Students can access the CBSE Sample Papers for Class 9 Computer Applications with Solutions and marking scheme Set 4 will help students in understanding the difficulty level of the exam.
CBSE Sample Papers for Class 9 Computer Applications Set 4 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However, internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-1) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section-A (1 Mark each)
(All questions are compulsory)
Question 1.
A CPU consists of- [1]
(A) ALU
(B) ALU and control unit
(C) ALU, CU and memory
(D) None of these.
Answer:
(C) ALU, CU and memory
Explanation: The central processing unit (CPU) consists of Control Unit, Arithmetic-Logic Unit and primary storage(RAM and ROM).
Question 2.
A name or number used to identify a storage location device is- [1]
(A) A byte
(B) A record
(C) An address
(D) All of these.
Answer:
(C) An address
Explanation: Each and every data stored in a storage medium has an address.
Question 3.
Which one of the following is also referred to as malicious software? [1]
(A) Maliciousware
(B) Badware
(C) Ilegalware
(D) Malware
Answer:
(D) Malware
Explanation: Malware is a kind of short program used by the hacker to gain access to sensitive data/information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.
Question 4.
Which of these is an example of a possible victim in a phishing attack? [1]
(A) The website that was hacked
(B) The person who had their identity stolen
(C) The bank of the victim
(D) All of these
Answer:
(D) All of these
Explanation: Phishing is a type of social engineering attack often used to seal user data, including login credential and credit card numbers.
Question 5.
Where might a spammer get your personal information from? [1]
(A) Facebook
(B) MySpace
(C) LinkedIn
(D) All of these
Answer:
(D) All of these
Explanation: Scammers use your social media accounts to learn your name and other identifying information.
Question 6.
Which of the following is not a well-known anti-virus program? [1]
(A) AVAST
(B) SMAG
(C) AVG
(D) McAFee
Answer:
(B) SMAG
Explanation: An antivirus is a kind of software that is specially designed to help the user’s computer to detect the virus as well as to avoid the harmful effect of them.
Question 7.
The key F12 opens a: [1]
(A) Save As dialog box
(B) Open dialog box
(C) Save dialog box
(D) Close dialog box
Answer:
(A) Save As dialog box
Explanation: The key F12 opens a Save As dialog box.
Question 8.
If you have chosen a slide background but you want to change the colour scheme, you will find the rel-evant option under: [1]
(A) File menu
(B) Slide show menu
(C) Edit menu
(D) Format menu
Answer:
(D) Format menu
Explanation: To change the color scheme of the slide background, the Format menu is used.
Question 9.
Which of the following is not a view in Excel? [1]
(A) Normal view
(B) Page Layout view
(C) Full screen view
(D) Reading view
Answer:
(D) Reading view
Explanation: Reading view is not a view in Excel. The different views in Excel are: Normal view, Page Layout view, Page Break Preview and Full screen view.
Question 10.
By default, on which page the header or the footer is printed? [1]
(A) On first page
(B) On alternate page
(C) On every page
(D) None of these
Answer:
(C) On every page
Explanation: A header is the top margin of each page, and a footer is the bottom margin of each page. Headers and footers are useful for including material that we want to appear on every page of a document such as your name, the title of the document, or page numbers.
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): A pixel is the smallest unit of resolution of a screen. [1]
Reason (R): The lower the number of pixels the higher the resolution will be.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(C) Assertion (A) is true and Reason (R) is false.
Explanation: The higher the number of pixels, the clear and sharper is the image.
Question 12.
Assertion (A): Software applications are developed for just a single platform. [1]
Reason (R): Software applications support multiple languages.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(D) Assertion (A) is False and Reason (R) is True.
Explanation: Software applications are not developed for just one platform. But supports multiple platforms-both hardware and software platforms.
Another important feature of today’s software application is that they support multiple languages and multiple currencies.
Section-B [2 Marks each]
Question 13.
Why CPU is called the brain of a computer? [2]
Answer:
Central Processing Unit (CPU) is called the brain of a computer system because it controls and guides the flow and maintenance of data. Ultimately CPU is a silicon chip which processes the data, and hence called the processor. For E.g.: Intel dual core chip.
Question 14.
What is utility software? Explain with examples. [2]
OR
Explain the terms:
(i) Node
(ii) Stand alone computer
Answer:
Utility software is also known as service routine software. Utility software helps in the management of computer hardware and application software. It performs a small range of tasks. For example : Disk-defragmenters, disk cleanup and virus scanners are utility softwares.
OR
(i) Node- It is a workstation. Each node in the bus network is directly connected to the control bus.
(ii) Standalone computer- A computer that is not connected to a network is known as a standalone computer.
Question 15.
Differentiate between LAN and WAN.
Answer:
Local Area Network (LAN) | Wide Area Network (WAN) |
LAN stands for Local Area Network. | WAN stands for Wide Area Network. |
LAN is spread over a small area of upto 1 km. | WAN is spread over a very large area. |
LAN usually costs less to set up. | WAN costs higher to setup. |
LAN is usually a single network. | WAN is usually a network of many networks. |
Question 16.
How do we protect our identity by using private browsing? [2]
OR
What are the reasons to protect our passwords?
Answer:
We can use the following to safely browse internet:
- Incognito browsing – It opens up a version of the browser that will not track our activity.
- Proxy – It works by acting as a middleman between our computer and the website we want to access.
- Virtual Private Network – It is a method used to protect our system from hackers trying to access our sensitive information.
OR
Passwords are considered an important safety tool as a password helps to :
- Keep our personal information safe.
- Protect our emails, files, and other content.
- Prevent someone from breaking into our account.
Question 17.
Sana has entered 49+30 in a cell. The worksheet is not displaying 79 in the cell. Instead, 49+30 is getting displayed. Help, Sana in rectifying the problem. [2]
Answer:
In Excel, every formula must start with an = (equal) sign.
Since, Sana has not put = sign before 49+30, thus she is not able to see the desired result will be displayed if she will use = (49 + 30) formula.
Question 18.
The cell A1 contains Mon. What will be the cell contains of Bl, Cl, Dl, if you click and drag the fill handle of A1 towards right? [2]
Img 1
OR
How can you un-hide a hidden sheet?
Answer:
The cells B1, C1 and D1 will be Tue, Wed, Thu respectively.
OR
Choose Format option in the Cells group of Hometab. Click on the Hide & Unhide option and then click on Unhide Sheet option.
Question 19.
Define any two ways that could cause Adware to enter your system. [2]
Answer:
Adware typically ends up on a user’s device through one of two ways:
i. You might install a free computer program or app.
ii. Another reason, there may be a vulnerability in your software or operating system,which hackers exploit to insert malware.
Section-C [3 Marks each]
Question 20.
Write the benefits of online hotel reservation system. [3]
Answer:
Online reservation software offers the following benefits:
(i) Instant answers to their availability inquiries.
(ii) Professional, instant automatic e-mail confirmation.
(iii) Time saving.
(iv) The ability to book anytime, from anywhere with Internet access.
(v) Money Saving.
(vi) No more human errors
Question 21.
What are the advantages of scanners? [3]
Answer:
The advantages of scanners
(i) Quality and detail: Scanners today provide high quality in terms of resolution for both colour and black and white documents.
(ii) Reliability: Scanners don’t depend on the use of a phone line like a fax does.
Additionally,there is no other end that needs to receive our scanned document in order to complete a successful transfer.
(iii) Environmental benefits: Using a scanner can also be environmental friendly. Scanners create digital copies of documents, photos and files on our computer that we can e-mail to other people or store and view on our own.
Question 22.
What is the difference between font and border formatting? [3]
Answer:
Font formatting affects text changing things like text size, colour, font-face, etc. Border formatting affects borders around boxes, cells, pictures, etc. Border formatting will change things like style, colour, thickness and combination of borders, like having different borders on different sides.
OR
Suman is working as a marketing manager in an advertising company. She has prepared a presentation on her latest product. What feature will be used for the following tasks? [3]
(i) To view all slides together.
(ii) To set timings of the slide show while rehearsing.
(iii) To show the sales using a chart
Answer:
(i) Press the Slide Sorter view button in work space area to view all the slides together.
(ii) In the Slide Transition page, set the timing in Advance slide sections Automatically after position where the slide will automatically play after a speculated time period.
(iii) In the layouts of tasks pane, select a chart type slide or use Insert → Chart menu option.
Question 23.
What are the different methods by which you will be able to identify malicious websites?
Answer:
The following are the list of malicious, criminal or inappropriate websites:
- Check for presence of an address, phone number and/or email contact – often indications that the website is genuine. If in doubt, send an email or call to establish authenticity.
- Check that the website’s address seems to be genuine by looking for subtle misspellings, extra words, characters or numbers or a completely different name from that you would expect the business to have.
- Roll your mouse pointer over a link to reveal its true destination, displayed in the bottom left corner of your browser. Beware if this is different from what is displayed in the text of the link from either another website or an email.
Section-D [4 Marks each]
Question 24.
Software is not only the basic requirement of a computer system, it makes a computer more powerful and useful. Computer systems divide software into two major classes. [4]
(i) What is the meaning of the term software?
(ii) What is the difference between software and hardware?
(iii) Mention various categories of application software.
Answer:
(i) Software is a set of programs that tells the computer to perform a task.
(ii) Difference between Hardware and Software
Hardware | Software |
Hardware is the physical parts of a computer system. | Software is a set of programs designed to perform a specific task. |
Hardware can be seen and touched. | Software cannot be seen and touched. |
Hardware cannot work on its own, and hence it requires software to instruct what to do. | Hardware is required for a software to work on. |
Ex. Input devices, Output devices, CPU, memory devices etc. | Ex. System software and application software, utility software etc. |
(iii) Application software can be divided into two categories:
• General-Purpose Application software (Package)
• Specific-Purpose Application software.
OR
Multi-Tasking Operating System:
The OS that allows the execution of multiple tasks at one time is known as multi-tasking OS. In this type of OS, several applications may be simultaneously loaded and used in the memory. While, the processor handles only one application at a particular time. It is capable of switching between the applications effectively, e.g. Unix, Windows 2000/ XP/NT/Vista etc.
Multi-User Operating System:
It is the type of OS that allows many users to take advantages of the computer’s resources, simultaneously. This OS makes sure that the requirements of the various users are balanced and each of the programs they are using has sufficient and separate resources, i.e. problem with one user doesn’t affect the entire community of users. e.g. Unix, Linux, Windows 2000 etc.
Section-E [4 Marks each]
Question 25.
Case Study-1 [4]
Internet provides so many opportunities for students and teachers. Now a days it is more important to strengthen Internet security to deal with new and emerging online threat. According to a survey many students and teachers are worried about their online safety. Software, Firewalls, strong passwords, spreading awareness etc. are the best practices to avoid cyber threats.
a. What do you mean by Internet Security?
b. Name any two online threats.
c. What is Firewall?
d. Name any one website which help us to generate a random strong password.
Answer:
a. Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security.
b. Online threats are:
• Phishing
• Email Spoofing
• Chat spoofing
c. Firewalls could be software or hardware and can assist in keeping a computer and a network secure. Firewalls analyze the network traffic and determine if the traffic should be allowed or not.
d. www.strongpasswordgenerator.com help us to generate a random strong password.
Question 26.
Case Study-2 [4]
The following figure shows a small part of a Word document. Identify different formatting features that are applied to it.
A Word document is one used for typing documents such as letters, essays, homework etc. It is a text file created in a word processing program, such as Microsoft Office.
Answer:
a. Center Alignment
b. To bold the text
(i) Select the text
(ii) Click the Bold
(B) on the Home tab
To color the text
(i) Select the text
(ii) On the Home tab, in the Font group, choose the arrow next to Font Color, and then select a color.
c. To line spacing
(i) Select the paragraphs you want to change.
(ii) Go to Home > Line and Paragraph Spacing.
(iii) Choose the number of line spaces you want or select Line Spacing Options, and then select the options you want under Spacing.
d. Justified alignment