OSI Model and Computer Components Overview
OSI Model and Computer Components Overview
QUESTION
In the OSI model, control is passed from one layer to the next, starting at the application layer (Layer 7)
in one station, and proceeding to the bottom layer, over the channel to the next station and back up the
hierarchy. The OSI model takes the task of inter-networking and divides that up into what is referred to as
a vertical stack that consists of the following 7 layers.
Did You Know...? Most of the functionality in the OSI model exists in all communications systems,
although two or three OSI layers may be incorporated into one. OSI is also referred to as the OSI
Reference Model or just the OSI Model.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Communication partners are identified,
quality of service is identified, user authentication and privacy are considered, and any constraints on data
syntax are identified. Everything at this layer is application-specific. This layer provides application
services for file transfers, e-mail, and other network software services. Telnet and FTP are applications
that exist entirely in the application level. Tiered application architectures are part of this layer.
Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
Page 1 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by translating
from application to network format, and vice versa. The presentation layer works to transform data into
the form that the application layer can accept. This layer formats and encrypts data to be sent across a
network, providing freedom from compatibility problems. It is sometimes called the syntax layer.
Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG,
MIDI.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session layer sets
up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each
end. It deals with session and connection coordination.
Transport (Layer 4)
OSI Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and forwarding are functions of this layer, as well as
addressing, internetworking, error handling, congestion control and packet sequencing.
At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC)
layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the
network gains access to the data and permission to transmit it. The LLC layer controls frame
synchronization, flow control and error checking.
Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC,
Frame Relay.
Page 2 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through the
network at the electrical and mechanical level. It provides the hardware means of sending and receiving
data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM
are protocols with physical layer components.
Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
Bridge
Operate at the data link layer
Connect two or more network segments that use the same data link and network protocol
Router
Operate at the network layer
Connects two or more segments that use the same or different data link layer but the same
network protocol
Gateway
Operate at the network layer
Connect two or more networks that use the same or different data link and network
protocol
Page 3 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
a) Motherboard
1. The motherboard acts as the central backbone of a computer on which other modular parts are
installed such as the CPU, RAM and hard disks.
2. The motherboard also acts as the platform on which various expansion slots are available to
install other devices / interfaces.
3. The motherboard is also responsible to distribute power to the various components of the
computer.
4. Also used in the coordination of the various devices in the computer and maintain an interface
among them.
b) Northbridge chip
Links the CPU to very high-speed devices, especially RAM and graphics controllers.
The Northbridge connects the Southbridge to the CPU and is commonly known as the memory
controller hub.
The Northbridge handles a computer's faster interaction requirements and controls
communication between the CPU, RAM, ROM, the basic input/output system (BIOS), the
accelerated graphics port (AGP) and the Southbridge chip.
The Northbridge links I/O signals directly to the CPU.
The CPU uses the Northbridge frequency as a baseline for determining its operating frequency
c) Southbridge chip
Page 4 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Bit
Binary digit i.e. 1 or 0
ii. Nibble
4 bits or half byte
iii. Byte
8 bits
v. Data Bus
Bi-directional
Carries data signals throughout the system
carries the actual data being processed
Page 5 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
a) Assembler
Translates mnemonics or assembly language into machine language
b) Editor
Program that allows the user to enter, edit and store a group of instructions or text
under a filename
c) Compiler
Program that translates high level language into machine code
d) Debugger
It’s a program that allows the user to test and debug object file
e) Loader
Program that takes the hex file generated by the assemble and generate a file in a
binary load and loads it into memory for execution
Page 6 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Oscilloscope
Page 7 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Tribocharging
This occurs when an electrically charged object is placed near a conductive object
isolated from the ground.
The presence of the charged object creates an electrostatic field that causes electrical
charges on the surface of the other object to redistribute.
Even though the net electrostatic charge of the object has not changed, it now has regions
of excess positive and negative charges.
An ESD event may occur when the object comes into contact with a conductive path.
Page 8 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
(b) syntax
Refers to the structure of a programming language
Is the set of rules that defines the combinations of symbols that are considered to
be a correctly structured document or fragment in that language?
Refers to the spelling and grammar of a programming language
Page 9 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
POST stands for "Power On Self Test." It is a diagnostic program built into the computer's hardware that
tests different hardware components before the computer boots up.
POST begins by checking the BIOS chip and then tests CMOS RAM.
If the POST does not detect a battery failure, it then continues to initialize the CPU, video card, secondary
storage devices, such as hard drives and floppy drives, ports and other hardware devices, such as the
keyboard and mouse, to ensure they are functioning properly.
If any of these tests fail, the POST process will return an error message.
This message may be displayed on the screen or may be output in the form of beeps or blinking lights.
The most common type of POST error is a memory error.
This can be caused by one or more bad memory modules or a memory chip that is loose or not fully seated.
The POST process runs quickly at the beginning of the boot sequence before the operating system loads.
Therefore, you most likely will not notice it unless there is an error.
Once the POST has determined that all components are functioning properly and the CPU has successfully
initialized the BIOS looks for an OS to load.
GUI CLI
Uses graphics, images, icons and text. It is a text based interface that requires text and
codes to operate
Booting up is more demanding on the CPU. Booting up system is less demanding on the
CPU
A GUI requires more system resources because A computer that is only using the command line
of the elements that require loading, such as takes a lot less of the computer's system
icons and fonts. Video, mouse, and other drivers resources than a GUI.
need to be loaded, taking up additional system
resources
Mouse is used as the basic input device; Keyboard is used as the basic input device. The
command line allows the user to keep their
hands on the keyboard, almost never touching
the mouse.
Most users pick up this interface much easier New users have a difficult time navigating and
when compared to a command line interface, operating a command line interface, because of
the memorization and familiarity needed to
although new users may struggle learning to
use the mouse and all GUI features operate a command line interface,
In a multitasking environment, GUI users have Does not offer the same ease and ability to view
windows that enable a user to view, control, multiple things at once on one screen in a
manipulate, and toggle through multiple multitasking environment
programs and folders at same time. Allows more
than one process to work simultaneously.
Slower than someone who is working in a Fast in that Command line users only need to
command line, as using both a mouse and utilize their keyboards to navigate the interface.
keyboard to navigate and control your operating Additionally, they often only need to execute a
or file system is going to slow you a bit few lines to perform a task.
Page 10 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i) Program Counter
Holds the address of the next instruction to be executed
Page 11 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
c) Unix shell
C Shell
Bourne Shell
Corn Shell
Page 12 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
a) Define Network Operating System (NOS) and give any two (2) examples.
Is the software that allows multiple computers to communicate, share files and hardware devices
with one another?
A network operating system is an operating system designed for the sole purpose of supporting
workstations, database sharing, application sharing and file and printer access sharing among
multiple computers in a network.
Examples
Microsoft Windows NT
OpenVMS
Microsoft Windows Server 2003,
Microsoft Windows Server 2008,
Linux
Mac OS X.
Providing access to remote printers, managing which users are using which printers when,
managing how print jobs are queued, and recognizing when devices aren't available to the
network
Enabling and managing access to files on remote systems, and determining who can
access what—and who can't
Granting access to remote applications and resources, such as the Internet, and making
those resources seem like local resources to the user (the network is ideally transparent to the
user)
Providing routing services, including support for major networking protocols, so that the
operating system knows what data to send where
Monitoring the system and security, so as to provide proper security against viruses,
hackers, and data corruption.
Providing basic network administration utilities (such as SNMP, or Simple Network
Management Protocol), enabling an administrator to perform tasks involving managing
network resources and users.
Page 13 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. 10BASE2
10Base2 is among the family of Ethernet network standards for local area networks
(LAN) that uses a thinner version of coaxial cable to establish a network path or medium
and operates at a speed of 10 Mbps to carry out baseband transmission.
10Base2 is also known as cheapernet, thinwire, thinnet and thin Ethernet.
10Base2 use RG- 58 A/U coaxial cable that is thinner, flexible, cheaper and
comparatively easier to install than cable used in 10Base5 standard.
The maximum cable length within a 10Base2 is 200 meters, but 185 meter is a preferred
length.
The maximum number of nodes that can connect within a 10Base2 network segment is
30.
10Base2 use BNC T-connector to join two cables together and to connect with the
computer’s network interface card (NIC).
Moreover, the cable must be terminated with a 50 ohm resistant at each end.
ii. 10BASE5
10Base5 refers to a standard for Ethernet network technologies that use a thicker version
of coaxial cables. It has the capability to transmit data at speed of 10Mbps up to 500
meters using baseband transmission.
10Base5 is also known as Thicknet, ThickWire and thick Ethernet.
The 10Base5 is among the first of original standards of Ethernet along with 10Base2.
The name 10Base5 is derived from its 10Mbps transmission speed and 500 meters as the
maximum segment length.
Its coaxial cable is similar to RG-8/U but with a much thicker shield and braiding,
making it highly resistant to network interference.
Its outer sheath even has the ability to resist and protect against fire.
A 10Base5 network segment (LAN) can consist of a maximum of 100 nodes.
Each node connects to the network segment or cable using an N-connector and must have
a distance of 2.5m between one another.
Nodes can also be connected through a vampire clam that enables adding a new node in a
live network.
Page 14 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
(b) Defragmenter
Gathers the non-contiguous data into one place making files run much faster
Process of updating and rewriting some segments of files to contiguous sectors of
a disk in order to increase the effective and efficiency of access of these files
Page 15 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
#include <iostream>
int main()
{
float num1, num2, sum;
// Printing output
cout << "Sum of "<< num1 << " and " << num2 << " is " << sum;
return 0;
}
Page 16 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Is a power OK signal
It is a signal sent to the motherboard when all output voltages from the power supply
are OK
The Power Good signal prevents a computer from attempting to operate on improper
voltages and damaging itself by alerting it to improper power supply.
The ATX specification defines the Power-Good signal as a +5 volt (V) signal generated
in the power supply when it has passed its internal self-tests and the outputs have
stabilized
The signal is then sent to the motherboard, where it is received by the processor timer
chip that controls the reset line to the processor.
Refers to the period or time a power supply takes to start up completely and begin
delivery to proper voltages to the connected devices
Is the amount of time it takes a power supply to start up completely and begin delivering
the proper voltages to the connected devices?
(c) Oscilloscope
Displays AC waveforms
Used to measure amplitude
Page 17 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. RISC
A reduced instruction set computer (RISC )is a computer which only use simple instructions
that can be divided into multiple instructions which perform low-level operation within single
clock cycle, as its name suggest “REDUCED INSTRUCTION SET”
ii. CISC
A complex instruction set computer (CISC ) is a computer where single instructions can
execute several low-level operations (such as a load from memory, an arithmetic operation,
and a memory store) or are capable of multi-step operations or addressing modes within
single instructions, as its name suggest “COMPLEX INSTRUCTION SET”.
CISC RISC
Emphasis on hardware Emphasis on software
Page 18 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Program counter
Instruction register is 8-bit register just like every other register of microprocessor.
The instruction may be anything like adding two data's, moving a data, copying a
data etc.
When such an instruction is fetched from memory, it is directed to Instruction
register. So the instruction registers are specifically to store the instructions that are
fetched from memory.
There is an Instruction decoder which decodes the information present in the
Instruction register for further processing.
Page 19 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Is the remaining 640kb from IBM real mode or base memory available
to load and run your applications
(iii)Extended Memory
Page 20 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
The Intel 8085 internal architecture can be divided into major functions. List any 4 major
functions.
1. Control Unit
Generates signals within uP to carry out the instruction, which has been decoded.
3. Registers
The 8085/8080A-programming model includes six registers, one accumulator, and
one flag register,. In addition, it has two 16-bit registers: the stack pointer and the
program counter.
4. Accumulator
The accumulator is an 8-bit register that is a part of arithmetic/logic unit (ALU).
This register is used to store 8-bit data and to perform arithmetic and logical
operations. The result of an operation is stored in the accumulator. The accumulator
is also identified as register A.
5. Flags
The ALU includes five flip-flops, which are set or reset after an operation according
to data conditions of the result in the accumulator and other registers. They are
called Zero(Z), Carry (CY), Sign (S), Parity (P), and Auxiliary Carry (AC) flags.
The most commonly used flags are Zero, Carry, and Sign. The microprocessor uses
these flags to test data conditions.
Page 21 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Filename (also written as two words, file name) is a name used to uniquely identify
a computer file stored in a file system.
Different file systems impose different restrictions on filename lengths and the
allowed characters within filenames.
Host (or node or server) – network device that contains the file
Device (or drive) – hardware device or drive
Directory (or path) – directory tree (e.g., /usr/bin, \temp, [usr.lib.src],
etc.)
File – base name of the file
Type (format or extension) – indicates the content type of the file (e.g.,
.txt, .exe, .com, etc.)
Version – revision or generation number of the file
is the filename of the default operating system shell for DOS operating systems and
the default command line interpreter
responsible for setting up the system by running the AUTOEXEC.BAT
configuration file
is the first program run after booting
Page 22 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Access time
Access time is the amount of time it takes the processor to read data, instructions, and information
from memory.
A computer’s access time directly affects how fast the computer processes data.
Accessing data in memory can be more than 200,000 times faster than accessing data on a hard
disk because of the mechanical motion of the hard disk.
Today’s manufacturers use a variety of terminology to state access times.
Some use fractions of a second, which for memory occurs in nano seconds.
A nanosecond (abbreviated ns) is one billionth of a second. A nanosecond is extremely fast.
Other manufacturers state access times in MHz; for example, 800 MHz RAM.
It is the time that is measured in nanoseconds, the time between one Ram access of time when the
next Random Access Memory RAM access starts.
Access time were used as synonym of it but IBM separates that with some explanation.
That Cycle Time find the right place for the memory to take place in the memory and transfer
time of that information/process.
So one should not get confused while thinking about the Clock Cycle or Clock Speed which have
to do with number of cycles/second to which a processor is paced.
b) List any two (2) factors which affect memory speed within a system
A memory bank is the logical storage within computer memory that is used for storing and
retrieving frequently used data.
It can be a part of standard RAM or the cache memory used for easily accessing and retrieving
program and standard data.
A memory bank is primarily used for storing cached data, or data that helps a computer access
data much more quickly than standard memory locations.
Page 23 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Typically, a memory bank is created and organized by the memory access controller and the
actual physical architecture of the memory module.
In SDRAM and DDR RAM, the memory bank can consist of multiple columns and rows of
storage units spread across several chips.
Each memory module can have two or more memory banks for program and data storage.
Page 24 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
A bus is a common pathway through which information flows from one computer component to
another.
This pathway is used for communication purpose and it is established between two or more
computer components.
Data sharing - All types of buses found in a computer transfer data between the computer
peripherals connected to it. The buses transfer or send data in either serial or parallel method of
data transfer. This allows for the exchange of 1, 2, 4 or even 8 bytes of data at a time. (A byte is a
group of 8 bits). Buses are classified depending on how many bits they can move at the same
time, which means that we have 8-bit, 16-bit, 32-bit or even 64-bit buses.
Addressing - A bus has address lines, which match those of the processor. This allows data to be
sent to or from specific memory locations.
Timing - The bus provides a system clock signal to synchronize the peripherals attached to it
with the rest of the system.
Page 25 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Illustrate the following logic gates using diagram and their truth tables
(i) OR
(ii) X-OR
(iii)AND
(iv) NAND
(v) NOR
i. OR
A B X
0 0 0
0 1 1
1 0 1
1 1 1
ii. X-OR
A X
0 1
1 0
iii. AND
A B X
0 0 0
0 1 0
1 0 0
1 1 1
iv. NAND
A B X
0 0 1
0 1 1
1 0 1
1 1 0
v. NOR
A B X
0 0 1
0 1 0
1 0 0
1 1 0
Page 26 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Redundant array of independent disks (RAID) is a method of storing duplicate data on two or
more hard drives.
It is used for data backup, fault tolerance, to improve throughput, increase storage functions and
to enhance performance.
RAID is attained by combining two or more hard drives and a RAID controller into a logical unit.
The OS sees RAID as a single logical hard drive called a RAID array. There are different levels
of RAID, each distributing data across the hard drives with their own attributes and features.
Originally, there were five levels, but RAID has advanced to several levels with numerous
nonstandard levels and nested levels. The levels are numbered RAID 0, RAID 1, RAID 2, etc.
RAID is mostly used for data protection allowing a continuation of two data copies, one in each
drive.
i. RAID 2
In RAID 2, a central controller synchronizes the disks by making them spin at the same
angular orientation so that they all reach the index simultaneously.
RAID 2 uses bit-level striping and each sequential bit is placed on a different hard drive.
The error correcting code (ECC) used is the Hamming code parity, which is calculated across
bits and stored separately in at least a single drive.
This configuration requires special driver hardware to make the disks spin synchronously.
The RAID 2 controller was expensive and hard to implement. As a result, it never really
caught on and was almost never used.
ii. RAID 5
Because RAID 5 stripes data and parity bits across all disks, it is very tolerant of single disk
failures, although this reduces the disk capacity slightly. If a disk fails, it simply has to be
replaced and the system can go on. Further data reads are calculated from the parity so that
end users do not even notice the disk failure.
Page 27 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
RAID 5 is similar to RAID 4, but the dedicated drive used for parity was removed and
replaced with a distributed algorithm. This resolves the bottlenecks caused by a dedicated
parity disk.
Advantages:
Disadvantages:
Page 28 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
With the aid of well labeled diagrams briefly explain half duplex and full duplex
transmission modes.
In half duplex system we can send data in both directions but it is done one at a time that is when
the sender is sending the data then at that time we can’t send the sender our message.
The data is sent in one direction at a time
Half duplex uses a single path of communication for sending and receiving and is like a one-lane
road, where only one car can move in one direction at a time, while a car at the opposite end of
the lane must wait before driving.
Similarly, Half duplex-based systems can send or receive in only one direction at a time and must
wait for the completion of in-process communication before using the same channel to transmit in
the opposite direction
Example of half duplex is a walkie- talkie in which message is sent one at a time and messages
are sent in both the directions.
Page 29 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
In full duplex system there can be two lines one for sending the data and the other for receiving
data.
Page 30 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Algorithm
Is a set of instructions or procedures for solving a program
It is a finite set of well-defined instructions of accomplishing some tasks
ii. Pseudocode
Short hand way of describing a computer program rather than the use of a
specific syntax of a computer language
iv. Linker
Links the object code and separately compiled subroutines such as I/O
routines
Is a program that combines object modules to form an executable
program?
Linker or link editor is a computer program that takes one or more object
files generated by a compiler and combines them into a single executable
program.
v. Translator
translates source code into its equivalent machine code or object code
Page 31 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
a) Clearly show the differences between a surge protector and a surge suppressor.
A suppressor regulates the voltage and makes the power constant in a case of a spike or surge.
A protector simply detects the surge and turns the unit off.
Suppressor is good for things like computers you don't want to keep turning on and off.
Suppressor suppress surge but protector get its fuse blown on surge.
When a surge is detected, a surge protector If the voltage given to an electrical device is
diverts the surge to the ground, preventing it too high or too low, it could cause damage.
from reaching the connected device. Surge suppressors help prevent this, adjusting
the provided voltage up or down to keep it at
the correct levels.
Surge protectors are normally used with Surge suppressors are not used as often as
expensive electronic devices, such as surge protectors, but can be useful in certain
computers or televisions. Since electric situations. Some households or business may
surges can happen almost anywhere under the receive so called "dirty power," where the
right conditions, surge protectors are usually power fluctuates frequently. Surge suppressors
considered an easy and cheap investment. can be used in such situations to even out the
power supply and help protect electrical
devices.
b) Outline any three (3) occurrences when you use a power supply that does not supply
enough power for the system.
c) Name any three (3) computer components that require a power supply voltage of
+12V.
1. Hard disk
2. Optical drive
3. Floppy drive
4. Mainboard or motherboard
5. New age VGA cards
6. Fans,
7. Cooling devices
Page 32 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Current Tracer
Test the flow of fast rising current pulses
Senses the magnetic field generated by these pulses and indicates their
presence
v. Signature analyzer
Used to record complex data streams in AC waveforms
Monitors the logic activities of a node in a systems
Page 33 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i) Boot sector
First sector on a disk or partition on bootable disk which holds the code called the boot
record that causes the system to move the os files into memory and begin executing them
A boot sector or boot block is a region of a hard disk that contains machine code to be
loaded into random access memory (RAM) by a computer system's built-in firmware.
The purpose of a boot sector is to allow the boot process of a computer to load the os
program
Differentiate between Enhanced Parallel Port (EPP) and Executed Capabilities Port (ECP)
Page 34 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Refers to the structure of data which usually resides in memory itself that
indicates how memory is laid out
A technique whereby computer peripherals may be addressed as though they
formed part of the main memory of the computer
Chassis design
Chassis size
Power supply fan venting
Location of processor slots
c) Explain the term hot spots as used in areas inside the chassis of a computer
Refers to the areas inside the chassis which produces or dissipates heat during
processing
Page 35 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Real mode
Page 36 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Page 37 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
b) 1101012* 1010002
110101
*101000
11010100000
+ 110101000
1000010010002
d) CF816 to binary
110011110002
e) 101112 + 011012
= 1001002
f) 10012 - 01112
= 01102
g) 1101012 to binary
32+16+4+1
= 53
Page 38 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Latch
Latches and flip-flops are the building blocks of sequential circuits.
latches can be built from gates
latch does not have a clock signal
It is a bistable multivibrator i.e. a device with exactly two stable states high and low output
Has feedback path therefore information can be retained by the devices
Page 39 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Write brief notes on the following display units in terms of physical construction and operation
i. CRT
Working of CRT
Works by moving an electron beam back and forth across the back of the screen.
Each time the beam makes a pass across the screen, it lights up phosphor dots on the inside of
the glass tube, thereby illuminating the active portions of the screen.
By drawing many such lines from the top to the bottom of the screen, it creates an entire
screenful of images.
Page 40 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
ii. LCD
Page 41 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Plasma creates a picture from a gas filled with xenon and neon atoms and millions
of electrically charged atoms and electrons that collide when you turn the power
on.
When a voltage is applied, the electrodes get charged and cause the ionization of
the gas resulting in plasma. This also includes the collision between the ions and
electrons resulting in the emission of photon light.
A gas-plasma display works by sandwiching neon gas between two plates.
The print on one plate contains vertical conductive lines and the other plate has
horizontal lines, the two plates form a grid.
When electric current is passed through a horizontal and vertical line, the gas at
the intersection glows, creating a point of light, or pixel thereby creating an image.
Page 42 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
There are mainly two technologies that are used to spray the ink by nozzles.
Thermal Bubble
This technology is also known as bubble jet is used by various manufacturers like Canon and
Hewlett Packard.
When printer receives commands to print something, the current flows through a set of tiny
resistors and they produce heat.
This heat in turn vaporizes the ink to create a bubble.
As the bubble expands, some of the ink moves out of the nozzle and gets deposited over the
paper.
Then the bubble collapses and due to the vacuum it pulls more ink from ink cartridge.
There are generally 300 to 600 nozzles in a thermal printer head which can spray the ink
simultaneously.
Piezoelectric
In the piezoelectric technology, a piezo crystal is situated at the end of the ink reservoir of a
nozzle.
When printer receives the command to print, an electric charge is applied to the crystal which in
turn starts vibrating and a small amount of ink is pushed out of the nozzle.
When the vibration stops the nozzle pulls some more ink from the cartridge to replace the ink
sprayed out.
This technology is patented by Seiko Epson Corporation
Page 43 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Bubble jets
1. Under instructions from your computer, an electronic circuit in the printer figures out which
nozzles have to be fired to print a particular character at a certain point on the page. Hundreds
of nozzles are involved in making a single character and each one is only about a tenth as thick
as a human hair!
2. The circuit activates each of the nozzles by passing an electric current through a small resistor
inside it.
3. When electricity flows through the resistor, it heats up.
4. Heat from the resistor boils the ink inside the nozzle immediately next to it.
5. As the ink boils, it forms into a bubble of ink vapor. The bubble expands enormously and bursts.
6. When the bubble pops, it squirts the ink it contained onto the page in a precisely formed dot.
7. The collapsing bubble creates a partial vacuum in the nozzle that draws in more ink from the ink
tank, ready for printing the next dot.
8. Meanwhile the entire print head (light orange) is moving to the side ready to print the next
character.
Page 44 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Ink jets
1. An ink tank (black) supplies the ink dispenser (green) through a narrow tube by capillary action.
2. A droplet of ink from the tank sits waiting at the very end of the tube.
3. When the printer circuit (not shown) wants to fire an ink droplet, it energizes two electrical
4. The energized piezoelectric crystal (dark red) flexes outward (toward the right in this picture).
5. It squashes against a membrane (dark blue), pushing that toward the right as well.
6. The membrane pushes against a hole in the ink dispenser (green), increasing the pressure there.
7. The pressure forces the waiting ink droplet from the tube toward the paper.
Page 45 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Page 46 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Holds the operating system and acts as main storage media of a computer
Uses rugged solid substrates called platters
Storage is achieved by depositing a thin magnetic film on either side of each disk
Single hard disk usually consists of several platters.
Each platter requires two read/write heads, one for each side.
All the read/write heads are attached to a single access arm so that they cannot move
independently.
Each platter has the same number of tracks, and a track location that cuts across all
platters is called a cylinder
Page 47 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
A hard disk uses round, flat disks called platters, coated on both sides with a special
The platters are mounted by cutting a hole in the center and stacking them onto a spindle.
The platters rotate at high speed, driven by a special spindle motor connected to the
spindle.
Special electromagnetic read/write devices called heads are mounted onto sliders and
used to either record information onto the disk or read information from it.
The sliders are mounted onto arms, all of which are mechanically connected into a single
assembly and positioned over the surface of the disk by a device called an actuator.
A logic board controls the activity of the other components and communicates with the
Each surface of each platter on the disk can hold tens of billions of individual bits of data.
These are organized into larger "chunks" for convenience, and to allow for easier and
Each platter has two heads, one on the top of the platter and one on the bottom, so a hard
disk with three platters (normally) has six surfaces and six total heads.
Each platter has its information recorded in concentric circles called tracks.
Each track is further broken down into smaller pieces called sectors, each of which holds
Page 48 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Compact disc
Are recorded as a single continuous spiral track running from the spindle to the lead out area
A compact disk is a circular plastic plate that has a special coating on one side of it that is used
to burn data onto it
Compact is a small, portable, round medium made of molded polymer for electronically
recording, storing, and playing back audio, video, text, and other information in digital form
Page 49 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
To understand RAID, imagine multiple disk drives that are put together and interlinked in an
array to obtain greater performance, capacity and reliability.
RAID is an acronym for Redundant Array of Independent Disks - the technique that was
developed by researchers at the University of California at Berkeley during 1987 to
overcome the limitation and deficiency imposed by a single hard disk.
An array of hard disks known as RAID (Redundant Array of Independent Disks or some call
it Redundant Array of Inexpensive Disk) are used in enterprise which is normally the main
storage centre for mission-critical data.
RAID was originally deployed at the time when the individual disk capacity was too small to
hold huge and demanding operational data.
RAID tackles this issue nicely by daisy-chaining individual disk to form a larger volume
much sought after during that time.
Additional redundancy to increase failsafe is another consideration.
Increase in performance for some RAID configuration under specific operational
environment is obviously another factor for selection of RAID.
RAID can be quite complex considering that different users may be using different methods
to store their data on their RAID server resulting in different kinds of RAID configuration.
Whatever the configuration, the main consideration still hinges on three critical factors -
Volume size, Failsafe and Performance considerations.
Common RAID configuration may deploy duplex / mirror, striping (with or without parity)
or a combination of these.
RAID became popular when the needs of new applications and devices are beyond the capability of
a typical single hard disk. Special hard disks are expensive and RAID thus became an affordable
alternative to large storage system that requires speedy data transfer rates and security.
RAID is now commonly used on computer server to reliably store large chunks of data. With
the availability of RAID options now integrated into motherboard chipsets and operating
systems, desktop and high-end users are starting to employ this technology to operate the
storage-intensive tasks, such as non-linear video/audio editing and critical real-time
operations.
Page 50 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Repeater
Used to connect one or more Ethernet cable segments
Provides signal amplification and regeneration to restore a
good signal level
ii. Router
Operate at the network layer
Connects two or more segments that use the same or
different data link layer but the same network protocol
iii. Bridge
Operate at the data link layer
Connect two or more network segments that use the same
data link and network protocol
iv. Gateway
Operate at the network layer
Connect two or more networks that use the same or
different data link and network protocol
v. Switch
Sometimes called a multiport bridge
Combines network segments linked together and has
several ports
Page 51 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
a) Assembler
Translates mnemonics or assembly language into machine language
b) Editor
Program that allows the user to enter, edit and store a group of instructions or text
under a filename
c) Compiler
Program that translates high level language into machine code
d) Debugger
It’s a program that allows the user to test and debug object file
e) Loader
Program that takes the hex file generated by the assemble and generate a file in a
binary load and loads it into memory for execution
Page 52 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
b) Unix shell
C Shell
Bourne Shell
Corn Shell
c) Unix Utilities
File management (rm, cat,ls)
User management (passwd)
Process management (kill,ps)
Printing management (lp,pr)
Networking utilities
Program development tools
Page 53 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Communication Protocol
QUESTION
TCP/IP
The TCP/IP model differs slightly from the seven-layer Open Systems
Interconnection (OSI) networking model designed after it, which defines how
applications can communicate over a network.
TCP/IP functionality is divided into four layers, each of which include specific protocols.
1. The application layer provides applications with standardized data exchange. Its
protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post
Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple Network
Management Protocol (SNMP).
2. The transport layer is responsible for maintaining end-to-end communications across the
network. TCP handles communications between hosts and provides flow control, multiplexing
and reliability. The transport protocols include TCP and User Datagram Protocol (UDP), which is
sometimes used instead of TCP for special purposes.
3. The network layer, also called the internet layer, deals with packets and connects
independent networks to transport the packets across network boundaries. The network layer
protocols are the IP and the Internet Control Message Protocol (ICMP), which is used for error
reporting.
4. The physical layer consists of protocols that operate only on a link -- the network
component that interconnects nodes or hosts in the network. The protocols in this layer include
Ethernet for local area networks (LANs) and the Address Resolution Protocol (ARP).
Advantages of TCP/IP
QUESTION
1. Physical layer
Defines hardware specifications
Transmission modes eg simplex, half duplex
Physical topology eg star, ring bus
Data rate i.e the number of bits to be transmitted per second
3. Network layer
Logical addressing-translates source and destination addresses into ones and zeros
that can be understood across all the networks
Routing- determines which path to take from source to destination
Datagram encapsulation- places messages into datagrams called packets
4. Transport layer
5. Session layer
Dialog control- allows two systems to enter into a dialog defining whether
communication is half duplex or full duplex
Page 57 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
6. Presentation layer
7. Application layer
Provides an interface between the user and the network
Allows the user to access the network
Page 58 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
v) Stack pointer
Page 59 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
QUESTION
With the aid of a well labeled diagram clearly explain the fetch/execute cycle of the 8085
microprocessor (10)
QUESTION
Describe the functions of the following in implementation of interfacing system buses on I/O
ports
i. Latch (3)
ii. Tristate buffer (3)
iii. Bi-directional buffer (4)
QUESTION
Briefly explain the following terms
i. Compiler (2)
ii. Algorithm (2)
iii. Flow chart (2)
iv. Pseudocode (2)
v. Syntax (2)
QUESTION
With the aid of a well labeled diagram explain the principle operation of a laser printer (10)
QUESTION
Describe the function of the following special purpose registers
i. Accumulator (2)
ii. Program counter (2)
iii. Instruction register (2)_
iv. Stack pointer (2)
v. Status register (2)
Page 60 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
QUESTION
QUESTION
QUESTION
Page 61 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Hardware
Physical., tangible components of a computer
Examples keyboard, mouse
ii. Software
Computer programs that control the working of the computer
Example operating systems, application software
iii. Firmware
Hardwired software coded into the computer hardware during manufacturing
EXPANSION CARDS
Examples
PCI
PCI-Express
AGP
Page 62 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
A standard process describes the steps needed for processing to take place. It is called the
Fetch - Decode - Execute cycle or sometimes simply called the Fetch-Execute Cycle.
First of all, both the data and the program that acts upon that data are loaded into main
memory (RAM) by the operating system. The CPU is now ready to do some work.
1. FETCH
The first step the CPU carries out is to fetch some data and instructions (program) from
main memory then store them in its own internal temporary memory areas. These
memory areas are called 'registers'.
This is called the 'fetch' part of the cycle.
For this to happen, the CPU makes use of a vital hardware path called the 'address bus'.
The CPU places the address of the next item to be fetched on to the address bus.
Data from this address then moves from main memory into the CPU by travelling along
another hardware path called the 'data bus'.
You could imagine that it is a bit like a boat attendant at a lake calling in customers when
their time is up -- "Boat number 3, time to come in!" The 'address' of the boat is 3 and the
'data' is its content. The boat is parked at a pier, which is like the internal register of the
CPU.
2. DECODE
The next step is for the CPU to make sense of the instruction it has just fetched.
This process is called 'decode'.
The CPU is designed to understand a specific set of commands. These are called the
'instruction set' of the CPU. Each make of CPU has a different instruction set.
The CPU decodes the instruction and prepares various areas within the chip in readiness
of the next step.
3. EXECUTE
This is the part of the cycle when data processing actually takes place. The instruction is
carried out upon the data (executed). The result of this processing is stored in yet another
register.
Once the execute stage is complete, the CPU sets itself up to begin another cycle once
more.
Page 63 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Page 64 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Fetch cycle takes four t-states and execution cycle takes three t-states.
Page 65 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
05 – lower bit of address where opcode is stored. Multiplexed address and data bus AD0-AD7
are used.
20 – higher bit of address where opcode is stored. Multiplexed address and data bus AD8-AD15
are used.
ALE – Provides signal for multiplexed address and data bus. If signal is high or 1, multiplexed
address and data bus will be used as address bus. To fetch lower bit of address, signal is 1 so
that multiplexed bus can act as address bus. If signal is low or 0, multiplexed bus will be used as
data bus. When lower bit of address is fetched then it will act as data bus as the signal is low.
RD (low active) – If signal is high or 1, no data is read by microprocessor. If signal is low or 0,
data is read by microprocessor.
WR (low active) – If signal is high or 1, no data is written by microprocessor. If signal is low or 0,
data is written by microprocessor.
IO/M (low active) and S1, S0 – If signal is high or 1, operation is performing on input output. If
signal is low or 0, operation is performing on memory.
Page 66 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Page 67 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Latch
Is a bistable multivibrator- a device with exactly two stable states
States are high output and low output
Has got a feedback path which allows information to be retained by the
device
Can be a memory device
Page 68 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Compiler
It’s a program translator
Translates high level language from source code to machine code or object
code
ii. Algorithm
Is a set of instructions or procedures for solving a program
It is a finite set of well-defined instructions of accomplishing some tasks
iv. Pseudocode
Short hand way of describing a computer program rather than the use of a
specific syntax of a computer language
v. Syntax
Refers to the structure of a programming language
Page 69 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
1. Cleaning
When an image has been deposited on the paper and the drum has been separated
any remaining toner must be removed from the drum
A printer blade is used to scrap all the excess toner
2. Conditioning
Involves removing the latent image from the drum and conditioning the drum for a
new latent image
3. Writing
Involves scanning the photo sensitive drum with the laser beam
4. Developing
The toner is applied to the latent image on the drum
5. Transferring
The toner attached to the latent image is transferred to the paper
6. Fusing
Toner is permanently fused on the paper. The printing paper is rolled between a
heated roller and a pressure roller, the loose toner is melted and fused with the fibers
in the paper
The paper is then moved to the output tray as printed page
Page 70 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
The laser printer uses electrostatic charges to (1) create an image on the drum, (2) adhere
toner to the image, (3) transfer the toned image to the paper, and (4) fuse the toner to the
paper. The laser creates the image by "painting" a negative of the page to be printed on
the charged drum. Where light falls, the charge is dissipated, leaving a positive image to
be printed.
Page 71 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Page 72 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
The CONTROL CIRCUITRY is the part of the printer that talks with the computer and receives
the printing data.
A Raster Image Processor (RIP) converts the text and images in to a virtual matrix of dots.
The PHOTOCONDUCTING DRUM which is the key component of the laser printer has a special
coating which receives the positive and negative charge from a CHARGING ROLLER.
A rapidly switching LASER BEAM scans the charged drum line by line.
o When the beam flashes on, it reverses the charge of tiny spots on the drum, respecting to
the dots that are to be printed black.
o As soon the laser scans a line, a stepper motor moves the drum in order to scan the next
line by the laser.
A DEVELOPER ROLLER plays the vital role to paste the tonner on the paper. It is coated with
charged tonner particles. As the drum touches the developer roller, the charged tonner particles
cling to the discharged areas of the drum, reproducing your images and text reversely.
Meanwhile a paper is drawn from the PAPER TRAY with help of a belt. As the paper passes
through a CHARGING WIRE it applies a charge on it opposite to the toner’s charge.
When the paper meets the DRUM, due to the opposite charge between the paper and toner particles,
the toner particles are transferred to the paper.
A CLEANING BLADE then cleans the drum and the whole process runs smoothly continuously.
Finally paper passes through the FUSER which is a heat and presser roller, melts the toner and
fixes on the paper perfectly.
Page 73 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Accumulator
Acts as working area
Used for performing arithmetic functions
It’s a temporary holding register for data
v) Status register
Shows the status position of the current instruction being executed e.g.
whether it’s a jump statement or there is an interrupt
Page 74 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Page 75 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
(a) CRT
Cathode Ray Tube
Works by moving an electron beam back and forth across the back of the screen.
Each time the beam makes a pass across the screen, it lights up phosphor dots on the
inside of the glass tube, thereby illuminating the active portions of the screen.
By drawing many such lines from the top to the bottom of the screen, it creates an entire
screenful of images.
(b) LCD
Liquid Crystal Display
Utilize two sheets of polarizing material with a liquid crystal solution between them.
An electric current passes through the liquid causing the crystals to align so that light
cannot pass through them.
Each crystal, therefore, is like a shutter, either allowing light to pass through or
blocking the light thereby creating an image on the screen
Page 76 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Draw a Cathode Ray Tube (CRT) and fully label it.
Page 77 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
a) Data types
Integer
Float
Double
Character
Short
Long integer
b) i. syntax errors
Refers to grammatical errors such as misspelling e.g. redln instead of readln
is an error in the syntax of a sequence of characters that is intended to be written
in a particular programming language
d) Structured programming
Is a top down technique of designing programs and systems
Complex programs are broken down into smaller programs which are
manageable
Structured programming is a programming paradigm aimed on improving the
clarity, quality, and development time of a computer program by making
extensive use of subroutines, block structures and for and while loops—in
contrast to using simple tests and jumps such as the goto statement.
Page 78 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
a) Antistatic MAT
This is where computer components are placed
A technician will also stand on it during servicing and repairing a computer
Used to prevent the buildup of Electro- Static Discharge
b) Antistatic Writsrap
Used to connect the technician to the computer system to make sure that the
technician and the computer components are working on the same potential
Used to prevent the buildup of Electro- Static Discharge
c) Casing
Used for the protection and support of internal components of a computer
d) Docking station
It attaches to AC power and laptop peripherals
A platform into which you can install a portable computer.
The docking station typically contains slots for expansion cards, bays for
storage devices, and connectors for peripheral devices, such as printers
and monitors. Once inserted in a docking station, the portable computer
essentially becomes a desktop model computer.
e) Multimeter
Analogue measuring instrument used to measure voltage, current and
resistance in an electronic circuit
A digital multimeter (DMM) is a test tool used to measure two or more
electrical values—principally voltage (volts), current (amps) and resistance
(ohms).
Digital multimeter combine the testing capabilities of single-task meters—the
voltmeter (for measuring volts), ammeter (amps) and ohmmeter (ohms).
It is a standard diagnostic tool for technicians in the electrical/electronic
industries.
Page 79 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Current Tracer
Test the flow of fast rising current pulses
Senses the magnetic field generated by these pulses and indicates their
presence
v. Signature analyzer
Used to record complex data streams in AC waveforms
Monitors the logic activities of a node in a systems
Page 80 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Data Bus
Bi-directional
Carries data signals throughout the system
b. i) 111110112 to decimal
= 128 + 64 + 32 + 16 + 8 + 2 + 1
= 251
= 0111 1100
7 C
= 7C16
Page 81 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Explain the following
i. L1 cache memory
ii. L2 cache memory
b) Describe the following modes of operation of a CPU
i. Real mode
ii. Protected mode
iii. Virtual real mode
iv. Compatibility
i. L1 Cache Memory
o Internal cache and is integrated into the CPU
Page 82 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
DOS command processor is composed of three functional units, name and briefly explain them.
Startup section
Resident Section
Transient Section
Responsible for handling command interpreter for both internal and external
command used in DOS
b)
RAM ROM
Random Access Memory Read Only Memory
Temporary memory Permanent memory
Volatile Non volatile
COPY X-COPY
A command that copies all files that A command that copies all files
are needed to be copied except hidden files and system files
Page 83 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Cache memory
Intermediary where instructions are stored for execution after being fetched from the
main memory or hard disk.
Fast memory providing a link to the CPU
Static RAM
Error checking
Is a bit added to the end of a string of binary code that indicates whether the number of
bits in the string with the value one is even or odd. Parity bits are used as the simplest
form of error detecting code
RAM Packages
1. DIL – Dual Inline Package
An electronic device package with a rectangular housing and two parallel rows of
electrical connecting pins. The package may be through-hole mounted to a printed
circuit board or inserted in a socket.
2. SIP
3. SIMM
Single Inline Memory Module
single in-line memory module with a 32-bit data path
Page 84 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
4. DIMM
Dual Inline Memory Module
Provides 64-bit data path
Has a separate electrical connector on both sides of the module. It stores each
bit of data in a separate capacitor, providing direct access to the motherboard
through the system bus.
DIMMs with 184 pins are used for DDR SDRAM, while 240-pin DIMMs are
used for DDR2 and DDR3 SDRAM. DDR, DDR2 and DDR3 DIMM modules
are each keyed differently (notches in different locations) so that they cannot
be inserted into the wrong slots. Because of space limitations, laptops use
small outline DIMMs (SODIMMs).
Page 85 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Describe the following RAM packages
i. DIL.
Dual In-line Package, a DIP is a chip encased in hard plastic with pins running along the
outside. The picture is an example of a DIP found on a computer motherboard that has been
soldered into place. Below is an illustration of a comparison between a DIP and a SIP not
connected to a circuit board.
A dual inline package switch (DIP switch) is a set of manual electrical switches designed to hold
configurations and select the interrupt request (IRQ). DIP switches are used in place of jumper
blocks. Most motherboards have several DIP switches or a single bank of DIP switches.
Commonly, DIP switches are used to hold configuration settings.
ii. SIP.
Short for Single In-line Package, SIP is a computer chip packaging that contains one row of
connection pins, unlike dual in-line packages (DIPs) which contain two rows.
A single inline package (SIP) is a computer chip package that contains only a single row of
connection pins. This is different from dual inline packages (DIP), which have two rows of
connected pins.
A single inline package may also be known as a singline inline pin package (SIPP).
Page 86 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
SIP is not as common as the dual in-line package (DIP); however, SIPs have been used to
package multiple resistors and RAM chips with a common pin.
By either using surface mounting device process or DIP process, SIPs collectively arrange RAM
chips on a small board.
iii. SIMM.
SIMM stands for Single In-Line Memory Module. With SIMMs, memory chips are soldered onto a
modular printed circuit board (PCB), which inserts into a socket on the system board.
The first SIMMs transferred 8 bits of data at a time. Later, as CPUs began to read data in 32-bit chunks, a
wider SIMM was developed, which could supply 32 bits of data at a time. The easiest way to differentiate
between these two different kinds of SIMMs was by the number of pins, or connectors. The earlier
modules had 30 pins and the later modules had 72 pins. Thus, they became commonly referred to as 30-
pin SIMMs and 72-pin SIMMs.
iv. DIMM.
Dual In-line Memory Modules, or DIMMs, closely resemble SIMMs. Like SIMMs, most DIMMs install
vertically into expansion sockets. The principal difference between the two is that on a SIMM, pins on
opposite sides of the board are “tied together” to form one electrical contact; on a DIMM, opposing pins
remain electrically isolated to form two separate contacts.
Page 87 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
168-pin DIMMs transfer 64 bits of data at a time and are typically used in computer configurations that
support a 64-bit or wider memory bus. Some of the physical differences between 168-pin DIMMs and 72-
pin SIMMs include: the length of module, the number of notches on the module, and the way the module
installs in the socket. Another difference is that many 72-pin SIMMs install at a slight angle, whereas
168-pin DIMMs install straight into the memory socket and remain completely vertical in relation to the
system motherboard. The illustration below compares a 168-pin DIMM to a 72-pin SIMM.
Page 88 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
(a) What do you understand by the term motherboard form factor and give an example
(b) State the main difference between an oscilloscope and digital multimeter
(c) For an ATX power supply, state the voltage levels for the following color codes
(i) Red
(ii) Yellow
(iii) Blue
(iv) Orange
(v) Black
QUESTION
Explain the function of the following components
i. CMOS battery (1)
ii. Disk drive controller (1)
iii. Display adapter card (2)
iv. Expansion slot (2)
v. Motherboard (2)
vi. Power supply unit (2)
QUESTION
(a) The DOS BOIS can be described as IO.sys. explain what is IO.sys (2)
(b) Describe the booting process. Your answer should include the I0.sys, Auto-exec.bat and
the Confg.sys (3)
(c) In Config.sys explain the following syntax
C:\ Mouse \Mouse.sys (3)
(d) Not ready, Error reading device, Abort, retry, ignore
Which part or section of DOS prompts such warning messages and what would
have happened for such messages to be displayed (2)
QUESTION
(i) Give a command to copy a file Stephen.txt from Adrive to C drive (2)
(ii) What does the command \ p means in DOS (2)
(iii)What command would you type to rename a file memos.txt to letter.txt (2)
(iv) What are device drivers and their purpose (4)
QUESTION
Define the following terms and give examples where appropriate
(i) GUI and the concept of windows and icons (4)
(ii) File manager (2)
(iii)Control panel (2)
(iv) Windows setup (2)
(v) Print manager (2)
QUESTION
Page 89 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Discuss the following as used to improve the efficiency of a hard disk in windows
(i) Smart drive utility (2)
(ii) Ram drive utility (2)
(iii)Memory banks (2)
(iv) Scan disk (2)
(v) Disk defragmenter (2)
QUESTION
Convert the following to stated bases
(i) 11111011 to hex (1)
(ii) 99 to hex (1)
(iii)CD to binary (1)
(iv) 768 to binary (1)
(v) 15,125 to binary (2)
Convert the following negative numbers to 2’s complement
i. -81 (2)
ii. -127 (2)
QUESTION
(a) Describe the difference between the following giving examples
i. Hardware and software (2)
ii. System software and application software (2)
iii. Shareware and freeware (2)
(b) explain the following classes of application software
i. Off the shelf (2)
ii. Customized of tailor -made software (2)
QUESTION
(i) Draw a block diagram of a computer architecture (6)
(ii) Describe the components of the CPU giving their main functions (4)
QUESTION
a) Explain what you understand by application package (2)
b) Give four factors you would consider when buying an application package (8)
Page 90 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
b) Oscilloscope
Displays AC waveforms
Used to measure amplitude
c) Multimeter
Analogue measuring instrument used to measure voltage , current and
resistance in an electronic circuit
d) Red- 5v
Yellow-12v
Blue- -12v
Orange- 3.3v
Black - 0v or ground
Page 91 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. CMOS battery
Complementary Metal-Oxide Semi-conductor battery
A battery that maintains the time, date, hard disk and other configuration settings in
the CMOS memory. CMOS batteries are small and are attached directly to the
motherboard
.
ii. Disk drive controller
A chip and associated circuitry that is responsible for controlling a disk drive. There
are different controllers for different interfaces. For example, an IDE interface
requires an IDE controller and a SCSI interface requires a SCSI controller. On
Macintosh computer systems, the disk controller is built into the motherboard.
Enables the processor or CPU to access, read, write, delete and modify data to and
from the hard disk. .
v. Motherboard
The main circuit board of a microcomputer where all the computer components
are connected
is a printed circuit board that is the foundation of a computer and allows the
CPU, RAM, and all other computer hardware components to function and
communicate with each other.
Page 92 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Page 93 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
a. IO.sys
Is a section that provides an interface between the computer hardware and the
operating system
Contains system initialization routines
b. Describe the booting process. Your answer should include the I0.sys, Auto-
exec.bat and the Confg.sys
When the computer is switched on, the CPU executes the boot strap loader
It checks the disk directory for the IO.sys and the DOS.sys and loads them
into RAM
The IO. Sys checks the peripherals attached to the system and prepares them
for use
The DOS.sys performs initialization
The DOS checks for the autoexec.bat file on the boot disk and lastly the
config.sys file which configures the system for use
C: \ Mouse \ Mouse.sys
Resident Section
When one tries to write to a disk which is not inserted e.g. floppy disk
Page 94 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
i. Give a command to copy a file Stephen.txt from A drive to C drive
Page 95 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Question
i. GUI and the concept of windows and icons
v. Print manager
Program that controls the computer to send a printing signal to the
printer
Used to setup a printer or to view documents being printed or jobs
in queue
Page 96 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Discuss the following as used to improve the efficiency of a hard disk in windows
A RAM drive (also called a RAM disk) is a block of RAM (primary storage or volatile
memory) that a computer's software is treating as if the memory were a disk drive
(secondary storage). It is sometimes referred to as a "virtual RAM drive" or "software
RAM drive" to distinguish it from a "hardware RAM drive" that uses separate hardware
containing RAM, which is an old type of battery backed solid-state drive
a memory bank serves as a repository for data, allowing data to be easily entered and
retrieved.
Memory banks are commonly used for caching data. By storing frequently used
information in memory banks, the data can be accessed quickly and easily. This speeds
up common tasks that are run within the operating system and other programs eg OS
boot system would be stored in the ROM bank
Scans your hard disk and fixing any errors found and an attempt is made to recover
any information stored on bad sectors
Page 97 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
It’s a process of file updating and rewriting some segments of files to contiguous
sectors of a disk in order to increase the effectiveness and efficiency of access of
these files
QUESTION
Convert the following to stated bases
i. 11111011 to hex (1)
1111 1011
8+4+2+1 8 +2+1
15 11
F B
F B16
Page 98 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
0,125 *2 =0
0,25*2=0
0,50*2=1
=001
1111,0012
-81 = 11011112
Page 99 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
QUESTION
Hardware Software
Physical, tangible devices of a Programs that direct the activities of a
computer computer
E.g keyboard, mouse, vdu E.g operating systems, application
software
System software Application software
Programs that control and support Programs that specify the information
operations of a computer system processing activities required for the
E.g operating systems completion of a specific task
DBMS E.g spreadsheet
Word processing
databases
Shareware Freeware
it’s a try before buying method of copyrighted software which the owner
distribution where copyrighted allows to freely use and distribute
software programs are distributed for without paying registration fee
free without payment for a certain is software that is completely free for
period. anyone to use or pass along to other to
is proprietary software that is provided use
to users on a limited basis and only for software which can be downloaded,
a certain limited trial basis used, and copied without restrictions
QUESTION
i. Draw a block diagram of a computer architecture
ii. Describe the components of the CPU giving their main functions
Control Unit
Issues commands to computer elements and interpret
stored instructions
Arithmetic and Logic Unit
Performs arithmetic and logic functions
QUESTION
a) Application package
Programs that specify the information processing
activities required for the completion of a specific task
E.g. spreadsheet
Word processing
Databases
QUESTION
State the functions of the following troubleshooting components
i. Digital multimeter (2)
ii. Current tracer (2)
iii. Logic probe (2)
iv. Oscilloscope (2)
v. Signature analyzer (2)
Often the LED on the LOGIC PROBE will use different colors to indicate different states.
Logic high: If the logic circuit is at a logic or digital high voltage, the logic probe will indicate this
on its interface - typically this will be a colour red.
Logic low: Again the logic probe will indicate a logic or digital low. The most common colour for
this is green.
Pulses: The logic probe is likely to incorporate a pulse detection circuit. When the line is active a
third colour, possibly amber will be indicated. The logic probe may well incorporate circuitry to detect
very short pulses and in this way indicate when the line is active. Sometimes the length of the pulses
may be indicated by the brightness of the LED.
Line tri-stated: Often it is possible for lines to be tri-stated, i.e. the output device has its output
turned off and no real state is defined. Many logic probes are able to indicate this state by having all
indicators turned off.
QUESTION
a) List any two (2) mechanisms for charge accumulation. [2]
b) State any Four (4) ways of safeguarding your components against static electricity
[4]
c) In the event that you don’t have the recommended antistatic tools, but you have
been tasked to fix a failure PC. what do you do to protect your components [4]
Whenever two dissimilar materials come in contact, electrons move from one surface to
the other. As these materials are separated and more electrons remain on one surface
than the other, one material takes on a positive charge and the other a negative charge
b) State any Four (4) ways of safeguarding your components against static
electricity [4]
To prevent damage to your sensitive electronic components in your system from Electrostatic
Discharge, you should:
Antistatic Wrist Strap - Worn to protect your delicate computer components from static
electricity damage. Any static electrical charge that builds up on your body is then
immediately transferred to ground.
Always use an anti-static wrist strap when working on a computer except when working on
monitors: One end is an elastic band that fits around your wrist and which is connected to an
alligator clip by a wire. The clip connects to a metal part of the computer chassis, which
equalizes the voltage between you and the computer, thus avoiding static sparks.
Antistatic Mat - Antistatic mats are available to place underneath a computer being
repaired; such a mat may have a snap for connecting the antistatic wrist strap. An
antistatic floor mat or ground mat is one of a number of antistatic devices designed to
help eliminate static electricity.
Antistatic gloves - Another option is to use anti-static gloves when handling delicate
electronic components.
Antistatic bags - You should leave your components in their antistatic bags that you
purchased them in until you are ready to use them since, placing them outside of their
bags, make them susceptible to ESD.
c) In the event that you don’t have the recommended antistatic tools, but
you have been tasked to fix a failure PC. what do you do to protect your
components [4]
Before touching any of the components inside your case, you should ground yourself to
discharge any static buildup.
Make sure to discharge the static electricity by touching the metal chassis
Always grasp a metal part of the computer chassis with your bare hand before you touch
anything inside.
Handle your expansion cards by their edges. Hold sensitive electronic components by
edges to avoid touching any terminals or parts.
When possible, try to avoid working in carpeted areas. Carpeting greatly increases static
build-up within your body. Do not do any work inside your computer while standing on
carpet.
Do not work on your computer in cold, dry conditions since this encourages static
electricity. You should try to raise the humidity to between 50 to 60%.
Do not wear woolen or nylon clothing while working on or repairing your computer.
Keep your clothing away from drives, boards, memory, etc. Clothing could possibly be
electrically charged, especially when it is dry and cold.
Leave your PC plugged into an AC outlet with the power switch turned off. This places
ground on the metal case.
Shut down your computer and turn off the switch on your surge protector leaving the
surge protector plugged in so that it will be grounded.
QUESTION
List and briefly describe any five (5) factors affecting memory speed
within a computer system. [10]
1. Wait states
2. Memory interleave
3. Page mode
4. Cache
5. Pipe lining
6. Shadow RAM
Wait states
A wait state is a situation in which the computer processor experiences a delay, mainly when
accessing external memory or a device that is slow in its response.
Therefore, wait states are considered wasteful in processor performance.
However, modern-day designs try to either eliminate or minimize wait states.
These include caches, instruction pre-fetch and pipelines, simultaneous multithreading and branch
prediction.
While all of these techniques cannot eliminate wait states entirely, they can significantly reduce
the problem when working together.
Wait states are also used to reduce energy consumption, allowing the processor to slow down and
pause if there is no work for the CPU.
Memory interleave
The term interleaving refers to a process in which the CPU alternates communication between
two or more memory banks.
Interleaving technology is typically used in larger systems such as servers and workstations.
Here’s how it works: every time the CPU addresses a memory bank, the bank needs about one
clock cycle to “reset” itself.
The CPU can save processing time by addressing a second bank while the first bank is resetting.
Interleaving can also function within the memory chips themselves to improve performance.
For example, the memory cells inside SDRAM chip are divided into two independent cell banks,
which can be activated simultaneously.
Interleaving between the two cell banks produces a continuous flow of data. This cuts down the
length of the memory cycle and results in faster transfer rates.
Page mode
Paging is a memory management scheme by which a computer stores and retrieves data from
secondary storage for use in main memory.
In this scheme, the operating system retrieves data from secondary storage in same-size blocks
called pages.
Paging is an important part of virtual memory implementations in modern operating systems,
using secondary storage to let programs exceed the size of available physical memory.
Paging is a DRAM memory management method used by computers that allows data to be saved
and obtained from a specified storage space to be used in the main memory.
Under this method, data is gathered using blocks of the same size (called pages), which allows
for noncontiguous use of the physical address space.
Bursting
Bursting is another time-saving technology.
The purpose of bursting is to provide the CPU with additional data from memory based on the
likelihood that it will be needed.
So, instead of the CPU retrieving information from memory one piece of at a time, it grabs a
block of information from several consecutive addresses in memory.
This saves time because there’s a statistical likelihood that the next data address the processor
will request will be sequential to the previous one.
This way, the CPU gets the instructions it needs without having to send an individual request for
each one. Bursting can work with many different types of memory and can function when reading
or writing data.
Both bursting and pipelining became popular at about the same time that EDO technology
became available. EDO chips that featured these functions were called “Burst EDO” or “Pipeline
Burst EDO” chips.
Cache
Cache memory is a relatively small amount (normally less than 1MB) of high speed memory that
resides very close to the CPU. Cache memory is designed to supply the CPU with the most
frequently requested data and instructions. Because retrieving data from cache takes a fraction of
the time that it takes to access it from main memory, having cache memory can save a lot of time.
If the information is not in cache, it still has to be retrieved from main memory, but checking
cache memory takes so little time, it’s worth it. This is analogous to checking your refrigerator for
the food you need before running to the store to get it: it’s likely that what you need is there; if
not, it only took a moment to check.
The concept behind caching is the “80⁄20” rule, which states that of all the programs, information,
and data on your computer, about 20% of it is used about 80% of the time. (This 20% data might
include the code required for sending or deleting email, saving a file onto your hard drive, or
simply recognizing which keys you’ve touched on your keyboard.) Conversely, the remaining
80% of the data in your system gets used about 20% of the time. Cache memory makes sense
because there’s a good chance that the data and instructions the CPU is using now will be needed
again.
Pipe lining
Pipelining is a computer processing technique where a task is divided into a series of stages with
some of the work completed at each stage. Through the division of a larger task into smaller,
overlapping tasks, pipelining is used to improve performance beyond what is possible with non-
pipelined processing. Once the flow through a pipeline is started, execution rate of the
instructions is high, in spite of the number of stages through which they progress.
Page 109 of 110
rmmakaha@gmail.com
COMPUTER SYSTEMS REVISION
Pipelining is the process of accumulating and executing computer instructions and tasks from the
processor via a logical pipeline.
It allows storing, prioritizing, managing and executing tasks and instructions in an orderly
process.
Pipelining does not decrease the time for individual instruction execution.
Instead, it increases instruction throughput.
The throughput of the instruction pipeline is determined by how often an instruction exits the
pipeline
Pipelining is also known as pipeline processing.
Pipelining is primarily used to create and organize a pipeline of instructions for a computer
processor to processes in parallel.
Typically, pipelining is an ongoing process where new tasks are added frequently and completed
tasks are removed. Each of these tasks has different stages or segments and leaves the pipeline
after the completion of the processing at a specified time.
All of these tasks are executed in parallel and are provided a fair share of processor time based on
their size, complexity and priority.
Pipelining can include any tasks or instructions that need processing time or power.
Shadow RAM