COMMUNITY COLLEGE COMMUNITY COLLEGE Department of

Document Sample
COMMUNITY COLLEGE COMMUNITY COLLEGE Department of Powered By Docstoc
					                             COMMUNITY COLLEGE
                          Department of Computer Science


              Comp 242 Computer Maintenance and Assembling

                           Major Exam – I (1429-30)

Date: 1-12-2008                                            Time: 2 Hours

Student’s Number :…………………………………………………………… Maximum Marks: 15

Student’s Name        :…………………………………………………………… Marks obtained:

Section Number        :       792



                                     Part- A


I) Fill In:                                                1X7=7


                            SRAM, partitioning, PCI, backup,
                                 jumpers, FAT, virus


   1) A SCSI card is inserted into a PCI slot inside the computer.

   2) SATA drives don't require master/slave relationships, and therefore have
      no jumpers to set.

   3) The partitioning of a hard drive occurs after the drive has been
      physically formatted but before it is logically formatted.

   4) SRAM memories are used in particular for the processor's cache
      memory, which are fast and costly.

   5) A virus is inactive until you execute an infected program or application
      OR start your computer from a disk that has infected system files.

   6) The FAT is the heart of the file system.

   7) The backup utility helps you create a copy of the information on your
      hard disk.




                                     Part- B


KING SAUD UNIVERSITY, Riyadh                                         Page 1 of 5
                              COMMUNITY COLLEGE
                          Department of Computer Science



II) Answer any        3 of the following:                                 2X3=6

    1) What is a computer virus ? How can you protect your computer from
       viruses?


Computer viruses are programs written for destructive purpose, by "mean" people. These virus
programs are placed into a commonly used program so that program will run the attached virus
program as it boots, therefore, it is said that the virus "infects" the executable file or program.
Executable files include Macintosh "system files" and application programs. Viruses work the
same ways in Windows or DOS machines by infecting zip or exe files.

A virus is inactive until you execute an infected program or application OR start your computer
from a disk that has infected system files. Once a virus is active, it loads into your computer's
memory and may save itself to your hard drive or copies itself to applications or system files on
disks you use.

Protection:-

    1. Load only software from original disks or CD's. Pirated or copied software is always a risk
       for a virus.
    2. Execute only programs of which you are familiar as to their origin. Programs sent by
       email should always be suspicious.
    3. Computer uploads and "system configuration" changes should always be performed by
       the person who is responsible for the computer. Password protection should be
       employed.
    4. Check all shareware and free programs downloaded from on-line services with a virus
       checking program.
    5. Purchase a virus program that runs as you boot or work your computer. Up-date it
       frequently.



    2) Define Partition of Hard Disk. What is NTFS?


Partitioning is the process of writing the sectors that will make up the partition table.
which contains information on the partition: size in sectors, position with respect to the
primary partition, types of partitions present, operating systems installed. When a
partition is created, it is given a volume name which allows it to be easily identified.

The partitioning of a hard drive occurs after the drive has been physically formatted but
before it is logically formatted. It involves creating areas on the disk where data will not
be mixed. It can be used, for example, to install different operating systems that do not
use the same file system. There will therefore be at least as many partitions as there are
operating systems using different file systems. If you are using just one operating system,
a single partition the full size of the disk is sufficient, unless you want create several
partitions so as to have, for example, several drives on which data are kept separate



 KING SAUD UNIVERSITY, Riyadh                                                        Page 2 of 5
                                   COMMUNITY COLLEGE
                              Department of Computer Science

NTFS
NTFS, short for New Technology File System, is the most secure and robust file
system for Windows NT, 2000, and XP. It provides security by supporting access
control and ownership privileges, meaning you can set permission for groups or
individual users to access certain files.

There are currently two versions of NTFS being used in Microsoft operating
systems. NTFS 4.0 is the file system used with Windows NT 4.0. NTFS 5.0 was
released with Windows 2000, and is also being used in Windows XP. NTFS 5.0
provides some additional capabilities which were not included in NTFS 4.0. Both
versions of NTFS share the following features:

        NTFS supports compression of individual files and folders which can be
         read and written to while they are compressed.

        NTFS is a recoverable file system, meaning it has the ability to undo or
         redo operations that failed due to such problems as system failure or
         power loss.

        NTFS supports Macintosh files.




    3) Discuss at least three (3) types of Hard disks. Explain their uses and
       installation.



TYPES OF HARD DISKS

 There are a few different types of hard disk but, other than its physical size, the different type of interfaces
 of the hard disk is the main difference.


    1) (A)dvanced (T)echnology (A)ttachment (Also known as IDE, ATAPI and Parallel ATA)


    Often used for Desktop Computers.


                 Low costs
                 Large capacity


    2) (S)erial ATA




KING SAUD UNIVERSITY, Riyadh                                                                       Page 3 of 5
                                  COMMUNITY COLLEGE
                               Department of Computer Science
 SATA is basically an advancement of ATA.


                Low costs

                Large capacity

                Faster transfer rates compared to ATA (difference is marginal at times though)

                Smaller cables for better heat dissipation


   3) SCSI(aka Scuzzy)


 SCSI is commonly used in servers, and more in industrial applications than home uses.


                Faster

                Wide range of applications

                Better scalability and flexibility in Arrays (RAID)

                Backward compatible with older SCSI devices

                Better for storing and moving large amounts of data

                Tailor made for 24/7 operations

                Reliability




   4) What is RAM ? Discuss types of RAM.


Random Access Memory (RAM) can be thought of as the short-term memory, in the
sense that once the power is turned off, all information stored there is not saved. All
modern computers have hard drives which store data permanently as magnetic
information, but even with the improved speed of today's hard drive technology.
Hard drives are still too slow to keep up with the needs of the processor since it can
operate on considerably more information per second than can possibly be
transferred to and from the hard drive.

This is where the need for a fast, short-term memory solution comes in, a memory
space that provides very fast access for the processor so data can be written and
read as needed without slowing down the system appreciably



Types of random access memory
There are generally two broad categories of random access memory:

       DRAM memories (Dynamic Random Access Module), which are inexpensive.
        They are used essentially for the computer's main memory



KING SAUD UNIVERSITY, Riyadh                                                                Page 4 of 5
                              COMMUNITY COLLEGE
                         Department of Computer Science
       SRAM memories (Static Random Access Module), which are fast and costly.
        SRAM memories are used in particular for the processor's cache memory



III) Show that how will you install the CPU and RAM on the
motherboard.(LAB)                                  1X1=1


IV) Define                                                               1X1=1

    Backup

The Backup helps you create a copy of the information on your hard disk. In the event
that the original data on your hard disk is accidentally erased or overwritten, or becomes
inaccessible because of a hard disk malfunction, you can use the copy to restore your lost
or damaged data.

        Or

    SCSI

SCSI (pronounced scuzzy) is short for Small Computer System Interface, and the SCSI card
controls various SCSI devices. SCSI devices might be hard drives, optical drives, scanners or
tape drives. A SCSI card is inserted into a PCI slot inside the computer. SCSI is a competing
technology to the more standard IDE (Integrated Drive Electronics). Most hard disks are IDE, but
the IDE controller card is integrated into the motherboard. If SCSI components are desired, a
SCSI card is required.

         SCSI is a faster, more robust technology than IDE, and has traditionally been utilized in
servers. Aside from speed, another great advantage over IDE is that the SCSI card can connect
15 or more devices in a daisy chain. The controller assigns each device its own SCSI ID, allowing
for great flexibility towards expanding any system.




 KING SAUD UNIVERSITY, Riyadh                                                        Page 5 of 5

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:4
posted:2/26/2012
language:English
pages:5