Computer Applications_Sample Paper(Class-9) (2)
Computer Applications_Sample Paper(Class-9) (2)
2. Which of the following software protects your computer system from a virus [1]
attack?
c) adware d) spam
c) Spam d) Malware
a) Melissa b) Brain
6. The status of your document like current page number and number of pages are [1]
given by ________.
7. ________ is a type of software designed to help the user’s computer detect viruses [1]
and avoid them.
c) Adware d) Malware
a) .ppx b) .pptx
c) .xppt d) .ppt
12. Assertion (A): You can use the PowerPoint Rehearsal feature to rehearse your [1]
presentation.
Reason (R): Rehearse timing is used to add the time at which the presentation is
created.
a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.
Section B
13. Give one difference between primary memory and secondary memory. [2]
14. Is it possible to remove a worksheet? State the process of doing it. [2]
OR
What is a Margin in Word?
OR
What is a disk storage?
OR
What are the primary interest of online attackers in spyware?
19. Write any three advantages and disadvantages each of optical fibre cable. [2]
Section C
20. Compare and contrast the two wireless transmission media; Bluetooth and infrared. [3]
21. Do you think, use of bulleted lists or numbered lists is more appropriate in a Word [3]
document?
OR
What are possible interactions used in presentation?
22. How do you copy the contents of the cells using drag and drop method? [3]
Section D
24. Explain the requirements for Safe e-Commerce transactions. [4]
OR
What are the components of information system?
Section E
25. Read the text carefully and answer the questions: [4]
Microsoft Word is a word processor, which means that it's designed primarily for
text-based documents. These can be business reports, student papers, informal notes
from a call or a lecture, or letters to friends and relatives. In Word, you type text
and see roughly how it will appear on someone else’s computer screen or on paper.
You can change the font, colour, size and other style settings for text using Word’s
built-in options. To style multiple sections of text the same way, such as to
consistently style headings in a certain way, you can create styles that group
multiple formatting options into one setting. Microsoft Word has been designed for
years to maximize compatibility between versions. Typically, versions of Microsoft
Word can open files created in previous versions of the software and save files in
formats usable by earlier versions. You can also save files in formats such as Rich
Text Format, which is used by a variety of competing products.
(i) How are spelling and grammatical mistakes shown in a Word document?
Section A
1.
(b) Toolbar
Explanation:
Toolbar
2.
(b) Antivirus
Explanation:
Antivirus
3.
(d) spam
Explanation:
Spam is an electronic equivalent of junk mail.
4.
(d) Malware
Explanation:
Malware designed to interrupt ongoing computer operations, collect private information
and gain unauthorised access to your system resources.
5.
(d) Elk Cloner
Explanation:
Elk Cloner is the first computer virus created by Richard Skrenta.
6.
(d) Status bar
Explanation:
Status bar gives the status of your document like current page number and number of
pages.
7. (a) Antivirus
Explanation:
An antivirus is a kind of software that is specially designed to help the user's computer to
detect the virus as well as to avoid the harmful effect of them.
8.
(d) .ppt
Explanation:
.ppt
9.
(c) Jarkko Oikarinen
Explanation:
Jarkko Oikarinen
10.
(d) Compiler, interpreter and assembler
Explanation:
Compiler, interpreter and assembler
11.
(c) A is true but R is false.
Explanation:
A DVD (Digital Versatile Disk) is made up of several layers of plastic, totalling about 1.2
millimeters thick. Each writable layer of a DVD has many tracks of data.
12.
(c) A is true but R is false.
Explanation:
You can use the PowerPoint Rehearsal feature to rehearse your presentation. The
Rehearsal feature lets you know how long your presentation takes, and it can even set slide
timings so that the slides automatically advance based on the timings you set during the
rehearsal.
Section B
13. The primary memory is volatile and has limited storage capacity, whereas secondary
memory is non-volatile and can store huge amount of data.
14. Yes, it is possible to remove a worksheet. To remove a worksheet right-click on the Sheets
tab of the sheet that you want to delete and choose Delete from pop-up menu, or choose
Delete Sheet from the pop-up menu of Delete option on cells group under Home tab.
OR
A margin is the space between the text and the edge of your document. By default, a new
document's margins are set to Normal, which means it has a one-inch space between the
text and each edge.
15. Computer ethics is the branch of practical principles that deals with how computer experts
should make decisions about social and professional behaviour. It is a set of moral
principles which regulates and governs the use of computing and Internet technology.
16. Spreadsheet software is a software application capable of organizing, storing and
analyzing data in tabular form. The application can provide digital simulation of paper
accounting worksheets.
OR
Disk storage is a general category of storage mechanisms where data are recorded by
various electronic, magnetic, optical or mechanical changes to the surfaces of one or more
rotating disks.
For example:
i. Hard disk
ii. Floppy disk
17. Android is mainly designed for touchscreen mobile devices such as smartphones and
tablets.
18. Worm is a program which is capable of reproducing and spreading itself to another
computer system with the help of the computer network. This type of virus does not cause
direct damage to the files and the programs.
OR
Primary interest of online attackers in spyware is using it to steal personal information for
financial crimes such as carding and identity theft or to sell that information to someone
else who then executes more traditional financial crimes.
19. Advantages
i. They have higher bandwidth so can carry more data quickly.
ii. Data can be carried over longer distances without loss.
iii. They are immune to electromagnetic interference.
Disadvantages
i. Their cost is high.
ii. They are fragile.
iii. Joining optical cables requires trained labour.
Section C
20. Bluetooth and infrared both are short-range wireless transmission media. This is the only
point at which both these data transmission technologies look similar but there is a lot of
difference between the two. Infrared is mostly used in TV remotes and there must be a
direct line-of-sight between the transmitter and the receiver while on the other hand
Bluetooth uses a radio frequency which allows transmission through walls and other
objects.
21. The use of bulleted lists or numbered lists is an effective way to outline or list the items in
a Word document. By modifying numbered or bulleted lists, yon are able to change the
way of information that is displayed. Creating an outline list, which can help to organise
your document for clear presentations. To customize your eye-catching bullets, Word
provides many different images from which to choose. Also, Word gives you the ways of
modifying the format of your numeral list.
OR
Go to previous slide
i. Go to next slide
ii. Go to first slide
iii. Go to last slide
iv. Go to page or object
22. To copy using drag and drop, select the cell or range of cells that you want to copy and
then press Ctrl key and move the mouse to one of the selection's borders (the mouse
pointer changes from a white cross to a black cross with small plus sign). Then, simply
drag the selection to its new location while you continue to press the Ctrl key.
The original selection remains behind and Excel makes a new copy when you release the
mouse button.
23. Virus: Viruses are segments of code that performs malicious actions. A computer virus is
a self-replicating computer program written to alter the way a computer operates, without
the permission or knowledge of the user. Viruses can be intentionally destructive-
destroying data.
Worm: A worm is a malicious program that replicates constantly, without requiring
another program to provide a safe environment for replication. Worms can continue
replicating themselves until they completely fill available resources, such as memory, hard
drive space, and network bandwidth.
Section D
24. Requirements for Safe e-Commerce transactions: The following are some of the
fundamental requisites that ensure safe electronic transactions and payments:
i. Confidentiality: At the time of buying some objects online, we are generally asked to
enter our personal information such as name, delivery address (house address), credit
card or debit card details, etc. Such information should be kept confidential and not be
accessible by any unauthorised person. It should not be hacked or leaked at the time of
transaction or transmission.
ii. Integrity: Information should not be hampered or changed during its transmission over
the network. For example, if you are making a payment of ₹2,000 using your credit or
debit card, then ₹2,000 should be deducted from your account. This information should
not get changed.
iii. Encryption: Information should be encrypted and decrypted only by the authorised
user.
iv. Availability: As e-commerce is a crucial branch of ICT, the information required for
completing a transaction should be available on time. Delay in the availability of
information may incur loss in business.
v. Authenticity: Authenticity is an important requisite of e-commerce. Only authorised
persons should be allowed to gain access to information. Otherwise, unauthorised
persons may steal and misuse the information.
OR
i. Hardware: It is the physical technology that hosts and executes the software, stores
and carries the data, provides interfaces for the entry and removal of information from
the system.
ii. Data: It is stored, processed, and transmitted through a computer system must be
protected. Data is the most valuable asset of an organization and usually is the main
target of intentional attacks.
iii. People: Some people have always been a threat to information security and they are the
weakest link in a security chain.
iv. Procedures: Procedures are a set of written instructions for grouping when an
unauthorized user obtains an organization's procedures, and poses threat to the integrity
of the information.
v. Networks: Information systems in LANs are connected to other networks such as the
internet and new security challenges rapidly emerge.
Section E
25. Read the text carefully and answer the questions:
Microsoft Word is a word processor, which means that it's designed primarily for text-
based documents. These can be business reports, student papers, informal notes from a call
or a lecture, or letters to friends and relatives. In Word, you type text and see roughly how
it will appear on someone else’s computer screen or on paper. You can change the font,
colour, size and other style settings for text using Word’s built-in options. To style multiple
sections of text the same way, such as to consistently style headings in a certain way, you
can create styles that group multiple formatting options into one setting. Microsoft Word
has been designed for years to maximize compatibility between versions. Typically,
versions of Microsoft Word can open files created in previous versions of the software and
save files in formats usable by earlier versions. You can also save files in formats such as
Rich Text Format, which is used by a variety of competing products.
(i) Spelling mistakes are shown as red wavy underlines and grammatical mistakes are
shown using blue wavy underlines.
(ii) Tab-Review and Group-Proofing
(iii)Superscript: Ctrl, Shift and +
Subscript: Ctrl and =
(iv)Tab: Insert
Group: Symbol