0% found this document useful (0 votes)
274 views

Foc QP 4

The document provides a scheme of valuation for a 1st semester diploma examination in Fundamentals of Computer. It outlines 10 questions across 5 sections. For each question, it lists the subparts and marks allotted for each subpart. Some examples of question subparts include drawing logic gate circuits, solving numerical problems, explaining concepts, and providing truth tables. Students must answer one full question from each section, with one full question worth 20 marks. The scheme of valuation provides guidance to examiners on evaluating and marking student responses for the examination.

Uploaded by

ಹರಿ ಶಂ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
274 views

Foc QP 4

The document provides a scheme of valuation for a 1st semester diploma examination in Fundamentals of Computer. It outlines 10 questions across 5 sections. For each question, it lists the subparts and marks allotted for each subpart. Some examples of question subparts include drawing logic gate circuits, solving numerical problems, explaining concepts, and providing truth tables. Students must answer one full question from each section, with one full question worth 20 marks. The scheme of valuation provides guidance to examiners on evaluating and marking student responses for the examination.

Uploaded by

ಹರಿ ಶಂ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

1ST SEMESTER DIPLOMA EXAMINATION, AUGUST/SEPTEMBER-2022

FUNDAMENTALS OF COMPUTER- 20CS11T)

SCHEME OF VALUATION
i) Answer one full question from each section
ii) One full question carries 20marks
SECTION -I
1. a. Listing any 3 features of number system - (3*1=3m), List any 2 number system with an example (2*1=2m)
b. Statement of any one demorgan’s law -1m, proof using truth table- 4m
c. Finding 2’s complement of minuend - (2m) + perform addition –(2m) + result- (1m)
d. Definition of an Universal Gate -1m, diagram -3m explanation -1m

2. a. Meaning of Logic Gate -2m, 3 Logic gates and their symbol- (3*1=3m)
b. Because of the more length of solution, consider Any two solutions (2.5*2=5m)
c. Finding Excess 3 code- 3m, BCD code-2m(exclude ASCII)
d. Truth table-5m. ( based on columns and their correctness marks may be allotted)
SECTION -II
3. a. Solving the Expression - 5m
b.Definition/understanding of Flipflop-1m, Listing types of flipflops-2m, Any 2 applications-2m
c. Any five difference between Combinational and Differential circuits- (5*1=5m)
d. Diagram of 4:2 encoder- 2m, Truth table -3m
4. a.i) finding 1’s complement- 2m ii) finding 2’s complement – 3m
b. Definition/Understanding of Shift register -1m. Listing types-2m, Any 2 applications-2m
c. Comparator circuit diagram -3m, Truth table-2m
d. Drawing a clock signal-1m, Indicating or explaining each term – (4*1=4m)
SECTION -III
5. a. Drawing Full adder circuit – 3m, Write Sum AND Carry expression-2m
b. Solving problem -5m
c. 4 applications – (4*1=4m)
d. Diagram -3m, working Explanation -3m

6.a. Drawing Full Subtractor circuit – 3m, Difference and Borrow expression-2m
b. i-1m ii-1m iii-1m iV-2m (1+1+1+2=5m)
c. Each generation 2 features- (4*1=4m)
d. Any 3 comparisons/ differences –(3*2=6m)
SECTION -IV
7.a. Identifying and listing any 3 security threats during browsing – (3*2=6m), any 2 counter measures -2m
b. Drawing functional units -3m, explanation- 3m
c. Listing or drawing Flynn’s classification – 2m, 1Feature of each class – (4*1=4m)

8. a. i) category of networking -2m


ii) Networking devices – 3m
iii) Drawing topology -3m
b. Arranging the memory in hierarchy -3m, any 3 applications-3m
c. BIOS features -2m , 4 differences between BIOS and UEFI –( 4*1=4m)
SECTION -V
9. a. 4 differences between Mobile OS and Computer OS – (4*1=4m)
b. 5 variable naming rules – (5*1=5m)
c. flowchart -4m
d. algorithm -7m( based on algorithm structure and understanding, marks may be awarded)
10. a. any 4 Comparisons -4m
b. 5 symbols–(5*1=5m)
c. Algorithm -4m
d. Flowchart -7m(based on symbols and understanding marks may be awarded)
********************
1ST SEMESTER DIPLOMA EXAMINATION, AUGUST/SEPTEMBER-2022

FUNDAMENTALS OF COMPUTER- 20CS11T)

Model Answer

Note : i) Answer one full question from each section


ii) One full question carries 20marks
SECTION – I

1) a) Any Three features of Number Systems: (3*1=3m)


i) The number system is the system of naming or representing numbers for indicating Quantities
ii) Each numeral system is characterized by its base.
iii) The numeral systems have a base or set of symbols that allow to represent the different numeral
quantities.
iv) Each element within the numeral system has a weighted value based on its position.
v) The number 0 expresses or denotes the absence of a given quantity.
vi) We may perform arithmetic operations on numbers of number system

List any two number systems with example(2*1=2m)


i) Binary ii) Octal iii)Decimal iv) Hexadecimal

b) i) Demorgan’s First law: (1m)

Proof using TruthTable: (4m)

(or)
ii) Demorgan’s Second law: (1m)
Proof using Truth Table: (4m)

c) Given to perform 1101(2)-1001(2) using 2’s complement method


Step 1: find 2’s complement of subtrahend (2m)
Subtrahend is: 10012
Its 1’s complement: 01102
2’s complement is: 01112
Step2: Add above 2’s complement to minuend: (2m)
Minuened: 11012
2’s c of subtrahend: 01112
Sum: 101002
Step 3: Since we got carry bit 1, we discard it and answer is positive (1m)
Result is: 01002 //(i.e in decimal 13-9=4)

d) NAND is called as Universal gate, because we can obtain all the basic gates like OR, AND etc using multiple
NAND gates. (1m)
OR gate using NAND gates (3m)

Explanation:(1m)
Using 3 NAND gates we can Obtain OR gate, when connected as above diagram. Inputs to 2 NAND ‘s are to
be shorted and their output are to be input to third NAND gate to get OR output

2. a)Logic Gate: (2m)


Logic gates are the basic building blocks of any digital system. It is an electronic circuit having one or more
than one input and only one output. The relationship between the input and the output is based on a certain logic.
Example: AND gate, OR gate.

Logic gates and their symbols (any 3): (3*1=3m)

b) Answer any 2 out of 3 (2.5*2=5m)


i) 999 (10) to Octal:
Divide 999 by 8 as below:
999/8=124 with remainder 7
124 / 8 = 15 with remainder 4
15 / 8 = 1 with remainder 7
1/8=0 with remainder 1
Rewrite the remainders from bottom to top. Result: 1747(8)

ii) 10101111(2) to Hexadecimal

First, convert 101011112 into decimal as below:


10101111(2) = 1 × 27 + 0 × 26 + 1 × 25 + 0 × 24 + 1 × 23 + 1 × 22 + 1 × 21 + 1 × 20
= 17510

Now convert 17510 to hexadecimal as below:


175 / 16 = 10 with remainder 15 (F)
10 / 16 = 0 with remainder 10 (A)
Result is: AF(16)

iii) First,
convert 123.778 into decimal, by using above steps:
= 1 × 82 +2 ×81 +3 × 80 +7 × 8-1 + 7 × 8-2
= 83.98437510
Now, we have to convert 83.98437510 to binary
83 / 2 = 41 with remainder 1
41 / 2 = 20 with remainder 1
20 / 2 = 10 with remainder 0
10 / 2 = 5 with remainder 0
5 / 2 = 2 with remainder 1
2 / 2 = 1 with remainder 0
1 / 2 = 0 with remainder 1
83 = 1010011 ------- (1)
0.984375 × 2 = 1 + 0.96875
0.96875 × 2 = 1 + 0.9375
0.9375 × 2 = 1 + 0.875
0.875 × 2 = 1 + 0.75
0.75 × 2 = 1 + 0.5
0.5 × 2 = 1 + 0
0.984375 = 0.111111------- (2)
Result: 1010011.111111(2)
c) Given: 149(10)

i) EXCESS3 code: (3m)


1 4 9
+3 +3 +3
=4 =7 =12
0100 0111 1100

Result: 010001111100
ii) BCD code: (2m)

1 4 9

0001 0100 1001

Result:000101001001

d) To Verify LHS is equal to RHS for the equation, the truth table is as below: (award marks based on the
correctness of colums and values)

SECTION II

3. a) Simplify the given expression: (5m)

b) A flip flop is an electronic circuit used to store binary data. The stored data can be changed by
applying varying inputs. (1m)
Types of flip flops: (2m)
i. RS Flip Flop
ii. JK Flip Flop
iii. D Flip Flop
iv. T Flip Flop

Applications (any 2 of the below): (2m)


Counters, Storage registers, Shift registers, Data storage, Bounce elimination switch,
Latch, Data transfer, Registers
c) Any five differences: (5*1=5m)

d) 4:2 encoder circuit: (2m)

(OR)

Truth table: (3m)

4. a) i) To find 1’s complement of 01011(2)(2m)


Convert 1 to zero and zero to one
01011
1’s c: 10100
Result: 10100(2)
ii) To find 2’s complement of 11011(2) (3m)
-Find 1’s complement :
11011
1’s c: 00100
-Add 1 to 1’s complement
00100
+1
00101
Result: 00101(2)

b) SHIFT REGISTER: A group of flip flops which is used to store multiple bits of data and the data is moved from
one flip flop to another is known as Shift Register. (1m)

Types of Shift registers: (2m)

o Serial In Serial Out (SISO)


o Serial In Parallel Out (SIPO)
o Parallel In Serial Out (PISO)
o Parallel In Parallel Out (PIPO)

Applications (any 2): (2m)

 Parallel to serial conversion


 IO expansion for microcontrollers
 To induce Time delay
 In sequential devices

c) Comparator circuit : (3m)

Truth Table: (2m)


d)

Fig: Digital clock cycle (1m)


(1mark for each bilow bits)
i. Clock frequency: clock frequency (F) is the number of clock cycles per second.
ii. Clock period: clock period is the time duration of a Clock cycle (or) Inverse of clock frequency. It is
equal to 1/F
iii. Falling edge of clock: the line of the clock that connects a High-point towards the low-point. Ex: the
edge CD in above diagram
iv. High -level of clock: the duration of the clock signal for which it stays at High level. Ex: the edge BC in
above diagram

5. a) Diagram: (3m)

Sum, X= (A ⊕ B) ⊕Cin(1m)
Carry, Y= A.B + Cin.(A ⊕ B) (1m)

b) Given: Nibble means 4 bits to be transferred, N=4bits

Clock cycle time period, T=5 milliSeconds


For N bits time needed to shift data using SISO shift register = (2N-1)*T
= (2*4-1)*5
= 35 milliSeconds (5M)

c) Applications of computer: (any 4)(4*1=4m)


 Business
 Education
 Marketing
 Banking
 Insurance
 Communication
 Health Care
 Military
 Engineering Design
(any other relevant answer conveying the meaning may be awarded marks)

d) A keyboard has own processor and circuitry that carries information to and from that processor. A large
part of this circuitry makes up the key matrix.A keyboard contains many push-buttons called "keys". When
one of these are pushed, an electrical circuit is closed, and the keyboard sends a signal to the computer that
tells it what letter, number or symbol it would like to be shown on the screen. (2m)

(Any other diagram conveying above mechanism may be awarded marks)(3m)

6. a) Diagram – (3m)
Difference, D = (A ⊕ B) ⊕ Bin (1m)
Borrow, Bo= A’B+ A’.Bin+B.Bin (1m)

b) b) Given is 4:1 multiplexer:


i. 4 inputs are given (1m)
ii. 1 output taken (1m)
iii. Select lines selects one of the multiple inputs and connect it to the Output(1m)
iv. (2m)

c) Any 2 features of each generation (4m)

Generation of Features
computers
1st Generation Vacuum tube technology, Supported machine language only,
(1946-1959) Very costly, Generated a lot of heat, Huge size, Non-portable,
Consumed a lot of electricity
2nd Generation Use of transistors, Supported machine and assembly languages,
(1959-1965) Reliable and Smaller size as compared to first generation
computers, produced less heat as compared to first generation
3rd Generation IC used, Supported high-level language, More reliable and faster
(1965-1971) in comparison to previous two generations
4th Generation VLSI technology used, Pipeline processing, Very cheap, Portable
(1971-1980) and reliable, Very small size
5th Generation ULSI technology, Development of true artificial intelligence &
(1980 onwards) Natural language processing, Advancement in Superconductor
technology, powerful computers at cheaper rates
d) Any three differences (3*2=6)

SECTION IV

7. a) Security threats on unsecured website (any three): (3*2=6m)


i. Phishing attacks – Users may be trapped into fake sites that look similar to genuine sites. Cyber
criminals may convince / force users to provide sensitive data like banking details, password etc.
ii. Use of unsecure protocols. Ex: HTTP instead of HTTPS for secure communications
iii. Ransomware attack – User’s sensitive data is encrypted. But it will be decrypted
only after paying money to attacker
iv. Online File editing sites may misuse our uploaded data. When we upload our files
say our images or videos, they may be misused by them without user’s consent.
v. User may be prompted to download Malwares, virus, Trojans etc through attractive/catchy links
Drive in downloads – where without user’s notice virus, spyware may get installed on user’s
computer
vi. Denial of service attack – Here user may be denied of service he requested because
of flooding of requests by botnet
vii. Honey traps
Measures to deal with security threats ( any 2) : (2*1=2m)
i. Keeping the software and systems updated
ii. Using secure communication protocols
iii. Installing and properly configuring Firewalls
iv. awareness/educate to distinguish between original vs fake sites
(Any other appropriate correct answers may be awarded marks)

b) Diagram of Functional units of a Computer: (3m)

Explanation:(3m)
Various Functional units of computer are:
i.Input Unit: Data or Instructions to a computer is input using any Input device. Commonly used input
devices are Keyboard, Mouse, Joystick, scanner etc.

ii.Central Processing Unit(CPU): CPU- also known as brain of computer, is constituted of Arithmetic and
Logic Unit(ALU) and Control Unit(CU).
ALU is responsible for performing all the Arithmetic like addition, subtraction etc and Logical
operations like AND, OR etc. The intermediate results are stored on temporary storage called the
Registers.

CU controls and coordinates all the processes being executed on the computer. It generates the
timing signal responsible to which all the processes are synchronized.
iii.Memory Unit: Memory unit store the programs and the data on which the instructions of programs
operate. Instructions are fetch from memory, executed on CPU and result is stored back to memory.
iv.Output Unit: This unit renders the output to the users. Commonly used output devices are Monitor,
Printer, Speaker etc.

c) Flynn’s classification of computers: (Listing or Table) - (2m)


Features: any two each (4*1=4m)
i. SISD (Single Instruction Single Data): Instructions are executed sequentially, Von Neumann Architecture
based, Single CPU computer,
ii. SIMD (Single Instruction Multiple Data): includes many processing units under the supervision of a
common control unit, Vectors processors, Parallel Processing
iii. MISD (Multiple Instruction Single Data): multiple processing units operate on one single-data
stream,May be pipelined, Theoretical model only (not practically used)
iv. MIMD (Multiple Instruction Multiple Data): Multiple processors in a parallel computer execute different
instructions and operate on various data at the same time, Multiprocessing, Ex: Cray T90, Cray T3E, IBM-
SP2

8. a) i. Categoty of networking: (2m)

-Local Area Network (LAN) have to be setup separately for each department.

-All LANs are connected to Wide Area Network(WAN) through a router

ii. Networking devices needed:(3m)


-Each department needs an Ethernet switch of 64ports or a Wireless Switch
-A Router to which all the Switches are connected
-LAN cable(cat5/6) as per the requirement
iii. Topology (3m)
-In every department all the 50 systems may be connected to LAN using either Bus topology, Star
Topology or Ring Topology (any one).

-All the LAN switches are connected to Router in Star topology

(Any other answer if Justified may be awarded marks accordingly)

b) Diagram (3m)

Increasing access speed


Applications(any 3):(3m)
Registers: Used in CPU to store intermediate result
Cache memory: used to increase speed of access
Main memory: It is the addressable memory by the CPU. All the instructions and data are stored here before
loaded toc cpu.
Disk cache: Part of hard disk, used as cache memory to increase disk access speed
Magnetic disk / tape: Large storage devices, used for permanent/persistent storage of data

c) BIOS (any two features):(2m)


- BIOS refers to Basic Input/Output system
- It is embedded on EPROM, BIOS is set of instruction responsible for booting of the Computer
- Runs through Power On Self Test (POST) process.
- Configuration of Booting and Hardware may be done through BIOS
Differnces (any 4) - (4*1=4m)

BIOS UEFI

BIOS refers to Basic Input/Output system UEFI refers to Unified Extensible Firmware
Interface
It works on 16bit mode Supports 32bit and 64bit mode

Uses MBR (Master boot record) to save Uses GPT (GUID Partition Table) ) to save
information about hard drive information about hard drive
BIOS doesn’t support GUI UEFI supports GUI

Hard disk drive is limited to maximum size of Hard disk Drive may of size larger than 2TB
2TB
Require more boot time than UEFI Booting takes less time than in BIOS

Less secure More secure than BIOS

SECTION V

9. a) Any 4 differences- (4*1=4m)

Mobile OS Computer OS
Mobile OS helps and supports to run application Computer OS allows user to run their
software on mobile devices applications on Computer
Mobile OS is simple and lightweight compared Computer OS is complex and heavy weight
to Computer OS (small in size) compared to Mobile OS (large in size)
Supports less number of functionalities/ services Supports large number of functionalities/
services
Boot time is lesser than Computer OS Boot time is more than Mobile OS
Applications are designed to consume less No such restrictions imposed on the applications
memory and space
Ex: Android, Bada, Blackberry OS, iOS etc Ex: Windows 10, Mac, Redhatetc

b) Variable Naming rules in programming language (any 5): (5*1=5m)

I. Variable name must begin with a letter, dollar sign ($) or an underscore (_):
II. You cannot use reserve words to name variables
III. variable are case sensitive:
IV. Special symbols except underscore are not allowed in variable name
V. Multiple consecutive underscores are not allowed
VI. Variable name should be meaningful, such that it describes the value
VII. Space is not allowed within a variable

c) (4m)

Read N

d) ALGORITHM :(7m)
STEP 1: Start
STEP 2: Insert ATM card and enter PIN
STEP 3: IF login is successful THEN
IF Operation is ACCOUNT BALANCE THEN
display Account BALANCE
ELIF Operation is PRINT STATEMENT THEN
print Mini statement
ELIF Operation is WITHDRAW CASH THEN
ask user to enter amount
WITHDRAW amount
ELSE
Print 'Unsuccessful login'
STEP 5: Stop
(ANY OTHER SUITABLE ASSUMPTIONS AND DEEMED TO BE CORRECT MAY BE AWARDED MARKS)

10. a) a) Any 4 difference (4*1=4m)

Multiprocessing Multiprocessing
It is a mechanism provided using multiple This mechanism doesn’t need multiple
processors processors
Multiple processes are run on multiple Multiple programs are kept in main memory at a
processors time.
Does not ensure the better CPU utilization as Ensures better CPU utilization, as processor
multiple processors may sit idle. runs another program when ongoing process is
halted
Uses concept of Parallel processing Uses concept of Context-switching
Not cost effective Cost effective
Ex: In a quad-core processor 4 processes may Ex: More than one program residing in RAM
run paralelly.

b) any 5 symbols: (5m)

c) ALGORITHM :(4m)
STEP 1: START
STEP 2: Read an integer value from user, say N
STEP 3: IF N%2== 0 THEN
Print "N is an Even number"
ELSE
Print "N is an Odd Number"
ENDIF
STEP 4: END
d) Flowchart: (7m)

(Any Other Suitable Assumptions and found To Be Correct May Be Awarded Marks Accordingly)

Certificate
This is to certify that all the answers pertaining to the subject Fundamentals of Computers (20CS11T)
are borrowed from the prescribed text book specified in the syllabus copy.

AKKASALI NEELAKANTACHARI
Lecturer in CSE. DRR Govt. Polytechnic,
Davanagere.
Board Members:
Sd/-

Krishna M D Sharmila D BharatKumar V S Puttaswamy T Usha D

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy