0% found this document useful (0 votes)
8 views

Computer Applications_Sample Paper(Class-9) (2)

This document is a sample question paper for Class IX Computer Applications for the academic year 2024-25, consisting of five sections (A-E) with a total of 50 marks. It includes various types of questions such as multiple choice, short answer, long answer, and case-based questions, covering topics related to computer software, hardware, and ethics. The paper is structured to assess students' understanding of computer applications and their practical implications.

Uploaded by

listenofficial16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Computer Applications_Sample Paper(Class-9) (2)

This document is a sample question paper for Class IX Computer Applications for the academic year 2024-25, consisting of five sections (A-E) with a total of 50 marks. It includes various types of questions such as multiple choice, short answer, long answer, and case-based questions, covering topics related to computer software, hardware, and ethics. The paper is structured to assess students' understanding of computer applications and their practical implications.

Uploaded by

listenofficial16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

SAMPLE QUESTION PAPER - 3

Computer Applications (165)


Class IX (2024-25)

Time Allowed: 2 hours Maximum Marks: 50


General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, internal choices have been provided in
some of the questions.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04
marks each.
Section A
1. Which of the following bars contains the tools for performing various [1]
tasks/functions?

a) Scroll bar b) Toolbar

c) Title bar d) Status bar

2. Which of the following software protects your computer system from a virus [1]
attack?

a) All of these b) Antivirus

c) Library programs d) Device drivers

3. The electronic equivalent of junk mail is known as [1]

a) packets b) cyber fraud

c) adware d) spam

4. ________ stands for Malicious Software is software designed to infiltrate a [1]


computer system without the owner's informed consent.
a) Blog b) Attachments

c) Spam d) Malware

5. Which of the following is the first computer virus? [1]

a) Melissa b) Brain

c) Malware d) Elk Cloner

6. The status of your document like current page number and number of pages are [1]
given by ________.

a) Menu bar b) Formatting toolbar

c) Standard toolbar d) Status bar

7. ________ is a type of software designed to help the user’s computer detect viruses [1]
and avoid them.

a) Antivirus b) Both Malware and adware

c) Adware d) Malware

8. Which of the following is the extension of a PowerPoint 2010 file? [1]

a) .ppx b) .pptx

c) .xppt d) .ppt

9. IRC was developed by: [1]

a) Charles Babbage b) Tim Berners-Lee

c) Jarkko Oikarinen d) Ray Tomlinson

10. ________ are the examples of programming language translators. [1]

a) Compiler, C++ b) Assembler, Java

c) C, C++, Basic d) Compiler, interpreter and


assembler

11. Assertion (A): A DVD is made up of several layers of plastic. [1]


Reason (R): The full form of DVD is Data Video Disc.
a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

12. Assertion (A): You can use the PowerPoint Rehearsal feature to rehearse your [1]
presentation.
Reason (R): Rehearse timing is used to add the time at which the presentation is
created.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

Section B
13. Give one difference between primary memory and secondary memory. [2]

14. Is it possible to remove a worksheet? State the process of doing it. [2]

OR
What is a Margin in Word?

15. Define the term computer ethics. [2]

16. What is spreadsheet software? [2]

OR
What is a disk storage?

17. For which devices is the Android mainly designed? [2]

18. Define worms. [2]

OR
What are the primary interest of online attackers in spyware?

19. Write any three advantages and disadvantages each of optical fibre cable. [2]

Section C
20. Compare and contrast the two wireless transmission media; Bluetooth and infrared. [3]

21. Do you think, use of bulleted lists or numbered lists is more appropriate in a Word [3]
document?

OR
What are possible interactions used in presentation?

22. How do you copy the contents of the cells using drag and drop method? [3]

23. What are virus and worms? [3]

Section D
24. Explain the requirements for Safe e-Commerce transactions. [4]

OR
What are the components of information system?

Section E
25. Read the text carefully and answer the questions: [4]
Microsoft Word is a word processor, which means that it's designed primarily for
text-based documents. These can be business reports, student papers, informal notes
from a call or a lecture, or letters to friends and relatives. In Word, you type text
and see roughly how it will appear on someone else’s computer screen or on paper.
You can change the font, colour, size and other style settings for text using Word’s
built-in options. To style multiple sections of text the same way, such as to
consistently style headings in a certain way, you can create styles that group
multiple formatting options into one setting. Microsoft Word has been designed for
years to maximize compatibility between versions. Typically, versions of Microsoft
Word can open files created in previous versions of the software and save files in
formats usable by earlier versions. You can also save files in formats such as Rich
Text Format, which is used by a variety of competing products.

(i) How are spelling and grammatical mistakes shown in a Word document?

(ii) Which group and tab contains the Thesaurus command?

(iii) What is the keyboard shortcut for subscript and superscript?

(iv) Which group and tab contains the Symbol command?


26. Read the text carefully and answer the questions: [4]
Response time is the time taken by a system to react to a given input. In a Real-time
Operating System (RTOS), the response time is very critical and is fixed. In case of
any event, the system has to respond within a fixed duration of the time or else the
system might collapse. So we can say that RTOS is time-driven.
Usually in a RTOS, the output of one unit acts as an input for another unit. So delay
in receiving output from a unit delays the supply of input to the next unit. The
second unit does not respond to the delayed input and so does not give any output
for which the third unit might be waiting. So the whole system crashes. The best
examples of RTOS are airbags in a car, fire alarm system, aircraft control system.
Generally, RTOS are embedded systems meaning that they are a part or a unit of a
larger system.
For example, temperature control system in ACs and refrigerators, digital watches,
MP3 players, in mobile phones etc. Some of the widely used RTOS are LINUX,
Windows CE, RT LINUS, OSE, QNX etc.

(i) Define Real-time Operating Systems.

(ii) Amoeba is an example of:

(iii) A thread is a ________ process, which is managed by operating system scheduler.

(iv) Which of the following is like a heart of operating system?


Solution
SAMPLE QUESTION PAPER - 3
Computer Applications (165)
Class IX (2024-25)

Section A
1.
(b) Toolbar
Explanation:
Toolbar
2.
(b) Antivirus
Explanation:
Antivirus
3.
(d) spam
Explanation:
Spam is an electronic equivalent of junk mail.
4.
(d) Malware
Explanation:
Malware designed to interrupt ongoing computer operations, collect private information
and gain unauthorised access to your system resources.
5.
(d) Elk Cloner
Explanation:
Elk Cloner is the first computer virus created by Richard Skrenta.
6.
(d) Status bar
Explanation:
Status bar gives the status of your document like current page number and number of
pages.
7. (a) Antivirus
Explanation:
An antivirus is a kind of software that is specially designed to help the user's computer to
detect the virus as well as to avoid the harmful effect of them.
8.
(d) .ppt
Explanation:
.ppt
9.
(c) Jarkko Oikarinen
Explanation:
Jarkko Oikarinen
10.
(d) Compiler, interpreter and assembler
Explanation:
Compiler, interpreter and assembler
11.
(c) A is true but R is false.
Explanation:
A DVD (Digital Versatile Disk) is made up of several layers of plastic, totalling about 1.2
millimeters thick. Each writable layer of a DVD has many tracks of data.
12.
(c) A is true but R is false.
Explanation:
You can use the PowerPoint Rehearsal feature to rehearse your presentation. The
Rehearsal feature lets you know how long your presentation takes, and it can even set slide
timings so that the slides automatically advance based on the timings you set during the
rehearsal.
Section B
13. The primary memory is volatile and has limited storage capacity, whereas secondary
memory is non-volatile and can store huge amount of data.
14. Yes, it is possible to remove a worksheet. To remove a worksheet right-click on the Sheets
tab of the sheet that you want to delete and choose Delete from pop-up menu, or choose
Delete Sheet from the pop-up menu of Delete option on cells group under Home tab.
OR
A margin is the space between the text and the edge of your document. By default, a new
document's margins are set to Normal, which means it has a one-inch space between the
text and each edge.
15. Computer ethics is the branch of practical principles that deals with how computer experts
should make decisions about social and professional behaviour. It is a set of moral
principles which regulates and governs the use of computing and Internet technology.
16. Spreadsheet software is a software application capable of organizing, storing and
analyzing data in tabular form. The application can provide digital simulation of paper
accounting worksheets.
OR
Disk storage is a general category of storage mechanisms where data are recorded by
various electronic, magnetic, optical or mechanical changes to the surfaces of one or more
rotating disks.
For example:
i. Hard disk
ii. Floppy disk
17. Android is mainly designed for touchscreen mobile devices such as smartphones and
tablets.
18. Worm is a program which is capable of reproducing and spreading itself to another
computer system with the help of the computer network. This type of virus does not cause
direct damage to the files and the programs.
OR
Primary interest of online attackers in spyware is using it to steal personal information for
financial crimes such as carding and identity theft or to sell that information to someone
else who then executes more traditional financial crimes.
19. Advantages
i. They have higher bandwidth so can carry more data quickly.
ii. Data can be carried over longer distances without loss.
iii. They are immune to electromagnetic interference.
Disadvantages
i. Their cost is high.
ii. They are fragile.
iii. Joining optical cables requires trained labour.
Section C
20. Bluetooth and infrared both are short-range wireless transmission media. This is the only
point at which both these data transmission technologies look similar but there is a lot of
difference between the two. Infrared is mostly used in TV remotes and there must be a
direct line-of-sight between the transmitter and the receiver while on the other hand
Bluetooth uses a radio frequency which allows transmission through walls and other
objects.
21. The use of bulleted lists or numbered lists is an effective way to outline or list the items in
a Word document. By modifying numbered or bulleted lists, yon are able to change the
way of information that is displayed. Creating an outline list, which can help to organise
your document for clear presentations. To customize your eye-catching bullets, Word
provides many different images from which to choose. Also, Word gives you the ways of
modifying the format of your numeral list.
OR
Go to previous slide
i. Go to next slide
ii. Go to first slide
iii. Go to last slide
iv. Go to page or object
22. To copy using drag and drop, select the cell or range of cells that you want to copy and
then press Ctrl key and move the mouse to one of the selection's borders (the mouse
pointer changes from a white cross to a black cross with small plus sign). Then, simply
drag the selection to its new location while you continue to press the Ctrl key.
The original selection remains behind and Excel makes a new copy when you release the
mouse button.
23. Virus: Viruses are segments of code that performs malicious actions. A computer virus is
a self-replicating computer program written to alter the way a computer operates, without
the permission or knowledge of the user. Viruses can be intentionally destructive-
destroying data.
Worm: A worm is a malicious program that replicates constantly, without requiring
another program to provide a safe environment for replication. Worms can continue
replicating themselves until they completely fill available resources, such as memory, hard
drive space, and network bandwidth.
Section D
24. Requirements for Safe e-Commerce transactions: The following are some of the
fundamental requisites that ensure safe electronic transactions and payments:
i. Confidentiality: At the time of buying some objects online, we are generally asked to
enter our personal information such as name, delivery address (house address), credit
card or debit card details, etc. Such information should be kept confidential and not be
accessible by any unauthorised person. It should not be hacked or leaked at the time of
transaction or transmission.
ii. Integrity: Information should not be hampered or changed during its transmission over
the network. For example, if you are making a payment of ₹2,000 using your credit or
debit card, then ₹2,000 should be deducted from your account. This information should
not get changed.
iii. Encryption: Information should be encrypted and decrypted only by the authorised
user.
iv. Availability: As e-commerce is a crucial branch of ICT, the information required for
completing a transaction should be available on time. Delay in the availability of
information may incur loss in business.
v. Authenticity: Authenticity is an important requisite of e-commerce. Only authorised
persons should be allowed to gain access to information. Otherwise, unauthorised
persons may steal and misuse the information.
OR
i. Hardware: It is the physical technology that hosts and executes the software, stores
and carries the data, provides interfaces for the entry and removal of information from
the system.
ii. Data: It is stored, processed, and transmitted through a computer system must be
protected. Data is the most valuable asset of an organization and usually is the main
target of intentional attacks.
iii. People: Some people have always been a threat to information security and they are the
weakest link in a security chain.
iv. Procedures: Procedures are a set of written instructions for grouping when an
unauthorized user obtains an organization's procedures, and poses threat to the integrity
of the information.
v. Networks: Information systems in LANs are connected to other networks such as the
internet and new security challenges rapidly emerge.
Section E
25. Read the text carefully and answer the questions:
Microsoft Word is a word processor, which means that it's designed primarily for text-
based documents. These can be business reports, student papers, informal notes from a call
or a lecture, or letters to friends and relatives. In Word, you type text and see roughly how
it will appear on someone else’s computer screen or on paper. You can change the font,
colour, size and other style settings for text using Word’s built-in options. To style multiple
sections of text the same way, such as to consistently style headings in a certain way, you
can create styles that group multiple formatting options into one setting. Microsoft Word
has been designed for years to maximize compatibility between versions. Typically,
versions of Microsoft Word can open files created in previous versions of the software and
save files in formats usable by earlier versions. You can also save files in formats such as
Rich Text Format, which is used by a variety of competing products.
(i) Spelling mistakes are shown as red wavy underlines and grammatical mistakes are
shown using blue wavy underlines.
(ii) Tab-Review and Group-Proofing
(iii)Superscript: Ctrl, Shift and +
Subscript: Ctrl and =
(iv)Tab: Insert
Group: Symbol

26. Read the text carefully and answer the questions:


Response time is the time taken by a system to react to a given input. In a Real-time
Operating System (RTOS), the response time is very critical and is fixed. In case of any
event, the system has to respond within a fixed duration of the time or else the system
might collapse. So we can say that RTOS is time-driven.
Usually in a RTOS, the output of one unit acts as an input for another unit. So delay in
receiving output from a unit delays the supply of input to the next unit. The second unit
does not respond to the delayed input and so does not give any output for which the third
unit might be waiting. So the whole system crashes. The best examples of RTOS are
airbags in a car, fire alarm system, aircraft control system.
Generally, RTOS are embedded systems meaning that they are a part or a unit of a larger
system.
For example, temperature control system in ACs and refrigerators, digital watches, MP3
players, in mobile phones etc. Some of the widely used RTOS are LINUX, Windows CE,
RT LINUS, OSE, QNX etc.
(i) In a Real-time Operating System (RTOS), the response time is very critical and is fixed.
In case of any event, the system has to respond within a fixed duration of the time or
else the system might collapse. So we can say that RTOS is time-driven.
(ii) Amoeba is an example of Distributed OS.
(iii)light weight
(iv)Kernel is like a heart of operating system which plays a vital role in modern OS.

You might also like