Chapter Test Answers Computer Applications 9
Chapter Test Answers Computer Applications 9
Answers
Chapter 1: FUNDAMENTALS OF Ans. 12. A block is a sector or a group of sectors that the
operating system can address (point to).
COMPUTER SYSTEM
Ans. 13. Cache Memory
Ans. 1. c. High speed main memory Ans. 14.
Monitor, printer and speakers are some
Ans. 2. a. 2 examples of output devices.
Ans. 3. d. RAM Ans. 15.
Various designing and Desktop Publishing
Ans. 4. d. EPROM (DTP) software such as CorelDRAW, Photoshop,
Ans. 5. banking PageMaker, InDesign, etc., are used by print
Ans. 6. Output media and publishing industries for designing
and printing newsletters, brochures, books,
Ans. 7. Data
magazines, etc.
Ans. 8. d. (A) is false, but (R) is true.
Ans. 16. Flash memory is a non-volatile memory chip
Ans. 9. c. (A) is true, but (R) is false.
used for storage and for transferring data
Ans. 10. (i) c. Fast and expensive between a Personal Computer (PC) and digital
(ii) b. non-volatile storage devices. It has the ability to be electronically
(iii) d. All of the above reprogrammed and erased. It is often found in
(iv) d. All all correct USB flash drives, MP3 players, digital cameras
(v) d. Formatting and solid-state drives.
(vi) c. EEPROM Ans. 17. A sector is one of the “pie slices” the diskette or
(vii) d. All all correct disk is divided into. Dividing the circular medium
into pie slices is a way to organise it so that data
Ans. 11. (i) S
upercomputers are one of the
fastest computers currently available. can be located by the read/write heads of the
Supercomputers are very expensive and are drive. The hard disk is usually installed inside the
employed for specialised applications that computer’s case, though there are removable
require immense amount of mathematical and cartridge types as well. A block is a sector
calculations. or a group of sectors that the operating system
(ii) I
t is a midsize multi-processing system can address (point to). The bigger the hard disk
capable of supporting up to 250 users size more the sectors that a block will hold. It is
simultaneously. the block where actual data is stored.
(iii) M
inicomputer is a medium size multi- Ans. 18. E-governance can be defined as a form of
processing computer. In this type of organisation that integrates the interactions
computer, there are two or more processors, and interrelations between the government and
and it supports 4 to 200 users at one time. the citizens, companies, customers and public
(iv) M
ainframe computers are designed in institutions through the application of modern
such a way that it can support hundreds or information and communication technologies.
thousands of users at the same time. It is the use of Information and Communications
(v) W
orkstation is designed for technical or Technology (ICT) for the following activities:
scientific applications. It consists of a fast (i) P
romote a more efficient and cost-effective
microprocessor, with a large amount of RAM government.
and high speed graphic adapter. (ii) F
acilitate more convenient government
(vi) P
C (Personal Computer) is also known as services.
a microcomputer. It is basically a general-
(iii) Allow greater public access to information.
purpose computer and designed for
(iv) M
ake government more accountable to
individual use. It consists of a microprocessor
as a Central Processing Unit (CPU), memory, citizens.
input unit, and output unit. Ans. 19. Limitations of a computer system are as follow:
(vii) T
he hybrid computer is a combination of (i) L
ack of Common-sense: There is no common
both analog and digital computers. Hybrid sense in computers and this is one of the
computers are fast like an analog computer major limitations of computers. They cannot
and have memory, and accuracy like a digital make sound and prudent decisions based on
computer. a simple perception of the situation or facts.
2 |
(ii) N
o IQ: Computers lack Intelligence Quotient (vii) E
ngineering: Computer Aided Engineering
(IQ); they typically have zero IQ. In simple (CAE) software even allows designers to
words, computers cannot see or think of specify the type of material to be used for
any specific action as per the corresponding different parts of a product.
situation. (viii) M
anufacturing: Automobile units use
(iii) N
o Feelings: The computer is still a machine robots for doing tasks such as painting,
and therefore has no feelings. Unlike humans, welding, blending metal, etc. Manufacturing
computers do not feel anything. They lack using computers and Robotics is known as
emotion. Computer Aided Manufacturing (CAM).
(iv) N
o Thinking Capability: Computers cannot
think of themselves, which restricts them Chapter 2: INPUT, OUTPUT AND
to do any task on their own. They are STORAGE DEVICE
machines in which instructions are stored or
Ans. 1. d. All of these
programmed to perform specific tasks.
Ans. 2. a. dots per sq
(v) N
o Decision-Making Ability: Computers are
incapable of making decisions because they Ans. 3. d. All of these
do not contain the necessary elements. Ans. 4. c. 8
Decision-making is a complex process Ans. 5. visual display unit
that usually requires elements such as Ans. 6. dot-matrix printers
information, intelligence, knowledge, wisdom,
Ans. 7. permanent
and judgment capability.
Ans. 8. b. B
oth (A) and (R) are true, but (R) is not correct
Ans. 20.
Areas of applications of computers are as
follows: explanation of (A).
(i) B
usiness: Computer is used in business Ans. 9. d. (A) is false, but (R) is true
organisations for doing various tasks such Ans. 10. (i) c. 8 bits
as payroll calculations, budgeting, sales (ii) c. Kilobyte
analysis, financial forecasting, etc. (iii) a. byte
(ii) B
anking: In the banking sector, computers (iv) a. byte
are used to store details of customers and
(v) c. storage
conduct transactions, such as withdrawal
and deposit of money through ATMs. Banks (vi) b. memory
have reduced manual errors and expenses (vii) b. same
to a great extent through extensive use of Ans. 11. (i) An input device sends information to a
computers. computer system for processing. Example:
(iii) E
ducation: Computers are used in education Keyboard, Mouse, etc.
sector through online classes, online (ii) An output device reproduces or displays the
examinations, referring e-books, online results of that processing. Example: Monitor,
tutoring, etc. They help in increased use of Printer, etc.
audio-visual aids in the education field. (iii) QWERTY is the name of standard keyboard.
(iv) H
ealthcare and Medicine: Computers are (iv) The printer is hard copy device and scanner is
used in hospitals to maintain a database soft copy device.
of patients’ history, diagnosis, X-rays, live
(v) A pixel is also known as a picture element.
monitoring of patients, etc. Surgeons
A pixel is the smallest unit of a digital
nowadays use robotic surgical devices to
image or graphic that can be displayed and
perform delicate operations, and conduct
represented on a digital display device.
surgeries remotely.
(vi) Print resolution is measured in terms of
(v) M
ilitary: Computers are also used for defence
number of dots per inch (dpi).
purposes as they play an important role in
the design and development of weapons, (vii) Monitor resolution is the measurement of
other equipment’s and machineries which the number of pixels that a computer display
are used for communication in distant and or monitor can show at a time.
remote areas. Ans. 12. Scanner is an input device that converts the
(vi) S
cientific Research: Computer systems are document image into digital form so that it can
used by scientists to perform tasks such as be fed into the computer.
developing hypothesis, data interpretation, Ans. 13. A touchscreen is a computer display screen that
exchange data electronically, and simulate can be used as an input device. The touchscreen
complex events because of characteristics allows a user to interact by touching thumbnails
such as high speed and accuracy. on the screen.
Computer Application | Class 9 | 3
Ans. 14. It is a special type of keyboard that allows coated with magnetic material. It is enclosed in
typing without much strain and bending at the a jacket made of a special fiber that allows for
wrists. It reduces the muscle and figure pain the air to cushion the disk when it is rotating at
while typing. high speed and avoid wear and tear to the disk.
Ans. 15. A computer is a hand operated electronic Both the floppy and the jacket carry a central
pointing device that controls the coordinates of hole for the central spindle and a small circular
a cursor on your computer screen as we move hole near it. The beginning of tracks and sectors
it around on a pad. are signaled when the small circular holes in
Ans. 16. Dot-matrix printer is an impact printer that the jacket and the disk coincide. There is a write-
prints text and graphics on the paper by using protect notch on the jacket, which when closed
tiny dots to form the shapes. It uses a set of by a sticker, seals the floppy and thus prevents
metal pins known as print head to strike an inked any further writing. Then information can only
printer ribbon and produce dots on the paper. be read from the floppy.
These combinations of dots give the desired
shape on the paper. Generally, they print with Chapter 3: CLASSIFICATION OF
a speed of 50 to 500 characters per second as
per the quality of the printing is desired. The
SOFTWARE
quality of the print is determined by the number Ans. 1. d. Operating system
of pins used (varying from 9 to 24). Ans. 2. b. MS DOS
Ans. 17. A thermal printer is a printer which uses heated
Ans. 3. a. Library programs
elements to print. Direct thermal and thermal
Ans. 4. c. Antivirus
wax transfer are the two types of thermal
Ans. 5. a. WINZIP
printers. These printers are relatively efficient
and quiet, and they come in a number of sizes Ans. 6. c. Encryption
and styles for different printing needs. A thermal Ans. 7. mobile app
printer has a print head containing many small Ans. 8. Software
resistive heating pins that on contact, melt wax- Ans. 9. Antivirus
based ink onto ordinary paper or burn dots onto Ans. 10. b. Both (A) and (R) are true, but (R) is not correct
a specially coated paper. Computerised billing, explanation of (A).
electric and water bills are generators by this Ans. 11. c. (A) is true, but (R) is false.
method. Ans. 12. (i) d. Disk defragmenter
Ans. 18. Difference between hard copy and soft copy are
(ii) a. Decryption
as follows:
(iii) a. We can touch and feel the software.
S.No. Hard Copy Soft Copy (iv) c. Utility programs
(i) Hard copy is a printed Soft copy is a non- (v) b. 2
document file. printed document file. (vi) d. Operating system
(ii) It is a physical copy. It is a virtual copy. (vii) b. Monitor
Ans. 13. (i) S
oftware is a set of instruction, data or
(iii) It is treated as permanent It is treated as
programs used to operate computers and
copy. temporary copy. execute specific tasks.
(iv) Hard copy does not Soft copy requires an (ii) S
ystem software is a type of computer
require an electronic electronic interface program that is designed to run a computer’s
interface like computers like computers or hardware and application programs.
or mobiles, etc., to read mobiles, etc., to read (iii) MS-Excel
and display. and display. (iv) M
ain features: Animation, Transition, Merge
shape, Slide layout, Insert-clipart, Video-
(v) Hard copies are not easily Soft copies are easily
Audio etc.
portable like soft copy. portable than hard
(v) Note-pad, Wordpad, MS-word.
copy.
(vi) Software designed to help the user to
Ans. 19.
Floppy disk is a pocketbook version of the perform specific tasks.
magnetic disk. It is a random access device (vii) Application software enables the user to
available in size 31/2, 51/4 or 8 inches diameter. complete their tasks:
Storage capacities of 640 KB, 1.2 MB, 1.44 MB MS-Word: Creating Document
are typical. It is a cheap, durable, non-volatile MS-Excel: Solving mathematical calculations
storage option and reusable by writing over MS-Access: Creating database
the previous data. Floppy disk is a circular plate MS-PowerPoint: Creating a presentation
4 |
Ans. 14. The data bus allows the actual data transfer to (iii) System Software is Utility Software easier
the CPU. difficult to design. to build than system
Ans. 15. The address bus allows the CPU to send the software.
address to RAM.
(iv) System Software Utility software depends
Ans. 16.
Firmware is a software program on the
have fast speed. on the specifications of
hardware device, which perform functions like
the system.
basic input/output tasks and offers necessary
instructions for the device to communicate with (v) Without system Utility software can
other computing devices. software, system be downloaded either
can’t run. from web or comes
Ans. 17. The address bus is used to specify a physical
pre-installed.
address in the memory while the data bus is
used to transmit data among components in (vi) System Software can Utility Software is
both directions. Therefore, the address bus is be either free or paid if mostly free to install in
unidirectional while the data bus is bidirectional. downloaded from web. computer.
Ans. 18. Features of system software are as follows: (vii) Example of system Example of utility
(i) S
ystem software is closer to the computer software are operating software are : Avast
system. system, etc. antivirus, disk tools,
(ii) S
ystem software is written in a low-level backup software, etc.
language in general.
(iii) S
ystem software is difficult to design and Chapter 4: COMMUNICATION AND
understand. CONTENT TECHNOLOGY
(iv) S
ystem software is fast in speed (working
Ans. 1. d. Lack of robustness
speed).
Ans. 2. a. TAN
(v) S
ystem software is less interactive for the
Ans. 3. d. Monitor
users in comparison to application software.
Ans. 4. b. LAN
Ans. 19. Features of application software are as follows:
Ans. 5. d. Metropolitan Area Network
(i) A
n important feature of application software
Ans. 6. versatile
is it performs more specialised tasks like
Ans. 7. node
word processing, spreadsheets, e-mail, etc.
Ans. 8. c. (A) is true, but (R) is false.
(ii) M
ostly, the size of the software is big, so it
Ans. 9. b. B
oth (A) and (R) are true, but (R) is not correct
requires more storage space.
explanation of (A).
(iii) A
pplication software is more interactive for Ans. 10. (i) a. Less cost
the users, so it is easy to use and design.
(ii) d. MAN
(iv) T
he application software is easy to design (iii) a. Hub
and understand.
(iv) b. LAN
(v) A
pplication software is written in a high-level (v) a. Local Area Network
language in general.
(vi) a. Instant Messaging
Ans. 20. The difference between system software and (vii) b. Twisted pair
utility software are as follows: Ans. 11. (i) B
aud and bits per second (bps) is used to
S.No. System Software Utility Software measurement for the information carry of a
communication channel.
(i) System Software Utility Software refers
(ii) 1 byte = 8 bits
maintain the system to software programs
1 kbps (kilo bits per second) = 1024 bits
resources and give the that add functionality to
(iii) T
he microwaves are transmitted in a straight
path for application computer and help to line and hence require a line-of-sight
software to run. perform in better way. transmission. The distance covered by the
(ii) System Software is Utility Software mainly microwave signals depends on the height of
a general purpose focuses on how the two antenna. The taller the antenna, the
longer is the distance covered by the signals.
software. computer infrastructure
(iv) T
he radio waves are generated easily. They
such as hardware,
are low-frequency signals and can travel
operating system,
long distance. They can penetrate through
software, etc., operates. the buildings.
Computer Application | Class 9 | 5
(v) T
he satellites are transponders (units that Ans. 18.
Ethernet Cable is the most widely used
receive on one frequency and retransmit on technology for LAN. It consists of devices
another) that are set in geostationary orbits attached to a common medium that provides a
directly over the equator. path for the signals to travel. This medium may
(vi) R
outer and modem are the two networking be coaxial cables or twistedpair. Data travels
devices. over Ethernet inside protocol units called
(vii) W
iMAX stands for Worldwide Interoperability frames which have the address of the sender
for Microwave Access. and receiver. To connect Ethernet cables to a
Ans. 12. Each computer in a network is called a node. computer, a network adapter is used.
Ans. 13.
In a computer network, application programs Advantages
and other costly software are installed on one
(i) Installation of Ethernet is less expensive.
central computer. Users connected to a network
can access these programs or software through (ii) It can connect a wider range of computer
the central computer. types.
Ans. 14.
Internet Service Provider (ISP) is a company (iii) It is widely available.
that provides with the Internet connection, for Disadvantages
example, Airtel, BSNL, DOCOMO, Idea, Reliance,
(i) It does not work well for voice transmission.
etc.
Ans. 15. (i) P
AN: It stands for Personal Area Network. It is (ii) M
any times the traffic of data is slowed down
a computer network used for communication due to congestion.
among computer and different technological Ans. 19. The characteristics of Internet are as follows:
devices close to it. Technologies such as (i) A
web browser is an application program that
Bluetooth and infrared communication form
is used to access the websites and web pages
a wireless PAN around the device.
on the Internet.
(ii) WiMAX: It stands for Worldwide
(ii) T
he Internet utilises the TCP/IP protocol
Interoperability for Microwave Access. It is a
wireless transmission of data using a variety and is accessed using a computer modem,
of transmission modes. broadband, 3G, 4G, or network that is
Ans. 16. An Intranet is a private network that is installed connected through an ISP.
within an enterprise. It may consist of many (iii) In the case of broadband, many computers
interlinked Local Area Networks and also use and devices use Wi-Fi to connect to router
leased lines in the Wide Area Network. that is connected to the ISP.
The term Internet stands for International (iv) T
he search engines are used to find the
Network. It is a worldwide system of computer information available on the Internet.
networks. It is the largest public network that
(v) F
iles, pictures, songs and videos can be
allows users to get connected with each other
all over the world and to exchange information shared via downloading (receiving) and
with each other. It is a collection of computers uploading (sending).
and servers that are connected to each other Ans. 20. Following are the key differences between
using routers and switches, around the world. Guided and Unguided Media.
Ans. 17.
Coaxial Cable is an electrical cable with an inner (i) T
he guided media uses a physical path or
conductor which is surrounded by an insulating conductor to transmit the signals whereas,
medium and which is again surrounded by an
the unguided media broadcasts the signals
outer conductor. The outer conductor is covered
through the air.
with a plastic jacket. It is mainly used by cable TV
operators to connect the community antenna (ii) T
he guided media is also called wired
and user homes. communication or bounded transmission
Advantages: media. However, the unguided media is called
(i) It is cheaper than any other medium. wireless communication or unbounded
(ii) It is not fragile and is prone to various shocks transmission media.
and jerks. (iii) T
he guided media provides direction to the
Disadvantages: signals whereas, the unguided media does
(i) Its insulation may degrade over a period of not direct the signals.
time and may require replacement of cable. (iv) C
ategories of guided media are twisted pair
(ii) Interference of signal can occur. cable, coaxial cable and optical fibre. On the
(iii) It cannot be laid down in areas with physical other hand, the categories of unguided media
constraints, e.g., mountainous areas and over are radio waves, microwaves, and infrared
water bodies. signals.
6 |
Chapter 5: Operating System Ans. 17.
The activities related to File Management
includes:
Ans. 1. d. Java (i) F
ile Attributes: File attributes are the
Ans. 2. a. Windows 7 properties associated with a file that specifies
Ans. 3. c. Two the different information related to the file or
Ans. 4. b. GUI data of the file. It specifies the characteristics
of a file, such as a type and location that
Ans. 5. a. Unix
completely describe a file.
Ans. 6. hardware, software (ii) F
ile Operations: File operations are the
Ans. 7. operating system various tasks that are performed on files. A
Ans. 8. c. (A) is true, but (R) is false. user can perform these operations by using
Ans. 9. d. (A) is false, but (R) is true. the commands provided by the operating
system.
Ans. 10. (i) b. BOSS
(iii) F
ile Access Permissions: File access
(ii) a. CLI
permission help specify the manner in which
(iii) a. Macrokernal a user can access a file. These are the access
(iv) c. HFS rights that allow us to read, write or execute
(v) d. Microsoft Word a file.
(vi) b. Multi-processing Operating System (iv) F
ile System: File systems are used by an
operating system to store and organise the
(vii) d. Real-time Operating System
various files and their information on a hard
Ans. 11. (i) First Come First Serve disk.
(ii) Operating system is the first program that Ans. 18.
Types of System Calls: There are five different
loads in computer’s main memory, when a categories of system calls:
computer is switched on. (i) P
rocess control which is used to end, abort,
(iii) Buffering is a technique of storing data in create, terminate, allocate and free memory.
memory area (buffer). (ii) F
ile management which is used to create,
(iv) Data can be transferred in the form of units open, close, delete, read file, etc.
such as characters, words, bytes, blocks or (iii) Device management
records from one component to another. (iv) Information maintenance
(v)
Yes, it is a family of an operating system (v) Communication
produced by Microsoft in July 1993. NT stands Ans. 19. Depending upon the number of programs that
for New Technology. can be opened at a time, OS can be classified
into two types—
(vi) Windows 7 and Windows XP.
ingle-tasking operating system and Multi-
S
(vii) Shell is an interface between the user and the
tasking operating system.
kernel. It interprets the user’s commands and
Single-tasking Operating System: As the name
executes them.
suggests, single-tasking OS allows only one
Ans. 12. Multi-tasking is a process, where more than one program to be opened and used at a time. This
tasks are been performed at a same time in the operating system is designed to manage the
computer. computer so that one user can effectively do
Ans. 13. Android and iPhone Operating System (iOS) are one thing at a time. Some examples are MS-DOS
the examples of the operating systems that are and Palm OS for handheld devices.
used in mobile phone. Multi-tasking Operating System: Multi-tasking
refers to an operating system in which multiple
Ans. 14. The first version of Apple iOS was released on
processes, also called tasks, can run on a
29th July, 2007.
single computer, simultaneously and without
Ans. 15. LINUX as an operating system is fast becoming interfering with each other. For example, we can
popular. Although it has not touched the listen to our favourite songs as well as type a
popularity of Windows operating system but document in MS Word, if we are using a multi-
still is providing a high competition to Windows tasking OS like Windows. Some more examples
operating system. of multi-tasking OS are Linux, Mac OS, Android,
Windows 98 onwards, etc.
Ans. 16. The two features of LINUX are as follows:
Ans. 20.
An operating system provides an interface
(i) It is a multi-user operating system which can
through which user interacts with the computer
be run in single mode also. system and gives instructions to it. CUI and GUI
(ii) I
t can run on many computer models are the two types of user interfaces provided by
unlike Windows which can run only on Intel operating systems for user interaction with a
machines. computer system.
Computer Application | Class 9 | 7
Character User Interface (CUI) based operating (ii) a. It is used to burn media files stored on
systems: CUI stands for Character User your computer’s hard drive to a CD or DVD.
Interface, and as the name suggests, it provides (iii) b. Off
a character-based interface to interact with (iv) b. It is used to play downloaded movies
a computer. We can only type text to give (v) a. datataken
commands to the computer as in. MS-DOS or
(vi) d. Both b and c.
command prompt. There are no images or
(vii) a.
It automatically sizes or snaps two
graphics on the screen and it is a primitive type
windows to fit together on the screen thus
of interface. In the early days, this interface
allowing you the convenience of viewing
was used to operate computers. A black screen
them next to each other.
with white text was there for providing the
Ans. 11. (i) D
rawing area is the area where you create
commands. The mouse was not used. All the
your drawings using different tools of Paint.
commands were typed and entered through the
(ii)
The Calculator is a utility program that
keyboard. CUIs have gradually became outdated
allows you to do mathematical and scientific
as the more advanced GUIs took their place.
calculations. It works like a regular calculator.
However, even the most modern computers
(iii) WordPad is a small word processor program
have a modified version of CUI called CLI
that is used to type the documents. It has
(Command Line Interface). Some examples of
features to let you type the text as well as to
CUI are DOS, UNIX, etc.
format the text.
Graphical User Interface (GUI) based operating
(iv)
Sticky notes is another useful feature of
systems: GUI often pronounced as ‘Gooey’ Windows 7 and it can be placed on the
stands for Graphical User Interface. It is the desktop. These are used for writing reminders
most popular and widely used interface. This is or for making a To Do List.
an interface that makes use of graphics, images
(v) Aero Snap feature enables you to resize and
and icons. This interface made it possible for expand Windows more quickly. It also allows
a mouse to be used with a computer and the to compare the contents of two different
interaction really became very easy as the user windows.
could interact with just a click of the mouse
(vi)
Aero Peek feature makes all the open
rather than typing every time to give commands windows transparent, so that you can see the
to the computer. desktop.
Windows is the most common example of GUI (vii)
Drag and drop is used to move an item
based operating system. Some other examples present on the screen, to a new location.
are Linux, Symbian, Mac OS X, etc. Ans. 12. The Notification area is the area of the taskbar
where you can view programs and tasks that
Chapter 6: working with are running in the background, as well as view
windows 7 important messages about updating your
computer. It is also called the System tray.
Ans. 1. d. All of the above Ans. 13. The Address bar allows you to navigate up and
Ans. 2. a. Y
ou can configure the WMI Control to back up down on a series of windows by double-clicking
your WMI repository. on a folder.
Ans. 3. d. All of these Ans. 14.
After a window is maximised, the Maximise
Ans. 4. c. Both a. and b. button changes to the Restore button. It looks
Ans. 5. d. It allows you to schedule a task to run in like two windows near one another. If you click
response to an event. the Restore button, the maximised window
shrinks to its previous size (the size before you
Ans. 6. Start
maximised it).
Ans. 7. File
Ans. 15.
Double-click Pressing the left mouse button
Ans. 8. b. B
oth (A) and (R) are true, but (R) is not correct twice quickly and releasing it, is called double-
explanation of (A). click. To open a file or a program on a computer
Ans. 9. d. (A) is false, but (R) is true. requires you to double-click the left mouse
Ans. 10. (i) b.
It is used to store the URL addresses, button on the icon of the program or file you
usernames, and passwords required for want to open.
you to access the other websites you deal Ans. 16.
Control Buttons : The control buttons (Minimise,
with that require you to log on in order to Maximise/Restore and Close) are located at the
conduct business with them. right corner of the title bar.
8 |
(i) T
he Close (X) button: It closes an already Ans. 8. a. Both (A) and (R) are true, and (R) is the correct
open window and thus allows you to exit a explanation of (A).
program. Ans. 9. (i) c. GIF
(ii) T
he Maximise () button: It maximises the (ii) a. Moving Picture Experts Group
program, making it full screen. If it is already
(iii) b. RAM
maximised, it looks like a box on the top of
(iv) d. MIDI
another box. If you click on it in that state, it
will return the window to its previous size. (v) d. MOV
(iii) T
he Minimise (-) button: It reduces the (vi) a. Tweening
current window to a taskbar button. Clicking (vii) b. Xiph.Org
on the button on the taskbar restores the Ans. 10. (i) L
inear and Non-Linear are two types of
window to its former state. multimedia.
Ans. 17. File contains the options to work with files such (ii) The hardware and software requirements for
as creating a new file, saving a file, opening a text matter as follows:
file, printing a file, and import/export options. (a) Keyboard
The steps to open a file are:
(b) Optical Character Recognition (OCR)
Step 1: Right-click on the file you want to open in
(c) Text Editors
the different software.
(d) Text Style
Step 2: Click on the Open with option.
(iii)
Generative Graphics is extensively used
Step 3: Click on the compatible software in the
in drawings and illustrations in the form
list. The particular file will get opened in the
of 2-D and 3-D pictures. It is created for
selected software.
mathematical representation of simple
Ans. 18.
Different Shell Commands: The following are
objects.
the basic shell commands that are used to work
(iv)
Real Audio is a proprietary format, and is
with files in Windows CLI.
used for streaming audio that enables you to
(i) d
ir (Directory): This command displays the
play digital audio files in real-time.
list of files and folders/subfolders.
(v) The file extensions of real audio is .ra, .ram or
Syntax: dir
.rm.
(ii) cd (Change directory): This command
changes the directory location. (vi) MPEG (Moving Pictures Expert Group) format
is the most popular format on the Internet.
Syntax: cd <dir/folder name>
It is cross-platform, and supported by all the
(iii) c d-: This command returns to the previous
most popular web browsers.
directory, you were working in.
(vii) Videos stored in the MPEG format have the
Syntax: cd-
extension .mpg or .mpeg.
(iv) cd ..: This command moves you one directory
Ans. 11.
Skype is an online application that provides
up/back in the directory structure.
video chat and voice call services. We can share
Syntax: cd .. <dir/folder name>
images, text, video and many other things,
(v) ls: This command lists the directory/folder
and may send and receive both text and video
contents.
messages.
Syntax: ls
(vi) cls: This command clears the screen. Ans. 12. Raster graphics or bitmap image on the other
Syntax: cls hand is a dot matrix data structure, representing
(vii) del: This command deletes one or more files. a generally rectangular grid of pixels, or points
Syntax: del <filename> of color, viewable via a monitor, paper, or other
display medium.
Chapter 7: Social networking Ans. 13.
Cc (CARBON COPY): We type the e-mail address
of the people we want to send a copy of our
Ans. 1. c. Both a. and b. e-mail to also called as Cc. This feature is used
Ans. 2. d. Keyboard to share a particular message with a large
Ans. 3. a. Vector graphics number of people.
Ans. 4. a. Joint Photographic Experts Groups
Bcc (BLIND CARBON COPY): If we want to
Ans. 5. global keep somebody invisible from all the other
recipients of our message, then his or her e-mail
Ans. 6. blog
address will be typed here. This feature is very
Ans. 7. c. (A) is true, but (R) is false.
similar to Cc.
Computer Application | Class 9 | 9
Ans. 14.
Virtual Reality: It is a kind of technology (ii) Hyper Text Transfer Protocol Secured.
to create a simulated environment. Unlike (iii) Incognito
traditional user interfaces, virtual reality places
(iv) Log off refers to closing the current session
the user inside an experience. Instead of viewing
in the social networking site.
a screen in front of them, users are immersed
and able to interact with 3D worlds. (v) Never download text or e-mail attachments
There are two kinds of virtual reality techniques: that you are not expecting, or files from the
websites you do not trust. Do not open junk
(i) T
hat allows a user to view a picture from
many angles. e-mails or spam mails as these may contain
virus.
(ii) A
“world” is constructed of polygons in a 3D
plane. The computer then renders in real- (vi) Spammer is the term used for a person who
time the world allowing you to walk through creates an electronic spam.
the world. (vii)
Malware is the short name of Malicious
Ans. 15.
On the Internet, chatting is talking to other software.
people who are using the Internet at the same Ans. 10. Spyware is a kind of malware that is sent to
time you are. Usually, this “talking” is the
someone’s computer intentionally to steal
exchange of typed-in messages requiring one
information such as e-mail passwords, credit
site as the repository for the messages (or “chat
card password, etc.
site”) and a group of users who take part from
anywhere on the Internet. Ans. 11.
Worm is a program which is capable of
Advantages: reproducing and spreading itself to another
computer system with the help of the computer
(i) Can communicate instantly
network. This type of virus does not cause direct
(ii) Can attach files
damage to the files and the programs.
(iii) Fast
Ans. 12.
Cyberstalking is a crime in which the
(iv) Cheap (almost free)
attacker harasses a victim using electronic
Disadvantages:
communication, such as e-mail or Instant
(i) Need internet connection Messaging (IM), or messages posted to a social
(ii) Other person needs to be online networking site and chat site. A cyber stalker,
Ans. 16. (i) JPEG - Joint Photographic Experts Groups using anonymity allow them to stalk their victim
(ii) WMA and MP3 without being detected.
(iii) Sampling Ans. 13. The three types of information collected by a
(iv) Ogg social networking site are as follows:
(v) WAV (i) Required Information: Name, E-Mail, Date of
Birth, Location. (Essential for the account.)
Chapter 8: About Cyber safety (ii) Secret Information: Alternate e-mail, mobile
Ans. 1. d. All of these phone number, security question and answer.
Ans. 2. a. Spammer (In case the account is compromised or you
Ans. 3. d. Firewall have lost your password.)
Ans. 4. trademark (iii) Biographical Information: Information
Ans. 5. Intellectual Property (IP) about yourself submitted voluntarily. (For
Ans. 6. b. B
oth (A) and (R) are true, but (R) is not correct advertisement content offered to you and to
explanation of (A). aid in advertisement targeting).
Ans. 7. d. (A) is false, but (R) is true. Ans. 14. While selecting passwords the following points
Ans. 8. (i) c. Give no personal information are to be remembered:
(ii) c. I never give my password to anyone (i) The longer the password, the harder it is to
(iii) c. Pharming crack. Consider a 12-character password or
(iv) a. InPrivate longer.
(v) b. Gmail (ii) Avoid names, places, and dictionary words.
(vi) b. Spyware (iii) Mix it up. Use variations on capitalisation,
(vii) a. Man made spelling, numbers and punctuation.
Ans. 9. (i) A
blog is a regularly updated website or web (iv) You may also use a specialised Password
page, typically one run by an individual or Manager package; as ultimately the number
small group that is written in an informal or of passwords that you need to remember
conversational style. will grow.
10 |
Ans. 15. Confidentiality of information is defined as Ans. 11.
A header is text that appears within the top
information to which the public does not have margin on each page of a document or section.
general access. This policy governs the use or A footer appears in the bottom margin of each
further disclosure of such information. page.
Best practices used to ensure confidentiality are Ans. 12. To highlight a text in word the following steps
as follows: are involved:
(i) A
n authentication process, which ensures that (i) Select the text.
authorised users are assigned confidential (ii) C
lick on the ‘Highlight’ drop-down list of the
user identification and passwords. Another ‘Font’ group of the ‘Home’ Tab.
type of authentication is biometrics. Ans. 13.
Templates are ready-made design samples
(ii) R
ole-based security methods may be available in MS Word for creating documents
employed to ensure user or viewer such as brochures, invitation cards, agendas
authorisation. For example, data access levels and much more.
may be assigned to specified department Ans. 14. To select a paragraph, Triple-click anywhere in
staff. the paragraph. The whole paragraph will get
(iii) A
ccess controls ensure that user actions selected.
remain within their roles. For example, if a Ans. 15. The two options of the ‘Paragraph Spacing’ are:
user is authorised to read but not write data,
(i) E
xactly: When you choose this option, the
defined system controls may be integrated.
line spacing is measured in points, just like
font size. For example, if you’re using 12-point
Chapter 9: ms word 2010: text, you could use 15-point spacing.
A word processing tool (ii) A
t least: Like the exactly option, this lets
you choose how many points of spacing you
Ans. 1. a. Drawing/Shapes
want. However, if you have different sizes of
Ans. 2. a. Data source
text on the same line, the spacing will expand
Ans. 3. a. WordArt source to fit the larger text.
Ans. 4. b. Documentation Ans. 16. The ‘Multiple’ line spacing allows you to type
Ans. 5. red the number of lines of spacing you want. For
Ans. 6. Paragraph example, choosing Multiple and changing the
spacing to 1.2 will make the text slightly more
Ans. 7. c. (A) is true, but (R) is false.
spread out than single-spaced text. If you want
Ans. 8. b. B
oth (A) and (R) are true, but (R) is not correct
the lines to be closer together, you can choose a
explanation of (A).
smaller value, like 0.9.
Ans. 9. (i) d. Justified Alignment
Ans. 17.
Usually we may apply multiple formatting
(ii) b. Insert options such as bold, italic, underline, changing
(iii) a. Calibri font size, color, etc., to some specific text
(iv) c. Shapes entered in a document. In case we wish to apply
same format to other text, Format Painter can
(v) d. Insert
help us. Performing the similar steps again to
(vi) a. 3-D Effects
apply the same formatting text effects can be
(vii) b. Font Style time consuming and boring. To avoid such kind
Ans. 10. (i) A
font is a graphical representation of text of problem, MS Word 2010 offers a feature
that may include a different typeface, point called Format Painter. This feature enables us
size, weight, color or design. to copy the formatting effects applied to the
(ii) Align Left, Justify, Align Right and Center. selected text, without selecting the text itself.
(iii) The amount of space allocated for the footer Ans. 18. After preparing the document in MS Word, we
section of a page is called footer work space. can print it. But, it is always recommended to
preview the document before we send the
(iv) The default extension is docx.
document for final printing as previewing a
(v) The spacing that can be adjusted before and document enables us to see how a document
after paragraphs is called paragraph spacing. will finally appear on the paper, after printing.
(vi) The default line spacing in Word is 1.15. We perform the below mentioned steps to
(vii)
Print Layout view is the default view. This preview a document before printing it.
view displays how the document will look on Step 1: We open the document that we want to
a page after printing. preview.
Computer Application | Class 9 | 11
Step 2: Then, we click on the File tab followed (vi) Alt + Shift + M
by the Print option. This will display a preview (vii) A
rrangement refers to the placement of a
of the document in the right column. We can graphic on imaginary vertical axis.
scroll-up or scroll-down the document to move Ans. 13. Page settings refers to the parameters defined
through the document using the Scroll bar. by the user that help determine how a printed
Step 3: Once we are satisfied with the preview page will appear. Those parameters can
of the document, we can click on the Home tab include everything from the size, margins, page
again to go back to the actual content of the orientation, to quality of print. More plainly, it’s a
document. menu that allows users to customise the layout
of a page.
Chapter 10: more on Ans. 14.
A margin is the space between the text and
ms word 2010 the edge of your document. By default, a new
document’s margins are set to Normal, which
Ans. 1. b. Blue means it has a one-inch space between the text
Ans. 2. d. Review and each edge.
Ans. 3. a. Proofing Ans. 15. Perform the below mentioned steps to insert a
Ans. 4. c. F7 footer in a Word document.
Ans. 5. c. Thesaurus (i) Step 1: Click on the Insert tab and then click
Ans. 6. Bullet on the Footer option in the Header & Footer
group.
Ans. 7. subscript
(ii) Step 2: Select a footer style from the drop-
Ans. 8. b. B
oth (A) and (R) are true, but (R) is not correct
explanation of (A). down list. The footer will be displayed at the
bottom of the page. Enter the information as
Ans. 9. b. B
oth (A) and (R) are true, but (R) is not correct
required. The footer will be applied to all the
explanation of (A).
pages.
Ans. 10. b. Both (A) and (R) are true, but (R) is not correct
Ans. 16. Perform the below mentioned steps to insert
explanation of (A).
page breaks in a Word document.
Ans. 11. (i) a. Format Painter Mode
(i) Step 1: Place the cursor immediately before
(ii) d. Home tab
the text that you want to appear on a new
(iii) a. same page.
(iv) c. font (ii) Step 2: Click on the Insert tab, and then click
(v) c. paint brush on the Page Break option available in the
(vi) c. Ctrl + Enter Pages group. The Word inserts a page break
(vii) d. Both a. and b. and moves all the text after the page break
Ans. 12. (i) N
umbered lists are usually used when you onto a new page.
need to put the headings under a specific Ans. 17. Different styles can be added to a picture.
order, ascending or descending. However, Perform the below mentioned steps to add
bullet points are used to get across your stuff styles to a picture.
fully in rather a chronological order without Step 1: Select the picture you want to add a style
emphasis on any one point particularly. to.
(ii) Word’s options for borders in a document Step 2: As soon as you select it, you would see
are moderately comprehensive and allow the Format tab under the Picture Tools.
you to create a clear-cut layout or decorative Step 3: In the Picture Styles group, select the
design. You can apply borders to things like style of your choice, after clicking on the drop-
paragraphs, pages, table cells, etc.
down arrow.
(iii) S
ome of the options are: Pages, Print One
Ans. 18. Perform the below mentioned steps to change
sided, Collate, Page Orientation, Paper Size,
the color of the WordArt.
Page Margins and Scaling.
Step 1: Select the WordArt text.
(iv) A symbol is a special character that is
Step 2: Click on the Format tab.
generally not found on the keyboard and
therefore cannot be inserted directly into a Step 3: From the Text Fill drop-down list in the
document. WordArt Styles group, choose a color which you
(v) R
esizing a picture means changing the length wish to add to the WordArt. If you do not wish
and breadth of the picture in order to make it to add any color to the WordArt, then select the
bigger or smaller. No Fill option.
12 |
Ans. 19.
WordArt is a quick way to make the text stand (iv) Toggle Case is used to capitalise every letter
out with special effects. The WordArt options except the first letter.
in MS Word contain various special effects that (v) T
he positioning of the text inside a text box is
can be applied to the text. WordArt styles are called Alignment. The Paragraph group on the
available in the WordArt gallery on the Insert Home tab has all the alignment features.
tab, which you can then customise. (vi) A
theme is a pre-defined combination of
Perform the below mentioned steps to insert colors, fonts and effects that can be applied
WordArt: to a presentation.
Step 1: Place the cursor where you want to (vii) S
martArt allows users to add text to pre-
insert the WordArt. defined art designs. The advantage with
Step 2: Click on the Insert tab. SmartArt, although each component of the
Step 3: Click the drop-down arrow under the SmartArt can be edited individually, is that
WordArt option in the Text group and choose you can also modify the SmartArt as a whole
while retaining the settings on each individual
any style from the drop-down list.
component.
Step 4: A box with Your text here will be
Ans. 11. Solid fill, Gradient fill, Picture or Texture fill and
displayed on the screen. In this box, enter the
Pattern fill.
text you wish to apply the WordArt to.
Ans. 12.
Animating slides involves adding movement
Step 5: Open the drop-down list of Text effects
and sometimes sound to text or to the slides in
in the WordArt Styles group.
a presentation.
Step 6: Place the mouse pointer on the
Ans. 13. To apply animation to a text follow these steps:
Transform option which will open a sublist.
(i) S
elect the text on the slide that you want to
Step 7: Select a WordArt style. The WordArt
animate.
style that you have selected will be applied to
(ii) O
n the Animations tab of the ribbon, click Add
the entered text.
Animation, and pick an animation effect.
Chapter 11: ms powerpoint Ans. 14. Normal view is the view for creating individual
slides. This is the main/default view for
2010: a presentation tool formatting and designing slides by adding text,
graphics and animation effects.
Ans. 1. a. copy and paste
Slide Sorter view is the view that shows a
Ans. 2. b. Alt + F
thumbnail of each slide in order. Using this you
Ans. 3. d. Edit may rearrange the order of slides, produce a
Ans. 4. c. Insert timed slide show, or add transitions between
Ans. 5. Play selected slides.
Ans. 6. header Ans. 15. To add a background to a slide or slides:
Ans. 7. c. (A) is true, but (R) is false (i) S
elect the Design tab, then click the Format
Ans. 8. b. B
oth (A) and (R) are true, but (R) is not correct Background command of the Customise
explanation of (A). group.
Ans. 9. (i) a. Slide (ii) T
he Format Background pane will appear on
the right. Select the desired fill options. The
(ii) d. Tools
background style of the selected slide will
(iii) a. File
update.
(iv) c. Title bar
(iii) If you want, you can click Apply to All to apply
(v) c. Shift + F10 the same background style to all slides in
(vi) b. Ctrl+O your presentation.
(vii) c. Repeat Ans. 16.
Animating Text and Objects: We can give sound
Ans. 10. (i) P
owerPoint assists you in defining the right effects or visual effects, including movement to
rehearse timings for automatic slide changes. the text or objects in a presentation. Animation
This is particularly important to know the can be used to focus on important points, to
display time for each slide, particularly when control the flow of information and to increase
you are talking to an audience along with the viewer interest in a presentation.
slide. Built-in animation effect can be added in Office
(ii) Slide Sorter View PowerPoint presentation by do the following:
(iii) S
trikethrough crosses the text by drawing a (i) S
elect the text or object that you want to
line through it. animate.
Computer Application | Class 9 | 13
(ii) O
n the Animations tab, in the Animations Ans. 11. (i) d. Auto Outline
group, select the animation effect that you (ii) d. Format cells alignment
want from the animate list.
(iii) d. Counts non-empty cells
To apply a custom animation effect in Office
(iv) d. Ctrl + Space Bar
PowerPoint, do the following:
(i) S elect the text or object that you want to (v) a. $
animate. (vi) b. Internet assistant wizard
(ii) On the Animations tab, in the Animations (vii) c. a formula that either directly or indirectly
group, click Custom Animation. depends on itself
In the Custom Animation task pane, click Add Ans. 12. (i) d. Line chart
Effect and then do one or more of the following:
(ii) b. Pie chart
(i) To make the enter text or object with an
effect, point to Entrance and then click any (iii) d. Scatter chart
effect. (iv) b. Ctrl+End
(ii) To add an effect, such as a Spin effect, to (v) d. Press Ctrl key
text or an object that is already visible on (vi) b. Ctrl+Shift+Spacebar
the slide, point to Emphasis and then click an
(vii) a. Print preview
effect.
(iii) To add an effect that makes text or an object Ans. 13. A function is a pre-defined formula which help
leave the slide at some point, click to Exit and to do mathematical, statistical operations.
then click an effect. Ans. 14. Ctrl + Shift + F
(iv) To add an effect that makes text or an object Ans. 15.
The small black square in the bottom-right
move in a specified pattern, click to Motion corner of the selected cell or range is called a
Paths and then click a path. fill handle.
To specify how the effect is applied to your Ans. 16. We can find the highest score in Hindi, English
text or object, right-click any custom animation and Maths by writing the following formula:
effect in the Custom Animation list and then
For Hindi: =max(B2 : B6)
click Effect Options.
Do one of the following: For English: =max(C2 : C6)
(i) To specify settings for text, on the Effect, For Maths: =max(D2 : D6)
Timing and tabs, click the options animate Ans. 17. Three types of data that can be entered in a cell
text from Effect tab to use to animate the are:
text. (i) L
abel: Label is any text entered by using a
(ii) To specify settings for an object, on the Effect keyboard. It may be any letter, number, or
and Timing tabs, click the options that you special symbol. By default the labels are left
want to use to animate the object. aligned.
Effects appear in the Custom Animation list in (ii) V
alues: The numerical data consisting of only
the order that you add them. numbers are called values. By default values
are right aligned.
Chapter 12: MS EXCEL 2010: (iii) F
ormula: Any expressions that begins with
A SPREADSHEET TOOL an equals ‘=’ is treated as formula. When a
formula is entered in a cell the formula bar
Ans. 1. a. Today() gets activated.
Ans. 2. d. Mathematical Ans. 18. (i) 750
Ans. 3. b. Category axis (ii) D2 : D6
Ans. 4. b. Combination chart (iii) C5
Ans. 5. c. Print Selection (iv) 10
Ans. 6. Cell Ans. 19. Perform the below mentioned steps to add the
Ans. 7. left, right border.
Step 1: Select the cells or range of cells where
Ans. 8. Editing
you want to add the border.
Ans. 9. c. (A) is true, but (R) is false.
Step 2:
In the Font group on the Home tab,
Ans. 10. b. B
oth (A) and (R) are true, but (R) is not correct click on the down arrow of the Borders
explanation of (A). option. The Borders list will appear.
14 |
Step 3: Click on the required border style. Excel (iv) 7
immediately assigns borders to the cell (v) 5
or the range of cells.
Ans. 22. (i) 4
Ans. 20. Perform the below mentioned steps to apply a
chart style: (ii) 5