Académique Documents
Professionnel Documents
Culture Documents
System software refers to the files and programs that make up your computer's
operating system. System files include libraries of functions, system services,
drivers for printers and other hardware, system preferences, and other
configuration files. The programs that are part of the system software include
assemblers, compilers, file management tools, system utilites, and debuggers.
Since system software runs at the most basic level of your computer, it is called
"low-level" software. It generates the user interface and allows the operating
system to interact with the hardware.
NAME: S.JAYAGOKUL.
REG NO: 19BCC0020.
System software programs are created to facilitate a variety of functions as
follows
managing information
manipulating data
constructing visuals
coordinating resources
NAME: S.JAYAGOKUL.
REG NO: 19BCC0020.
2. Write the Algorithm for addition of two numbers and division of two
numbers in single user interface.
(Variables-
Algorithm-
Step 1- Start the Program
Step 2- Input A, B
Step 3- If Addition
Calculate C=(A+B)
Step 4- Else Division
C=(A/B)
Step 5- Output C
Step 6- Stop the Program
3. Write the steps to convert number systems (all conversions).
a. Binary to Decimal
Steps
Multiply each bit by 2n, where n is the “weight” of the bit
The weight is the position of the bit, starting from 0 on the right
Add the results
NAME: S.JAYAGOKUL.
REG NO: 19BCC0020.
b. Octal to Decimal
Steps
Multiply each bit by 8n, where n is the “weight” of the bit
The weight is the position of the bit, starting from 0 on the right
Add the results
c. Hexadecimal to Decimal
Steps
Multiply each bit by 16n, where n is the “weight” of the bit
The weight is the position of the bit, starting from 0 on the right
Add the results
d. Decimal to Binary
Steps
Divide by two, keep track of the remainder
First remainder is bit 0 (LSB, least-significant bit)
Second remainder is bit 1
Etc.
e. Octal to Binary
Steps
Convert each octal digit to a 3-bit equivalent binary representation by
421 method
NAME: S.JAYAGOKUL.
REG NO: 19BCC0020.
f. Hexadecimal to Binary
Steps
Convert each hexadecimal digit to a 4-bit equivalent binary
representation by 8421 method
g. Decimal to Octal
Steps
Divide by 8
Keep track of the remainder
h. Binary to Octal
Steps
Group bits in threes, starting on right
Convert to octal digits
i. Hexadecimal to Octal
Steps
Use binary as an intermediary
j. Decimal to Hexadecimal
Steps
Divide by 16
Keep track of the remainder
NAME: S.JAYAGOKUL.
REG NO: 19BCC0020.
k. Binary to Hexadecimal
Steps
Group bits in fours, starting on right
Convert to hexadecimal digits
L. Octal to Hexadecimal
Steps
Use binary as an intermediary
4. Explain the role of DBA and list out the applications of DBMS from June
2019 to till date in VIT.
Today’s databases can be massive and may contain unstructured data types such
as images, documents, or sound and video files. Managing a very large database
(VLDB) may require higher-level skills and additional monitoring and tuning to
maintain efficiency.
DBAs create backup and recovery plans and procedures based on industry best
practices, then make sure that the necessary steps are followed. Backups cost
time and money, so the DBA may have to persuade management to take
necessary precautions to preserve data.System admins or other personnel may
actually create the backups, but it is the DBA’s responsibility to make sure that
everything is done on schedule.In the case of a server failure or other form of
data loss, the DBA will use existing backups to restore lost information to the
system. Different types of failures may require different recovery strategies, and
the DBA must be prepared for any eventuality. With technology change, it is
becoming ever more typical for a DBA to backup databases to the cloud, Oracle
Cloud for Oracle Databases and MS Azure for SQL Server.
NAME: S.JAYAGOKUL.
REG NO: 19BCC0020.
5. Security
A DBA needs to know potential weaknesses of the database software and the
company’s overall system and work to minimise risks. No system is one hundred
per cent immune to attacks, but implementing best practices can minimise
risks.In the case of a security breach or irregularity, the DBA can consult audit
logs to see who has done what to the data. Audit trails are also important when
working with regulated data.
6. Authentication
7. Capacity Planning
The DBA needs to know how large the database currently is and how fast it is
growing in order to make predictions about future needs. Storage refers to how
much room the database takes up in server and backup space. Capacity refers to
usage level.If the company is growing quickly and adding many new users, the
DBA will have to create the capacity to handle the extra workload.
8. Performance Monitoring
9. Database Tuning
10. Troubleshooting
DBAs are on call for troubleshooting in case of any problems. Whether they
need to quickly restore lost data or correct an issue to minimise damage, a DBA
needs to quickly understand and respond to problems when they occur.