0% found this document useful (0 votes)
15 views9 pages

Computers Worksheet

The document is a revision worksheet for Class IX Computer Science, covering various topics such as the definition and characteristics of computers, networking advantages, keyboard types, and differences between compilers and interpreters. It also includes safety measures against malware, types of cookies, and functions of operating systems, along with short answer questions on network components and types of CD ROMs. Additionally, it addresses the uses of the Internet, cyber law, and multifactor authentication.

Uploaded by

saivarchasvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views9 pages

Computers Worksheet

The document is a revision worksheet for Class IX Computer Science, covering various topics such as the definition and characteristics of computers, networking advantages, keyboard types, and differences between compilers and interpreters. It also includes safety measures against malware, types of cookies, and functions of operating systems, along with short answer questions on network components and types of CD ROMs. Additionally, it addresses the uses of the Internet, cyber law, and multifactor authentication.

Uploaded by

saivarchasvi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

HALF YEARLY

Class IX / SA- 1 / Revision worksheet


SUBJECT : COMPUTER CLASS: IX

—------------------------------------------------------------
LONG ANSWER QUESTIONS
1.What is a computer?Explain any two limitations and characteristics of a
computer?
A. Computer is a programmable electronic device that accepts input, processes the data
according to a set of instructions and gives some meaningful output.
Characteristics:
1. Speed:
A computer works at an amazing speed. The work which is done by a normal person in 2-3
hours can be done by a computer in a fraction of seconds.
2. Accuracy:
A computer performs its task with great accuracy. It does not commit any mistakes. Errors occur
only when the input is incorrect.
Limitations:
1. Limited Intelligence: As compared to human beings computers have limited IQ.
2. Dependence on Power: A Computer is an electronic machine and thus its dependence on
power makes it costly.

2. What is Networking? Explain any five advantages of networking?


A. A network is a set of devices (often referred to as nodes) connected by communication links.
A node can be a computer, printer, or any other device capable of sending and/or receiving data
generated by other nodes on the network.
Advantages of Network:
Central Storage of Data: Files can be stored on a central node (the file server) that can be
shared and made available to every user in an organization.
Connectivity: There is a negligible range of abilities required to connect to a modern computer
network.
Faster Problem-solving: Since an extensive procedure is disintegrated into a few littler
procedures and each is taken care of by all the associated gadgets, an explicit issue can be
settled in lesser time.
Reliability: Reliability implies backing up information. Due to some reason equipment crashes,
and so on, the information gets undermined.
Flexible: This innovation is known to be truly adaptable, as it offers clients the chance to
investigate everything about fundamental things, for example, programming without influencing
their usefulness.
Security through Authorization: Security and protection of information are additionally settled
through the system.

3.Explain the various types of keys of a keyboard?


A.Keyboard: Keyboard is of different keys they are: 1)Typing keys
2)Control Keys
3)Navigation keys
4)Function Keys
5) Numeric Keys
TYPING KEYS: These keys include letters (ALPHABET KEYS), numbers(NUMBER KEYS),
Punctuation(“:;’) and special symbols(+--$ keys) etc…… These keys also include shift key caps
lock, space bar, Backspace, and the Tab keys.
CONTROL KEYS: These keys are either used alone or in combination with other keys to
perform an action.ctrl,Alt, Windows logo key, and the Esc key are the various examples of
control keys.
NAVIGATION KEYS: They are used to perform specific tasks. They are placed on the top row
of the keyboard and are labeled as F1…….F12. These keys have different functions.
FUNCTION KEYS: They are used for moving through documents or web pages and sometimes
for editing the text. These keys include the ARROW KEYS, HOME,END, Pgup,PgDn,DELETE,
and insert keys.
NUMERIC KEYS: The numeric keypad consists of number keys, from 0 to 9,the arithmetic
operators and decimal point. It is placed on the right side of the keyboard and is used for
entering numbers at a faster place.

4. Differentiate between compiler and Interpreter?


A. A computer does not understand any other language than the machine language(binary
language). The programmers use the High Level Language(HLL) to write the programs. These
codes need to be translated into binary code which the computer understands. This is done by
language processors.
The various language processors are given below:
● ASSEMBLER
● INTERPRETER
● COMPILER

Compiler Interpreter

1.A Compiler converts an entire program 1.An Interpreter converts a program written
written in a High Level an Language into in a High Level Language into Machine
Machine Language code language program line by line.

2.It converts the entire program at one go. 2.It converts the HLL program line by line
If an error is found, it will give the error list and simultaneously executes the converted
along with the line numbers. Once the line. If an error is found, it will display the
errors are removed, the compiler compiles error and will not proceed till the error is
the program. rectified.

3. A compiler is not required in the memory 3.An interpreter is required in the memory
after compilation. along with the program for its execution.

4. Execution with a compiler is faster. For 4. Execution with an interpreter is slower.


example C++, C language use compilers. For example, Basic language uses
interpreters.

5.Differentiate between LAN, MAN, WAN.


A.LAN stands for local area network. It is a group of network devices that allow communication
between various connected devices. Private ownership has control over the local area network
rather than the public. LAN has a shorter propagation delay than MAN as well as WAN. It
covers smaller areas such as colleges, schools, hospitals, and so on.

MAN stands for metropolitan area network. It covers a larger area than LAN such as small
towns, cities, etc. MAN connects two or more computers that reside within the same or
completely different cities. MAN is expensive and should or might not be owned by one
organization.
WAN stands for wide area network. It covers a larger area than LAN as well as a MAN such as
country/continent etc. WAN is expensive and should or might not be owned by one organization.
PSTN or satellite medium is used for wide area networks.

6. Write about various safety measures to protect your system from malware attack ?
A.Following methods can be used for protecting our system from Malware attack.
1. Security Programs: The anti-virus should be regularly updated. It should also be
programmed to regularly scan and quarantine the system.
2. Secure Internet access: Be vigilant when accessing or uploading information on the
Internet.Only secure sites should be used for financial transactions and no personal
information should be shared.
3. Regular security updates: Keep your applications and operating system updated at all
times. Special attention should be paid to security updates and security bulletins for
each software or application being used.
4. Avoid Spams: Mails from unwanted and unwanted sources should be deleted without
reading or downloading. Any attachments in such mails should never be downloaded or
installed onto the system.
5. Scanning all portable devices: Scan all portable storage devices before use as these
are the most common sources of infection in computers.
SHORT ANSWER QUESTIONS
7.What is the difference between EPROM and EEPROM?

EPROM EEPROM

1. The contents can be erased using 1. In this type of ROM the contents can be
ultraviolet rays and then reprogrammed by erased by using high voltage electricity.
an EPROM programmer.

2. While erasing contents by using 2. The entire contents may not be erased
ultraviolet rays, the entire content has to be as it has the option to delete selective
erased. portions of memory.

3. The chip needs to be physically removed 3. The chip does not need to be physically
from the system for erasing the bits. removed from the system for erasing the
bits.

8.Write the characteristics of Non-Impact printers.


A)i. Non-Impact printers do not make physical contact between the printer head and the paper.
ii. They are quieter than Impact printers.
iii. These printers have better print quality.
iv. Coloured graphics can also be printed with these printers.

9.What is an Operating system? Name the major functions of the operating system.
A.An Operating System is the interface between the computer hardware and the end-user.
Processing of data, running applications, file management and handling the memory is all
managed by the computer OS. An operating system is the most important software that runs on
a computer.
The main functions of operating system are:
1) Processor Management
2) Memory Management
3)Device Management
4) File Management.
10.What are icons? Describe any three categories of System icons?
A. IONS: Small graphic symbols that are displayed on the desktop are called icons
System Icons: System Icons are displayed along the left edge of the screen. These icons are
created automatically by windows during its installation. Some system icons are :

1. My Computer
2. Recycle Bin
3. My Documents
4. Internet Explorer etc.

Computer: The complete information regarding the system drives and other peripherals can be
viewed under the computer icon.
Recycle bin: works like a trash bin , in which you throw the waste papers. It is a folder that
holds the deleted objects. You can also retrieve the deleted files, until you have emptied the
recycle bin.
Document :is a folder which is used to keep the commonly used documents. You can access
them easily when required.

11.What are cookies and what are their types?


A.Cookies:Cookies are small data files, which are sent by the website a user visits and are
generated by your browser.cookies are used to trail your record of visit to a particular website.
There are 3 types.
i)First party cookies.
ii)Third party cookies.
iii) session cookies.
i)First party Cookies: These kinds of cookies are generally used to store your login id,
password, autofill information etc. for the frequently visited websites.
ii)Third party Cookies: These are the cookies that websites store to get details of your search
history and web browsing history. These are most often used by advertising companies to track
you across multiple websites that you visit.
iii)Session Cookies: These are temporary cookies that are deleted after you close down your
browser.

12.Write the full form of the following:


a)NIC b)ISP c)LAN d)MAN e)WAN f)PAN
A.Network Interface Card (NIC)
Internet Service Provider (ISP)
local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide Area Network (WAN)
Personal Area Network (PAN)

13.What is a CPU?Mention the three components of a CPU ?


A.Central Processing Unit(CPU):
1. CPU is the part of a computer that is known as the Brain of the computer.It is also
named a processor or microprocessor.
2. The main function of the CPU is processing instructions given to the computer. Every
operation that is carried out, including key strokes, opening and closing programs, and
saving files, is carried out by the CPU.
Three components of a CPU:
The central processing unit has three significant parts. And those parts of CPU are:
· Memory or Storage Unit
· Control Unit
· ALU(Arithmetic Logic Unit)

14.Write any six characteristics of a computer?


A. A computer is capable of performing highly tasks,which humans are not able to perform
efficiently. Let us discuss the strengths and limitations of computers.
characteristics of a computer:There are 7 strengths in a computer. They are:
1)speed
2) Accuracy
3) Reliability
4)Storage Capacity.
5)Versatility.
6)Reduction in manpower.
7)Reduction in paper work.

15.What is a microphone? Describe the usage?


A.A microphone, colloquially nicknamed mic or mike (/maɪk/),] is a transducer that converts
sound into an electrical signal.Microphones are used in many applications such as telephones,
hearing aids, public address systems for concert halls and public events, motion picture
production, live and recorded audio engineering, sound recording, two-way radios,
megaphones, radio and television broadcasting, and in computers for recording voice, speech
recognition, VoIP, and for non-acoustic purposes such as ultrasonic sensors or knock sensors.

16.Explain Utility software with an example?


A.Utilities are the programs that support the smooth functioning of a computer. Software utilities
are specially designed to help the end user, manage, and tune the computer hardware/software
and perform a single task at a time. The utilities that we use depend on the Operating System
running on our computer. Some help you to backup data, some help to recover data that has
been accidentally erased and so on. The list is endless.
The main utility programs are described below:
● FILE AND FOLDER MANAGEMENT
● BACKUP
● SYSTEM RESTORE
● COMPRESSION
● DISK MANAGEMENT
● DISK DEFRAGMENTATION
● DISK CLEANUP
17.Write one example of each:
a)CUI(Operating System) b)GUI(Operating System) c)Compression Software
d)Multimedia Software e)Presentation Software f)Database Management System
A. a)CUI(Operating System) - Linux, Unix
b)GUI(Operating System) - Windows
c)Compression Software - WinZip
d)Multimedia Software - Windows Media Player
e)Presentation Software - MS PowerPoint
f)Database Management System - Oracle , MS-Access

18.Write a short notes on


a)Scroll Bar b)Status Bar
A.ScroolBar:
These are vertical or horizontal bars on the right side and at the bottom of the screen
respectively. Using the horizontal scroll bar, you can move the screen display right and left, and
with the help of a vertical scroll bar, you can move the screen up and down.
Status Bar:
It is a long horizontal bar present at the bottom of the window that displays information about the
status of the contents in the window.

19.What is the Internet? Explain any three uses of the Internet.


A.The Internet is a worldwide network of computers that uses common communication
standards and interfaces to provide the physical backbone for a number of interesting
applications. Computers on the Internet use remote server machines to share files and devices
with the user machine.
The uses of the Internet are as follows:
1.Business: These organizations use the internet to provide complex financial database.
Meetings can be scheduled and conducted through video conferencing facility. Railways,
airways and hotel reservations can be made through the internet
2.Forum for discussion: The Internet is used as a platform for discussion with like-minded
people. Several professionals connect to various forums to discuss the latest techniques in their
field of specialization.
3.Mailing Letters: Electronic mail is one of the popular features of the Internet. It allows you to
send and receive messages free of cost.You can also attach pictures,audio and video.

20.Write a note on Cyber law.


A. Cyber Law or Internet Law is a term that encapsulates the legal issues related to the use of
the Internet. With the increase in the number of crimes related to the Internet (frauds, tax
evasion,and phishing etc.) urgent need was felt to introduce an act of law against such crimes.
With this view in mind, the Indian Government introduced Information Technology Act2000 also
known as ITA-2000 or IT Act on October 17,2000.

21.What is multifactor authentication?


A. 1) A user id and strong password alone are not sufficient to secure web accounts.
Multi factor authentication is one of the simplest and most effective ways to secure data.
2)For Example,when a user enters a User ID and password,the website sends an OTP to the
user’s mobile devices.

22. Mention different types of network components.


A. 1. Modem 4. Repeater
2. Hub 5. Gateway
3. Switch 6. Bridge

VERY SHORT ANSWER QUESTIONS


23.What are the two types of CD ROMs available in the market?
A.The two types of CD ROMs available in the market are:
1.CD R(Compact Disk Recordable): The data can be recorded only once on these disks but
can be read over and over again.
2.CD RW(Compact disk Rewritable): It is a rewritable disk which allows us to erase previously
recorded data and write new data on it many times.

24.Name the popular encryption software which can be downloaded free of charge?
A.FlexCrypt is the popular encryption software which can be downloaded free of charge.
25.Dhruv is working in the National weather Forecasting Agency.His job is to
telecast the daily weather forecast to the national television. Which type of
computer is used to forecast the weather conditions?
A.Supercomputer is used to forecast the weather conditions.
26.Name two types of Impact printers?
A.Impact printer refers to a class of printers that work by banging a head or needle against an
ink ribbon to make a mark on the paper. This includes dot-matrix printers, daisy-wheel printers,
and line printers. They are also called “character printers”.
Impact printers are classified into two types:
1) Daisy Wheel Printers.
2) Dot-Matrix printers.
27.Name the type of software that can be used for publication of a brochure or a
newspaper?
A.PageMaker, CorelDRAW,InDesign etc. are the softwares that can be used for publication
of a brochure or a newspaper?
28.Which Operating systems allow more than one user to use the same computer
at the same time or different times?
A.Multi user Operating systems allow more than one user to use the same computer at the
same time or different times.
29. Mention different components of the operating system.
A. The operating system has two components:
1. Shell 2. Kernel
30.What is a Plotter?
A.A Plotter is a vector graphic printing device which interprets commands from a computer to
make line drawing on paper with one or more automated pens.
31.What is Phishing?
A.Phishing is the fraudulent attempt to obtain sensitive information such as usernames,
passwords and credit card details by disguising as a trustworthy entity in an electronic
communication.
32.When was the Information Technology Act introduced by the Indian
government?
A.Information Technology Act2000 also known as ITA-2000 or IT Act introduced on October
17,2000.
33. What are the two types of software?
A. 1. System software 2. Application software
34.Name the port which is used to connect a Flash drive?
A.USB port used to connect a Flash drive.
35. Mention different types of ROM.
A. Masked ROM, PROM, EPROM, EEPROM.
36. What are the two types of primary memory?
A. RAM and ROM
37. Mention different types of RAM.
A. DRAM,SRAM,SDRAM,DDR.
38. Mention the most common types of monitor.
A. 1. CRT 2. LED 3. LCD
39. What is protocol?
A. Protocol means set of rules.
40. What is FTP?
A. File transfer protocol is standard internet protocol. It is one of the simplest and easiest ways
to exchange files between two or more computers.

*******************

You might also like