf("Enter power number(positive integer): ");
scanf("%d", &a);
result = power(base, a);
printf("%d^%d = %d", base, a, result);
return 0;
}
int power(int base, int a) {
if (a != 0)
return (base * power(base, a - 1));
else
return 1;
}
0 মন্তব্যসমূহ