Following is the 9th class computer notes for unit 1 according to the Federal Board of Intermediate and Secondary Education (FBISE)
John Napier developed Napier’s Bones, a manually operated calculating device. It used 9 separate strips (bones) marked with numerals to multiply and divide. It was also the first machine to calculate using the decimal point system.
Difference Engine was a mechanical computer that could do basic computations. It was a steam-powered calculating machine used to solve numerical problems.
Analytical Engine was a mechanical computer that took input from punch cards. It was capable of solving any mathematical problem and storing data in memory.
The primary focus of fifth-generation computers is to develop and utilize AI (Artificial Intelligence) technologies. This involves machines (called Robots) who can learn, think, innovate, reason, and solve problems automatically and independently.
| Volatile | Non-volatile memory |
| RAM is a volatile memory. | ROM is a Non-volatile memory. |
| RAM is READ/WRITE memory. | ROM is read-only memory. |
| Information stored in it is lost when the computer is turned off. | The programs stored in it are not lost when the computer is turned off. |
The number of bits in a word is called the word size. A computer with a bigger word size can transfer more bits into the microprocessor at a time for processing, improving the computer’s processing speed.
In a pipeline, multiple instructions are in different stages of execution simultaneously. This allows for better utilization of the CPU’s resources and faster execution of instructions. CPUs use pipelining to increase efficiency.
a) The primary consideration would be the type of memory. Generally, DDR4 RAM is the current standard for most modern systems
b) The amount of memory needed depends on the intended usage of the computer. For gaming or content creation, I’d aim for at least 16GB of RAM to ensure smooth multitasking
c) The physical size of the memory modules must match the motherboard’s memory slots.
A protocol is a set of rules that governs data communications. It represents an agreement between the communicating devices. Without a protocol, two devices are connected but may not be communicating with each other.
In Simplex mode, the communication takes place in only one direction. Radio and television broadcastings are also examples of simplex transmission.
In half-duplex mode, communication takes place in both directions, but not at the same time. For example, communication between a computer and a credit card machine.
In full-duplex mode, the communication takes place in both directions at the same time. One common example of full-duplex communication is the telephone network. When two people are communicating by a telephone line, both can talk and listen at the same time.
The start bit tells the receiver that a character is coming and the stop bit indicates that the transmission of the character has ended. Start and Stop bits are used in asynchronous transmission.
A switch is a networking device that performs the same job as the hub but is considered more intelligent than a hub. It gathers information about the data packet and forwards it to only the node (e.g. computer) it was intended for.
In asynchronous transmission, the time interval between two characters is variable and not fixed. Start and Stop bits are used in asynchronous transmission. This type of transmission is ideal for slow-speed communication when gaps may occur during transmission. An example of asynchronous transmission is keyboard data transmission.
In synchronous transmission, the time interval between two characters is always the same. It does not require transmission of start and stop bits. Synchronous transmission is faster than asynchronous because fewer bits have to be transmitted. The best example of synchronous transmission is the data transmission between devices in network communications links.
In Peer-to-Peer networks, every computer is capable of playing the role of client, server or both at the same time. A peer computer on your desktop can share files and printers with other computers and it can simultaneously access other shared resources on the network.
Peer-to-peer networks tend to be relatively small. Most of these networks fall to range between two and ten computers. Large peer-to-peer networks become difficult to manage because so many network administrators control sharing and maintaining shared resources.
| Star Topology | Ring Topology |
| In a star network topology, each network node is connected to a central device called a hub. | Ring topology is shaped just like a ring. It is made up of an unbroken circle of network nodes. |
| Failure of cable does not stop the functioning of the entire network. | If the ring is broken at any point, the entire network stops functioning. |
| Expensive topology to implement. | Not costly to implement. |
In mesh topology, each node is directly connected to all the nodes. Data can be routed around failed computers or busy ones. It can manage high traffic. Therefore it is considered the most reliable topology.
It is considered the most expensive to implement because more cabling is required in this topology.
Application Layer provides services to end-users. It interacts with the operating system or application software whenever the user wants to send files, read messages or perform other network-related activities.
The following are some characteristics of first-generation computers.
The following are some characteristics of second-generation computers.
The following are the characteristics of the third generation of computers.
The following are the characteristics of the fourth generation of computers.
A natural system is an interconnected collection of elements or components that exist in nature. These systems are typically found in the environment and are characterized by their ability to self-regulate, adapt, and maintain a certain degree of stability.
The following are a few examples of natural systems.
Ecosystems: Ecosystems are perhaps the most common and diverse natural systems. They encompass various types, including:
Weather Systems: Weather systems involve the interactions of the Earth’s atmosphere, including phenomena like rainfall, wind patterns, and temperature changes.
Geological Systems: These systems encompass geological processes and features like: –
Hydrological Systems: These systems involve the movement, distribution, and quality of water on Earth, including rivers, lakes, and the water cycle.
Solar System: Our solar system itself is a natural system, with the Sun, planets, moons, asteroids, and comets all interacting under the influence of gravity.
Biological Systems: Biological systems encompass a wide range of living organisms and their interactions:
Artificial systems, also known as man-made or human-made systems, are created and designed by humans to serve specific purposes, solve problems, or achieve particular goals. Unlike natural systems, which occur organically in the natural world, artificial systems are intentionally constructed by humans to address various needs and objectives. These systems can range from simple devices to highly complex structures, and they exist in numerous domains.
The following are some common examples of artificial systems.
Energy Systems:
Manufacturing Systems:
Healthcare Systems:
The following are the characteristics of the fifth generation of computers.
The timeline for the fifth generation is not as precisely defined as the earlier generations, but it is generally associated with ongoing advancements in computing that were expected to emerge in the late 20th century and beyond. The main objective of the fifth generation of computers is to develop devices that can understand natural languages and have thinking power. This is a big challenge for computer developers and programmers to design such systems and software for them.
Data communication is the process of transferring information from one point to another in a networking environment. Communication Network Network communication consists of five basic components.
A sender, also called a transmitter is a computer/device that sends a message (data or information) from source to destination in a communication network. It may be a computer, workstation, cell phone or camera.
Message is the data or information that is to be transmitted. Message can be in the form of text, audio, video, or any combination of these.
Medium is the path through which a message travels from source to destination. A medium can be wired, for example, telephone cable, coaxial cable and fibre optics. It can also be wireless for example Bluetooth, Wi-Fi, microwave, radio wave and satellite.
The receiver is the device which receives the transmitted message. It can be a computer, workstation, telephone handset or television set.
A protocol is a set of rules that governs data communications. It represents an agreement between the communicating devices. Without a protocol, two devices are connected but may not communicate with each other.
Hub is a connectivity device used in LAN. It connects multiple LAN devices on one network and makes them act together as a single network. A hub is a non-intelligent device that sends output to all the devices on the network. A hub has multiple input/output (1/0) ports, in which an input in one port results in it being an output in all the other ports, except the port where it was input.
Switch is a networking device that performs the same job as the hub but is considered as intelligent as the hub. It gathers information about the data packet and forwards it to only the node (e.g. computer) it was intended for. A data packet is a basic unit of communication over a computer network. When data is transmitted, it is broken down into packets which are reassembled to the original form once they reach the destination.
A router is a communication device which is used to connect two or more networks. Today, most of the networks are connected to the Internet. When the computer is sending data to another computer on the Internet, a router receives the data packets, looks for the remote computer address and forwards it to a computer that is closer to the remote computer.
A gateway is a device that is used to connect a network to another network that uses different protocols. If we have to link different kinds of networks, such as a network of IBM mainframe computers and a network of PCs, we might have to use a gateway. Gateways change the format of the data packets but not the contents of the message, to make it conform to the application program of the remote computer.
Bus network topology connects each node to the network along a single piece of cable, called a bus.
In a star network topology, each network node is connected to a central device called a hub. Large networks can require many hubs and hubs can be connected to create a single large network.
Ring topology is shaped just like a ring. It is made up of an unbroken circle of network nodes.
Advantages of Ring Topology
Limitations of Ring Topology
In mesh topology, each node is directly connected to all the nodes.
Advantages of Mesh Topology
Limitations of Mesh Topology
ISO created a standard model for data communication systems called the Open Systems Interconnection (OSI) model.
The seven layers of the OSI model are described below.
Application Layer provides services to end-users. It interacts with the operating system or application software whenever the user wants to send files, read messages or perform other network-related activities.
Presentation Layer takes the data provided by the Application Layer and converts it into a standard format that the other layers can understand.
Session Layer performs functions that enable two applications or two pieces of the same application to communicate across the network. It performs security, name recognition, logging and other similar functions.
Transport Layer establishes connections between two computers on the network. It handles quality control by ensuring that the data received is in the correct format and order
Network Layer decides which physical path-way the data should take to reach the destination. The communication device Router works in the network layer.
Data Link Layer defines the format of data on the network. This layer converts the data into packets and checks them before putting them on the path-way. The communication device Switch works in this layer.
The physical layer defines cables and signalling. It provides hardware such as cables and connectors for sending and receiving data. Cables, hubs and repeaters work in this layer.
The Internet has evolved from its origins in the 1960s as ARPANET, a U.S. Department of Defense project for research institutions and military installations, to become a global network of interconnected computer networks. In the 1970s, the development of TCP/IP protocols established the foundation for the modem Internet, allowing different networks to communicate.
The 1990s saw the emergence of the World Wide Web and web browsers, revolutionizing how people access and share information over the Internet. The 2000s brought broadband Internet and social media platforms, while the 2010s saw the rise of mobile Internet and the Internet of Things (loT). In the 2020s, the Internet continues to evolve with cloud computing, artificial intelligence, and 5G technology, impacting nearly every aspect of modern life.
The main applications of the Internet include:
i. What computing machine was capable of taking input from punch cards and storing data in memory?
a) Abacus
b) Analytical Engine
c) Tabulating Machine
d) Differential Analyzer.
ii. What technology replaced vacuum tubes in second-generation computers?
a) Transistors
b) Integrated Circuits (ICs)
c) Microprocessors
d) Magnetic tapes
iii. Which computer generation introduced the use of Integrated Circuits (ICs)?
a) First Generation
b) Second Generation
c) Third Generation
d) Fourth Generation
iv. Which of the following is an example of a natural system?
a) Telephone network
b) Human body
c) Database
d) Automobile
v. Which component of the microprocessor controls the working of input/output devices and storage devices?
a) Arithmetic Logic Unit (ALU)
b) Control Unit (CU)
c) Memory Address Register (MAR)
d) Data Register (DR)
vi. Which type of memory retains data even when the computer is turned off?
a) RAM
b) ROM
c) Cache
d) Register
vii. What is the main purpose of Cache memory?
a) Store program instructions
b) Provide high-speed storage
c) Control input/output devices
d) Perform arithmetic operations
viii. What is the smallest unit of memory in a digital computer?
a) Kilobyte
b) Bit
c) Byte
d) Megabyte
ix. Which memory type uses laser beams to read and write data?
a) RAM
b) Optical memory
c) Cache memory
d) ROM
x. In Von Neumann’s architecture, where are instruction data and program data stored?
a) In separate memory units
b) In the same memory unit
c) In the processor’s registers
d) In the cache memory
xi. What is the primary function of the buses in a computer’s memory system?
a) Control memory operations
b) Display graphics
c) Transmit data between components
d) Perform arithmetic operations
xii. What is the primary function of the Presentation Layer in the OSI model?
a) Establishing connections between computers
b) Converting data into a standard format
c) Deciding the physical path of data
d) Sending data in both directions simultaneously
xiii. In which network topology is data transmission unidirectional, like radio or television broadcasts?
a) Star Topology
b) Bus Topology
c) Mesh Topology
d) Ring Topology
xiv. Which data communication standard is used for transferring web pages and related data on the World Wide Web?
a) TCP/IP
b) HTTP
c) FTP
d) SMTP
xv. Which network architecture requires each computer to act as either a server or a client but not both simultaneously?
a) Client/Server Network
b) Peer-to-Peer Network
c) Metropolitan Area Network (MAN)
d) Wide Area Network (WAN)
Unit 8: Entrepreneurship in Digital Age Write answers of the following short response questions. Q.1.…
Unit 7: Digital Literacy Write answers of the following short response questions. Q.1. Differentiate between…
Unit 6: Impacts of Computing Write answers to the following short response questions. Q1. List…
Unit 5: Applications of Computer Science Write answers of the following short response questions. Q1.…
10th Computer Science Unit 4 Data and Analysis Write answers of the following short response…
10th Computer Unit 3: Programming Fundamentals Unit 3: Programming Fundamentals Write answers of the following…