Students can access the CBSE Sample Papers for Class 9 Computer Applications with Solutions and marking scheme Set 3 will help students in understanding the difficulty level of the exam.
CBSE Sample Papers for Class 9 Computer Applications Set 3 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However, internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-1) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section-A (1 Mark each)
(All questions are compulsory)
Question 1.
A …………….. is a pointing device.
(A) Mouse
(B) Keyboard
(C) Scanner
(D) None of these
Answer:
(A) Mouse
Explanation: A mouse usually contains, two or three buttons. As the user rolls it on a flat surface, the mouse controls cursor movement on the screen. It is also used to make selections to point at and to click the items.
Question 2.
Disk Defragmentation Software is a (an) ……………
(A) Utility
(B) Operating system
(C) Data base program
(D) None of these
Answer:
(A) Utility
Explanation: Disk defragmenters can detect computer files whose contents are stored on the hard disk in disjointed fragments, and move the fragments together to increase efficiency.
Question 3.
Suppose you have bought all hardware components required for assembling a computer. After assem-bling the Computer System, which will be the very first software to be installed? [1]
(A) Hardware Drivers
(B) Operating System
(C) Anti-Virus Software
(D) Word Processing Software
Answer:
(B) Operating System
Explanation: An operating system is the first program which should be loaded into the computer system after assembling the hardware parts. It is the first program which gets loaded on starting a computer.
Question 4.
Reema is a house wife. She planned to teach the students of other country with the help of communica-tion technology, so that she can earn some money and utilize her time. Which network will connect her with the people living in different countries? [1]
(A) LAN
(B) MAN
(C) WAN
(D) SAN
Answer:
(B) MAN
Explanation: She can connect with the other people with the help of WAN (Internet).
Question 5.
The only purpose of the is to reproduce itself again and again. [1]
(A) Spam
(B) Worm
(C) Spyware
(D) Trojan Horse
Answer:
(B) Worm
Explanation: Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, etc.
Question 6.
Which software display advertising on a computer, redirects search results to advertising websites, and collects user data for marketing purposes. [1]
(A) Spyware
(B) Spam
(C) Trojan Horse
(D) Adware
Answer:
(B) Spam
Explanation: Adware is also known as advertisement – supported software, generates revenue for its developers by automatically generating adverts on your screen, usually without a web browser.
Question 7.
Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else? [1]
(A) Malware
(B) Spyware
(C) Adware
(D) All of these
Answer:
(B) Spyware
Explanation: It is generally defined as the software designed to enter the target’s device or computer system, gather all information, observe all user activities, and send this information to a third party. Another important thing about the spyware is that it works in the background and sends all information without your permission.
Question 8.
……………. can steal and hold users data and then demand money to release back. [1]
(A) Spyware
(B) Ransomware
(C) Trojan Horse
(D) Worm
Answer:
(B) Ransomware
Explanation: Ransomware is a kind of malware that can steal and hold users data and then demand money to release back.
Question 9.
Which can be used for quick access to commonly used commands and tools? [1]
(A) Status bar
(B) Tool bar
(C) Menu bar
(D) Title bar
Answer:
(B) Tool bar
Explanation: In Word 2003, Tool bar is used for quick access to commonly used commands and tools.
Question 10.
……………. is an animated presentation that we display on a computer monitor or projection system. [1]
(A) Slide Show
(B) Format toolbar
(C) Tasks pane
(D) All of these
Answer:
(A) Slide Show
Explanation: To view a presentation on full screen is called slide show.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): You cannot insert a video in a presentation. [1]
Reason (R): It is difficult to insert a large video file.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(D) Assertion (A) is False and Reason (R) is True.
Explanation: One can insert a video file in a slide. Adding a movie motion clip to a slide is similar to adding a sound clip. But be aware that you may have trouble sending a PowerPoint presentation with large video files to your friends and colleagues via e-mail because many e-mail servers have limits on the size of e-mail attachments.
Question 12.
Assertion (A): Excel is an electronic spreadsheet. [1]
Reason (R): Data files created with Excel are called Workbooks.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
Explanation: Excel is an electronic spreadsheet. Electronic Spreadsheet stores information in computer memory, calculates and displays the results. Data files created with Excel are called Workbooks (in the same way as Word files are called documents). But where Word starts up with a single blank page, Excel file by default contains three blank worksheets. More worksheets can be added and others deleted, as required.
Section-B [2 Marks each]
Question 13.
List any four tasks performed by Operating System (OS). [2]
Answer:
An operating system (OS) performs mainly the following tasks-
- It acts as an interface between user and the hardware.
- It controls the hardware.
- It assigns memory to the computer system.
- It handles all the applications.
Question 14.
Give some examples of specific purpose application software. [2]
OR
Write a note on fiber optic cable? Why is modem required?
Answer:
Accounting Management, Reservation System, HR Management, Attendance System, Payroll System, Inventory control system.
OR
Fiber optic cable is made by a glass-like material and it is used to transfer data with a high speed. In fiber optic, data travels in the form of light. Modem transforms the computer digital signals to analog signals and vice-versa that can be conveyed through the telephone lines for data transfer.
Question 15.
What does MPEG stand for? What are the file extensions of MPEG file format? [2]
Answer:
MPEG (Moving Pictures Expert Group) format is the most popular format on the Internet. It is crossplatform, and supported by all the most popular web browsers.
Videos stored in the MPEG format have the extension .mpg or .mpeg.
Question 16.
What are threats? [2]
OR
What is the method of selecting a strong password?
Answer:
A threat is object, person, or other entity that represents a constant danger to an asset. Management of the organization must be informed of the various kinds of threats facing the organization.
OR
While selecting passwords the following points are to be remembered:
- The longer the password, the harder it is to crack. Consider a 12-character password or longer.
- Avoid names, places, and dictionary words.
- Mix it up. Use variations on capitalization, spelling, numbers, and punctuation.
- You may also use a specialized Password Manager package; as ultimately the number of passwords that you need to remember will grow.
Question 17.
Differentiate between Slide Transition and Custom Animation. [2]
Answer:
Differences between slide transition and custom animation are as follows:
Slide Transition | Custom Animation |
Slide transitions are the looks that take you from one slide to the next. | Custom Animations are the movements you put on text, pictures, objects on an individual slide. |
Slide transitions apply to slides themselves. | Custom Animations are applied to objects on a slide |
Question 18.
Suggest the appropriate functions for the following situations: [2]
(i) For returning the minimum value out of a range A1 to C5.
(ii) For determining whether the customer is eligible for discount or not from the bill amount stored in cell D5. A customer is eligible for discount if bill amount >5,000.
OR
What is the difference between the Save and Save As option? [2]
Answer:
(i) = MIN(A1: C5)
(ii) = IF(D5>5,000, “Discount”, “NoDiscount”)
OR
“Save” means the file gets saved under its current name, in whatever folder it was saved before or in the default folder of that computer whereas “Save
As” gives you the opportunity to save the file under a different name and in another folder.
“Save As” allows you to name the updated version with a new name and at the same time preserves the old version.
Question 19.
What is the difference between Malware and Virus. [2]
Answer:
Malware: Malware is a program designed to gain access to computer systems, normally for the benefit of some third party, without the user’s permission.
Virus: A virus is a malicious executable code attached to another executable file which can be harmless or can modify or delete data.
Section-C
Question 20.
Explain Database Management System. What are the features of DBMS?
Answer:
It refers to the software that is responsible for storing, maintaining and utilizing a database. It enables a user to define, create and maintain the database and provide controlled access to it. A database is a collection of integrated data stored together to serve multiple applications.
DataBase Management System provides several additional features which are as follows:
- Removes data redundancy
- Eliminates data inconsistency
- Data integration
- Data sharing
- Data security
e.g. MS-Access, Corel Paradox, Lotus Approach, MySQL, OpenOffice.org Base etc.
Question 21.
Distinguish between input unit and output unit. [3]
Answer:
Distinguish between input unit and output unit are as follows:
Input Unit | Output Unit |
It accepts the data and instructions from outside. | It gives the result which is produced by the computer. |
It converts the accepted instructions and data in computer acceptable form. | It converts the results, which are in a coded form to human readable form. |
It supplies the converted instructions and data to the computer system for further processing. | It supplies the converted results to the user. |
Question 22.
What are page margins? State the difference between gutter and mirror margin.
OR
Write the steps to apply background in PowerPoint.
Answer:
The blank spaces around the edges of the page are called page margins. In general, we insert text and graphics in printable area inside the margins. Microsoft Word offers several page margin options such as gutter margin and mirror margin.
Gutter margins are used to add extra spaces to the side or top margin of a document that we plan to bind. Mirror margins are used to set up facing pages for double sided documents such as books or magazines.
OR
To apply texture effect follow the steps:
Step 1: Select the Texture tab of Fill Effect dialog box.
Step 2: Scroll down the available textures until you find an appropriate one. Select it and click OK and return to the Background dialog box.
Step 3: In the Background dialog box, you can select Preview to see the effects before applying them. Click Apply for current slide only or Apply for all slides in your presentation.
Step 4: Click OK button.
Question 23.
Write down the ways to report a Cyber-Crime.
Answer:
- On being of a cybercrime a first step is to immediately report the matter to either parents or school authorities.
- Parents can visit nearby police station and file a complaint.
- The Information Technology Act, 2000 has global jurisdiction, means anyone can complain from anywhere. Or can use link: http://www.cybercrimehelpline.com/
Section-D [4 Marks each]
Question 24.
Deepti, a trainee of architectural department. She has a project to design an architecture of a hospital. She has done her project, but is unable to determine which type of printer she should use to print her design. Suggest her a suitable printer. And also write its advantages. [4]
Answer:
Deepti should use Plotter. The Plotters are primarily used for graphs, charts, 3D printing, and drawing.
Advantages of Plotter:
i. The Plotters can print on large sheets to obtain results in high resolution with maintaining and preserving DPI.
ii. They are capable of printing on various other materials like plastic sheets, cardboard, wood, aluminum, and steel.
They work with enormous speed which does not deteriorate the design and quality of output produced by modern plotters.
OR
Write any two-two differences for the following:
(i) RAM and ROM
(ii) LAN and MAN
Answer:
(i)
Random Access Memory (RAM) | Read Only Memory (ROM) |
It is a volatile memory. | It is a non-volatile memory. |
It stores data at execution time. | It stores hardware details. |
(ii)
LAN | MAN |
LAN is a network that enables the communication between many linked devices. It is in charge of establishing connections among neighborhood units, including universities and schools. | Several computers can be connected to MAN in the same city or separately. It encompasses at greater region, including minor towns and cities. |
LAN is a private and secured network. Hospitals, schools, offices, etc., can own it. |
MAN can be either public or private. A lot of businesses and telephone companies could own them. |
Section-E [4 Marks Each]
Question 25.
Case Study-1 [4]
Nidhi’s teacher has taken a class on cyber safety today. Nidhi learns different concepts related to cyber security. Nidhi’s teacher also gives an assignment on the same topic. Following are the questions of that 1 assignment. Help Nidhi to fulfill her assignment.
a. How can you help stop spam?
b. Which program or hardware device that filter the information coming through an internet connec-tion to a network or computer system.
c. Which software allow a visited website to store its own information about a user on the user’s com-puter?
d. Why passwords are used?
Answer:
a. Do the following:
- Block certain email addresses known for sending spam.
- Setup email filters based on keywords known to be in spam.
- Unsubscribe from listservs.
b. Firewall
c. Cookies
d. A strong password provides essential protection from financial fraud and identity theft.
Question 26.
Case Study-2 [4]
Read the following text and answer thequestions given below:
Copying or Moving In ExcelTo copy using drag and drop, select the cell or range of cells that you want to copy and then press Ctrl key and move the mouse to one of the selection’s borders (the mouse pointer changes from a white cross to a black cross with small plus sign). Then, simply drag the selection to its new location while you continue to press the Ctrl key.
The original selection remains behind, and Excel makes a new copy when you release the mouse button. To move a range using drag and drop, do not press Ctrl key while dragging the border.
a. Which key must be pressed to copy the contents in Excel?
b. Which keyboard shortcut is used to perform Cut operation?
c. Which key combinations are used to perform Paste operation?
d. Which keyboard shortcut is used to perform Copy operation?
Answer:
a. To copy the contents from one place to another in the same or different worksheet, Ctrl key is instrumental.
b. To perform the Cut operation, firstly select the cells and press Ctrl+X keys. The data gets moved to the clipboard.
c. The shortcut keys combination for Paste operation is Ctrl+V keys. This operation is used in combination with Copy(Ctrl+C) and Cut(Ctrl+X) commands.
d. To perform the Copy operation, firstly select the cells and press Ctrl+C keys. The datagets copied in the clipboard.