Students must start practicing the questions from CBSE Sample Papers for Class 9 Computer Applications with Solutions Set 5 are designed as per the revised syllabus.
CBSE Sample Papers for Class 9 Computer Applications Set 5 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However; internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section – A (1 Mark each)
(All questions are compulsory)
Question 1.
The operating system of a computer serves as a software interface between the user and [1]
(A) Hardware
(B) Peripheral
(C) Software
(D) Screen
Answer:
(A) Hardware
Explanation:
An operating system is a software which performs all the basic tasks like file man-agement, memory management, process manage-ment, handling input and output, and controlling peripheral devices such as disk drives and printers.
Question 2.
Which of the following is an example of computer software? [1]
(A) Laser printer
(B) Library Management System
(C) OBCR
(D) console
Answer:
(B) Library Management System
Explanation:
Software is a set of instructions, data or programs used to operate computers and ex-ecute specific tasks.
Question 3.
Which one is a characteristic of computer? [1]
(A) Versatility
(B) Diligence
(C) High speed
(D) All of the above
Answer:
(D) All of the above
Explanation:
Characteristics of Computer System
- Speed
- Accuracy
- Diligence
- Versatility
- Reliability
- Memory.
Question 4.
The binary system uses the symbols ____ and ___.
(A) 1, 2
(B) 0, 1
(C) 1, 1
(D) 1, 10
Answer:
(B) 0, 1
Explanation:
Binary number system uses two symbols 0 and 1 and its radix is 2. The symbols 0 and 1 are generally called bits.
Question 5.
What does a firewall do? [1]
(A) Prevents unauthorized access to your computer via the internet
(B) Stops you installing software that may harm your computer
(C) Records everything you do on computer
(D) Runs checks every time to prevent virus attack
Answer:
(A) Prevents unauthorized access to your computer via the internet
Explanation:
A firewall is a network security sys-tem that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a bar-rier between a trusted network and an untrusted network, such as the Internet.
Question 6.
Software that track your activity without your knowledge. [1]
(A) Ransomware
(B) Freeware
(C) Shareware
(D) Spyware
Answer:
(D) Spyware
Explanation:
Spyware is malicious software that enters a user’s computer, gathers data from the de-vice and user, and sends it to third parties without their consent.
Question 7.
A program that encrypts your system data and personal documents. And demand a ransom for their
release. [1]
(A) Adware
(B) Spyware
(C) Ransomware
(D) Shareware
Answer:
(C) Ransomware
Explanation:
Ransomware is a type of malware from cryptovirology that threatens to publish the victim’s personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damag-ing any files, more advanced malware uses a tech-nique called cryptoviral extortion.
Question 8.
Which of the following is not an example of a package? [1]
(A) Inventory Control System
(B) Payroll Management System
(C) Library management System
(D) None of these
Answer:
(D) None of these
Explanation:
The word package is a commonly used term for a computer program (or group of programs) that has been developed by a vendor and is available for purchase in a pre-packaged form. Inventory control system, payroll manage-ment system and Library management system are all examples of packages.
Question 9.
Which software takes control of computer system on startup?
(A) Compiler
(B) Operating System
(C) Application Software
(D) All of these
Answer:
(B) Operating System
Explanation:
The operating system supervises the overall operation of the computer, including monitoring the computer’s status and scheduling operations, which include the input and output processes.
In addition, the operating system allocates CPU time and main memory to programs running on the computer, and it also provides an interface between the user and the hardware. Specifically, the operating system provides services that include process management, virtual memory, file management, security, fault tolerance, and the user interface.
Question 10.
What do you understand by formatting? [1]
(A) Working in empty worksheet
(B) Emptying a worksheet
(C) Generally arranging data in worksheet
(D) Deleting selected data from worksheet
Answer:
(C) Generally arranging data in worksheet
Explanation:
A good formatting method helps you to find meaning in the spreadsheet without the trouble of going through each and every individual cell.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, As sertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): An Operating System is a program that manages the computer hardware. [1]
Reason (R): Operating System also provides a basis for application programs and acts as an interface between the computer user and computer hardware.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true and Reason (R) is not a correct explanation of Assertion (A)
(C) Assertion (A) is True and Reason (R) is False.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
Question 12.
Assertion (A): A general arrangement of data is known as formatting. [1]
Reason (R): Formatting does not affect the actual cell value, only appearance changes.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true and Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is True and Reason (R) is False.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(B) Both Assertion (A) and Reason (R) are true and Reason (R) is not a correct explanation of Assertion (A).
Section-B (2 Marks each)
Question 13.
What is Presentation Graphic Software? [2]
Answer:
Presentation Graphic Software: The software that can create professional looking visual aids is called Presentation Graphic Software.
Example: Microsoft Power Point, Canva, Google Slides etc.
Question 14.
Write names of popular DBMS packages. [2]
OR
List the basic functions of Operating System.
Answer:
DBMS Packages:
- MS Access
- Oracle
- My SQL
- Open Office.org Base
OR
Functions of Operating System:
- Processor Management
- Memory Management
- File Management
- Device Management
- User Interface
Question 15.
What do you mean by memory stick? [2]
Answer:
The Memory Stick is a removable flash memory card format, originally launched by Sony in late 1998. A Memory Stick is a type of portable flash memory storage card that’s typically used with handheld devices.
Question 16.
What is confidentiality of information? [2]
OR
What are the safety measures to prevent from malware?
Answer:
Confidentiality of Information: Confidentiality of information ensures that only authorized users get access to sensitive and protected data.
OR
Safety measures to prevent from malware:
- Use Anti-Virus and Anti-Spyware software
- Download updates regularly
- Run frequent full-system scan
- Keep your system up-to-date
- Disable cookies, if possible
Question 17.
What is Embedded Chart? [2]
Answer:
Embedded Chart: Embedded Chart is a chart ob-ject that is placed on a worksheet and saved with that work sheet when the workbook is saved. Embedded charts are beneficial when you want to view or print a chart with its source data or with other information in a worksheet.
Question 18.
Differentiate between worksheet and workbook. [2]
OR
Differentiate between cell and cell pointer.
Answer:
Workbook: A workbook is a collection of many worksheets under a common file name.
A workbook contains three worksheets by default. It can be increased.
Worksheet: A worksheet is a single sheet/page of workbook. A worksheet is made up of rows and columns (Grids). Worksheet contains actual data, formulas in cells.
OR
- Cell: Cell is a unit of worksheet, formed by intersection of row and a column.
- Cell Pointer: It is a cell-boundary that speci-fies which cell is active at that moment.
Question 19.
Define Handouts and Outlines? [2]
Answer:
Handouts: Handouts are basically thumbnails of slides printed together on a sheet of paper. Such layouts can be customized to suit specific require-ments.
Outlines: Outline View shows your presentation arranged as an outline and is ideal for quickly adding text to a slide or previewing the structure of a presentation.
Section-C (3 Marks each)
Question 20.
What features of word processors make them very useful? [3]
Answer:
Features of Word Processor: Word processor pro-cessors provide following features that enhance their usefulness:
- Spelling and grammar check
- Dictionary and thesaurus
- Mail merge facility
- Provide variety of fonts and printing styles
- Various formatting styles
- Inserting images and objects
- Creating links of other documents etc.
Question 21.
What is a Multitasking? [3]
Answer:
Multitasking: Multitasking refers to the ability of a computer, OS or application to perform more than one task or operation at the same time. Multitasking allow processes to be done simultaneously, meaning the computer runs faster.
The Operating system manages the Multitasking to ensure that problems of this nature do not occur.
Question 22.
Describe about various types of views in presentation. [3]
OR
Describe about the different types of Slide Layouts.
Answer:
Types of Views of a slide: There are six different ways to view your presentation.
Normal view: The normal view is the standard view used for creating and viewing presentation slides.
Outline view: The outline view in PowerPoint shows a list with the whole text of all slides on the left of the screen. There are no images and graph-ics displayed in this view. It’s useful for editing the presentation and can also be saved as a Word document.
Slide view: Slide view shows you just the slide and its contents. It is easiest to use when you are designing your presentation slide by slide.
Slide Sorter view: Slide Sorter view gives you a view of your slides in thumbnail form. This view makes it easy for you to sort and organize the se-quence of your slides as you create your presenta-tion, and then also as you prepare your presenta-tion for printing.
Slide show view: Use Slide Show view to deliver your presentation to your audience. Slide Show view occupies the full computer screen, exactly the way your presentation looks on a big screen when your audience sees it.
Notes view: Notes Page view in PowerPoint shows a smaller version of the slide with a small area for notes underneath.
OR
Slide Layout: Slide layouts contain formatting, positioning, and placeholder boxes for all of the content that appears on a slide.
Here are some layouts to help you build your arsenal of reusable slides within your company:
- Title Slide layout.
- Table of content Slide Layout.
- Simple Text Content Slide layout.
- Two Text Content Slide layouts.
- Content Slide layout [Text + Picture]
- Content Slide layout [Texts + Pictures]
- Impact Message Slide Layout.
Question 23.
What is cell referencing? Define with their types.
Answer:
Cell referencing: A cell reference refers to the value of a different cell or cell range on the cur-rent worksheet or a different worksheet within the spreadsheet.
An Excel cell reference, also known as a cell ad-dress, is a mechanism that defines a cell on a worksheet by combining a column letter and a row number.
Types of cell referencing: Excel has three types of cell references: relative, absolute, and mixed.
Knowing how to use each type of reference is im-portant for proper formatting and calculating data.
Relative cell referencing: By default, a cell refer-ence is a relative reference, which means that the reference is relative to the location of the cell.
Absolute cell referencing: Absolute reference is a cell reference in which the column and row coordi-nates stay constant while copying a formula from one cell to the other. A dollar symbol ($) is used before the coordinates to correct them.
Mixed cell referencing: Mixed Reference is a type of Absolute reference in which either the column is made constant or the row is made constant.
Section-D (4 Marks each)
Question 24.
How are computer categorized? [4]
OR
Describe any four input devices.
Answer:
Category of Computer: The computers are divided into three categories, based on their working.
- Analog Computer
- Digital Computer
- Hybrid Computer
Analog Computer: An analog computer is a type of computer that uses physical rather than digital variables to solve problems.
Ex- Analog watch, Analog weight machine etc.
Digital Computer: A digital computer is machine that stores data in a numerical format and per-forms operations on that data using mathematical manipulation.
Ex- Digital Calculator, Digital watch etc.
Hybrid Computer: Hybrid computer is a special computer that has both features of analog and digital computer systems.
Ex- Smart phone, laptop etc.
OR
Input device: An input device is any hardware de-vice that sends data to your computer and allows you to interact with and control it. Keyboard and mouse are two primary input devices. Some of the input devices are described below
Keyboard: A computer keyboard is an input device that allows a person to enter letters, numbers, and other symbols (together, these are called characters) into a computer. It is one of the most used input devices for computers.
Mouse: A mouse is a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position.
Scanner: A scanner is a device that captures im-ages from photographic prints, posters, magazine pages and similar sources for computer editing and display.
Microphone: A microphone is an input device that was developed by Emile Berliner in 1877. It is used to convert sound waves into electric waves or input the audio into computers. It captures audio by converting sound waves into an electrical signal, which may be a digital or analog signal.
Section-E (4 Marks each)
Question 25.
Case Study-1 [4]
Computer Virus: A computer virus is a type of malicious software, or malware that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage.
A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system.
Computer viruses can easily spread through the Internet and email, causing potential harm to a computer’s data, files and hard drive. Viruses are commonly disguised as hyperlinks, pop-ups or email attachments of images, greeting cards or audio or video files. Use the following tips to help keep your computer safe from viruses, hackers and other malicious attacks. Don’t open email attachments or click on hyperlinks from unknown senders. Use your spam blocking or filtering tools to block unsolicited emails, instant messages and pop-ups.
Use passwords that are hard to guess and change them regularly. Do not store user names and passwords on websites.
(a) What are the abilities of computer virus?
(b) What is the full form of computer VIRUS?
(c) What is the ability of computer worm?
(d) What are the methods to prevent from viruses?
Answer:
a. Abilities of Computer Virus:
- Corrupt a file
- Damage text inside a file
- Damage to data and software
- Data loss and leakage
b. VIRUS stands for Vital Information Re-source Under Seize.
c. Abilities of Computer Worm:
- Self-replicate
- Consume memory bandwidth
- Slow down computer
d. Methods to prevent from viruses:
- Use Antivirus
- Scan Regularly
- Update software time to time
- Update Antivirus
- Run full system scan
Question 26.
Case Study-2 [4]
Word Processor: A word processor is a software program capable of creating, storing, and printing text documents. It allows users to write and modify text, display it on a screen, save it electronically, and print it out. The general features of Word Processor are large blocks of text, page breaks, page numbering, and hidden text. A text editor refers to any form of computer program that enables users to create, change, edit, open and view plain text files. SimpleText allows text editing and text formatting (underline, italic, bold, etc), fonts, and sizes. Formatted text can draw the reader’s attention to specific parts of a document and emphasize important information.
(a) Write names of any two simple text editors?
(b) What is the shortcut key to open a saved file?
(c) Arranging and enhancing the data in a word processor is called-
(d) State the formatting features which are applied in a word processor.
Answer:
a. Notepad, Notepad+ + and word pad are the simple text editors.
b. CTRL+O is use to open a saved file.
c. Formatting is the process of arranging and enhancing the data in word processor.
d. Bold, Italic, Underline, Font color, Size, Style and other effects. These are some of the formatting features of word processor.