University of Sargodha
MSc. 1st Term Examination 2019.
Subject I.T Paper: Introduction to ICT(ICT-2011)
Objective Part
Question 01: write short answer of the following questions.
1. Explain the term SMTP?
ANS: Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/IP network. SMTP provides the ability to send and receive email messages. SMTP is an application-layer protocol that enables the transmission and delivery of email over the Internet. SMTP is created and maintained by the Internet Engineering Task Force (IETF). Simple Mail Transfer Protocol is also known as RFC 821 and RFC 2821.
2. Explain Mobile E-Commerce.
ANS: Mobile e-commerce (m-commerce) is a process of online sales transactions that use wireless electronic devices such as hand-held computers, mobile phones or laptops. These wireless devices interact with computer networks that have the ability to conduct online merchandise purchases. Any type of cash exchange is referred to as an e-commerce transaction. Mobile e-commerce is just one of the many subsets of electronic commerce.
3. What is volume business ASP?
ANS: Volume business ASP is an application service provider that supplies packaged business solution to business organization such as accounting, HRM, MIS.
4. Explain SCSI Port.
ANS: SCSI stands for small computer system interface. It is a special high-speed parallel port to attach SCSI peripheral devices like disk drives and printer. It can connect up to 15 devices using daisy chain.
5. What is function of heat sink?
ANS: SCSI stands for small computer system interface. It is a special high-speed parallel port to attach SCSI peripheral devices like disk drives and printer. It can connect up to 15 devices using daisy chain. Heat sinks are commonly used in all CPUs and are also used in refrigeration and air conditioning systems, GPUs and video card processors. Heat sink dissipates heat from the processor.
6. Explain cache memory.
ANS: Cache Memory is a special very high-speed memory. It is used to speed up and synchronizing with high-speed CPU. Cache memory is an extremely fast memory type that acts as a buffer between RAM and the CPU. It holds frequently requested data and instructions so that they are immediately available to the CPU when needed. Cache memory is used to reduce the average time to access data from the Main memory. The cache is a smaller and faster memory which stores copies of the data from frequently used main memory locations. There are various different independent caches in a CPU, which store instructions and data.
7. Explain OCR.
ANS: Optical character recognition is a technology that reads type-written, computer printed or hand written characters from ordinary documents. It translates the image into the form that can be organized by the computer. Most OCR devices include a small optical scanner for reading characters and sophisticated software to analyze what is read. A common OCR device is handheld wand reader. It is used to retail store to read price tags by reflecting light on printed characters.
8. What are energy star programs
ANS: ENERGY STAR program is developed to help reduce the amount of electricity used by computers and related devices. This program encourages manufacturers to create energy- efficient devices that require little power when they are not in use.
9. Explain Cluster.
ANS: A cluster is a group of sectors within a disk and used to organize disk files. A cluster is larger than a sector, and most files fill many clusters of disk space. Each cluster ay consists of many sectors and has a unique cluster number. This cluster number is used to identify a cluster in hard
disk.
10. Explain Boot Disk.
ANS: A boot disk, or startup disk, is a storage device from which a computer can “boot” or start up. The default boot disk is typically a computer’s internal hard drive or SSD. Boot disk contains files required by the boot sequence as well as the operating system, which is loaded at the end of the startup process.
11. Ex[plain Trojan Horse
ANS: A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. It often disguises itself as legitimate software.
12. Explain BIOS
ANS: BIOS stands for Basic Input/ Output System and also known as the System BIOS, is firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs. The CPU accesses the BIOS before the operating system is loaded. The BIOS then checks all your hardware connections and locates all your devices. If everything is OK, the BIOS load the operating system into the computer’s memory and finish the boot-up process.
13. Difference Between GPS and GPRS
ANS:
GPS |
GPRS |
GPS Stands for Global Positioning System |
GPRS stands for General Packet Radio Service. |
GPS is used to locate position of a particular object. |
GPRS is used to access emails, and to browse the internet. |
GPS communicates with a collection of satellites that orbit the earth |
GPRS communicates with a terrestrial tower. |
GPS requires three or more stations to work |
GPRS requires just one station to work. |
GPS can be used any where |
GPRS can be used in the range of tower. |
14. Explain SQL
ANS: SQL stands for Structured Query Language. SQL is used to communicate with a database. it is the standard language for relational database management systems. SQL statements are used to perform tasks such as update data on a database, or retrieve data from a database.
15. Explain Spyware
ANS: Spyware is a type of malware that is used to gather information about a person or organization, without their knowledge, and send such information to another entity without the consumer’s consent. Furthermore, spyware asserts control over a device without the consumer’s knowledge, sending confidential information to another entity with the consumer’s consent, through cookies.
16. Write a short note on surge protector.
ANS: Surge protector is used to protect against electrical power variations. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
Go Back to main page
Download ICT Notes