Module 1 Flashcards

(97 cards)

1
Q

The word computer comes from the word ________, which means ___________.

A

“compute” which means “to calculate”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is an electronic device that can perform arithmetic operations at high spped.

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer is also called _________ because it can store, process, and retrieve date whenever desired.

A

data processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A computer is also called a data processor because it can _______, _______, and ________ data whenever desired.

A

store, process, and retrieve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is the activity of processing data using a computer.

A

data processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Show how a computer processes data.

A

data - capture data - manipulate data - output results - information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is the raw material used as input and information.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It is obtained as the output of data processing.

A

processed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enumerate the Characteristics of Computers

A
  1. Automatic
  2. Speed
  3. Accuracy
  4. Diligence
  5. Versatility
  6. Power of Remembering
  7. No I.Q.
  8. No feelings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Given a job, computers can work on it automatically without human intervention. What characteristics of a computer is this?

A

Automatic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computers can perform data processing jobs very fast, usually measured in microseconds, nanoseconds, and picoseconds. What characteristics of a computer is this?

A

Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ________ of a computer is consistently high and the degree of its __________ depends upon its design. What characteristics of a computer is this?

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This refers to computer errors caused due to incorrect input data or unreliable programs.

A

Garbage In - Garbage Out (GIGO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer is free from monotony, tiredness, and lack of concentration. It can continuously work for hours without creating any errors and without grumbling. What characteristics of a computer is this?

A

Diligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computer is capable of performing almost any task if the task can be reduced to a finite series of logical steps. What characteristics of a computer is this?

A

Versatility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computers can store and recall any amount of information because of their secondary storage capability. It forgets or loses certain information only when it is asked to do so. What characteristics of a computer is this?

A

Power of Remembering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A computer does only what it is programmed to do. It cannot take its own decision in this regard. What characteristics of a computer is this?

A

No. I. Q.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Computers are devoid of emotions. Their judgement is based on the instructions given to them in the form of programs that are written by us (human beings). What characteristics of a computer is this?

A

No feelings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

He invented the first mechanical adding machine in 1642.

A

Blaise Pascal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When did Blaise Pascal invent the first mechanical adding machine?

A

1642

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

He invented the first calculator for multiplication in 1671.

A

Baron Gottfried Wilhelm von Leibniz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When did Baron Gottfried Wilhelm von Leibniz invent the first calculator for multiplication?

A

1671

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Where and when did keyboard machines originate?

A

United States around 1880

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

He came up with the concept of punched cards that were extensively used as input media until the late 1970s.

A

Herman Hollerith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
He is considered to be the father of modern digital computers.
Charles Babbage
26
He designed the "Difference Engine" in 1822.
Charles Babbage
27
When did Charles Babbage design the "Difference Engine"?
1822
28
He designed a fully automatic analytical engine in 1842 for performing basic arithmetic functions.
Charles Babbage
29
When did Charles Babbage design a fully automatic analytical engine for performing basic arithmetic functions?
1842
30
His efforts established a number of principles that are fundamental to the design of any digital computer.
Charles Babbage
31
Enumerate some of the well-known computers.
1. The Mark I Computer (1937-44) 2. The Atanasoff-Berry Computer (1939-42) 3. The ENIAC (1943-46) 4. The EDVAC (1946-52) 5. The EDSAC (1947-49) 6. Manchester Mark I (1948) 7. The UNIVAC I (1951)
32
In computer talk, it is a step in technology.
Generation
33
It provides a framework for the growth of the computer industry.
Generation
34
It was used to distinguish between various hardware technologies, but now it has been extended to include both hardware and software
Generation
35
An electronic device that controls the flow of electrons in a vacuum. It is used as a switch, amplifier, or display screen (CRT). Used as on/off switches, it allowed the first computers to perform digital computations.
vacuum tube
36
It is a binary switch and the fundamental building block of computer circuitry. Like a light switch on the wall, it either prevents or allows current to flow through
transistor
37
It is a small chip that can function as an amplifier, oscillator, timer, microprocessor, or even computer memory. It is a small wafer, usually made of silicon, that can hold anywhere from hundreds to millions of transistors, resistors, and capacitors.
Integrated circuit or IC chip
38
It is an integrated set of programs that control the resources (the CPU, memory, I/O devices, etc.) of a computer system. It provides its users with an interface or virtual machine that is more convenient to use than the bare machine
Operating System
39
What are the two primary objectives of an Operating System?
1. Making a computer system convenient to use 2. Managing the resources of a computer system
40
It hides the details of the hardware from the programmer and provides the programmer with a convenient interface for using the system
Operating system layer
41
Describe the local architecture of a computer system. (From center to outside)
computer hardware - operating system - other system software and application programs - users
42
It is a program, also called job, in execution.
process
43
Another term for "process" in computers.
job
44
It manages the processes submitted to a system in a manner to minimize the idle time of processors (CPUs, I/O processors, etc.) of the system
Process management
45
It is a collection of related information.
File
46
Every file has a _______, its _____ and ________.
name, data, and attributes
47
It uniquely identifies it in the system and is used by its users to access it.
File's name
48
It is the content of a file.
file's data
49
They contain information such as the date & time of its creation, the date & time of last access, the date & time of the last update, its current size, its protection features, etc.
File's attributes
50
It takes care of file-related activities such as structuring, accessing, naming, sharing, and protection of files
File management module of an operating system.
51
What are the two commonly supported file access methods?
1. Sequential access 2. Random access
52
Information stored in a file can be accessed sequentially (in the order in which they are stored, starting at the beginning)
Sequential Access
53
Information stored in a file can be accessed randomly irrespective of the order in which the bytes or records are stored
Random access
54
It deals with the rules for naming files in an operating system. This may include such rules as: maximum number of characters that a file name may have, special characters allowed in a file name, distinction between upper case and lower case letters.
File naming
55
They allow file extensions to be part of a file name.
Multi-part file names
56
They indicate something about the file and its content. It is used by applications to check for the intended type of file before operating on it.
File extensions
57
.bas - What is its meaning?
Basic source program file
58
.c - What is its meaning?
C source program file
59
.ftn - What is its meaning?
Fortran source program file
60
.pas - What is its meaning?
Pascal source program file
61
.obj - What is its file?
Object file
62
.bin - What is its meaning?
Executable binary program file
63
.lib - What is its meaning?
Library of obj. files used by the linker
64
.dat - What is its meaning?
Data File
65
.hlp - What is its meaning?
Text file for HELP command
66
.man - What is its meaning?
Online manual page file
67
.txt - What is its meaning?
General text file
68
.bak - What is its meaning?
Backup file
69
.doc - What is its meaning?
Microsoft word document file
70
.wav - What is its meaning?
Microsoft windows sound file
71
.wk4 - What is its meaning?
Lotus 1-2-3 spreadsheet file
72
.xls - What is its meaning?
Microsoft Excel spreadsheet file
73
.jpg - What is its meaning?
JPEG graphics file
74
.gif - What is its meaning?
GIF graphics file
75
It deals with protecting the various resources and information of a computer system against destruction and unauthorized access.
Security
76
It deals with securing computer against external factors such as fires, floods, earthquakes, stolen disks/tapes, etc. by maintaining adequate backup, using security guards, allowing access to sensitive information to only trusted employees/users, etc
External Security
77
It deals with the problem of verifying the identity of a user (person or program) before permitting access to the requested resource
User authentication
78
Once authenticated, _____________ mechanisms prohibit a user/process from accessing those resources/information that he/she/it is not authorized to access
Access Control
79
It means encrypting private information so that unauthorized access cannot use information
Cryptography
80
Enumerate 3 things in Internal Security.
1. User authentication 2. Access Control 3. Cryptography
81
It provides a set of commands using which the user can give instructions to the computer for getting some job done by it.
Command Interpretation
82
These are the commands supported by the command interpretation module.
System call
83
Two types of user interfaces supported by various operating systems are:
1. Command-line Interface 2. Graphical User Interface (GUI)
84
User gives instructions to the computer by typing the commands
Command-line Interface
85
User gives commands to the system by selecting icon or menu item displayed on the screen with the use of a pointand-draw device
Graphical User Interface (GUI)
86
It is the amount of work that the system is able to do per unit time.
Throughput
87
It is the interval from the time of submission of a job to the system for processing to the time of completion of the job.
Turnaround time
88
It is the interval from the time of submission of a job to the system for processing to the time the first response for the job is produced by the system.
Response Time
89
Enumerate the common types of operating systems.
1. UNIX OS 2. MS DOS 3. MICROSOFT WINDOWS 4. MICROSOFT WINDOWS NT (New Technology) 5. LINUX
90
It is developed in the early 1970s at Bell Laboratories by Ken Thompson and Dennis Ritchie. Written in C high-level language, hence, highly portable, multi-user, time-sharing OS.
UNIX OS
91
It is used on a wide variety of computers ranging from notebook computers to supercomputers. Especially prevalent on RISC workstations such as those from Sun Microsystems, Hewlett-Packard, IBM, and Silicon Graphics. Structured in three layers – kernel, shell, and utilities.
UNIX OS
92
It stands for Microsoft Disk Operating System. Single-user OS for IBM and IBM-compatible personal computers (PC).
MS DOS
93
MS DOS stands for ____________.
Microsoft Disk Operating System
94
It is structured in three layers – BIOS (Basic Input Output System), kernel, and shell. Very popular in the 1980s, now not in much use and development with the launch of Microsoft Windows OS in 1990s.
MS DOS
95
It is developed by Microsoft to overcome the limitations of __________ operating system. Single-user, multitasking OS. The native interface is a GUI. Designed to be not just an OS but also a complete operating environment. OS of choice for most PCs after 1990.
MICROSOFT WINDOWS
96
Multi-user, time-sharing OS developed by Microsoft. Designed to have UNIX-like features so that it can be used for powerful workstations, network, and database servers. Supports multiprogramming and is designed to take advantage of multiprocessing on systems having multiple processors. Native interface is a GUI. Built-in networking and communications features. Provides strict system security. Rich set of tools for software develop.
MICROSOFT WINDOWS NT (New Technology)
97
Open-source OS enhanced and backed by thousands of programmers world-wide. Multi-tasking, multiprocessing OS, originally designed to be used in PCs. Name “______” is derived from its inventor Linus Torvalds. Several ________ distributions available (Red Hat, SuSE). Difference in distribution is mostly set of tools, number and quality of applications, documentation, support, and service.
Linux