You are on page 1of 8

MODULE - 1

1. List and explain the three things that have to work together in order for
most computers to perform useful functions.
Hardware - the physical components, both internal and external, that
make up a computer.
Operating System - a set of computer programs that manages the
hardware of a computer. An operating system controls the resources on a
computer, including memory and disk storage. An example of an
operating system is Windows XP.
Application Software - programs loaded on the computer to perform a
specific function using the capabilities of the computer. An example of
application software is a word processor or a computer game.
2. List and explain the two general categories of application software.
Business/Industry Software - Software designed for use by a specific
industry or market. Examples include: medical practice management
tools, educational tools and legal software.
General Use Software - Software used by a wide range of organizations
and home users for various purposes. These applications can be used by
any business or individual.
3. Explain the difference between local and network application software.
Local application - A local application is a program, such as a word
processor, that is stored on the hard disk of the computer. The
application runs only on that computer.
Network application - A network application is one that is designed to run
over a network, such as the Internet. A network application has two
components, one that runs on the local computer and one that runs on a
remote computer. Email is an example of a network application.
4. List the six common types of computers available.
a. Mainframes
b. Servers
c. Desktops
d. Workstations
e. Laptops
f. Hand-held portable devices
5. Explain what servers are and what they are used for.
Servers are high performance computers used in businesses and other
organizations.

Servers provide services to many end users or clients.


6. Why do servers often contain duplicate or redundant parts?
The services provided by a server are often important and may need to
be available to users at all times. Servers, therefore, often contain
duplicate, or redundant, parts to prevent them from failing.
7. How do workstations differ from desktop computers?
Desktops are commonly used to run applications such as word
processing, spreadsheets and networked applications such as email and
web browsing.
Workstations are high-powered business computers. They are designed
for specialized, high-end applications like engineering programs such as
CAD (Computer Aided Design).
8. What is ASCII and how does a computer use it?
Computers use binary codes to represent and interpret letters, numbers
and special characters with bits. A commonly used code is the American
Standard Code for Information Interchange (ASCII). With ASCII, each
character is represented by a string of bits
9. What are the advantages of purchasing a pre-assembled computer?
a. Lower cost
b. Adequate to perform most applications
c. No waiting period for assembly
10. What are the advantages of purchasing a custom built computer?
a. The end-user can specify exact components that meet user needs
b. Generally support higher performance applications such as graphics,
gaming, and server applications
11. What are some issues to consider when selecting a motherboard?
a. Support the selected CPU type and speed
b. Support the amount and type of system RAM required by the
applications
c. Have sufficient slots of the correct type to accept all required interface
cards
d. Have sufficient interfaces of the correct type
12. Explain what the Central Processing Unit (CPU) is and what it does.
The CPU, or processor, is the nerve center of the computer system. It is
the component that processes all of the data within the machine.

13. If a computer is running multiple applications simultaneously what


component is essential to accomplish this?
Most computers are capable of running multiple applications
simultaneously, or multi-tasking. The more applications that need to run
simultaneously, the more RAM required.
14. Explain in detail the function of the following adapter cards.
Video Cards
Video cards accept information from computers and translate it into a
format that can be displayed on a monitor screen. Video cards often
contain large amounts of RAM and dedicated processor chips for
manipulating video content. The choice of video cards is made based on
video speed and higher resolution cards. Video cards must match the
capabilities of the connected monitors.
Sound Cards
Sound cards accept digital information from the system and convert
them into a signal that is transmitted to a speaker that outputs an audio
signal. High-end sound cards can produce an audio output that rivals
some do the best stereo equipment available.
Network Interface Cards
Network interface cards (NICs) enable a computer system to exchange
information with other systems in a local network. The speed of the
network and the type of technology help determine what NIC is required.
The most common networking technology is currently Ethernet.
15. Explain in detail the function and process of an uninterruptible power
supply.
(In other words explain what it does and how it works.)
A UPS is a device that continually monitors the power to a computer
system and maintains the charge on an internal battery. If the power is
interrupted, the UPS provides backup power to the system without
interruption. The backup power comes from a battery inside the UPS and
can only power the computer system for a short period of time. UPSs are
designed to provide the end-user with sufficient time to properly shut
down a computer system should the main power fail. A UPS can also
provide an even flow of power to the computer and prevent damage
caused by voltage surges.
16. After installing a new computer component why is it important to obtain the
most current driver for it?
Drivers are continually updated to improve efficiency and functionality.
The most current driver can be obtained from the manufacturer's web
site and should normally be used.
17. What are the steps required to install a peripheral device?

a. Connect the peripheral to the host using the appropriate cable or


wireless connection
b. Connect the peripheral to a power source
c. Install the appropriate driver
18. If a newly installed peripheral device does not function properly what steps
can be taken to correct the problem?
a. Verify that all cables have been properly connected and that the
device is powered up.
b. Many devices, such as printers, offer a testing functionality on the
device directly, and not through the computer. Use this feature to verify
that the device itself is functioning properly. If the device is operational,
but not connecting to the computer system, the problem could be with
the cable connection.
c. Swap the suspect cable with a known good one. If this fails to solve the
problem the next step is to verify that the connection port the peripheral
device is connected to is recognized by the operating system.
Operating Systems :
1. Explain what the OS is and its purpose.
The OS controls input and output functions. In addition, the entered data
is manipulated inside of the computer, stored in RAM and processed by
the CPU. This internal manipulation and processing is also controlled by
the OS. All computerized devices, such as servers, desktops, laptops or
handhelds, require an OS in order to function.
2. Explain in detail what application programs are designed for. List some
examples.
Application programs are designed for a specific purpose, such as word
processing, and know nothing of the underlying electronics. For example,
the application is not concerned with how information is entered into the
application from the keyboard. The operating system is responsible for
the communication between the application and the hardware.
3. There are two ways for a computer user to interact with a computer. List
and explain both.
CLI - When using the CLI, the user interacts directly with the system in a
text-based environment by entering commands on the keyboard at a
command prompt. The system executes the command, often providing
textual output.
GUI - The GUI interface allows the user to interact with the system in an
environment that uses graphical images, multimedia, and text. Actions
are performed by interacting with the images on screen. GUI is more user

friendly and requires less knowledge than CLI of the command structure
to utilize the system.
4. Explain the following terms:
Shell The user interface that allows users to request specific tasks from
the computer. Theses requests can be made either through the CLI or
GUI interfaces.
Kernel Communications between the hardware and software of a
computer and manages how hardware resources are used to meet
software requirements.
Hardware The physical part of a computer including underlying
electronics.
5. Explain what a network operating system (NOS) does.
A NOS offers complex scheduling and user management software that
allow a device to share resources between many users and treat
networked resources as though they are directly connected.
6. List four characteristics of an operating system that falls under a commercial
license.
a. Restrictive in nature and limits what the end user can do with the
code.
b. Often very expensive depending on deployment.
c. Very structured development cycle and changes are not quickly
available.
d. Structured support available for a fee.
7. List four characteristics of an operating system that falls under a GNU public
license (GPL).
a. Ensures everyone has full access to the source cone and can
participate in enhancements on the product.
b. Often released free-of-charge.
c. Development cycle is usually less structured and changes are more
quickly implemented.
d. Less of a structured support arrangement often relying on community.
8. Operating systems require a certain amount of hardware resources, these
resources include such things as:
a. Amount of RAM
b. Hard disk space required
c. Processor type and speed
d. Video resolution
9. What factors need to be considered when selecting an operation system?

a. Ensure that the OS being considered fully supports the requirements of


the end user.
b. Make sure that sufficient hardware resources are available to support
the OS.
c. The level of human resources needed to support the OS.
10. List and explain two instances when a clean install of an OS could be done.
a. A clean install is done on a new system or in cases where no upgrade
path exists between the current OS and the one being installed.
b. A clean install is also performed when the existing OS installation has
become damaged in some way.
11. What happens to the existing data on a hard drive during a clean install?
It deletes all data on the partition where the OS is installed and requires
application software to be reinstalled.
12. How many partitions are required for a multiple OSs in a multi-boot
environment?
Each OS is contained within its own partition and can have its own files
and configuration settings.
13. List and explain what things a technician can check prior to installing a new
OS to ensure that the installation will work correctly?
a. Verify that all hardware is certified to work with the selected OS.
b. Verify that the hardware resources meet or exceed the published
minimum requirements.
c. Confirm that the appropriate installation medium is available. Due to
the file size of current operating systems, they are usually available on
both CD and DVD medium.
d. If the OS is to be installed on a system that already contains data: (a)
Use system diagnostic tools and utilities to ensure the current OS
installation is in good condition, free of malicious or damaging files and
codes; (b) Complete a full backup of all important files.
e. If performing a clean-install, verify that all application software is
available for installation.
14. Explain the technique used to help protect data on a hard drive when doing
a clean install?
One of the techniques available to help protect data is to divide the hard
drive into multiple partitions. With a clean install, many technicians
prefer to create one partition for data and a separate partition for the OS.
This enables an OS to be upgraded without the risk of losing data. It also
simplifies backup and recovery of data files.

15. There are three parts to the IP configuration, which must be correct for the
computer to send and receive information on the network. List and explain
these three parts.
a. IP address - identifies the computer on the network.
b. Subnet mask- is used to identify the network on which the computer is
connected.
c. Default gateway- identifies the device that the computer uses to
access the Internet or another network.
16. An IP address can be configured manually or assigned automatically by
another device. List and explain both.
a. Manual IP Configuration
With manual configuration, the required values are entered into the
computer via the keyboard, typically by a network administrator. The IP
address entered is referred to as a static address and is permanently
assigned to that computer.
b. Dynamic IP Configuration
Computers may be set up to receive network configuration dynamically.
This allows a computer to request an address from a pool of addresses
assigned by another device within the network. When the computer is
finished with the address it is returned to the pool for assignment to
another computer.
17. What two pieces of information must be unique to every host and not
duplicated on the LAN.
a. Computer names must be unique
b. IP addresses must also be unique to each device.
18. Explain what a software patch is.
A patch is a piece of program code that can correct a problem or enhance
the functionality of an application program or OS. They are usually
provided by the manufacturer to repair a known vulnerability or reported
problem.
19. List and explain the three different methods patches can be installed on a
computer.
a. Automatic installation - The OS can be configured to connect to the
manufacturer's web site, download and install minor updates without any user
intervention. Updates can be scheduled to occur during times when the
computer is on, but not in use.
b. Prompt for Permission - Some users wish to have control over which patches
are applied. This is often the choice of users who understand what impact a
patch may have on system performance. The system can be configured to
notify the end-user when a patch is available. The user must then decide if the
patch should be downloaded and installed.

c. Manual - Updates that require major pieces of code to be replaced on a


system should be run manually. These major updates are often called
service packs and are designed to correct problems with an application or
OS, and sometimes to add functionality. These service packs usually
require the end user to manually connect to a web site, download and
install the update. They may also be installed from a CD that can be
obtained from the manufacturer.
20. Why do browsers and office software such as word processors, spreadsheet
and database applications need to be patched?
Browsers and office software such as word processors, spreadsheet and
database applications are common targets for network attacks. These
applications require updates to correct the code that may allow the
attack to succeed. The manufacturer may also develop updates that can
improve product functionality, at no additional cost.

You might also like