Students can access the CBSE Sample Papers for Class 9 Computer Applications with Solutions and marking scheme Set 5 will help students in understanding the difficulty level of the exam.
CBSE Sample Papers for Class 9 Computer Applications Set 5 with Solutions
Time Allowed : 2 hours
Maximum Marks : 50
General Instructions:
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However, internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-1) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section-A (1 Mark each)
(All questions are compulsory)
Question 1.
Which of the following is a unit of measurement used with computer system? [1]
(A) Byte
(B) Mega Byte
(C) Giga Byte
(D) All of these
Answer:
(D) All of these
Explanation: There are different units of measurement in a computer like nibble, bytes, megabytes, gigabytes, terabytes, zettabytes, etc.
Question 2.
Which of the following does not represent an I/O device? (Sjp] [1]
(A) Speaker
(B) Plotter
(C) ALU
(D) Joystick
Answer:
(C) ALU
Explanation: Here, ALU is a processing device. ALU is a part of the CPU which calculates all the arithmetic and logical operations.
Question 3.
Utility programs include- [1]
(A) Virus scanning software
(B) Backup software
(C) Disk defragmenter
(D) All of these
Answer:
(D) All of these
Explanation: Utility software (also known as service program, service routine, tool, or utility routine) is computer software designed to help manage and tune the computer hardware, operating system or application software by performing a single task or a small range of tasks.
Question 4.
A company’s DBMS may be integrated with- [1]
(A) Payroll system
(B) HR management
(C) Attendance system
(D) All of these
Answer:
(D) All of these
Explanation: DBMS is used to store and retrieve the records and it can be used as the back-end support for Payroll system, HR management and Attendance system.
Question 5.
Cyber Attack refers to- [1]
(A) An effort to steal,
(B) spy on, damage,
(C) or destroy diverse components,
(D) All of the mention
Answer:
(D) All of the mention
Explanation: Cyber Attack refers an effort to steal, spy on, damage, or destroy diverse components of cyberspace, such as computer systems.
Question 6.
Spyware employs a variety of techniques to communicate back to a/an ……………. [1]
(A) User
(B) Machine
(C) Attacker
(D) None of these
Answer:
(C) Attacker
Explanation: Spyware is anything that takes up residence on a computer, usually uninvited, that can report on the activities and preferences of the computer’s users or disclose information about data stored on a computer.
Question 7.
What is an example of a Phishing Scam? [1]
(A) An application that looks useful, but actually contains spyware to slow down your computer.
(B) An email that appears to be legitimate, but is really being used to obtain personal or important infor-mation.
(C) Hacking into a computer and leaving false trails on who did it.
(D) Installing a virus and then asking you to pay to remove it.
Answer:
(B) An email that appears to be legitimate, but is really being used to obtain personal or important infor-mation.
Explanation: Phishing is a type of social engineering attack often used to seal user data, including login credentials and credit card numbers.
Question 8.
The general arrangement of the text in the document is
(A) Margin
(B) Text-alignment
(C) Clipboard
(D) Formatting
Answer:
(D) Formatting
Explanation: Formatting is to give special effects to the text like changes in font, style, size and colors, etc.
Question 9.
Which of the following function returns smallest value?
(A) Max
(B) Small
(C) Min
(D) Smallest
Answer:
(C) Min
Explanation: Use the MIN function to find the
smallest number.
Question 10.
While running a slide show, transition of slides can be done :
(A) Manually
(B) Using timing
(C) Bot (A) and (B)
(D) None
Answer:
(C) Bot (A) and (B)
Explanation: The slide transition can take place manually (by pressing the keyboard key or pressing mouse button) or using Rehearse timing feature (recording the time upto which a presentation
will be viewed).
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely, Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
Question 11.
Assertion (A): Access to confidential data can only be obtained by those who are allowed to do so. [1]
Reason (R)rConfidentiality applies to shielding unauthorized persons from obtaining information.
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
Explanation: Confidentiality has to do with the privacy of information, including authorizations to view, share, and use it. … passwords, which must remain confidential to protect systems and accounts.
Question 12.
Assertion (A): The data consolidation function takes data from a series of worksheets or workbooks and
summaries it into a single worksheet that can be updated easily. [1]
Reason(R): The sort option is present on data menu
(A) Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
(C) Assertion (A) is true and Reason (R) is false.
(D) Assertion (A) is False and Reason (R) is True.
Answer:
(B) Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
Section-B [2 Marks each]
Question 13.
Write four different types of utility software categories. [2]
Answer:
Utility software categories:
(i) Disk storage utilities keep track of the disk space and related tasks.
(ii) Disk cleaners can find files that are unnecessary to computer operation, or take up considerable amounts of space. Disk cleaner helps the user to decide what to delete when its hard disk is full.
(iii) Disk partitions can divide an individual drive into multiple logical drives, each with its own file system which can be mounted by the operating system and treated as an individual drive.
(iv) Backup utilities can make a copy of all the information stored on a disk, and restore either the entire disk (e.g., in an event of disk failure) or selected files (e.g., in an event of accidental deletion).
Question 14.
What benefits will a computerized accounting system bring your company? State any five possible ben¬efits. [2]
OR
How operating systems can be classified?
Answer:
(i) Automatic posting
(ii) Automatic reports generation
(iii) Automatic documents printing
(iv) More accuracy
(v) More faster to prepare an accounting report.
OR
Operating systems can be classified as follows:
(i) Multiuser: Allows two or more users to run programs at the same time.
(ii) Multiprocessing: Supports running a program on more than one CPU.
(iii) Multitasking: Allows more than one program to run concurrently.
(iv) Multithreading: Allows different parts of a single program to run concurrently.
Question 15.
What is the use of First-Party Cookies? [2]
Answer:
First-party cookies are directly stored by the website, which allows website owners to collect data, remember language settings, and perform other functions that provide a good user experience.
Question 16.
Define computer virus. Name some of the dangerous viruses. [2]
OR
Neera uses social websites. She is aware about cyber crime, but she is confused how to make password so strong that no one can break it. Give some tips to make her password.
Answer:
A virus is a computer program that is designed
to replicate itself by copying itself into the other
programs stored in a computer. It may have a
negative effect, such as causing a program to
operate incorrectly or corrupting computer’s
memory.
(i) C-Brain
(ii) Trojan horse
(iii) Macmag
(iv) Cascade
OR
To secure your passwords on the web, follow these tips:
1. Make sure it’s a base length of eight characters.
2. Use a mix of upper- and lower-case letters and in any event one number.
3. Include in any event one identity that isn’t a letter or number.
4. Be alert – utilize the primary letter of each expression of an important sentence or expression, at that point make it considerably harder by changing a portion of the letters to numbers (for example utilize a “3” to supplant an “e”).
5. Try a blend of your pet’s name, your preferred numbers, the road you experienced childhood with or different mixes.
Question 17.
Siddharth, a computer operator creating a presentation on solar system for his customer. The customer demands him to add some video clips to make it effective. Is it possible to add video clips in the presenta-tion? Write its steps. [2]
Answer:
Yes.
To add video clip in the slide, follow the given steps:
Step 1: Move to the slide to which you want to add the video.
Step 2: Select the Insert tab on the Ribbon and then click on the Video button located on the right side of the tab. The Insert Video dialog box appears.
Step 3: Select the video file that you want to insert.
Step 4: Click on the Insert button.
The video clip appears in the slide.
Question 18.
Create a list of 10 editing features of a MS-Power Point. [2]
OR
Explain the following:
- Undo and Redo commands
- Ungrouping sheets
Answer:
(i) Changing font sizes
(ii) Coloring objects
(iii) Inserting picture
(iv) Inserting graphics
(v) Editing picture
(vi) Adding sound
(vii) Adding video clips
(viii) Adding 3D objects
(ix) Animation
(x) Using templates
OR
- Undo command is used to remove the current action. Redo Command is used to remove the current undo action.
- Sheets can also be ungrouped by the help of sheet tab. If you do not ungroup the sheets any work you did in one sheet will be duplicated in all the others.
Question 19.
Explain mouse and also explain its types. [2]
Answer:
A device that controls the movement of the cursor
or pointer on a display screen.
There are a few different types of mouse available:
- Serial Mouse: This is a mouse with a serial connector, which requires a free serial port on our PC.
- USB Mouse: This type of mouse has a USB connector and requires a free USB port.
- Cordless Mouse: A cordless mouse (as the name suggests) has no cable, this type of mouse utilizes batteries for its power supply.
- Optical Mouse: An optical mouse utilizes optical electronics to track the mouse’s position and movement. They are preferred over standard mechanical mouse as they tend to be more reliable and require less maintenance. They can be considered in above 3 categories because they are available in all these variants.
Section-C [3 Marks each]
Question 20.
The operating system of modern computers has progressed from a command system to a Graphical User Interface (GUI). Describe three advantages to the user for using a Graphical User Interface rather than a Command driven svstem [3]
Answer:
(i) A GUI allows more information to be conveyed to the user through the use of icons, pictures, text, etc.
(ii) Icons can make it easier for a user to know what a computer is going to do before it does.
(iii) It allows the user to carry out much more complex operations in a much easier way.
Question 21.
Explain the following:
- Radiowaves
- Infrared Communication
- Co-axial cable
Answer:
- Radiowaves, like visible light, infrared, ultraviolet, x-rays and gamma rays, are electromagnetic waves that do travel through a vacuum.
- Infrared is a type of light that is not visible through the human eye. Infrared communication is concept of establishing connection through Infrared light as medium.
- A co-axial cable consists of one conductor usually a small copper tube or wire within and insulated from another conductor of large diameter usually copper tubing or copper braid.
Question 22.
Explain the various views that a document can be displayed in.
OR
How do you add a new slide to the presentation? Also explain, what can you do if you want each slide should be shown for a specific amount of time?
Answer:
In Word, we can view a document in a variety of ways:
(i) Print layout view: This view displays a document on the screen, the way it will look when printed.
(ii) Full-screen reading view: This view displays as much of the content of the document as will fit on the screen at a size which is comfortable for reading.
(iii) Web layout view: This view displays a document on the screen, the way it will look when viewed in a web browser.
(iv) Draft view: This view displays the content of a document with a simplified layout so that we can type and edit quickly.
OR
To add a new slide, click on the slide that you want the new slide to follow and then click on the New Slide button. The Slide Layout task pane appears so that you can select the layout for the new slide.
Setting Specific Amount of Time: Setting advance slide to on mouse click is the default and a simple setting. If we want each slide to be shown for a specific amount of time, click automatically after and enter the number of seconds.
Question 23.
Define the terms: [3]
(i) Cyber Stalking
(ii) Threats
Answer:
(i) Cyber stalking is a criminal offence under various state anti-stalking, slander and harassment laws.
(ii) A threat is an object, person, or other entity that represents a constant danger to an asset.
Management of the organization must be informed of the various kinds of threats facing the organization.
Section-D [4 Marks Each]
Question 24.
Describe at least two ways in which external memory complements internal memory. [4]
OR
Siddharth wishes to make a copy of his geography course work which is stored on the school computer system. He wants to take it home to finish it for home work. He has 2GB memory stick of his own. m Give the advantages of using memory stick.
Answer:
(i) Internal memory like RAM is limited in size i.e., only up to 8 GB but on the other hand external memory provides a larger space to the user to store data i.e., up to 2 TB.
(ii) Internal memory is volatile in nature whereas external memory is non-volatile in nature, which means that when we turn off power supply the data in our internal memory will be lost but the data in external memory will remain safe.
OR
Advantages of using memory stick are:
(i) A memory stick is more compact and easier to carry.
(ii) A memory stick offers faster access to data.
(iii) A memory stick offers faster data transfer.
(iv) A memory stick is more robust media.
(v) It is economically priced, offering large storage.
Section-E [4 Marks Each]
Question 25.
Case Study-1 [4]
Cyber Safety
Internet safety or online or cyber safety or E-safety is trying to be safe on the internet and is the actof maximizing a user’s awareness of personal safety and security risks to private information and property associated using the internet, and the self-protection from computer crime.
As the number of internet users continues to grow worldwide, internet, governments and organizations have expressed concerns about the safety of children and teenagers using the internet.
Over 35% have announced they have endured some sort of cyber-harassment. Safer InternetDay is celebrated worldwide in February to raise awareness about internet safety. In the UK Get SafeOnline Cam-paign has received sponsorship from government agency Serious Organized Crime Agency and major internet companies such as Microsoft and eBay.
a. What do you mean by cyber safety?
b. Who is the government concerned about cyber security?
c. In which month of the year the safer internet day celebrate and for what purpose?
d. What is full form of SOCA?
Answer:
a. Internet safety or online or cyber safety or Esafety is trying to be safe on the internet.
b. Governments and organizations have expressed concerns about the safety of children and teenagers using the internet.
c. Safer Internet Day is celebrated worldwide in February to raise awareness about internet safety.
d. Serious Organised Crime Agency.
Question 26.
Case Study-2 [4]
Oswaal stationery keeps stock of various stationeries in its shop. The proprietor wants to maintain a stock value and reorder level for following items as given in a spreadsheet.
Write formulas for the operations (i) to (iii) and answer the questions (iv) based on the spreadsheet given below along with the relevant cell address:
(a) To calculate the Stock Value as product of ‘Quantity in Stockl and ‘Rate’ for each item present in the spreadsheet.
(b) To calculate the ‘Quantity to Order’ as ‘Minimum Stock Quantity’-‘Quantity in Stock’ for each item.
(c) Proprietor wants to graphically represent his stationery stock. Suggest him the most appropriate feature of MS-Excel.
(d) If Quantity in Stock’s value changes, will have to redo all the calculations for that particular column
Answer:
a. At cell F2, type = D2*E2 and then copy this formula using Fill handle in range F3: F5.
b. To calculate the ‘Quantity to Order’ as ‘Minimum Stock Quantity’-‘Quantity in Stock’ for each item, use the formula =(Minimum Stock Quantity)-(Quantity in Stock)
c. To graphically represent the stationery stock in Excel, the most appropriate feature would be a bar chart or a column chart. These types of charts can show the quantities of each item in the stock and allow for easy comparison and visualization.
d. No the recalculation is not again required because the formula and functions that are given changes according to the values in the cells.