Students must start practicing the questions from CBSE Sample Papers for Class 9 Computer Applications with Solutions Set 2 are designed as per the revised syllabus.
CBSE Sample Papers for Class 9 Computer Applications Set 2 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However; internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Sectiom-A (1 Mark each)
(All questions are compulsory)
Question 1.
Which one of the following is also referred to as malicious software?
(A) Maliciousware
(B) Badware
(C) Ilegalware
(D) Malware
Answer:
(D) Malware
Explanation:
Malware is a kind of short program used by the hacker to gain access to sensitive data/information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.
Question 2.
The Software which is used to run a device/machine.
(A) Language Translator
(B) Utility Software
(C) Device Driver
(D) Disk Cleanup Software
Answer:
(C) Device Driver
Explanation:
A device driver is a small piece of soft-ware that tells the operating system and other software how to communicate with a piece of hard-ware.
Question 3.
Which of the following Language directly used by Computer?
(A) High Level Language
(B) Assembly Language
(C) Binary Language
(D) Middle Level Language
Answer:
(C) Binary Language
Explanation:
Computers use binary to store data. Not only because it’s a reliable way of storing have the data, but computers only understood 1s and 0s—binary.
Question 4.
Identify which of the following is not a Storage Unit?
(A) Hard Disk Drive
(B) Compact Disk
(C) Magnetic Tape
(D) OBCR
Answer:
(D) OBCR
Explanation:
Optical Bar Code Reader (OBCR)is an Input device. A barcode reader is defined as an optical scanner that can read the printed codes and helps to decode the data for sending to the computer.
Question 5.
Which one of the following is a type of antivirus program?
(A) NPAV
(B) Quick Heal
(C) Avast
(D) All of these
Answer:
(D) All of these
Explanation:
An antivirus program is a software utility designed to protect your computer or net-work against computer viruses. NPAV, Quick Heal and Avast all are the examples of antivirus pro-gram.
Question 6.
Refers to the safe and responsible use of Internet.
(A) Cyber Crime
(B) Cyber Reporting
(C) Cyber Safety
(D) None of these
Answer:
(C) Cyber Safety
Explanation:
Cyber safety is the safe and respon-sible use of information and communication tech-nology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful to other people on-line, and using good Internet etiquette.
Question 7.
Computer Worms have the ability to:
(A) Self-Replicate
(B) Non Self-Replicate
(C) Both a and b
(D) None of these
Answer:
(A) Self-Replicate
Explanation:
A computer worm is malware that is capable of spreading by itself with no human in-teraction. Wannacry is an example of a computer worm.
Question 8.
The Unsolicited E-mails are known as:
(A) Spam Mails
(B) Trash Mails
(C) Sent Mails
(D) None of these
Answer:
(A) Spam Mails
Explanation:
Email spam, aka junk mail, refers to unsolicited emails sent in bulk by a botnet with malicious intent.
Question 9.
Which one is an electronic spreadsheet application-
(A) MS Word
(B) MS Excel
(C) MS Power Point
(D) MS Access
Answer:
(B) MS Excel
Explanation:
Microsoft Excel is a popular spread-sheet software program for business. It’s used for data entry and management, charts and graphs, and project management.
Question 10.
The extension of MS-word file is:
(A) .xlsx
(B) .rndb
(C) .docx
(D) None of these
Answer:
(C) .docx
Explanation:
A file extension comes after the period in a filename and is typically made up of three or four alphanumeric characters that identify the file’s format..docx is the extension of latest MS-word Documents.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): RAM is a Volatile Memory. [1]
Reason (R): RAM Stores data Temporary.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true and Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is True and Reason (R) is False.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
Question 12.
Assertion (A): Page Number can be inserted in Header or Footer area. [1]
Reason (R): The text or object which is inserted at the top or bottom side of page, called Header or Footer.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true and Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is True and Reason (R) is False.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
Section-B (2 Marks each)
Question 13.
What is Computer Memory? Mention its type. [2]
Answer:
Computer Memory: Computer memory is a device that is used to store data or programs on a temporary or permanent basis for use in an electronic digital computer.
Types:
- Primary Memory
- Secondary Memory
Question 14.
What is multimedia?
Answer:
Multimedia is the combination of several media and contents such as audio, video, text, etc. Mul-timedia finds its application in various areas such as: industry, commercial, entertainment and fine arts, education, engineering industry, mathematical and scientific research, medicine.
OR
Advantage of Network:
- File Sharing
- Resource Sharing
- Messaging
- Data Transfer
- Hardware Sharing
Question 15.
What is the difference between Primary Memory and Secondary Memory? [2]
Answer:
Difference between Primary Memory and Sec-ondary Memory: Primary memory is the main memory of the computer where the currently pro-cessing data resides. The secondary memory of the computer is auxiliary memory where the data that has to be stored for a long time or permanently, is kept.
Question 16.
Describe Malware.
OR
Briefly discuss the role of Antivirus. [2]
Answer:
Malware: Malware is a Malicious software pro-gram designed to harm computer systems or their user.
Examples:
Ransomware, Trojan horses, and spyware.
OR
Role of Antivirus:
- Detecting, blocking, and removing viruses, malware, and ransom ware.
- Preventing identity theft and block phishing and fraud.
- Warning about dangerous websites and links before you click.
- Scanning the email.
Question 17.
What are consequences of cyberstalking? [2]
Answer:
The consequences of cyberstalking also impact a person’s mental health and overall well being. Frequently, people who have been a target of cyber-stalking experience distress, anxiety, and depression.
Question 18.
Match the Shortcut With correct Option. [2]
a. CTRL + G | i. Underline |
b. CTRL + Z | ii. Cut |
c. CTRL + X | iii. Go To |
d. CTRL + U | iv. Undo |
Describe about the use of Auto Format.
Answer:
CTRL+G = Go To
CTRL+Z = Undo
CTRL+X = Cut
CTRL+U = Underline
OR
Auto Format: A software feature commonly found in word processor programs such as Microsoft Word that automatically changes the formatting or appearance of text.
For example, if a user types “1st,” AutoFormat would change it to “1st.”
Question 19.
Define any two types of viruses.
Answer:
Two Types of Viruses are:
Resident Virus: A Resident virus which saves itself in the Computer memory and then infects other files and programs/applications when its originating program is no longer working.
Boot Sector Virus: Boot Virus is a type of virus that infects the boot sector processing of floppy disks or the Master Boot Record (MBR) of hard disks.
Section-C (3 Marks each)
Question 20.
LAN is a small network, which covers a small geographical area, such as school, office, campus, building etc. Its coverage area is up to 1 Kilometer. A LAN is divided into two categories on the basis of their connectivity, Wired LAN and Wireless LAN. Some other types of Local Area Network are PAN, SAN and CAN. [3]
i. Give an example of wireless LAN.
ii. What is the full name of CAN?
iii. What is the coverage area of Local Area Network?
Answer:
i. Wi-Fi, Bluetooth are the example of Wireless LAN.
ii. CAN Stands for Campus Area Network.
iii. The coverage area of LAN is up to 1 Kilometers.
Question 21.
Rohit, an Office Assistant in an IT company, wants to create an official letter in a MS-Word. Additionally,
he wants to insert table in his document. [3]
i. Rohit is confused about how to insert table? Suggest Rohit to use appropriate option.
ii. Which tab is used to insert Header and Footer?
iii. Which option is used to combine two or more cells of table in a single cell?
Answer:
i. Steps to insert table: InsertTab>Table>Insert Table > Select no of rows and columns > click OK.
ii. Insert Tab is used for Insert Header and Footer.
iii. Merge Cells Option is used to combine two or more cells into a single cell.
Question 22.
What is Language Translator? Define with their types. [3]
OR
Define Hardware and Software with suitable example.
Answer:
Language Translator: Language Translator is system software, which is used to translate user language (High Level Language) into Machine Language (Binary Language).
Types:
- Assembler
- Interpreter
- Compiler
OR
Hardware: The Electric, Electronic and physical components is called Computer Hardware. Ex-Monitor, Motherboard, Ram etc.
Software: A set of programs that are aimed to perform a group task, is called Software. Ex- OS, MS- office, Coral draw etc.
Question 23.
Word processor is application software, used for creating, editing and formatting text documents. It provides much greater features than other text editors. Word processors are generally used to create letters, books, report, memo and other documents. Word processors are used to convert/export document into PDF format. [3]
With the help of Mail Merge, you can easily create and merge documents, use to convert single mail into multiple.
1. What is Word processor?
2. What is the full form of PDF?
3. Can be convert Word document into PDF format?
Answer:
1. Word Processor: Word processor is application software, used for creating, editing and formatting text documents. It provides much greater features than other text editors.
2. Full form of PDF is Portable Document Format.
3. Yes, Word processors are used to convert/export document into PDF format.
Section-D (4 Marks each)
Question 24.
Write some best practices to protect your confidential information. [4]
Answer:
Cookies: A cookie is small, message/file that a website stores on user’s computer. Cookies store limited information, habits from a web browser session on a given website that can then be retrieved in the future.
Types of Cookies:
First-party cookies: Also known as Same Site cookies, the cookie and information it contains are restricted to the same site on which it was set.
Third-party cookies: These cookies are not restricted to the initial site where the cookie was created. Third-party cookies enable entities other than the original site to access them for user tracking and personalization purposes.
OR
The best practices used to protect the confidential information:
- Protect your mobile device
- Use Firewall
- Create Strong Password
- Use multifactor authentication
- Avoid using public computers.
Section-E (4 Marks each)
Question 25.
Case Study-1 [4]
Nowadays Cybercrime is a biggest problem faced by many Internet users day to day. To encounter these problems government has created some laws and amendments known as Cyber laws. But only the creation of law is not sufficient. A proper education and awareness is needed to safe from online criminal activities. Cyber Crime covers all those type of crimes performed on Internet using electronic gadgets/devices.
There are a variety of crime comes under cyber-crime, such as Cyber fraud, Credit card fraud, Identity theft etc. To protect against Cyber-crime use Strong passwords of Online Accounts, Keep software update, Manage Social Media Setting, Antivirus, and don’t share personal and financial information to unsecure sites. Ensure safe sites before sharing info such web address start with https://and website have a padlock sign.
(a) What is Cyber-crime?
(b) How to Prevent from Cyber-crime?
(c) What are the categories of Cyber Crime?
(d) How to make strong Passwords?
Answer:
a. Cyber Crime: Cybercrime is any criminal activity that involves a computer, networked device or a network.
b. Prevent from Cyber Crime:
- Ensure your system is up-to-date
- Use a secure internet connection
- Use strong password
- Be aware of pop-ups and fraudulent emails
- Protect yourself from identity threats
- Manage your social media settings
- Get right cyber insurance policy
c. Categories of Cyber Crime: Phishing, Cyber Stalking, Cyber bullying, Ransomware, Cyber Terrorism, Identity Theft, Security hacker etc.
d. Make Strong Passwords:
- Do not use nick names as password
- Use Alphabet, Number, Special Char-acters, Uppercase and combination of Lowercase Characters
- Password should not be too small
Question 26.
Case Study-2 [4]
An Operating System is system software, used to manage and control whole computer system. OS pro-vides an interface between user and hardware. The operating system is divided into many categories, such as GUI and CUI, single user and multiuser, single tasking and multi-tasking etc. A GUI operating system contains graphics, icons, desktop, wallpaper and is commonly navigated by a computer mouse. Example of GUI operating system is Windows 7, Windows 8, Windows XP, Windows CE etc.
Sample Question Papers
(a) What is Operating System?
(b) What are the types of Operating System?
(c) What is the full name of GUIOS?
(d) What are the key elements of Graphical User Interface Operating System?
Answer:
a. Operating System: An Operating System is system software, used to manage and control whole computer system. OS provides an interface between user and hardware.
b. Types of Operating System
- CUIOS
- GUIOS
Single user OS, Multi User OS
Single Tasking OS, Multi-Tasking OS etc.
c. GUIOS stands for Graphical User Interface Operating System.
d. Key Elements of GUIOS: Graphics, Icons, Mouse Cursor, Desktop, Wallpaper etc.