ONLY BBA STUDENT OF BRAC UNIVERSITY WILL BE BENEFITED.LAW STUDENT WILL ALSO BE LITTLE BIT BENEFITED.
Monday, August 8, 2011
FINAL SUGGESTION FOR CSE 101
Objective: From Lecture 1-5 and the whole book 1.a-13.b
Chapter 1
1. List the four parts of a computer system.
2. Identify four types of computer hardware
3. Differentiate the two main categories of computer software
4. Identify two unique features of supercomputers.
5. Describe a typical use for mainframe computers
6. Differentiate workstations from personal computers
7. Name four components found in most graphical user interfaces.
8. Describe the operating system’s role in running software programs.
9. Name five types of utility software.
10. What is OS? List the four primary functions of an OS.
11. What is GUI? What is software? Classify with example.
Chapter 2
1. List the two most commonly used types of computer monitors.
2. Explain how a CRT monitor displays images.
3. List four characteristics you should consider when comparing monitors.
4. List the four criteria you should consider when evaluating printers.
5. Describe how a dot matrix printer creates an image on a page.
6. Explain the process by which a laser printer operates.
7. Explain how data is stored on the surface of magnetic and optical disks.
8. Explain the difference between RAM and ROM.
9. List three hardware factors that affect processing speed
Chapter 3
1. Jacob likes to read. Last month he made a goal to read at least (466)8 pages from his book collection each week. How many pages did he read after (10110)2 weeks? He told his mother it would be equivalent to reading the (8E1)16 page Harry Potter and the Deathly Hallows (011)2 times. Was he correct? Explain your answer.
2. Cimorene spent an afternoon cleaning and organizing the dragon’s treasure. One fourth of the items she sorted were jewelry. (3C %)16 of the remainder were potions, and the rest were magic swords. If there were (110000)2 magic swords, how many pieces of treasure did she sort in all?
3. In Brac University randomly pick 3 clubs where they ask them to submit their annual profit for year 2007-2008. Drama Club, Computer Club and Business club submitted their annual profit as follows.
a. Drama Club – (E7BA.A)16
b. Computer Club - (163672.636)8
c. Business Club - (1110000110010.1101)2
Then Brac University decided to give all of them TK. 1485.6125. So they intend to write a check according to the format that the club uses to submit there annual balance. Write what amount they write on there checks according to the club format and what is the total of all 3 club annual profit in decimal. To get full credit show your steps.
4. From 2003 Till 2007 Bhuiyan Group of Industries donates WHO (World Health Organization). At the end of year 2008 hey waned o know how much Total money they donate so far. And based on the total amount they wanted to donate 50% of the total donation to year 2008. How much money in decimal hey will donate at year 2008?
Year Amount
2003 (ABC7.D)16
2004 (1010110110010.1101)2
2005 (73672.636)8
2006 (67252.500)8
2007 (D7E7.D)16
5. Addition and conversation.
• (6F.3C)16 + (203.25)8 = (????)16
• (A1D)16 + (346.74)8 = (????)8
• (4C.B7)16 + (123.46)8 = (????)10
• (9D.AB6)16 + (306.51)8 = (????)2
• (AD.BD)16+ (603.46)8+ (952.99)10+ (11011011.1101)2 = (????)10
6. Faraz, Kabir and faruqe made a club called “The Junto” to read books and discuss ideas. Ben read (232)8 science books. He read (E)16 times as many history books as science books. How many more history books than science books did he read? What is the total amount of book did he read? How many more book he need to read to complete total (11100000011)2?
7. Faraz collected donations for many worthy organizations. He had (2467.AD)16 Taka in a bank account to start a new hospital. OMAR gave him another (11010011.011000)2 Taka. How much more money must Faraz collect from kabir if he needs (EAEE)16 Taka for the hospital in decimal?
8. The day before the great battle at the Black Gate, a company of (1C2)16 orcs camped among the host of Mordor. But an argument broke out over dinner, and 1/3 of them were killed. Then 2/5 of the remainder died when a drunken troll stumbled through their camp during the night. (1101)2 of them run away from the battle field. How many of the orcs left to join the morning’s battle?
9. Draw flowchart for printing Sequence: 1, 3, 5, 9… N
10. Draw flowchart for printing Sequence: 2, 4, 6, 8… N
11. draw flowchart for printing Sequence: 1,-1, 2,-2, 3,-3……….n.-n
12. Write a flowchart where it prints all the number till N which divisible by 5 or 10 or 3
13. draw flowchart for printing Sequence: ½, 2/4, 3/6, 4/8 …n/2n
14. draw a flowchart for GPA calculation for N number of class.
15. draw a flowchart for printing he sequence of 1,-3, 5,-7 ...n
16. draw a flowchart for Fibonacci series.(ex: 0,1,1,2,3,5,8,13.....Nnth where Nnth = N(nth-1)+N(nth-2)
17. Draw a flowchart for N factorial series. (Ex: 5! =5*4*3*2*1)
18. draw flowchart for printing Sequence: 1+2+3+4+...+N or Write pseudo code and draw flowchart for printing Sequence: 2+4+6+8+…. +N OR 1+3+5+9+...+N
Chapter 4
1. What is Computer Network? What is WAN? What is LAN? What is MAN?
2. What is topology? How many types of topologies are there? Explain them with diagram.
3. What Topologies are appropriate for LAN?
4. What is the different between WAN and MAN?
5. What is the difference between data and information?
6. If you have to talk to a robot, name the devices and techniques that need to be in the robot to achieve the interaction requirement.
7. What are Intranet, Extra net and Internet? Explained there uses.
8. What is Database? Differentiate between database and Database Management Systems.
9. Describe different Levels of Abstraction.
10. What are DDL and DML?
11. What is the difference between procedural and non-procedural language?
12. Define Instances and Schemas. What is the role of database administrator?
13. What is File System Data Management?
14. What is data Dependency? What is Data Redundancy?
15. What is the difference between Relational Database and Non-Relational Database?
16. Why database management system is important from file management system?
Chapter 5
1. What is Software? What is software Engineering, computer Science and System Engineering?
2. What is the difference between software Engineering and computer Science and system engineering?
3. What are the generic activities of all software processing?
4. What are the attribute of good software? Explain any 5.
5. Write down the steps of waterfall model. What are the disadvantages of waterfall model?
6. What is process Model? What are the weaknesses of process Model?
7. What is the professional and ethical responsibility as a Software Engineer? Give 2 responsibilities that every software engineer should follow.
8. What is the code of ethics that engineers should follow?
9. What is Computer Virus? Give at least 5 category of virus type?
10. How does virus affect us? How we can prevent our computer from viruses?
11. What is Data Theft? How we can prevent our data from Hackers?
12. What is Integrity? What is cryptography?
Encrypt or Decrypt this using confusion Method
• Key 11
O Plaintext:
No one has yet realized the wealth of sympathy, the kindness and generosity hidden in the soul of a child. The effort of every true education should be to unlock that treasure.
O Cipher Text:
YZ ZYP SLD JPE CPLWTKPO ESP HPLWES ZQ DJXALESJ, ESP VTYOYPDD LYO RPYPCZDTEJ STOOPY TY ESP DZFW ZQ L NSTWO. ESP PQQZCE ZQ PGPCJ ECFP POFNLETZY DSZFWO MP EZ FYWZNV ESLE ECPLDFCP.
• Key 13
o Plaintext:
Education is not the filling of a pail, but the lighting of a fire.
O Cipher Text:
RQHPNGVBA VF ABG GUR SVYYVAT BS N CNVY, OHG GUR YVTUGVAT BS N SVER.
• Key 17
O Plaintext:
It is the mark of an educated mind to be able to entertain a thought without accepting it.
O Cipher Text:
ZK ZJ KYV DRIB FW RE VULTRKVU DZEU KF SV RSCV KF VEKVIKRZE R KYFLXYK NZKYFLK RTTVGKZEX ZK.
• Key 23
o Plaintext:
Education is simply the soul of a society as it passes from one generation to another.
o Cipher Text:
BARZXQFLK FP PFJMIV QEB PLRI LC X PLZFBQV XP FQ MXPPBP COLJ LKB DBKBOXQFLK QL XKLQEBO.
• Key 05
o Plaintext:
The roots of education are bitter, but the fruit is sweet.
o Cipher Text:
YMJ WTTYX TK JIZHFYNTS FWJ GNYYJW, GZY YMJ KWZNY NX XBJJY.
• Key 05
o Plaintext:
Part of the inhumanity of the computer is that, once it is competently programmed and working smoothly, it is completely honest.
o Cipher Text:
UFWY TK YMJ NSMZRFSNYD TK YMJ HTRUZYJW NX YMFY, TSHJ NY NX HTRUJYJSYQD UWTLWFRRJI FSI BTWPNSL XRTTYMQD, NY NX HTRUQJYJQD MTSJXY.
• Key 06
o Plaintext:
The Internet is not just one thing, it's a collection of things - of numerous communications networks that all speak the same digital language.
o Cipher Text:
ZNK OTZKXTKZ OY TUZ PAYZ UTK ZNOTM, OZ'Y G IURRKIZOUT UL ZNOTMY - UL TASKXUAY IUSSATOIGZOUTY TKZCUXQY ZNGZ GRR YVKGQ ZNK YGSK JOMOZGR RGTMAGMK..
• Key 09
o Plaintext:
Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months.
o Cipher Text:
CANJC HXDA YJBBFXAM URTN HXDA CXXCQKADBQ. MXW'C UNC JWHKXMH NUBN DBN RC, JWM PNC J WNF XWN NENAH BRG VXWCQB.
140. Encrypt or Decrypt this using Diffusions Method.
Key 05
i. Plaintext:
i. The roots of education are bitter, but the fruit is sweet.
j. Cipher Text L1
i. TOETRTTRST
ii. HTDIEETUS
iii. ESUOBRHIW
iv. ROCNIBETE
v. OFAATUFIE
k. Cipher Text L2
i. ESUOBRHIW
ii. HTDIEETUS
iii. OFAATUFIE
iv. ROCNIBETE
v. TOETRTTRST
P-Box
Level 1 1 2 3 4 5
Level2 5 2 1 4 3
THE COMPUTING FIELD IS ALWAYS IN NEED OF NEW CLICHES.
TTDSFH HIIINE ENSNES CGANW OFLEC MIWEL PEADT ULYOC
CGANW ENSNES HIIINE MIWEL OFLEC PEADT TTDSFH ULYOC
Cipher Text: CGANW ENSNES HIIINE MIWEL OFLEC PEADT TTDSFH ULYOC
P-Box
Level 2 1 2 3 4 5 6 7 8
Level 1 7 3 2 1 5 4 6 8
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.