0% found this document useful (0 votes)
38 views5 pages

Class Ix

Uploaded by

mishraswati2706
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views5 pages

Class Ix

Uploaded by

mishraswati2706
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

ISHER ACADEMY SR. SEC.

SCHOOL
HALF YEARLY EXAMINATION
SESSION- 2023-24
CLASS –IX
COMPUTER APPLICATIONS
TIME: 02 HOURS MM: 50
NAME: _______________________ ROLL NO.: ____

GENERAL INSTRUCTIONS:
i. THE QUESTION PAPER CONTAINS THREE SECTIONS.
ii. ALL QUESTIONS ARE COMPULSORY.
iii. ATTEMPT QUESTIONS BASED ON SPECIFIC INSTRUCTIONS FOR EACH PART.
iv. MARKS ARE INDICATED AGAINST EACH QUESTION.
v. READ THE QUESTIONS CAREFULLY BEFORE ANSWERING.

SECTION-A
Questions 1 to 10 are multiple choice questions. Choose the most appropriate answer from the given
alternatives and write the correct option. [10x1=10]
1. Which of the following is/are function of application software?
(a) Booting a computer (b) Preparing presentation
(c) Crating text documents (d) All of the above
2. Which of the following is/are example of system software?
(a) MS Windows (b) OpenOffice.org impress
(c) GNU/Linux (d) All of the above
3. Which of the following networks is used to connect computers across multiple cities?
(a) LAN (b) MAN (c) WAN (d) None of the above
4. Cable TV network is an example of
(a) Wi-Fi network (b) Wired technology
(c) Wireless technology (d) None of the above
5. Ethernet cable is used to:
(a) Carry signal from antenna to TV sets
(b) Transmit data over long distances
(c) Connect computers
(d) All of the above
6. __________ contains readymade pictures for a word processor.
a. Peripheral b. Clip art c. Highlight d. Execute
7. What is file extension of OpenOffice text document file?
a. odt b. doc c. dom d. txt
8. What is the Thesaurus used for?
a. Spelling options b. Grammar options c. Synonyms d. Opposite words
9. In H2O the number 2 appears lowered. What effect has been applied?
a. Superscript b. Lowered c. Subscript d. Laid down
10. In a text document every command is available in
a. letter b. Icon c. printer d. Menu
Questions No-11 and 12 are Assertion and Reason types. Each question consist of two statements, namely,
Assertion (A) and Reason (R). Select the most suitable option considering the assertion & Reason.
[2x2=4]
11. Assertion: A keyboard is used to type data or instructions and for some other functions.
Reason: Keyboard is a popular input device.
(A). Both assertion (A) and reason (R) are true and reason (R) is the correct explanation of assertion
(A).
(B). Both assertion (A) and reason (R) are true but reason (R) is not the correct explanation of
assertion (A).
(C). Assertion (A) is true but reason (R) is false.
(D). Assertion (A) is false but reason (R) is true.
12. Assertion: You can use the taskbar and Smart button to easily navigate through Windows 7.
Reason: Both features are always available on your desktop.
(A). Both assertion (A) and reason (R) are true and reason (R) is the correct explanation of assertion
(A).
(B). Both assertion (A) and reason (R) are true but reason (R) is not the correct explanation of
assertion (A).
(C). Assertion (A) is true but reason (R) is false.
(D). Assertion (A) is false but reason (R) is true.
SECTION-B (2 Marks Each)
Questions 13 to 19 are very short questions. [7x2=14]
13. Name the program that you use to create and format text documents.
14. Where do you find the ruler option?
OR
Where do you find the option for inserting footnotes and endnotes?
15. What do we call the person who gains unauthorized access into a computer?
16. Give two examples of computer virus.
17. Name the network of which Internet is an example.
OR
Name the software that is used to control the internal functioning of a computer.
18. Name any two private cloud providers.
19. Name the utility software that you use to secure system.
SECTION-C (3 Marks Each)
Questions 20 to 23 are short Questions. [4x3=12]
20. Define System Software. Explain with example.
21. What is decryption?
22. What is Multimedia? Explain with example.
OR
What do you understand by DoS attack?
23. What is Malware? Write two examples of malware.
SECTION-D (5 Marks Each)
Question 24 to 25 is case study type questions.
24. Case Study 1:
Web server is a special computer system running on HTTP through web pages. The web page is a medium
to carry data from one computer system to another. The working of the web server starts from the client
or user. The client sends their request through the web browser to the web server. Web server takes this
request, processes it and then sends back processed data to the client. The server gathers all of our web
page information and sends it to the user, which we see on our computer system in the form of a web
page. When the client sends a request for processing to the web server, a domain name and IP address
are important to the web server. The domain name and IP address are used to identify the user on a large
network.

a. Web servers are:


i. IP addresses
ii. Computer systems
iii. WebPages of a site
iv. A medium to carry data from one computer to another
b. What does the web server need to send back information to the user?
i. Home address
ii. Domain name
iii. IP address
iv. Both b and c
c. What is the full form of HTTP?
i. Hypertext Transfer Protocol
ii. Hypertext Transfer Procedure
iii. Hyperlink Transfer Protocol
iv. Hyperlink Transfer Procedure
d. The _____ translates internet domain and host names to IP address
i. Domain name system
ii. Routing information protocol
iii. Google
iv. Network time protocol
e. Computer that requests the resources or data from other computer is called as ____ computer
i. Server
ii. Client
iii. None of the above
iv. a and b
f. DNS stands for:
i. Domain Name Security
ii. Domain Number System
iii. Document Name System
iv. Domain Name System
25. Case Study 2:
In mid 80’s another federal agency, the NSF created a new high capacity network called NSFnet, which
was more capable than ARPANET. The only drawback of NSFnet was that it allowed only academic
research on its network and not any kind of private business on it. Now, several private organizations and
people started working to build their own networks, named private networks, which were later (in
1990’s) connected with ARPANET and NSFnet to form the Internet. The Internet really became popular in
1990’s after the development of World Wide Web.
1) What does NSFnet stand for?
a) National Senior Foundation Network
b) National Science Framework Network
c) National Science Foundation Network
d) National Science Formation Network
2) What does ARPANET stand for?
a) Advanced Research Premium Agency Network
b) Advanced Research Projects Agency Network
c) Advanced Review Projects Agency Network
d) Advanced Research Protection Agency Network
3) What is internet?
a) A single network
b) A vast collection of different networks
c) Interconnection of local area networks
d) Interconnection of wide area networks
4) To join the internet, the computer has to be connected to a __________
a) Internet architecture board
b) Internet society
c) Internet service provider
d) Different computer
5) Internet access by transmitting digital data over the wires of a local telephone network is provided by:
a) Leased line
b) Digital subscriber line
c) Digital signal line
d) Digital leased line
6) A piece of icon or image on a web page associated with another webpage is called ______
a) URL
b) Hyperlink
c) Plug-in
d) Extension
OR
Case Study 3:
TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to
interconnect network devices on the internet. TCP/IP can also be used as a communications protocol in a private
computer network (an intranet or an extranet).
TCP defines how applications can create channels of communication across a network. It also manages how a
message is assembled into smaller packets before they are then transmitted over the internet and reassembled in
the right order at the destination address.
IP defines how to address and route each packet to make sure it reaches the right destination. Each gateway
computer on the network checks this IP address to determine where to forward the message. TCP/IP uses the client-
server model of communication in which a user or machine (a client) is provided a service (like sending a webpage)
by another computer (a server) in the network. Collectively, the TCP/IP suite of protocols is classified as stateless,
which means each client request is considered new because it is unrelated to previous requests. Being stateless
frees up network paths so they can be used continuously.
1) Which of the following protocols is used in the internet?
a) HTTP
b) DHCP
c) DNS
d) All of the above
2) Which one of the following is not an application layer protocol used in internet?
a) Remote procedure call
b) Internet relay chat
c) Resource reservation protocol
d) Local procedure call
3) Which protocol assigns IP address to the client connected to the internet?
a) DHCP
b) IP
c) RPC
d) RSVP
4) Several protocols for upper layers in Bluetooth use:
a) UDP
b) HSP
c) ITC
d) L2CAP
5) Internet protocols are a set of rules to govern:
a) communication between computers on a network
b) standard
c) metropolitan communication
d) bandwidth
6) Checksum is used on internet by several protocols although not at the _____
a) season layer
b) transport layer
c) network layer
d) data link layer

******************************

You might also like