COMPUTER SCIENCE - 330 (TMA)
Ques 1. (i)Arrange the following units of memory in ascending order of storage
capacity. Gigabyte, Kilobyte, Terabyte, Megabyte, Petabyte.
Ans. Here are the units of memory arranged in ascending order of storage capacity:
1. Kilobyte (KB)
2. Megabyte (MB)
3. Gigabyte (GB)
4. Terabyte (TB)
5. Petabyte (PB)
This order reflects the increasing capacity of each unit, with each subsequent unit being
1,024 times larger than the previous one in binary terms.
Ques 2. (i) How do Compilers differ from Interpreters in the way they convert the
High Level Language Code (Source Code) into Machine Code (Object Code).
Ans.
Compiler: A compiler translates the entire source code into machine code at once,
creating an executable file. This process is generally slower but results in faster execution
of the program.
Interpreter: An interpreter translates the source code line by line as it executes. This
process is generally faster for smaller programs but can be slower for larger ones
Ques 3. (i)One of the most important skills an entrepreneur must have is the soft
skills. List out any four major skills that come under soft skills.
Ans. Four major soft skills that are essential for an entrepreneur are:
• Communication
• Interpersonal relations
All Rights Reserved © Manish Verma, for more Notes visit https://manishvermaofficial.com/+91 9599279672
• Environmental Observation
• Coordination
• Specific operation Technology
Ques 4.(i)Data processing consists of activities grouped into four functional
categories that are necessary to transform data into meaningful information, often
referred to as the Data Processing Cycle. Briefly explain this cycle using a suitable
flow diagram.
Ans. The Data Processing Cycle refers to the sequence of steps involved in transforming
raw data into meaningful information. It consists of four primary stages: Input, Processing,
Output, and Storage
Input
Storage Processing
Output
(i) Input : The term input refers to the activities required to record data and to make it
available for processing. The input can also include the steps necessary to check, verify
and validate data contents.
(ii) Processing : The term processing denotes the actual data manipulation techniques
such as classifying, sorting, calculating, summarizing, comparing, etc., that convert data
into information.
(iii) Output : It is a communication function which transmits the information, generated
after processing of data, to persons who need the information. Sometimes output also
includes decoding activity which converts the electronically generated information into
human-readable form.
All Rights Reserved © Manish Verma, for more Notes visit https://manishvermaofficial.com/+91 9599279672
(iv) Storage : It involves the filing of data and information for future use. The above
mentioned four basic functions are performed in a logical sequence as shown in Fig. 22.3
in all data processing systems.
Ques 5. (i)Explain the following terms briefly using suitable examples:
(a) Data Encapsulation
(b) Inheritance
Ans.
(a) Data Encapsulation : Data encapsulation is the process of bundling data and the
functions that operate on that data into a single unit, typically a class. This core concept
of object-oriented programming restricts direct access to the data, allowing it to be
modified only through member functions. For example, in a class **BankAccount**,
the balance is a private attribute. It can only be accessed or modified using methods
like `deposit()` and `withdraw()`, ensuring data integrity and security by hiding the
internal state from external interference.
(b) Inheritance : Inheritance is a fundamental concept in object-oriented programming
where a new class (derived class) inherits properties and methods from an existing
class (base class). This allows for code reusability and hierarchical classification. For
example, the base class Automobile can include common attributes, while a derived
class Motorcycle can inherit these properties and add specific features. C++ supports
this structure, enabling the creation of specialized classes that adapt existing
functionality without modifying the base class, enhancing flexibility and
maintainability.
Ques 6. (i) Cloud Computing is a buzz word in today's world. Elaborate upon the
advantages of Cloud Computing? Also differentiate between SaaS, PaaS and IaaS
with suitable examples.
All Rights Reserved © Manish Verma, for more Notes visit https://manishvermaofficial.com/+91 9599279672
Ans. Advantages of Cloud Computing :
• It creates a more flexible environment that allows organizations to "rent" computing
power on requirement.
• An organization can scale up or down its IT usage, according to demand.
• No need to procure space for creating infrastructure.
• Provide more mobile solution i.e., it is not necessary for the user to be in
• office to access the information. He or she can access the information through mobile
also.
• Organization can build its infrastructure on its actual use of IT resources, rather than
creating an overbuilt capacity, based on potential demand. Potential demands can be
met by renting services through cloud.
• Organizations can easily upgrade their applications as they can change platforms
simply by switching cloud service providers.
Differentiation between SaaS, PaaS, and IaaS :
ASPECT SAAS (SOFTWARE AS PAAS (PLATFORM IAAS
A SERVICE) AS A SERVICE) (INFRASTRUCTURE
AS A SERVICE)
Definition Provides access to Provides a platform Provides fundamental
applications hosted by for users to develop, computing resources
the service provider. run, and manage such as processing,
Users can use these applications storage, and
applications via the without dealing networking. Users can
internet without with the underlying install and run their
managing underlying infrastructure. own operating
infrastructure. systems and
applications.
All Rights Reserved © Manish Verma, for more Notes visit https://manishvermaofficial.com/+91 9599279672
User Control Users have limited Users have control Users have control
control over application over the deployed over operating
configurations. No applications and systems, storage,
control over underlying possibly application deployed
infrastructure. hosting applications, and
environment limited networking
configurations. No components, but not
control over the the underlying
underlying infrastructure.
infrastructure.
Target Users: End-users and Developers needing IT administrators and
businesses needing a platform for businesses needing
ready-to-use building and scalable
applications. deploying infrastructure for
applications. various applications.
Infrastructure Managed entirely by Managed by the Managed by the user;
Management the service provider. service provider; they have to manage
users focus on the operating
application systems and
development. applications.
Use Cases Email, collaboration Application Hosting virtual
tools, customer development, API machines, storage
relationship management, solutions, backup,
management (CRM) microservices. and recovery.
software.
All Rights Reserved © Manish Verma, for more Notes visit https://manishvermaofficial.com/+91 9599279672
Examples Gmail, Microsoft Office Google App Engine, Amazon Web
365, Salesforce, Google Microsoft Azure Services (AWS) EC2,
Docs App Service, Heroku Microsoft Azure
Virtual Machines,
Google Cloud
Compute Engine
All Rights Reserved © Manish Verma, for more Notes visit https://manishvermaofficial.com/+91 9599279672