Computer System

This page contains the NCERT Informatics Practices class 11 chapter 1 Computer System. You can find the solutions for the chapter 1 of NCERT class 11 Informatics Practices Exercise. So is the case if you are looking for NCERT class 11 Informatics Practices related topic Computer System questions and answers for the Exercise
Exercise
1. Name the software required to make a computer functional. Write down its two primary functions.
The name of the software required to make a computer functional is Operating System (OS)
Two primary functions of the Operating System software are:
Management of the other application programs
Provide access and security to the users of the system.
2. What is the need of RAM? How does it differ from ROM?
RAM is a volatile primary memory of a computer system that is used to store the computer data temporarily while the computer is working. RAM is needed to fastly load the program and data and make it available for processing.
The following are the differences between RAM and ROM.
Basis
RAM
ROM
Acronym for
Random Access Memory
Read Only Memory
Type of Memory
Volatile. Contents are lost after the computer is shut down.
Non-volatile. Contents are not lost even after the computer is shut down.
Speed of Access
Compratively faster.
Comparatively slower.
Type of Storage
Used for temporary storage of program and data.
Used for permanent storage of program and data.
Usage
Used for content that is frequently changed.
Used for content that is rarely changed.
Data
RAM’s data is directly accessed by the CPU
ROM’s data should be first loaded into RAM before being available to the CPU.
Storage Capacity
Comparatively higher
Comparatively lower.
3. What is the need for secondary memory?
The secondary memory is needed for the following reasons.
1.
The storage capacity of the primary memory is limited.
2.
The primary memory is either
Volatile (RAM)
or Read-Only (ROM)
3.
It meets the requirement to store the data or instructuions permanently, for future use.
4.
It has larger storage capacity than primary memory.
5.
Comparatively, primary memory is expensive but the secondary memory is cheaper.
6.
Few secondary storage devices like portable flash/pen drives make the data transfer between computers easier and simpler.
7.
Compared to the primary memory, the secondary memory is cheaper. But with the advent of technology, secondary storage devices like Solid-State Drive (SS) support very fast data trasfer.
4. Draw the block diagram of a computer system. Briefly write about the functionality of each component.
Block Diagram of a Computer System. Input Device Central Processing Unit (CPU) Output Device Secondary Storage Devices Primary Memory Control Unit Arithmetic Logic Unit (ALU) Input Device Output Device Secondary Storage Devices Primary Memory Control Unit (CU) Arithmetic Logic Unit (ALU) Central Processing Unit (CPU)
Functionality of the Components of a Computer System:
1. Central Processing Unit (CPU): This is the brain of the computer. It carries out the actual processing. So, it is commonly called as ‘processor‘ also and popularly known as microprocessor. They are physically placed on one or more microchips. This microchips are called Integrated circuits (IC) and they comprise semiconductor material.
CPU fetches the instructions and data through programs. So, the CPU
i.
Fetches the program and data from memory
ii.
performs arithmetic and logical operations as per the given instructions
iii.
stores the results back to memory.
CPUs use local memory called as ‘registers‘ to store the data and the instructions. These registers are part of the CPU. They are limited in size and number. Different registers are used for storing
i.
data
ii.
instructions
iii.
or intermediate results
In addition to the registers, CPU has two main components namely:
a.
Arithmetic Logic Unit (ALU): which performs all the arithmetic and logic operations as per the instructions in the program.
b.
Control Unit (CU): that.
i.
controls the sequential instruction execution
ii.
interpretation of the instructions
iii.
guiding the data through the computer’s memory, ALU and input or output devices.
2. Input Devices The input devices are the ones that are used to send control signals to a computer. They convert the input data into a digital form that is acceptable by the computer system. The following are few examples of input devices:
i.
Keyboard. Apart from the regular keyboards, there’re specially designed brailey keybaords to help the visually impaired persons to work on the computer.
ii.
Mouse
iii.
Scanner
iv.
Touchscreen
v.
Microphones/Mic which send input commands through voice. Examples are Google voice search, Apple’s Siri, Amazon’s Alexa, Microsoft’s Cortana etc.
The data sent by the input devices is
a.
temporarily stored in the main memory(RAM) of the computer system.
b.
and then it can be permanently stored in the secondary memory for future use.
3. Output Devices: The devices that receive the data from a computer system for
display
physical production etc.,
are called output devices. The output devices transform the digital information generated by the computer into human understandable formats. Examples include
i.
monitors. A braille display monitor is helpful for visually challenged people to read the textual output.
ii.
projector
iii.
headphone
iv.
speaker
v.
printers whcich includes the most recently invented 3D-printers too.
6. Mention any browsers used for browsing the internet.
The following are the most popular browsers used for browsing the internet.
a.
Apple’s Safary
b.
Brave
c.
Chrome by Google
d.
Opera
e.
Edge by Microsoft. Eearlier microsoft had Internet Explorer. But it is no more in use now.
f.
Firefox
💡Tip: Did you notice that the above list is prepared in the alphabetical order?
7. Name the input/output device used to do the following:
a)
To output audio
Speakers/Headphones/Earphones
b)
To enter textual data
Keyboard
c)
To make hard copy of a text file
Printer
d)
To display data/information
Monitor/Projector
e)
To enter audio-based command
Microphone/Mic
f)
To build 3D models
3D Printer
g)
To assist a visually impaired individual in entering data
Brailey keyboard
8. Identity the category (system, application, programming tool) of the following software:
a)
Compiler
programming tool
b)
Assembler
programming tool
c)
Ubuntu
System
d)
Text editor
Application
9. Conver the following into bytes:
a)
2 MB
b)
3.7 GB
c)
1.2 TB
a)
2 MB
{= 2 × 2^{10} × 2^{10}}
= 2 × 1024 × 1024
=
20,97,152 bytes
b)
3.7 MB
{= 3.7 × 2^{10} × 2^{10} × 2^{10}}
= 3.7 × 1024 × 1024 × 1024
=
3,97,28,44,748.8 3,97,28,44,749 bytes
c)
1.2 MB
{= 1.2 × 2^{10} × 2^{10} × 2^{10} × 2^{10}}
= 1.2 × 1024 × 1024 × 1024 × 1024
=
13,19,41,39,53,331.2 13,19,41,39,53,332 bytes
Note: A byte can not exist in decimals. So, we have rounded it up to the nearest integer in case (b) and case (c)
10. What is the security threats involved when we throw away electronic gadgets that are non-functional?
The security threat involved when we throw away electronic gadgets that are non-functional is that when the electronic gadgets fall into the hands of the mischief-mongers, they can easily recorver data from such devices. This poses a threat to data confidentiality. They can use the data to fraudently play with the confidential information to
a.
cause financial loss by accessing the bank accounts, use the bank related and other financial information etc.
b.
commit a crime by posing our identity
c.
violation of privacy by accessing our personal information.
d.
black mail etc
The electronic gadgets include the devices like smart phone, tablets, smart watches, tabs, laptops etc.
Note: This list is not comprehensive. You can think and write any other threats associated by disposing these devices.
11. Write down the type of memory needed to do the following:
a)
To store data permanently
Secondary memory devices like Hard Disk Drive (HDD), CD/DVD, Memory Card, Flash/Pen Drive, Solid-State Drive (SSD)
b)
To execute the program
RAM in the primary memory as well as Cache Memory
c)
To store instructions which can not be overwritten
ROM in the secondary memory