0% found this document useful (0 votes)
8 views

Computer Applications_Sample Paper(Class-9) (1)

This document is a sample question paper for Class IX Computer Applications for the academic year 2024-25, consisting of five sections (A-E) with a total of 50 marks. It includes a variety of question types such as multiple choice, short answer, long answer, and case-based questions. The paper covers topics related to computer systems, software, internet safety, and application functionalities.

Uploaded by

listenofficial16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Computer Applications_Sample Paper(Class-9) (1)

This document is a sample question paper for Class IX Computer Applications for the academic year 2024-25, consisting of five sections (A-E) with a total of 50 marks. It includes a variety of question types such as multiple choice, short answer, long answer, and case-based questions. The paper covers topics related to computer systems, software, internet safety, and application functionalities.

Uploaded by

listenofficial16
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

SAMPLE QUESTION PAPER - 2

Computer Applications (165)


Class IX (2024-25)

Time Allowed: 2 hours Maximum Marks: 50


General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, internal choices have been provided in
some of the questions.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04
marks each.
Section A
1. What are RAM and ROM collectively known as? [1]

a) Secondary memory b) Tertiary memory

c) External memory d) Primary memory

2. Editor is used to: [1]

a) Write a program in interactive b) Manipulate the text


mode

c) Manipulate the graphics d) All of these

3. Who is the most common victim of online predators? [1]

a) Adults b) Infants

c) Teenagers d) 5-9 year olds

4. Which of the following viruses resides in the RAM of a computer system? [1]

a) Boot sector virus b) Non-resident virus


c) Creeper virus d) Resident virus

5. Which of the following viruses infects the boot records on the hard disk? [1]

a) Malware b) Boot virus

c) Macro d) Worm

6. By default, on which page the header or the footer is printed? [1]

a) On last page b) On alternate page

c) On first page d) On every page

7. If someone says they are 16 you should: [1]


a. believe them, they have no reason to lie
b. not trust anyone you don’t personally know
c. give them your age
d. meet up with them because they may be someone cool to hang out with

a) Option (d) b) Option (b)

c) Option (a) d) Option (c)

8. Which of the following features enables you to insert decorative text in a [1]
document?

a) WordArt b) Shape Style

c) Text Style d) Shapes

9. An operating system manages [1]

a) All of these b) memory

c) disk and I/O devices d) processor

10. Which of the following uses cables to connect two or more computers? [1]

a) Guided b) Transmission

c) Unguided d) Radiowaves
11. Assertion (A): Solaris is one implementation of the UNIX operating system. [1]
Reason (R): Solaris 10 is the latest in a long line of operating environment releases
based around the SunOS operating system.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

12. Assertion (A): A header and footer is the text that is added to the top and bottom of [1]
every page. It may include information such as title or page number, etc., related to
a document.
Reason (R): Mail merge is the process of automatic combining of a letter with a
mailing list to generate multiple copies of the letter with the different addresses and
other variable information, filled in.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

Section B
13. Discuss any two limitations of a computer system. [2]

14. Mohit has clicked on the cell residing at the intersection of first row and ninth [2]
column. What will be the address of the selected cell?

OR
What is the use of bullet styles in our document?

15. Internet can affect the privacy rights of a person. Comment. [2]

16. What do you mean by the term microphone? [2]

OR
How is SRAM different form DRAM?

17. What do you mean by Inter-Process Communication? [2]

18. Who is Identity Theft? [2]


OR
How does a virus affect your computer?

19. Differentiate between System and Application softwares. [2]

Section C
20. Write some features of application software. [3]

21. How to change the colour of the WordArt? [3]

OR
How do you start a slide show?

22. Write command for the operations (i) to (iii) based on the spreadsheet below: [3]

i. To calculate the Amount as Unit Price*Qty for each item in Column F.


ii. To calculate the Rebate as 7% of Amount if Type is consumable, else calculate
Rebate as 11% of Amount in Column G.
iii. To calculate total Rebate across all items in cell G6.

23. Name the three type of information collected by a social networking site. [3]

Section D
24. What are the common symptoms of a virus attack? [4]

OR
Mr. Sonu wants to secure his profile in a Social Networking site. To do this, he needs to
change some privacy settings of his profile in the social networking site. Suggest some
privacy settings that will safeguard his identity.

Section E
25. Read the text carefully and answer the questions: [4]
Business graphics, charts and diagrams used in a presentation. Presentation
graphics software provides predefined backgrounds and sample page layouts to
assist in the creation of computer-driven slide shows, which, in combination with a
data projector, made the 35 mm slide presentation obsolete. Navigation from page
to page (slide to slide) can be done manually or automatically every so many
seconds. The most popular presentation software is Microsoft PowerPoint.
Presentation graphics programs typically include a small library of lightweight
images and icons so that a creator can add a dash of colour to charts and graphs by
adding a picture related to the subject matter for example, an airplane for a chart of
earnings in the aerospace industry. Users can print output or display output
onscreen as a computer slide show. Microsoft PowerPoint is easily the market
leader in this niche, despite the fact that people use the software for presentations
that have nothing to do with charts or statistics all the time.

(i) In your own words explain the importance of Rehearse Timing.

(ii) Kavita wants to see all the slides in her presentation simultaneously. Suggest which
view she should use to see all the slides simultaneously.

(iii) Define the term Strikethrough.

(iv) What is mean by the term Toggle Case?

26. Read the text carefully and answer the questions: [4]
An Operating System (OS) is a collection of programs that manages and controls
the two major components of a computer system, i.e., hardware and software.
Computer hardware is of no use if we do not install the essential operating system
software in the computer.
An Operating System (OS) is the software component of a computer system that is
responsible for the management and coordination of all its activities. It shares the
resources of the computer. It acts as a host for the application programs that run on
the machine. As a host, one of the main purposes of an operating system is to
handle the details of the operations of the hardware.

(i) An ________ is a software that provides a platform for other applications to be


executed.

(ii) Define booting.

(iii) Define process scheduling.

(iv) The ________ system call is used to end, abort, create, terminate, and allocate free
memory.
Solution
SAMPLE QUESTION PAPER - 2
Computer Applications (165)
Class IX (2024-25)
Section A
1.
(d) Primary memory
Explanation:
Primary memory
2.
(d) All of these
Explanation:
Editor is a software used to draw and manipulate graphics, images, text and also used to
write the text in an interactive mode.
3.
(c) Teenagers
Explanation:
Teenagers
4.
(d) Resident virus
Explanation:
Resident virus
5.
(b) Boot virus
Explanation:
Boot virus
6.
(d) On every page
Explanation:
A header is the top margin of each page, and a footer is the bottom margin of each page.
Headers and footers are useful for including material that we want to appear on every page
of a document such as your name, the title of the document, or page numbers.
7.
(b) Option (b)
Explanation:
not trust anyone you don’t personally know
8. (a) WordArt
Explanation:
WordArt
9. (a) All of these
Explanation:
An operating system manages disk and I/O devices as it is responsible for input from
keyboard, mouse, etc. It also manages the computer memory, so that each process can run
most effectively.
10. (a) Guided
Explanation:
In guided media, signals are guided through cables.
11.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation:
Solaris is one implementation of the UNIX operating system that draws on both the
System V (AT & T) and Berkeley (BSD) traditions. It has risen from little more than a
research project to become the dominant UNIX operating system in the international
marketplace today. Solaris 10 is the latest in a long line of operating environment releases
based around the SunOS operating system, which is currently in version 5.10. Solaris is
commonly found in large corporations and educational institutions that require concurrent,
multi-user access on individual hosts and between hosts connected via the Internet.
However, it is also rapidly being adopted by small businesses and individual developers,
through Sun's promotion of the "Free Solaris" program.
12.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation:
Both A and R are true but R is not the correct explanation of A.
Section B
13. The two limitations of a computer system are as follows:
i. Inability to Take a Decision: Computers are incapable of decision-making as they do
not possess the essential skills necessary to take a decision, i.e., wisdom, intelligence
and the ability to judge.
ii. Inability to Express Ideas: Since it is a machine, it will only follow the instructions
and cannot give views or express ideas.
14. First row and ninth column address will be II.
OR
While working in a document, sometimes we need to highlight some areas of text in the
form of lists for summarising key points, so we use the option of creating bulleted and
numbered lists.
15. A person's Internet usage and transactions done by him/her online provides a large
amounts of information which provides insight into that person's interests and other vital
information about the person.
Hacking or tracking of activities of some person without his/her knowledge have become
prominent with the increase usage of Internet. Hence, a person with malicious intent can
easily invade in some other person's privacy online.
16. The microphone is an input device that is used to give the voice and sound input to the
computer. The sound input is stored in the digital form, in a computer.
OR
Static RAM (SRAM): Static RAM continues to hold the data and instructions
consistently till the power is supplied. There is no need to refresh this memory like
DRAM. SRAM consumes more power and is expensive too. But, it is also the fastest
memory and has a long life.
Dynamic RAM (DRAM): DRAM, unlike SRAM, needs to be refreshed continuously in
order to retain the data and instructions. DRAM is slower and smaller in size as compared
to SRAM and also has a short data life. It consumes less power and is less expensive as
compared to SRAM.
17. Kernel provides methods for synchronization and communication between processes
called Inter-Process Communication (IPC).
18. Identity theft or online identity theft is the act of a person obtaining information illegally
about someone else.
OR
Virus is a software used to infect a computer. After virus code is written, it is buried within
an essential programmed. Once the programmed is executed, the virus code is activated
and attack copies itself to other programs.
19. System software controls the whole computer system and ensures the smooth functioning
of it. It also provides an interface between the user and the hardware through which a user
can interact with the computer hardware.
An application software is used for solving a specific application/purposes. For example,
word processor is used for typing a letter and GIMP is used for editing or manipulating
pictures. Thus, an application software serves a specific application.
Section C
20. Features of application software are as follows:
i. An important feature of application software is it performs more specialised tasks like
word processing, spreadsheets, e-mail, etc.
ii. Mostly, the size of the software is big, so it requires more storage space.
iii. Application software is more interactive for the users, so it is easy to use and design.
iv. The application software is easy to design and understand.
v. Application software is written in a high-level language in general.
21. Perform the below mentioned steps to change the color of the WordArt.
Step 1: Select the WordArt text.
Step 2: Click on the Format tab.
Step 3: From the Text Fill drop-down list in the WordArt Styles group, choose a color
which you wish to add to the WordArt. If you do not wish to add any color to the WordArt,
then select the No Fill option.
OR
To start a slideshow immediately, click the Slide Show button located (along with the
other View buttons) in the lower-right corner of the screen . If you have set up a full-
screen slide show, PowerPoint fills the entire screen with the first slide of the slide show.
To advance to the next slide, click the mouse button or press Enter key, the Down Arrow,
Page Down, or the Spacebar. You can also start a slide show by opening the Slide Show
tab on the Ribbon and clicking either From Beginning or From Current Slide, depending
on how you want to start the show or F5 key.
22. i. At cell F2, type =D2*E2 and then copy this formula using mouse Fill handle onto range
F3 : F5.
ii. At cell G2, type =IF(C2=”Consumable", F2*0.07, F2*0.11) and then copy this formula
using mouse Fill handle onto range G3 : G5.
iii. At cell G6, type =SUM(G2 : G5).
23. The three types of information collected by a social networking site are as follows:
i. Required Information: Name, E-Mail, Date of Birth, Location. (Essential for the
account.)
ii. Secret Information: Alternate e-mail, mobile phone number, security question and
answer. (In case the account is compromised or you have lost your password.)
iii. Biographical Information: Information about yourself submitted voluntarily. (For
advertisement content offered to you and to aid in advertisement targeting).
Section D
24. The list of symptoms of computer viruses attack, which indicate that your system is
infected with a computer
viruses are as follows
i. Odd messages are displaying on the screen.
ii. Some files are missing.
iii. System runs slower.
iv. PC (Personal Computer) crash or restart again and again.
v. Drives are not accessible.
vi. Antivirus software will not run or installed.
vii. Unexpected sound or music plays.
viii. The mouse pointer changes its graphic.
ix. Receive strange e-mails containing odd attachments or viruses.
x. PC starts performing functions like opening or closing windows, running programs on
its own.
OR
Some of the common privacy settings associated with social networking sites are:
i. The default privacy settings is "Public", which may also be "Friends" or "Custom". The
first two options are good for someone who has a small group of friends they don’t
mind sharing everything with or who has no personal identifying information on their
profile and doesn’t mind it all being public. But for those of us who want a little more
control over exactly who sees what on our profiles, it’s time to familiarise yourself with
the "Custom" option.
ii. How You Connect: This section allows you to change how people find you, who can
post to your wall and who sees what information on your wall.
iii. How Tags Work: This option controls who can tag you in pictures, you can see the
pictures you’re tagged in and who can tag people in the pictures that you post. By
default, Facebook shows the pictures you are tagged in publicly, even if you do not
have a public wall.
iv. Apps and Websites: This section controls the third-party apps that are allowed to
access and interact with your profile without compromising it.
v. Privacy of Each Post: This option is for convenience where each time you make a
post, you can choose if that post is public, only to friends, only to you and more. You
can even set it to show only to certain lists that you have.
Section E
25. Read the text carefully and answer the questions:
Business graphics, charts and diagrams used in a presentation. Presentation graphics
software provides predefined backgrounds and sample page layouts to assist in the
creation of computer-driven slide shows, which, in combination with a data projector,
made the 35 mm slide presentation obsolete. Navigation from page to page (slide to slide)
can be done manually or automatically every so many seconds. The most popular
presentation software is Microsoft PowerPoint.
Presentation graphics programs typically include a small library of lightweight images and
icons so that a creator can add a dash of colour to charts and graphs by adding a picture
related to the subject matter for example, an airplane for a chart of earnings in the
aerospace industry. Users can print output or display output onscreen as a computer slide
show. Microsoft PowerPoint is easily the market leader in this niche, despite the fact that
people use the software for presentations that have nothing to do with charts or statistics
all the time.
(i) PowerPoint assists you in defining the right rehearse timings for automatic slide
changes. This is particularly important to know the display time for each slide,
particularly when you are talking to an audience along with the slide.
(ii) Slide Sorter View
(iii)Strikethrough crosses the text by drawing a line through it.
(iv)Toggle Case is used to capitalise every letter except the first letter.

26. Read the text carefully and answer the questions:


An Operating System (OS) is a collection of programs that manages and controls the two
major components of a computer system, i.e., hardware and software. Computer hardware
is of no use if we do not install the essential operating system software in the computer.
An Operating System (OS) is the software component of a computer system that is
responsible for the management and coordination of all its activities. It shares the
resources of the computer. It acts as a host for the application programs that run on the
machine. As a host, one of the main purposes of an operating system is to handle the
details of the operations of the hardware.
(i) operating system.
(ii) Booting is the process of loading the operating system into the memory during start up.
(iii)Process scheduling is the process through which the operating system decides which
process gets the processor when and for how much time.
(iv)process control.

You might also like