Students must start practicing the questions from CBSE Sample Papers for Class 9 Computer Applications with Solutions Set 4 are designed as per the revised syllabus.
CBSE Sample Papers for Class 9 Computer Applications Set 4 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However; internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section – A (1 Mark each)
(All questions are compulsory)
Question 1.
_____ is a type of software designed to help the user’s computer to detect viruses. [1]
(A) Malware
(B) Adware
(C) Antivirus
(D) None of these
Answer:
(C) Antivirus
Explanation:
Antivirus software (antivirus pro-gram) is a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices.
Question 2.
The Executable file has extension: [1]
(A) .exe
(B) .exc
(C) .ex
(D) .dat
Answer:
(A) .exe
Explanation:
A file with the EXE file extension is an executable file used in operating systems like Windows, MS-DOS, etc.It is a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.
Question 3.
Which one of the following is not application software? [1]
(A) MS-Office
(B) Windows 7
(C) Google Chrome
(D) Adobe Reader
Answer:
(B) Windows 7
Explanation:
Windows 7 is the Microsoft Windows operating system (OS).
Question 4.
Open Office is an example of ____ application software. [1]
(A) Enterprise
(B) Pre-packed
(C) Open source
(D) None of these
Answer:
(C) Open source
Explanation:
Open source software (OSS) is software that is distributed with its source code, making it available for use, modification, and distribution with its original rights.
Question 5.
Which of these is classed as personal information? [1]
(A) Date of birth
(B) Online nickname
(C) Gender
(D) Largest peak in your continent
Answer:
(A) Date of birth
Explanation:
Personal information, or personal data, is any information that can identify a person. For example, personal information may include: an individual’s name, signature, address, phone number or date of birth, sensitive information, and credit information.
Question 6.
What name is given to a malicious program that looks like a useful program? [1]
(A) Trojan Horse
(B) Invisible Man
(C) Worm
(D) Uninvited Guest
Answer:
(A) Trojan Horse
Explanation:
A Trojan, or Trojan Horse, is a type of malware that conceals its true content to fool a user into thinking it’s a harmless file.
Question 7.
Which cookie is known as persistent cookies? [1]
(A) First Party Cookie
(B) Third Party Cookie
(C) Super Cookie
(D) All of these
Answer:
(C) Super Cookie
Explanation:
A super cookie is a type of browser cookie that is designed to be permanently stored on a user’s computer.
Question 8.
IP refers to- [1]
(A) Internet Provider
(B) Internet Protocol
(C) Internal Protocol
(D) Internal Provider
Answer:
(B) Internet Protocol
Explanation:
The Internet Protocol (IP) is a set of standards for addressing and routing data on the Internet.
Question 9.
The shortcut key used to check Grammar and Spelling in word document is- [1]
(A) CTRL+F7
(B) Shift+F7
(C) F7
(D) Alt+F7
Answer:
(C) F7
Explanation:
Function key F7 is used to check grammar and spelling in word document.
Question 10.
The Table in document is – [1]
(A) Collection of rows and columns
(B) Combination of rows and columns
(C) Collection of slides
(D) Group of sheets
Answer:
(B) Combination of rows and columns
Explanation:
A table is a grid of cells arranged in rows and columns. Tables can be used to organize any type of content, whether you’re working with text or numerical data.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): Projector is an output device that shows result on screen. [1]
Reason (R): All output devices are used to produce result from computer’s processed dat(A).
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true and Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is True and Reason (R) is False.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
Question 12.
Assertion (A): Slide Transition is the visual movement as one slide changes to another. [1]
Reason (R): The Slides are created in presentation.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true and Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is True and Reason (R) is False.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(B) Both Assertion (A) and Reason (R) are true and Reason (R) is not a correct explanation of Assertion (A).
Section-B (2 Marks each)
Question 13.
Differentiate between System Software and Application Software. [2]
Answer:
System Software | Application Software |
System software are mainly designed for managing system resources. | Application software are designed to accomplish tasks for specific purposes. |
Programming of system software is complex. | Programming of application software is comparatively easy. |
A computer cannot run without system software. | A computer can easily run without application software. |
System software do not depend on application software. | Application software depend on system software and cannot run without system software. |
Question 14.
What is Encryption and Decryption? [2]
OR
Define System Software with suitable example
Answer:
Encryption: Encryption is the process of encoding information. This process converts the original representation of the information, known as plain-text into cipher text.
Decryption: The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption.
OR
System Software: System software is a type of computer program that is designed to run a com-puter’s hardware and application programs. Example: Operating System, Device Driver
Question 15.
How operating systems can be classified? [2]
Answer:
Operating systems can be classified as follows:
- Multiuser: Allows two or more users to run programs at the same time.
- Multiprocessing: Supports running a pro-gram on more than one CPU.
- Multitasking: Allows more than one pro-gram to run concurrently.
- Multithreading: Allows different parts of a single program to run concurrently.
Question 16.
What do you mean by malicious software? [2]
OR
What is the purpose of a firewall?
Answer:
Malicious Software: Malicious software, commonly known as malware, is any software that brings harm to a computer system. Malware can be in the form of worms, virus, Trojans etc.
Examples:
Virus, Worm, Trojan, Spyware etc.
OR
Purpose of Firewall: The primary use of a firewall in networking is to secure the network from cyberattacks. A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.
Question 17.
What is text alignment? How many types of text alignment? [2]
Answer:
Text Alignment: Text Alignment refers to the posi-tion of the text in a document.
Types of Text Alignment:
- Left Alignment
- Right Alignment
- Center Alignment
- Justify Alignment
Question 18.
Write any two prevent measures against Malware. [2]
OR
What do you understand by Session cookies?
Answer:
Prevent measures against Malware:
- Install an antivirus program and make sure it is regularly updated.
- Think twice before clicking links or down-loading anything.
OR
The session cookie allows the browser to re-identify itself to the single or unique server to which the client had previously authenticated.
Question 19.
What is privacy? [2]
Answer:
Privacy is the protection of personal information given online. In cyber security, it is related to a company’s policies on the use of user data.
Section-C (3 Marks each)
Question 20.
What is utility software? Define with example. [3]
Answer:
Utility Software: The Utility Software is system software that helps to maintain the proper and smooth functioning of a Computer System. Example: Compression Tool, Antivirus etc.
Question 21.
What is a customized software? [3]
Answer:
Customized Software: Customized software (also known as bespoke software or tailor-made soft-ware) is software that is specially developed for some specific organization or other user.
Custom software development is perfect for enterprise and web apps.
Question 22.
Define slide layout in presentation? [3]
OR
What is design template of Power Point Presentation?
Answer:
Slide Layout: A slide layout is an organized set of elements, using which a new slide can be created. Slide layouts contain formatting, positioning, and placeholder boxes for all of the content that ap-pears on a slide.
OR
Design Template: A design template is actually a predefined file that contains pre-defined element- styles for a presentation e.g. Font and bullet size, placeholders etc.
Question 23.
What do you understand by Electronic Spreadsheet? [3]
Answer:
Electronic Spreadsheet: An electronic spreadsheet, is application software used to calculate organized and analyze numerical data. It consists of rows and column similar to ones of the manual spreadsheet. Examples of electronic spread sheet are Microsoft Excel, Open Office Calc, Lotus 1-2-3 etc.
Section-D (4 Marks each)
Question 24.
State the basic units of the computer. Name the subunits that make up the CPU, and give the function of each of the units. [4]
OR
What is Binary Language? Why it is called Machine Language?
Answer:
Units of Computer: The basic units of a computer are:
- Input Unit
- Central Processing Unit
- Output Unit
- Memory
The CPU has two subunits: The Control Unit (CU) and the Arithmetic Logic Unit (ALU).
The Control Unit controls the entire operation being carried out.
The ALU performs the arithmetic and logical op-erations.
OR
Binary Language: Binary code is a language that uses only two symbols, 0 and 1, to represent different characters and instructions. Each 0 or 1 in binary code is referred to as a bit, and a group of eight bits is called a byte.
Binary information is sometimes also referred to as machine language since it represents the most fundamental level of information stored in a computer system.
Section-E (4 Marks each)
Question 25.
Case Study-1 [4]
Amrita has recently shifted to new city and new school. She does not know many people in her new city and school. But all of a sudden, someone is posting negative, demeaning comments on her social networking profile, school site’s forum etc.
She is also getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.
(a) What is this happening to Amrita?
(b) What action should she taken to stop them?
(c) What are the preventive action should Amrita take?
(d) How to stop unwanted mails?
Answer:
a. Amrita has become a victim of cyber bullying and cyber stalking.
b. She must immediately bring it into the notice of her parents and school authorities. And she must report this cybercrime to local po-lice with the help of her parents.
c. Don’t reply to unknown email addresses. Use greater level of privacy and security.
d. Block/Unsubscribe suspected e-mail accounts.
Question 26.
Case Study-2 [4]
Vaibhav wants to give identical design to all the slides and handouts she is going to print from her presentation. He wants to add effects in between changing slides, and content inside a slide.
(a) Which two methods can she use to accomplish her work?
(b) Compare the two methods and enlist their differences.
(c) Which type of effect applied in between changing slides?
(d) State the effect which is applied in a slide on various contents?
Answer:
(a) Vaibhav can do this in following two ways:
-
- Creating same design on each slide and handout manually.
- Using Slide master and handout master.
(b) In the first method, the efforts are increased many errors in designs may creep in.
The second method ensures reduced efforts and identical design on each slide and hand-out.
(c) Transition Effect
(d) Animation Effect