Students must start practicing the questions from CBSE Sample Papers for Class 9 Computer Applications with Solutions Set 1 are designed as per the revised syllabus.
CBSE Sample Papers for Class 9 Computer Applications Set 1 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However; internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Sectiom-A (1 Mark each)
(All questions are compulsory)
Question 1.
Add, Subtract, Multiple and Logic operations are performed by _____. [1]
(A) Registers
(B) Control unit
(C) ALU
(D) None of these
Answer:
(C) ALU
This unit performs two kinds of op-erations, the arithmetic processing and logical processing. In arithmetic processing it performs all mathematical operations such as addition, sub-traction, multiplication and division. In logical processing, it performs the relational and logical operations such as comparing larger or smaller values, true or false statements, etc.
Question 2.
EEPROM stands for— [1]
(A) Electrically Erasable Programmable Read Only Memory
(B) Easily Erasable Programmable Read Only Memory
(C) Electronic Erasable Programmable Read Only Memory
(D) None of these.
Answer:
(A) Electrically Erasable Programmable Read Only Memory
Explanation:
Electrically Erasable and Programmable Read Only Memory (EEPROM) can be reprogrammed with special electrical pulses.
Question 3.
How many antivirus programs should be installed on a single system? [1]
(A) 1
(B) 2
(C) 3
(D) 4
Answer:
(A) 1
Explanation:
Antivirus scans the device to keep it safe from any virus attack. It either deletes the vi-rus or deactivates the virus.
Question 4.
Which type of software used to maintain the proper and smooth functioning of the computer? [1]
(A) Application Softwares
(B) Utility Softwares
(C) Operating System
(D) None of these
Answer:
(B) Utility Softwares
Explanation:
The Utility Software is system software that helps to maintain the proper and smooth functioning of a Computer System.
Question 5.
If you are working with Excel, you can underline text by pressing key: [1]
(A) Ctrl + V
(B) Ctrl + U
(C) Ctrl + Z
(D) All of these
Answer:
(B) Ctrl + U
Explanation:
Entered text can be underlined by firstly selecting the cells containing the text and then pressing Ctrl+U keys.
Question 6.
Hacking, when done with a positive intent, is called- [1]
(A) Ethical hacking
(B) Active hacking
(C) Passive hacking
(D) Ethics
Answer:
(A) Ethical hacking
Explanation:
Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.
Question 7.
To autofit the width of column:
(A) Double click the left border of column
(B) Double click the right border of column
(C) Double click the column header
(D) All of the above
Answer:
(B) Double click the right border of column
Explanation:
To make the columns in a table au-tomatically fit the contents, click on our table. On the Layout tab, in the Cell Size group, click AutoFit, and then click AutoFit Contents, or double click the right border of column.
Question 8.
The page setting appears in: [1]
(A) Edit menu
(B) File menu
(C) Format menu
(D) View
Answer:
(B) File menu
Explanation:
The option to set the page or slide in a presentation appears in File menu.
Question 9.
The chart legend can be placed in: [1]
(A) On the top, right
(B) Bottom
(C) Left
(D) All of these
Answer:
(D) All of these
Explanation:
The legend of a chart can be placed on any side of the chart. It can be placed at the top, bottom, right or left of the inserted chart.
Question 10.
IPO Cycle stands for …….. [1]
(A) Instruction Process Operation Cycle
(B) Input Process Operation Cycle
(C) Input process Output Cycle
(D) None of these
Answer:
(C) Input process Output Cycle
Explanation:
IPO cycle refers to as Input Process Output cycle, the computer takes in some input, does some processing on input and then gives some output after processing. This is called as IPO cycle or Input-Process-Output Cycle.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, As-sertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): A printer produces output usually in the form of text on paper. [1]
Reason (R): The output of the printer is called hard copy.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is false and Reason (R) is true.
Answer:
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
Explanation:
Hard copy is usually on paper and can be read immediately or stored and read later. This is a relatively stable and permanent form of output. A printer produces hard copy output.
Question 12.
Assertion (A): ROM chips are non-volatile. [1]
Reason (R): Read Only Memory, i.e. ROM chip retains the stored data when the power supply is cut.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is false and Reason (R) is true.
Answer:
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
Section-B (2 Marks each)
Question 13.
Explain the following terms: [2]
(i) Volatility
(ii) Storage capacity.
Answer:
(i) Volatility refers to the characteristics which signifies loss of data when power is removed.
(ii) Storage capacity refers to the amount of data the storage medium can hold.
Question 14.
What is an optical disc? Write any two types of optical disc. [2]
OR
How does a cordless mouse communicate with computer?
Answer:
An optical disc is an electronic data storage me-dium that can be written to and read using a low powered laser beam. They can store data up to 6 to 7 gigabytes.
Some types of optical discs are:
- CD
- DVD
OR
A cordless or wireless mouse communicates with the computer via radio waves and thus a cord is not needed. Some famous manufacturers of cordless mouse are HP, Dell, etc.
Question 15.
What do you mean by data recovery software? Give some examples. [2]
Answer:
Data recovery is the process of restoring data that has been lost, deleted or corrupted or made inaccessible for any reason. The software used for this purpose are called data recovery software.
For Example: Back Track, Data Rescue 3, Spin Rite, etc.
Question 16.
Antivirus software begins operating by checking your computer programs and files against a database of known types of malware. Since new viruses are constantly created and distributed by hackers, it will also scan computers for the possibility of new or unknown types of malware threats. [2]
The main task of an antivirus software is to check all the programs/data files available in the computer. When the program finds a file that contains a virus, it will usually quarantine it and/or mark it for deletion, making it inaccessible and removing the risk to your device. A pirated antivirus software should not be used because it will not be able to remove all the viruses, rather it may spread the virus itself. So, you are advised to install original antivirus software and keep it updating periodically.
With reference to the above case, answer the following questions:
(i) What is meant by pirated antivirus software?
(A) Copied from original software
(B) Reinstalled software
(C) Loaded from original CD
(D) None of the above
Answer:
(A) Copied from original software
(ii) What will happen if antivirus software is not updated periodically?
(A) It will be erased after some time.
(B) It will not be able to trace new viruses.
(C) It will force operating system to stop functioning.
(D) None of the above
Answer:
(B) It will not be able to trace new viruses.
OR
Neera has just learned how to do online transactions. Suggest her any two precautions that she should take to prevent online fraud.
Answer:
Precautions that should take to prevent Online Fraud are:
- Do not share user id and password with any-one
- Avoid doing transactions from cyber cafe and other public places
Question 17.
Suresh Tembre, a maths teacher is typing his maths question paper, and he needs to type an equation
x2 + 2y2 = 3. But, when he is trying it is appearing as x2 + 2y2 = 3. Which formatting feature will help him to write equation in proper way? [2]
Also explain how this feature is used?
Answer:
Super script feature.
Use the Superscript buttons:
- Select the text or number you want.
- Go to Home and select Superscript X2 button.
Question 18.
Write the use of the following shortcuts in MS Word: [2]
(i) Press Ctrl+H.
(ii) Press Ctrl+G.
(iii) Press Ctrl+I.
(iv) Press Ctrl+equal sign (=)
OR
Define the following terms:
(i) Transition effects
(ii) Animation
Answer:
(i) Find and replace text in a document Press Ctrl+H.
(ii) Go to a page, line, or bookmark in a document Press Ctrl+G.
(iii) Italicize text
(iv) Subscript text
OR
(i) Transition Effects: These are the special effects that introduce a slide in a slide show. You can choose from a variety of transitions and vary their speed.
(ii) Animation: These are the special sound or visual effects that you can add to text or other objects, such as a chart.
Question 19.
What is attack? [2]
Answer:
An attack is an intentional or unintentional attempt to cause damage or compromise the information. If someone casually reads sensitive information not intended for his or her use, this considered as a passive attack.
Section-C (3 Marks each)
Question 20
What is Data Confidentiality? [3]
Answer:
Data confidentiality is about protecting data against unintentional, unlawful, or unauthorized access, disclosure, or theft. Confidentiality has to do with the privacy of information, including authorizations to view, share, and use it. … passwords, which must remain confidential to protect systems and accounts.
Question 21.
Write the steps to apply animation effect onto an object in the slide. [3]
Answer:
To apply animation effect onto an object in the slide, follow the given steps:
Step 1: Go to the Animations tab.
Step 2: Click to select the element on the slide that you want to animate.
Step 3: In the Animation Styles gallery, choose an animation effect.
Step 4: Choose Entrance, Emphasis, and Exit ani-mation effects.
Step 5: Click on the Preview button at any time to see your animation in all its glory.
Question 22.
A website development company, CLUESTECH is going to setup its office in Delhi but due to space problem, company has to setup its office in two neighboring buildings. Which mode of transmission will help to join the computer of both the buildings? Write two advantages and two disadvantages of that mode of transmission. [3]
OR
What are the roles of an operating system in a computer?
Answer:
Infrared mode of transmission can be used to join computers of two buildings.
Advantages:
- It is a wireless network mode.
- It can be controlled by remote units.
Disadvantages:
- It is a mode of communication with limited range of 5m.
- It cannot pass through obstacles.
OR
The roles of an operating system in a computer are as follows:
- Program execution
- Handling input/output operations
- Manipulation of file system
- Error detection and handling
- Resource allocation
- Accounting
- Information and Resource protection.
Question 23.
How does a proxy server work for protecting your data? [3]
Answer:
A proxy server is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online.
Section-D (4 Marks each)
Question 24.
Cloud computing is a general term for anything that involves delivering hosted services over the internet. These services are divided into three main categories or types of cloud computing: infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). [4]
Public clouds are cloud environments typically created from IT infrastructure not owned by the end user. Some of the largest public cloud providers include Alibaba Cloud, AmazonWeb Services (AWS), Google Cloud, IBM Cloud, and Microsoft Azure.
Private clouds are loosely defined as cloud environments solely dedicated to a single end user or group, where the environment usually runs behind that user or group’s firewall.
(i) What is cloud computing?
(ii) List the types of cloud computing.
(iii) Write any two names of public cloud providers.
(iv) What do you mean by private cloud?
OR
There are some devices in a computer system which are used to give out the result of data processing. A popular output device about which you would be well aware of resembles a TV screen. In case, the output is to be displayed on a big screen for showing it to numerous people, an LCD projector is used. Other than these devices, we can also use printers (impact and non-impact) to produce the output on paper.
Based on the above case, answer the following questions:
(i) Name the device that is resemble a TV screen.
(ii) Which device produces result on paper with hammering effect?
(iii) Which device produce result without making any sound?
(iv) Name the device that is used to display presentation in a hall or a gallery.
Answer:
(i) Cloud computing is a general term for anything that involves delivering hosted services over the internet.
(ii) Types of cloud computing:
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Software as a Service (SaaS)
(iii) Alibaba Cloud, Amazon Web Services (AWS), Google Cloud, IBM Cloud, and Microsoft Azure (write any two)
(iv) Private clouds are loosely defined as cloud environments solely dedicated to a single end user or group, where the environment usually runs behind that user or group’s fire-wall.
OR
(i) VDU
(ii) Dot Matrix printer
(iii) Laser printer
(iv) LCD projector
Section-E (4 Marks each)
Question 25.
Case Study-1 [4]
Nisha recently learn about cyber safety. Help her to know the various new things in the cyber world by explaining the following questions:
a. What is Malware?
b. She has loaded ‘Norton Antivirus’ software in your computer system. Does it make her computer system free from virus attacks for a lifetime? Justify.
c. One of the students has spreading embarrassing rumours, secrets or gossip about her through social networking sites. What is it known as?
d. Write any two ways to that help her to stop spams.
Answer:
a. Malware is a kind of short program used by the hacker to gain access to sensitive data/information.
b. No, loading of Norton antivirus software in your computer system doesn’t make your computer system free from virus attack for a lifetime because every day new types of viruses are being developed and an antivirus software might not be able to detect or eliminate them.
So, it is very important to keep your antivirus software updated against the new viruses. It can be done by using the Internet and checking for updates on a regular basis.
c. It is known as Cyber bullying.
d. The different ways to stop Spam are as fol-lows:
- Installing good antivirus software in our computer system.
- Avoid reading unwanted email messages and delete them to keep in box empty
Question 26.
Case Study – 2. [4]
Applying Bold, Italic and Underline Effects
To apply Bold, Italic and Underline effects, follow the given steps:
i. Select a cell or range of cells.
ii. Click the Home tab.
iii. In the Font group, click any of the following buttons:
- Bold (B): Click to make the text bold.
- Italic (I): Click to tilt the selected text.
- Underline (U): Click to insert a line below the text. You can also choose the
- underline style by clicking on its drop-down arrow.
The effect(s) will be applied on the selection.
To remove applied effects, click on the same button(s) again.
a. What is the 1st step to format the data in Excel?
b. Which tab contains the formatting effects in Excel?
c. Which keyboard shortcut to apply Bold effect?
d. What is the meaning of Italic? How you can use it?
Answer:
a. The 1st step to format the data is to select a cell or a range of cells which is to be format-ted.
b. Home tab
c. Ctrl+B keys
d. Italic means to get a tilted text. Just select the text and click on the Italic button present in the Font group of Home tab or press Ctrl+I keys.