Students can access the CBSE Sample Papers for Class 9 Computer Applications with Solutions and marking scheme Set 1 will help students in understanding the difficulty level of the exam.
CBSE Sample Papers for Class 9 Computer Applications Set 1 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However, internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-1) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section-A (1 Mark each)
(All questions are compulsory)
Question 1.
Control unit is called ………….. of the computer. [1]
(A) Heart
(B) Nerve center of Brain
(C) Primary memory
(D) All of these
Answer:
(A) Heart
Explanation: Control Unit controls the overall operation of the computer system. It is considered as the heart of the computer system. It controls all the other units, directs them to operate in a proper way and co-ordinates various operations performed.
Question 2.
Which of the following is not a primary storage device? [1]
(A) Magnetic tape
(B) Magnetic disk
(C) Optical disk
(D) All of these
Answer:
(D) All of these
Explanation: All options such as magnetic tape, magnetic disk and optical disk are not primary storage devices. They are all secondary storage devices.
Question 3.
Identify the odd term among the following: [1]
(A) Mouse
(B) Keyboard
(C) Scanner
(D) ALU
Answer:
(D) ALU
Explanation: ALU performs two kinds of operations, the arithmetic processing and logical processing. In arithmetic processing it performs.
All mathematical operations such as addition, subtraction, multiplication and division. In logical processing, it performs the relational and logical operations such as comparing larger or smaller values, true or false statements, etc.
Question 4.
Compiler is a …………… [1]
(A) Language processor
(B) Device driver
(C) Utility software
(D) None of these
Answer:
(A) Language processor
Explanation: The translation of a high-level language program to object code is accomplished by a software program called a compiler, which translates the entire program at once.
Question 5.
Which of the following is not a cyber crime? [1]
(A) Denial of Service
(B) Man in the Middle
(C) Malware
(D) AES
Answer:
(A) Denial of Service
Explanation: Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cyber crime.
AES (Advanced Encryption Standard) provides security by encrypting the data.
Question 6.
Following are some examples of privacy and security threats except: [1]
(A) Virus
(B) Worm
(C) Hackers
(D) Spam
Answer:
(C) Hackers
Explanation: A hacker is a person who breaks into a computer system. The reasons for hacking can be
many: installing malware, stealing or destroying data, disrupting service, and more. Hacking can also be done for ethical reasons, such as trying to find software vulnerabilities so they can be fixed.
Question 7.
Which software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online? [1]
(A) Malware
(B) Adware
(C) Antivirus
(D) Both (B) and (C)
Answer:
(B) Adware
Explanation: Adware software automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
Question 8.
In which of the following, a person is constantly followed/chased by another person or group of several peoples? [1]
(A) Phishing
(B) Bulling
(C) Stalking
(D) Identity theft
Answer:
(B) Bulling
Explanation: In general, Stalking refers to continuous surveillance on the target (or person)done by a group of people or by the individual person.
Question 9.
Identify the button that allows you to change Line and Paragraph Spacing? [1]
Answer:
Explanation: To change the line spacing, select the lines you want to change. Then go to the Home tab and find the line spacing button in the Paragraph section.
Question 10.
……………. gives us a space to be ourselves without judgement. [1]
(A) Piracy
(B) Privacy
(C) Identity theft
(D) All of these
Answer:
(B) Privacy
Explanation: Privacy means our personal space without any intrusion.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, As¬sertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): Redo cancels your undo actions. [1]
Reason (R): Redo is used if you execute an undo and instantly regret it.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
Explanation: Redo cancels your undo actions. That is, if you execute an undo and instantly regret it, then click Redo to cancel the undo action.
Question 12.
Assertion (A): Header appears at the top area while footer appears at the bottom area of the slide. [1]
Reason (R): Header and Footer option is present in the Format menu.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(C) Assertion (A) is true and Reason (R) is false.
Explanation: Headers and footers provide a convenient way to place repeating text at the top or bottom of each slide, handout or notes page. You can add the time and date, slide number or page number or any other information that you want to appear on each slide or page, such as your name or the title of your presentation.
Section-B [2 Marks Each]
Question 13.
What is the difference between CUI and GUI? [2]
Answer:
CUI (Command User Interface) | GUI (Graphical User Interface) |
They are operating systems which work on instructions given by user in the form of commands. | They are the operating systems which have graphics so that users can interact more easily and interestingly. |
For example: DOS, Unix. | For example: Windows, Macintosh, Android. |
Question 14.
What is multimedia? Write any two applications of multimedia. [2]
OR
For each of the following devices, describe the type of component it is and briefly describe its function within a computer system.
(i) Laser Printer
(ii) Mouse
Answer:
Multimedia is a combination of several media & content such as audio, video, text etc.
Applications:
(i) Entertainment and fine arts
(ii) Education
OR
(i) Output device, used to print our work done on a computer system.
(ii) Input device, used to point on screen in GUIbased operating system.
Question 15.
Write any two advantages of network. [2]
Answer:
- File sharing: Networking of computers helps the network users to share data files.
- Hardware sharing: Users can share devices such as printers, scanners, CD-ROM drives, hard drives, etc.
Question 16.
What do you mean by cyber crime? How can you report it? [2]
OR
Mention any four tips to stay safe on social media.
Answer:
Cybercrime, also called computer crime, is the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking intellectual property, stealing identities, or violating privacy.
You can report any type of cybercrime via two methods either via a phone call or online via the
National Cyber Crime Reporting Portal.
You can also report cybercrime to the respective website on which the incident has happened. Most social media websites including Facebook, YouTube, Twitter, and Instagram have the option of reporting offensive content.
OR
- Use a strong password. The longer it is, the more secure it will be.
- Use a different password for each of your social media accounts.
- Set up your security answers.
- Be careful about what you share. Don’t reveal sensitive personal information i.e. home address, financialinformation, phone number.
Question 17.
What is VPN? [2]
Answer:
VPN allows you to hide your true identity by encrypting the data and web traffic, thus making it impossible for any third party to decode it.
Question 18.
Write the steps to add pictures from graphic files. [2]
OR
How do you insert a row in a sheet?
Answer:
Adding pictures from graphic files to places other than the clipart frame:
- Insert tab > Picture > From File.
- Browse to the graphic file, select it, and click on Open.
- Move the picture to its location.
- Resize the picture as necessary.
OR
- Choose the place where you want to insert rows.
- Choose Insert option available under Home tabCells group.
- Choose Insert Sheet option.
Question 19.
How to protect yourself from computer worm? [2]
Answer:
It can be difficult to get rid of malware like viruses, trojans and worms once they infect a system, so it’s always best to prevent them from getting onto your computer in the first place. Use a personal firewall to block external access to network services.
Section-C [3 Marks each]
Question 20.
Neha, a class IX student, has just started understanding the basics of networking. She is a bit confused in between the terms WAN and MAN. Help her in understanding the difference between the terms. [3]
Answer:
MAN | WAN |
MAN stands for Metropolitan Area Network. It is a medium-sized network that can cover a broad area such as cities and towns. | WAN stands for Wide Area Network. It connects countries and spans a broad geographic area. As an example, consider the Internet. |
The speed of data transmission in a MAN is higher than that of a WAN. | The speed is less as compared to MAN. |
The connections in MAN are connected through modem or cables/wires. | The network of WAN is connected through broadband services, 3G or 4G internet services, etc. |
Examples: • City • Building |
Examples: • Broadband and internet throughout the country or continent. |
Question 21.
What do you mean by system software? How many types of System Software are there? [3]
Answer:
System software is a type of computer program that is designed to run a computer’s hardware and application programs.
System software is of various types:
- Operating system
- Language processor
- Utility software
- Device Driver
Question 22.
Shubham Likhar, a manager of a multinational company has to create his annual report on the growth of the company. He made his report on a presentation mode with the help of MS Power Point. [3]
Now he wants to add a graphical presentation to show the growth of the company in the whole year. How he can add the graphs in the presentation?
OR
What is Hiding? How does a slide get hidden from the presentation?
Answer:
(i) Choose the slide layout with the chart.
(ii) On the slide, double-click on the chart holder box.
(iii) A sample chart will appear in the box.
(iv) A data sheet will also be displayed showing a table whose data is displayed in the chart form.
In this way, a chart or graph presentation can be added to the slide.
OR
If there is a slide that you need in your presentation, but you do not want it to appear in the slide show. You can hide the slide.
Step 1: To hide a slide open the presentation in the slide sorter view.
Step 2: Right-click on slide to be hidden.
Step 3: A null sign will appear at the bottom of the slide.
Step 4: Hide option is also available in the slide show menu.
Question 23.
How do you name a range of cells? [3]
Answer:
Step 1: Select the cell or range.
Step 2: Click in the Name drop-down list of the Name box at the left end of the formula bar.
Step 3: Enter the name for the range. It can be up to 255 characters with no spaces, and it must-begin with a letter, a backslash, or an underscore.
However, capitalization does not matter for naming.
Step 4: Press Enter key.
Section-D [4 Marks each]
Question 24.
Read the statements given below and identify the device or tool or software name for each. [4]
(a) It is a part of a computer system that is commonly referred to as the brain of a computer.
(b) A computer microprocessor can access it more quickly than it can access regular RAM.
(c) It is a program that controls and operates a particular type of device that is connected to the computer system.
(d) It can find files that are unnecessary to computer operation, or take up considerable amounts of space.
Answer:
(a) CPU
(b) Cache
(c) Device driver
(d) Disk cleaner
OR
The most common types of general purpose software are listed in the table. You need to write a description of what they are used for, and an example for each.
General Purpose Software | Description | Examples |
Word Processing | ||
DBMS | ||
Desktop Publishing (DTP) | ||
Presentation software | ||
Spread Sheet |
Answer:
General Purpose Software | Description | Examples |
Word Processing | Used to make documents. | MS Word. |
DBMS | To maintain records in Database. | MS Access. |
Desktop Publishing (DTP) | It is creation of documents using page layout skills. | Adobe Page Maker. |
Presentation software | Used to make presentations. | MS Power Point. |
Spread Sheet | Used to organize data in tabular form. | MS Excel. |
Section-E [4 Marks each]
Question 25.
Case Study-1 [4]
Nowadays, the internet is everywhere both in public and private life. It has become a vital means for pro-fessional and personal – often confidential – communication. This has required security enhancements to be added to the various communication methods used on the internet after it became widely used.
Dileep, a class IX student, is new to the cyber security concept. Help him in the following to understand this concept:
a. What is Cyber Security?
b. What is hacking?
c. What is Identity Theft?
d. What is a spam?
Answer:
a. Cyber Security provides security to a system against cyber-attacks by using various technologies, and processes.
b. Hacking is to write computer programs for enjoyment to gain access to a computer illegally for any purpose.
c. Identity theft or online identity theft is the act of a person obtaining information illegally about someone else.
d. Spam is unsolicited email on the Internet.
Question 26.
Case Study-2 [4]
Kriti want to create a presentation file for the demo. Presentation files contain slides that include data such as text, images, shapes, animations, video, and audio.
a. To change the color scheme of the slide background.
b. How can he record a voice narration?
c. How can he Insert picture from gallery?
d. How can he add a new slide into his presentation?
Answer:
a. To change the color scheme of the slide background, the Format menu is used.
b. He can add a new slide with the help of Insert menu.
Click on Home tab > New Slide.
c. Record voice narration:
Step 1: Click on record narration.
Step 2: Set Microphone.
Step 3: Insert narration of slide.
Step 4: Click OK.
d. Insert Picture from file:
Step 1: Click on Insert menu.
Step 2: Click on picture from file.
Step 3: Choose file.
Step 4: Click OK.