Q3. How is ordinary compilation process different from Java compilation?
Ans. The ordinary compilation, the source code is converted to a machine code, which is dependent upon the machine or the platform. This resultant machine code is called native executable code.
Contrary to ordinary compilers, the Java compiler does not produce native executable code for a particular machine. Instead it produces a special format called byte code. The Java byte code looks a lot like machine language, but unlike machine language Java byte code is exactly the same on every platform.
Q2. How can you say that java is both a programming language and a platform?
Ans. Like any other programming language, we can use Java to write or create various types of computer applications. The word platform generally is used to refer to some combination of hardware and system software. The Java platform is a new software platform designed to deliver and run highly interactive, dynamic and secure applications on networked computer systems.
Q1. When you compile a program written in the Java programming language, the compiler converts the human readable source file into platform independent code that a JVM can understand? What is this platform independent code called?
Ans. Byte code.
Q9. Describe why authentication is important for file protection.
The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authentication, which is the process of giving individuals access to system objects based on their identity.
Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individuals. Authentication is the process of determining whether someone is, in fact, who or what it is declared to be. It is the process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorization, which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. It is also used for file protection for unauthorized users.
Q8. What is fragmentation? How does it affect computer’s performance? What remedy do you suggest for it?
Ans. Fragmentation means files stored in fragmented storage blocks. That is, when files are not stored in contiguous storage areas rather their contents are scattered over the disk, it is known as fragmentation.
High fragmentation slows down a computer as the computer as the computer has to perform more read/write operations.
To defragment a disk, disk defragmentor utility may be run which rearranges files in contiguous storage blocks.
Q7. What is a DBMS?
Ans. DBMS is an acronym for Data Base Management System. A dbms is a software that can effectively store, manipulate, and handle bulk of data. A dbms provides utilities for data analyses and data based management.
Q6. What features of electronic spreadsheets make them useful?
Ans. Various useful features of electronic spreadsheets are:
- Spreadsheets cannot only represent data values but also their relationship(s).
- Spreadsheets provide facilities of cutting, pasting, moving, copying data values or formulae or formats etc.
- What if analysis becomes very easy using spreadsheets.
- Numerous built-in functions are available in spreadsheets.
- Data can graphically be represented through charts/ graphs of many types.
Q5. What features of word processors make them very useful?
Q5. What are the useful features of word processors.
Ans. Apart from performing the jobs of typewriter, word processors provide following features that enhance their usefulness.
- Word processors provide variety of fonts and print styles.
- Information can be saved for later use.
- Word processors provide the facility of spell-check, dictionary and thesaurus.
- Word processors offer various formatting styles that enhance the present-ability of a document2.
- Word processors offer very useful utility known as mail-merge.
Q179. Define String Literal.
Ans. String Literal are sequence of characters enclosed in double quotes.