# IGNOU BCA ( BCS-011) Previous Year Question Papers / Important Questions 2020- 2021

IGNOU BCS-011 Important Question 2020- 2021
Bachelor of Computer Applications (BCA)
MASTER OF COMPUTER APPLICATIONS (MCA)

### IMPORTANTQUESTION                       {TYPE-1}

1.  Convert the following decimal numbers to 5 binary and hexadecimal numbers.
(i) 75    (ii) 0.125

2. Convert the following hexadecimal 5 numbers to binary and decimal numbers.
(i) (AB)Hex'   (ii) (22F) Hex'

3. Convert the following decimal numbers to binary number and hexadecimal number :
(i) 57   (ii) 0.215

4. Convert the following, hexadecimal numbers to equivalent decimal numbers and binary numbers :
(i) (79) 16   (ii) (AC)16

5. Convert the following hexadecimal numbers to equivalent binary and decimal :
(i) (F4) 16    (ii) (AC)16

6. Convert the following decimal numbers to hexadecimal numbers as well as binary numbers:
(i) (3203) 10   (ii) (4312)10

7. Convert the following binary numbers to equivalent decimal and hexadecimal numbers :
(i) (1011 0101) 2    (ii) (0010 1110)2

8. Convert the following hexadecimal number 4 to equivalent binary and decimal :
(i) (51)16   (ii) (DA)16

9. Do the following conversions :
(i) (382)10to Binary
(iii) (110101.01)2to decimal
(iv) (38A)16to Binary

### IMPORTANTQUESTION                       {TYPE-2}

1. Explain the role and features of :
(i) Processor internal memories
(ii) Cache memory
(iii) Primary memory
(iv) Secondary memory

2. Define the following terms in the context of 7 a programming languages with the help of an example :
(i) Variable
(ii) Constants
(iii) Data types
(iv) Array
(v) Expression

3. Differentiate between the following :
(i) Desktop Computer versus Mainframe Computer
(ii) Impact printers versus non - impact printers
(iii) Open source software versus proprietary software

4. Explain any five of the following phrases/terms 20 with the help of example/diagram, if needed.
(a) Computer Virus
(b) Network Interface Card
(c) Wide Area Network (WAN)
(d) Guided Transmission Channels
(e) Any two source data entry devices
(f) File Management in Operating System

5. (a) Explain the purpose of each of the following 10 network devices :
(i) Network interface card
(ii) Modem
(iii) Repeater
(iv) Bridge
(v) Hub

6. Explain any five of the following terms with the 20 help of an example/diagrani, if needed :
(a) Security threats on Internet.
(b) The activities performed by search engines..
(c) Tools for collaboration on Internet.
(d) Diagnostic tools in a computer.
(e) Use of subroutines and functions.
(f) Purpose of "my computer' and "Recycle Bin".
(g) Main frame computers and Super computers.

7. Explain at least four important features of 12 the following application software.
(i) Word Processing
(iii) Database

8. Explain any five of the following terms/phrases 20 with the help of an example/diagram, if needed :
(a) Collaboration in the context of internet.
(c) TCP/IP
(d) Router and Switches
(e) User interfaces of operating systems
(f) Trojan horse and spyware

9. (a) Discuss the following in brief :
(i) Assembler
(ii) Editor
(iii) Interpreter
(iv) Compiler

10. Compare and contrast the following :
(i) SRAM versus DRAM
(ii) SIMM versus DIMM
(iii) ROM versus PROM
(iv) CD-ROM versus USB Drive

11. Explain any five of the following with the help of an example/diagram, if required :
(a) Network Interface Card
(b) Word Processing
(c) Collaboration in the context of Internet
(d) Router and Switches
(e) Activities in Software Project Management
(f) Two Data Entry Devices
(g) Cookies in the context of Browser Software

12. Explain any five of the following with the help of diagrams and examples as appropriate :
(a) Unicode
(b) Arrays
(c) Simplex, Half Duplex and Full Duplex Communication
(d) Firewall
(e) Laser Printer

13. Explain at least four important features of the following software applications :
(i) E-mail
(ii) Database
(iii) Word Processing

14. Explain any five of the following with help of an example/diagram, if required :
(a) The activities/actions performed by a search engine
(b) Use of subroutines and functions
(c) TCP/IP model
(d) Security threats on Internet
(e) Batch systems and Time sharing operating systems
(f) Diagnostic tools in a computer
(g) Mainframe computers and Supercomputers

15. Explain any five of the following with the help of diagrams and examples as appropriate :
(a) Uniform Resource Locator
(b) ROM
(c) Memory Management in an Operating System
(d) Client-Server Architecture
(e) Analogue and Digital Signals
(f) Disk Checkers

IGNOU BCS-011 PREVIOUS YEAR QUESTIONS PAPER