Students can access the CBSE Sample Papers for Class 9 Computer Applications with Solutions and marking scheme Set 2 will help students in understanding the difficulty level of the exam.
CBSE Sample Papers for Class 9 Computer Applications Set 2 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However, internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-1) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section-A (1 Mark each)
(All questions are compulsory)
Question 1.
Faster data communication is possible when using: [1]
(A) Co-axial Cable
(B) Fiber Optic
(C) Ethernet
(D) Twisted Pair
Answer:
(B) Fiber Optic
Explanation: Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds.
Question 2.
CGM stands for: [1]
(A) Computer Graphics Metafile
(B) Continue Graphic Metafile
(C) Common Graphic Metafile
(D) None of these
Answer:
(A) Computer Graphics Metafile
Explanation: Computer Graphics Metafile (CGM) is a free and open international standard file format for 2D vector graphics, raster graphics, and text, and is defined by ISO/IEC 8632.
Question 3.
Which input device is used to convert hard copy into soft copy of document? [1]
(A) Monitor
(B) Scanner
(C) Mouse
(D) Keyboard
Answer:
(B) Scanner
Explanation: Scanner is an input device. It works by converting the image/text on the document into digital information.
Question 4.
Siddharth is an engineering student and has to design a model for a generator. He should- [1]
(A) Straight-away make the model and test it.
(B) Draw the model on the paper and then make the real model.
(C) Make a clay model and then the actual model.
(D) Use CAD software to draw and test the model and make a real model
Answer:
(D) Use CAD software to draw and test the model and make a real model
Explanation: Graphics software allows the user to create, store, and display or print charts, graphs, maps, and drawings. Graphics software enables users to absorb more information more quickly and to spot relationships and trends in data more easily. There are three basic categories of graphics software packages: presentation graphics, analysis graphics, and computer-aided design software.
Question 5.
Which one of the following is a type of antivirus programme? [1]
(A) Quick heal
(B) Mcafee
(C) Kaspersky
(D) All of these
Answer:
(D) All of these
Explanation: Antivirus is a kind of software program that helps to detect and remove viruses from the user’s computer and provides a safe environment for users to work on.
Question 6.
The unwanted bulk e-mails that come from strange sources are called as …………… [1]
(A) Trash
(B) Junk
(C) Spams
(D) Cookie
Answer:
(C) Spams
Explanation: Spam is unsolicited email on the Internet.
Question 7.
…………….. monitors user activity on internet and transmit that information in the background to some-one else. [1]
(A) Malware
(B) Adware
(C) Spyware
(D) Spam
Answer:
(C) Spyware
Explanation: Spyware is a type of malware (or “malicious software”) that collects and shares information about a computer or network without the user’s consent.
Question 8.
…………… is a crime in which the attacker harasses a victim using electronic communication. [1]
(A) Identity theft
(B) Cybers Stalking
(C) Phishing
(D) Bulling
Answer:
(B) Cybers Stalking
Explanation: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.
Question 9.
Who is the father of computer security? [1]
(A) August Kerckhoffs
(B) Bob Thomas
(C) Robert
(D) Charles
Answer:
(A) August Kerckhoffs
Explanation: August Kerckhoffs, a linguist and German professor at HEC, wrote an essay in the Journal of Military Science in February 1883. Kerckhoff had unwittingly established the foundations for contemporary encryption, earning him the title of “Father of Computer Security”.
Question 10.
Which of the following is not a cybercrime?
(A) Denial of Service
(B) Man in the Middle
(C) Malware
(D) AES
Answer:
(A) Denial of Service
Explanation: Denial of Service, Man in the Middle, and Malware exploit the system causing a threat to security, hence they are considered as cybercrime. AES (Advanced Encryption Standard) provides security by encrypting the data.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): You can group placeholder objects. [1]
Reason (R): You can also group objects together so that you can format them as if they were one object.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(D) Assertion (A) is False and Reason (R) is True.
Explanation: You can also group objects together so that you can format them as if they were one object.
To group objects, select them then right-click to display the context menu and choose Group® Group. PowerPoint will display handles around the grouped objects rather than around each individual object. You can then move and format the group as if it were one object. Placeholder objects cannot be grouped.
Question 12.
Assertion (A): To erase the contents of cell(s), select the cell and press Delete key.
Reason (R): You cannot delete the contents of the cell. [1]
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(C) Assertion (A) is true and Reason (R) is false.
Explanation: To erase the contents of cell(s), select the cell and press Delete key. Pressing Delete key removes the cell’s contents, but does not remove any formatting such as bold, italic or a different number format. For more control over what gets deleted, you can choose Home Editing Clear. This command’s drop-down list.
Section-B [2 Marks each]
Question 13.
What are the major components of a computer system? [2]
Answer:
Major components of a computer system are:
(i) CPU
(ii) Input device (Keyboard, Mouse)
(iii) Output device (Monitor)
(iv) Storage device (RAM, ROM)
Question 14.
What are the limitations of RAM? [2]
OR
What is the significance of using language translator?
Answer:
Limitations of RAM are:
(i) Limited storage capacity.
(ii) Volatile in nature i.e., its contents get removed when power is turned off.
OR
A Programming Language Translator is responsible for converting programs written in a computer language to machine language. There are three types of translators namely Assemblers, Compilers and Interpreters.
Question 15.
What does the disk defragmentation utility do? [2]
Answer:
- It rearranges all the parts of files on a computer so that they are all in one place.
- It increases the speed of the computer and is easier for the hard drive because it doesn’t have to do as many seeks.
Question 16.
State methods by which you can detect a virus. [2]
OR
What is firewall? What is the significance of it in computer security?
Answer:
Following are some of the ways your computer reacts to viruses:
- The speed of your computer may go down to a considerable extent.
- Certain software may require more time to start than it does usually.
- Certain software may not start at all.
- Some software may start normally but close down abruptly
OR
A firewall is a program that monitors all communications, i.e. monitor both incoming and outgoing communication and traps all illicit packets.
The firewall helps to secure the system from unauthorized communication, such that only authentic users can connect to the computer.
Question 17.
Aradhana is processing her chemistry course work. She wishes to include her roll number in a header and page number in a footer. [2]
(i) What is a footer?
(ii) Flow is a header different from footer?
Answer:
(i) Footer- Footer is some text/number/graphic that is repeated on every page’s bottom area.
(ii) Difference between header and footer- Header is some text/number/graphic that is repeated on every page’s top area rather than bottom area as is the case with footer.
Question 18.
How do you start slide sorter view of a presentation? [2]
OR
In a worksheet, cell K12 has a value. A formula is to be entered in cell K15, such that if the value in a cell K12 is more than 300, the value in cell K15 would be 1.33 times the value of cell K12 otherwise, the value in cell K15 would be 1.5 times the value in cell K12. Explain the formula that you would use to achieve this.
Answer:
You can switch to Slide Sorter View in two easy ways:
Click on the Slide Sorter button at the right side of the status bar.
OR
Select the View tab on the Ribbon and then click on the Slide Sorter button in the Presentation Views group.
OR
At cell K15, enter the conditional statement as : = If (K12 300, K12* 1.33, K12 * 1.5)
Here, if condition checks the value at K12 ie. if it is greater than 300, then calculate 1.33 of K12 otherwise 1.5 of K12.
Question 19.
Meena, a student of class 9, have a habit to save documents after every update in document by using Save Button presented on the Quick Access Toolbar. One day she found that Save button was not present on Quick Access Toolbar. Help her to add Save button on Quick Access Toolbar, so that she can again use it. [2]
Answer:
To add the Save button:
i. Click Customize option of the Quick Access Toolbar, and then click More Commands.
ii. In the Choose commands from list, click File Tab.
iii. Choose Save command, and then click Add.
iv. Remember to click OK.
Section-C [3 Marks Each]
Question 20.
Mohit wants to purchase a mouse, but he is very confused, which type of mouse should he buy. Help him to understand the types of mouse. [3]
Answer:
There are three types of mouse: Trackball mouse, Optical mouse and wireless optical mouse.
a. Trackball mouse are old technology mouse that has a mechanical movement of ball inside. That ball moves along the movement of mouse.
b. Optical mouse are the mouse having infrared sensitivity technology these mouse are being used these days.
c. Wireless optical mouse:
This mouse comes with Bluetooth technology that can be used for long-range signal recognition having no issues of wire tangle.
It is the same infrared sensitivity technology used in this too that is in optical mouse. Only the difference is it is wireless.
Question 21.
How does Adware work? [3]
Answer:
Adware works by installing itself quietly onto your devices, hoping you’ll – accidentally or otherwise – click on an advert that it displays to you.
Adware can also track your browsing history and search to display advertising that are more relevant to your surfing. Once the developer has your location and browser history, they can make additional income by selling that information to third parties.
Question 22.
What do you mean by cache memory, are they good for our computer system or not, explain? [3]
OR
Rita’s teacher gave her an assignment to preparing a presentation on Global Warming. Rita has collected all the content and prepared her presentation, but she forgot how to save it. Help her to save the presentation.
Answer:
Cache memory, also called CPU memory, is a Random Access Memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. Cache memory is fast but expensive. Yes, it is good for our computer as it is fast and saves our time.
OR
Step 1: Choose File → Save. The Save As dialog box appears.
Step 2: Browse to the location you want to save the file in.
Step 3: Enter a filename in the File name box.
Step 4: Click on Save.
Your work is saved.
Question 23.
How do you copy the contents of the cells using drag and drop method? [3]
Answer:
To copy using drag and drop, select the cell or range of cells that you want to copy and then press Ctrl key and move the mouse to one of the selection’s borders (the mouse pointer changes from a white cross to a black cross with small plus sign ). Then, simply drag the selection to its new location while you continue to press the Ctrl key.
The original selection remains behind, and Excel makes a new copy when you release the mouse button.
Section-D [4 Marks Each]
Question 24.
Ravi is a programmer. He wants to give a software to his friend for testing purpose by using a secondary memory device. Which portable device is suitable for him? Write some advantages of that device. [4]
OR
State the difference between interpreter and compiler.
Answer:
A Pen Drive using Flash Memory is more preferable, as it is not only fast for reading and writing, but also portable for the Ravi to carry here and there.
Advantage
(i) It is portable.
(ii) It is light weight.
(iii) It is very compact.
(iv) It has a storage capacity ranging from 16 MB to 128 GB and so on.
(v) It can transfer data at a very high speed.
Pen drive has proved its usefulness to the programmers. They can carry their programs and even complete operating systems or high-level languages and other utilities in a single pen drive.
OR
Interpreter | Compiler |
Translates program one statement at a time. | Scans the entire program and translates it as a whole into machine code. |
It takes less amount of time to analyze the source code but the overall execution time is slower. | It takes large amount of time to analyze the source code but the overall execution time is compara tively faster. |
No intermediate object code is generated, hence are memory efficient. | Generates intermediate object code which further requires linking, hence requires more memory. |
Continues translating the program until the first error is met, in which case it stops. Hence debug ging is easy. | It generates the error message only after scanning the whole program. Hence debugging is compara tively hard. |
Programming language Like Python, Ruby use interpreters. | Programming language like C, C + + use compilers. |
Section-E [4 Marks each]
Question 25.
Case Study-1 [4]
Spyware is a type of malware (or ” malicious software”) that collects and shares information about a computer or network without the user’s consent. It can be installed as a hidden component of genuine software packages or via traditional malware vectors such as deceptive ads, websites, email, instant mes-sages, as well as direct file-sharing connections.
Answer the following questions on the given information.
a. Spyware is a type of ……………..
(A) Malware
(B) Worm
(C) Trojan horse
(D) None of these
Answer:
(A) Malware
Explanation: Malware (or ‘malicious software’) is a program or files that are developed for the purpose of doing harm. Worms seek to infect and replicate without targeting and infecting specific files already present on a computer.
b. It can be installed as a hidden component of …………… software package.
(A) Free
(B) Open
(C) Genuine
(D) None of these
Answer:
(C) Genuine
Explanation: It can be installed as a hidden component of genuine software packages or via traditional malware vectors such as deceptive ads, websites, email, instant messages, as well as direct file-sharing connections.
c. Spyware runs hidden from the …………..
(A) User
(B) Machine
(C) Both (A) and (B)
(D) None of these
Answer:
(A) User
Explanation: Spyware tracks websites visited by a user, and uses this information to build a profile. Some spyware can even collect personal information forms filled out online.
d. Spyware employs a variety of techniques to communicate back to a/an …………..
(A) User
(B) Machine
(C) Attacker
(D) None of these
Answer:
(C) Attacker
Explanation: Spyware is anything that takes up residence on a computer, usually uninvited, that can report on the activities and preferences of the computer’s users or disclose information about data stored on a computer.
Question 26.
Case Study-2 [4]
Sanchay, has recently learn Excel. Help Sanchay by suggesting the best suitable answers for the following problems which needs to resolved:
a. How he can select the whole worksheet?
b. What feature of Excel will help him to change the colour of the cells or columns?
c. How can he add a border around the cells in Excel?
d. How can he change the font size of text in a cell or a range of cells?
Answer:
a. By pressing Ctrl+A keys, all the data already in a worksheet gets selected.
b. Fill colour effect from drawing toolbar.
c. To add a border around the cells in Excel, follow the given steps:
Step 1: Select the cells.
Step 2: Click on the Home tab.
Step 3: In the Font group, click the Border button.
A drop-down menu of borders appears.
Step 4: Select the required border option. The selected border will be applied; surrounds the selected cells.
d. To change the font size of text in a cell or a range of cells, follow the given steps:
Step 1: Select a cell or a range of cells.
Step 2: Click the Home tab.
Step 3: In the Font group, click the down arrow alongside the Font Size field.
Step 4: Select the desired size from Font Size drop down menu or type the size that you want to give and press Enter key. The selected size will be applied.