0% found this document useful (0 votes)
9 views

Computer Applications_Sample Paper(Class-9) (4)

This document is a sample question paper for Class IX Computer Applications for the academic year 2024-25, consisting of five sections (A-E) with a total of 50 marks. It includes multiple-choice questions, short answer questions, long answer questions, and case-based questions covering various computer application topics. The paper is designed to assess students' knowledge and understanding of computer applications, software, and related concepts.

Uploaded by

listenofficial16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Computer Applications_Sample Paper(Class-9) (4)

This document is a sample question paper for Class IX Computer Applications for the academic year 2024-25, consisting of five sections (A-E) with a total of 50 marks. It includes multiple-choice questions, short answer questions, long answer questions, and case-based questions covering various computer application topics. The paper is designed to assess students' knowledge and understanding of computer applications, software, and related concepts.

Uploaded by

listenofficial16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

SAMPLE QUESTION PAPER - 5

Computer Applications (165)


Class IX (2024-25)

Time Allowed: 2 hours Maximum Marks: 50


General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, internal choices have been provided in
some of the questions.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04
marks each.
Section A
1. Optical mouse was built by: [1]

a) IBM, 1920 b) Microsoft, 1999

c) Intel, 1930 d) Dell, 2000

2. Which device converts human-understandable data and programs into a form that [1]
computers can understand and process?

a) Input b) Monitor

c) Printer d) Output

3. A category of software that spies of your computer activities is [1]

a) Utilities b) Freeware

c) De-ware d) Spyware

4. Which of the following creates a barrier between the computer and any [1]
unauthorised program trying to come in through the Internet?

a) Spam b) Virus
c) Firewall d) Antivirus

5. Which one of the following is also referred to as malicious software? [1]

a) Maliciousware b) Badware

c) Ilegalware d) Malware

6. Which of the following keys are pressed to right align the text? [1]

a) Ctrl + R b) Ctrl + E

c) Ctrl + L d) Ctrl + C

7. ________ refers to the condition in which your computer stops working. [1]

a) Malware b) Hang

c) Virus attack d) Hacking

8. Which of the following features is used to revert the original picture? [1]

a) Brightness b) Reset picture

c) Recolor d) Contrast

9. How do you add programs from the Start menu to Taskbar's Quick Launch area in [1]
Windows 7?
a. Just drag and drop the program you want to add to the Quick Launch area on the
Taskbar from the Start menu.
b. Right-click the program you want to add to the Quick Launch area on the
Taskbar from the Start menu and select Pin to Taskbar.
c. Both (a) and (b)
d. There is no method to add a program from the Start menu to the Quick Launch
area on the Taskbar.

a) Option (a) b) Option (b)

c) Option (d) d) Option (c)

10. Which type of software is designed to perform specific, personal, business or [1]
scientific processing tasks?
a) Compiler b) System

c) Application d) GUI

11. Assertion (A): A program does nothing unless its instructions are executed by a [1]
CPU.
Reason (R): A program in execution is called process.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

12. Assertion (A): WordArt is a quick way to make the text stand out with special [1]
effects. The WordArt options in MS Word contain various special effects that can
be applied to the text.
Reason (R): Drawing objects are the built-in graphics in MS Word. We can add a
variety of objects to the document, including arrows, callouts, squares, stars and
flowchart shapes.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

Section B
13. What do you mean by buffering? [2]

14. Write the steps to save a workbook. [2]

OR
What is meant by formatting a document?

15. What do you mean by digital signatures and security certificates? [2]

16. Name the most commonly used input device. [2]

OR
Into how many categories can computer networks be classified, on the basis of
geographical area?
17. Ankit has to transfer a photo on his mobile phone to his friend’s phone in the same [2]
room. Which of the following technologies would let him to do this quickly?
i. Bluetooth
ii. Infrared
iii. Either of the two

18. Define trademark. [2]

OR
Define virus.

19. Differentiate between long-distance wireless media and short-distance wireless [2]
media.

Section C
20. “An operating system acts as a bridge between a user and the computer system”. [3]
Justify the statement with the help of a figure.

21. How does MS Word 2010 differ from MS Word 2013? [3]

OR
Explain the purpose of following Slide Layouts in detail.
i. Title and Content
ii. Blank
iii. Content with Caption

22. How do you move a cell content? [3]

23. Who is a black hat hacker? [3]

Section D
24. Write the various ways from which to avoid being stalked on social media. [4]

OR
What are the tips for protecting yourself against identity theft?

Section E
25. Read the text carefully and answer the questions: [4]
Presentation Graphics Software is an application software that lets us create
computer-based, attractive and convincing presentations. There are different
presentation graphics software available such as MS PowerPoint, Apple Keynote,
OpenOffice Impress, Corel Presentations, Adobe Persuasion, Flow Vella, Kingsoft
Presentation, etc. Presentation graphics software allows us to create an attractive
multimedia presentation using a series of slides. Text, images, videos, animations,
links and sound can be combined on each slide to create a final presentation.
MS PowerPoint is a presentation software developed by Microsoft. It allows us to
create dynamic slide presentations that can include animation, narration, images
and videos. MS PowerPoint includes all the features that we need for a
professional-looking presentation.

(i) Define PowerPoint.

(ii) Define Slide in PowerPoint presentation.

(iii) What do you mean by template?

(iv) How to insert a new slide?

26. Read the text carefully and answer the questions: [4]
In a computer system, the software is basically a set of instructions or commands
that tells a computer what to do. In other words, the software is a computer
program that provides a set of instructions to execute a user’s commands and tell
the computer what to do. For example like MSWord, MS Excel, PowerPoint, etc.
System software is software that directly operates the computer hardware and
provides the basic functionality to the users as well as to the other software to
operate smoothly. Software that performs special functions or provides functions
that are much more than the basic operation of the computer, is known as
application software.

(i) Define a software.

(ii) What is system software?

(iii) Name the software used for sorting of tabulated data.

(iv) What are the main features of MS PowerPoint?


Solution
SAMPLE QUESTION PAPER - 5
Computer Applications (165)
Class IX (2024-25)
Section A
1.
(b) Microsoft, 1999
Explanation:
Microsoft, 1999
2. (a) Input
Explanation:
Input
3.
(d) Spyware
Explanation:
Spyware is a category of software that spies computer activities.
4.
(c) Firewall
Explanation:
Firewall
5.
(d) Malware
Explanation:
Malware is a kind of short program used by the hacker to gain access to sensitive data/
information. It is used to denote many kinds of viruses, worms, Trojans and several other
harmful programs. Sometimes malware is also known as malicious software.
6. (a) Ctrl + R
Explanation:
Ctrl + R
7.
(b) Hang
Explanation:
Hang refers to the condition in which your computer or software stops working.
8.
(b) Reset picture
Explanation:
Reset picture feature of Picture Tools Format is used to revert the original picture.
9.
(d) Option (c)
Explanation:
Both (a) and (b)
10.
(c) Application
Explanation:
Application software is a computer software which is designed to help the user to perform
some specific or personal tasks.
11.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation:
A program does nothing unless its instructions are executed by a CPU. A program in
execution, as mentioned, is a Process. For example: A timeshared user program such as a
compiler is a process. A word-processing program being run by an individual user on a PC
is a process. A system task, such as sending output to a printer, can also be a process (or at
least part of one).
12.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation:
Both A and R are true but R is not the correct explanation of A.
Section B
13. Buffering is a technique of storing data in memory area (buffer).
14. Saving a Workbook:
Step 1: Save a workbook select File > Save. If you are saving a file for the first time in
Excel it displays a Save As dialog box.
Step 2: Name the file and also select a drive or folder to save the file and then click Save
button.
OR
The general arrangement of text is called formatting. Formatting provides documents with
a neat and more legible outlook. It makes a document presentable.
15. A digital signature is a form of electronic signature that authenticates a document or
transaction through encryption and password.
Security certificate is a unique digital identification that is used to verify the identity of an
individual website or user. It ensures the authenticity of a person and information.
16. Keyboard is the most commonly used input device, which can also be used to type
commands directing the computer to perform certain actions.
OR
Computer networks can be classified on the basis of geographical area covered by a
network into the following categories.
i. Personal Area Network
ii. Local Area Network
iii. Metropolitan Area Network
iv. Wide Area Network
17. Ankit could either of the two technologies Bluetooth or Infrared which is supported by
both the devices involved. Infrared though slightly faster than bluetooth has a limitation
that it needs a clear line of sight between the devices for it to work.
18. A logo or symbol that is printed on business items to make it exclusive, is known as a
trademark. A trademark is valid for ten years and can be renewed after that.
OR
A virus is a harmful program, which on entering a computer, starts creating copies of
itself. It then attacks by corrupting the executable files and folders saved on the computer.
19. Differences between long-distance and short-distance wireless media are as follows:
S.No. Basis Long-distance wireless media Short-distance wireless media
It supports communication over a It supports communication over a
(i) Purpose long distance, i.e. upto thousands of short distance, i.e. upto few
kilometres. kilometres.
Microwave, radio wave and satellite Bluetooth, infrared, wi-fi and
(ii) Examples communication are long distance WiMAX are short-distance
wireless media. wireless media.
Section C
20. As shown, an operating system acts as a bridge between a user and a computer system. It
actually provides an interface through which a user can interact with and also use the
computer hardware and software.

21. Differences between MS Word 2010 and MS Word 2013 are as follows
MS-Word 2010 MS-Word 2013
It is the successor of Microsoft Office 2010
It is the successor of Microsoft Office 2007
and the predecessor of Microsoft Office
and predecessor of Microsoft Office 2013.
2016.
It was released on 15th June, 2010 for It was released on 29th January, 2013 for
general availability. general availability.
It has no enhanced reading mode. It has an enhanced reading mode.
OR
i. Title and Content: The Title and Content layout lets us to write the title for a slide in
the title text box placeholder and it also lets us to add content such as table, chart,
SmartArt, picture, Clip Art and MediaClip in the content placeholder.
ii. Blank: Blank layout does not contain any placeholder and thus gives us the flexibility
to add placeholders, i.e., text or content and customise it as per our requirement.
iii. Content with Caption: The Content with Caption layout comprises a title box, a text
box to accommodate the details about the content displayed in a placeholder along with
a content placeholder.
22. Moving Cell Contents:
There are two ways of moving cell contents:
i. Cut and Paste Method
ii. Drag and Drop Method
The steps to move cells using Cut and Paste method are:
Step 1: Select the range of cells.
Step 2: Select Cut option from Clipboard group of Home tab.
Step 3: Select the cell where you wish to paste the cells.
Step 4: Select Paste option from Clipboard group of Home tab.
The cells will be pasted to the desired location.
23. When a person breaks into a computer system like a hacker but tries to steal the
passwords, files or other information with the intention to misuse it, the person is
considered a black hat hacker. A black hat hacker is also called a cracker or a cyber-
criminal.
Section D
24. There are various ways from being stalked on social media
Hide your contacts: You should hide your contacts because a stalker may try to reach
out to a friend of yours in order to get close to you.
Use security features: Keep your computer free from threats or breaches in security
by installing safety software and a firewall.
Disable geotagging: It can be dangerous because a stalker can know where you are.
So geotagging should be disable.
Make your profile private: Always make your profile private, to protect yourself
from a stalker. Set your settings to only share information.
Delete an old account: You should delete your old account that are inactive.
OR
Identity theft is the act of a person obtaining information illegally about someone else.
Thieves try to find such information as full name, maiden name, address, date of birth,
passwords, phone number, e-mail and credit card numbers. The thief can then use this
information to gain access to bank accounts, e-mail, and identify themselves as you.
How Social Media can put you at Risk for Identity Theft
Information such as your full name, date of birth, hometown, interests and hobbies, nature
of work etc, post on your profile. Criminals can easily manipulate these details to commit
fraud.
You also put yourself at risk for identity theft when you post updates of your activities on
your social media accounts.
Section E
25. Read the text carefully and answer the questions:
Presentation Graphics Software is an application software that lets us create computer-
based, attractive and convincing presentations. There are different presentation graphics
software available such as MS PowerPoint, Apple Keynote, OpenOffice Impress, Corel
Presentations, Adobe Persuasion, Flow Vella, Kingsoft Presentation, etc. Presentation
graphics software allows us to create an attractive multimedia presentation using a series
of slides. Text, images, videos, animations, links and sound can be combined on each slide
to create a final presentation.
MS PowerPoint is a presentation software developed by Microsoft. It allows us to create
dynamic slide presentations that can include animation, narration, images and videos. MS
PowerPoint includes all the features that we need for a professional-looking presentation.
(i) PowerPoint is a presentation graphics software.
(ii) An electronic page in a presentation is called Slide.
(iii)A template is a pre-designed format of text and colour scheme.
(iv)New Slide button for inserting a new slide can be found on Home tab.

26. Read the text carefully and answer the questions:


In a computer system, the software is basically a set of instructions or commands that tells
a computer what to do. In other words, the software is a computer program that provides a
set of instructions to execute a user’s commands and tell the computer what to do. For
example like MSWord, MS Excel, PowerPoint, etc. System software is software that
directly operates the computer hardware and provides the basic functionality to the users
as well as to the other software to operate smoothly. Software that performs special
functions or provides functions that are much more than the basic operation of the
computer, is known as application software.
(i) Software is a set of instruction, data or programs used to operate computers and execute
specific tasks.
(ii) System software is a type of computer program that is designed to run a computer's
hardware and application programs.
(iii)MS-Excel
(iv)Main features: Animation, Transition, Merge shape, Slide layout, Insert-clipart,
VideoAudio etc.

You might also like