Admission Open in Summer Camp 2021
Important Long Questions and Chapters
Chapter No 1:
I. What is Software? Explain different categories / types of software.
II. What are display screen? Explain its different types.
III. What is Impact printer? Briefly discuss different types.
IV. What is non-impact printer? Briefly discuss different types.
Chapter No 2:
I. What is Bus topology? Explain its working advantages and disadvantages with diagram.
II. What is Ring topology? Explain its working advantages and disadvantages with diagram.
III. What is Star topology? Explain its working advantages and disadvantages with diagram.
IV. What is Tree topology? Explain its working advantages and disadvantages with diagram.
V. What is Mesh topology? Explain its working advantages and disadvantages with diagram.
VI. What is LAN? Where is it used? Discuss its uses and advantages.
VII. What is WAN and MAN? Explain its advantages and disadvantages and used.
VIII. Explain different components of a network.
Chapter No 3:
I. What is data transmission mode? Explain its types with example and diagram.
II. What is Guided media / bounded media? Briefly describe different guided media.
III. What is Unguided media / unbounded media? Briefly describe different unguided media.
Chapter No 5:
I. What is computer architecture? Which components are including in the architecture?
II. What is main memory? Describe its structure. How data stored in main memory is accessed.
III. What is RAM and ROM? Describe its different types of RAM and ROM.
IV. What is computer bus? Explain briefly different types of buses.
V. What is system bus? Explain briefly different types of system bus.
VI. What is computer language? Describe High- and Low-level languages.
VII. What is Language processor or translator? Explain its different types.
Chapter No 6:
I. Define virus. Explain different causes of computer virus.
II. How does virus spread? OR How virus is activated?
III. Discuss different types of viruses.
IV. What is data security? Briefly discuss different security threat to data security. What is solution of these threats?
NOTE: Chapter No 1,2,3,5,6 are most important.