You are on page 1of 6

2020-2021

First Revision Examina

Name of the Examination: Academic Year


Computer 2 hours
IX Applications

Class Subject Duration

Name of the Question


Seen 50

Setter Max. Marks

General Instructions:
1. This question paper contains two parts A and B. Each part is compulsory.

2. Part A carries 20 marks while part B carries 30 marks.

3. Part-A consists very short answer and case based MCQ Questions and Part-B is
Descriptive Paper.

4. Both Part A and Part B have choices.

Part – A:
1. It consists two sections- I and II.

2. Section I has 13 questions of very short answer type. An examinee is to attempt any 10
out of 13 questions.

3. Section II has two case studies. Each case study has 7 case-based sub-parts. An
examinee is to attempt any 5 out of 7 sub-parts.

Part – B:
1. Question No. 16 to 20 are short answer Type (SA-I) questions of 2 mark each,
Question No 21 to 25 are Short Answer Type (SA-II) questions of 3 marks each and
Question No 26 is Long Answer Type question of 5 marks.2. Internal choice is provided
in 1 question of 2 marks, 1 question of 3 marks and 1 question of 5 marks.
Questio Part A Marks
n No Allocated
Section-I

This section consists of 13 questions of very short answer type.


Question no. 4 to 8 are of 'fill in the blank' type. Fill the blank
with the most appropriate answer. Attempt any 10 questions
from question no 1 to 13.

1 Identify the following: 1

a) Hard drive
b) Floppy disc
c) Memory stick
d) None of the Above

2 Which of the following is the part of language 1


processor? a. Hardware
b. Text editor
c. Compiler
d. Antivirus software

3 _____Allow the hackers to gain remote access of a target 1


system. a. Trojan Horses
b. Spyware
c. Adware
d. None of the above

4 1 kilobyte(KB)=_____ bytes 1
5 ____ is the process of loading an operating system into a computers 1
main memory.

6 Rehearse timing command is present on _______ tab. 1


7 Is it possible to change the background of a slide at some later point 1
of time?

8 ________refers to all the activities done with criminal intent in 1


cyberspace

9 This view allows you to set the appearance of all printed handouts for 1
a presentation.

10 The process of removing unwanted part of an image is 1


called--- a. Hiding
b. Cropping
c. Cutting
d. None of the above

11 The default page orientation in Excel is: 1


12 Define Cyber safety. 1
13 What is Cloud computing? 1
14 Computer is a device that transforms data into meaningful
information. It processes the input according to the set of
instructions provided to it by the user and gives the desired
output quickly. A Computer can perform the following set of
functions:
Accept data
Store data
Process data as desired
Retrieve the stored data as and when required
Print the result in desired format.

(i) Name the primary memory that is volatile in nature 1


(ii) Brain of the computer is called____ 1
a. Software
b. Hardware
c. CPU
d. Memory

(iii) These devices accept data and instructions from the 1


user. a. Memory
b. Output devices
c. Input devices
d. CPU

(iv) The major sections/components of a CPU are ______ and _____ 1

(v) Plotter is an example of ______ 1

a. Memory
b. Output devices
c. Input devices
d. ALU

(vi) The function of a _____ unit is to Store data. 1

(vii) The function of an ____is to perform arithmetic and logic operations 1


15 Cyber safety
Cyber safety refers to safety in cyberspace. It is the safe and
responsible use of information and the communication
technologies(ICT) various approaches to cyber safety is founded
on:
∙ Maintaining a positive approach about the many benefits
brought by technologies
∙ Encouraging the public to identify the risks associated with
ICT
∙ Putting in place strategies to minimize and manage risks

Impact of internet on society

The most important thing which the internet has done is that it
has brought people of the world very close to each other. The
communication has become so good that whereas it used to take
15 days for a letter to come from the USA, it now takes 15
seconds to send an email to anywhere in the world.

(i) Cyber safety is the responsible use of 1


a. IT
b. ICT
c. Social networks
d. passwords

(ii) Internet is networks of 1


a. Networks
b. Humans
c. Workers
d. None of the above

(iii) State true or false: 1


Twitter is a social networking site.

(iv) Macfee is ____ program 1


a. A virus
b. An antivirus
c. An OS
d. None of the above

(v) Hacker is a person who 1


a. Has an intention of causing damages
b. Does not have an intention of causing damages.
c. Distributes any electric book or document without the consent
of the concerned person
d. Is an abuser repeatedly sending an identical email message to a
particular address

(vi) ____means doing business online 1


a. World wide web
b. Confidentiality of information
c. E-commerce
d. Cyber crime

(vii) ____is a form of malware that essentially hold a computer system 1


captive while demanding a ransom.
a. Worm
b. Trojan horse
c. Bots
d. Ransomware

Part –B

All questions are compulsory. In case of internal choices,


attempt any one.

16 Compare and contrast the two wireless transmission media: Bluetooth 2


and infrared.

17 Distinguish between bitmap and vector images 2

OR

Write the difference between RAM and ROM

18 Write the rules to enter a formula in Excel. 2


19 Explain any 2 ways of safe browsing the web and using 2
social networks.

20 Write any 4 tips which help you while creating password? 2


21 Consider the following table. Write down the formula to calculate the 3
following:

AB CDEF
NAME BASIC HRA DA PF NET
1
SALARY
2 Amal 50000 20000 ___ 600 ___
3 Diya 56000 20000 ___ 600 ___
4 John 35000 15000 ___ 400 ___
5 Harjit 45000 15000 ___ 500 ___
6 Kavin 60000 25000 ___ 700 ___
7 Surya 75000 30000 ___ 700 ___
8 Dev 25000 10000 ___ 300 ___
9 Maximum ___

a. To calculate the DA as 25 % of BASIC+HRA for each


employee and display in column D.

b. To calculate the NETSALARY as BASIC+HRA+DA-PF for


each employee and display in column F.

c. To find the maximum NETSALARY and display in cell F9.

22 Write any one point of difference between the 3


following: a. Margins and alignment of text
b. Save and save as
c. Merging cells and splitting cells
23 a. Write the difference between animation and transition in 3
PowerPoint.
b. Write the steps to create an animation.

24 a. Discuss briefly about any 3 email-crimes that 3

occur. OR

b. Write short notes on:


(i) Adware
(ii) Spyware
(iii) Trojan Horse

25 a. Write short notes on : 3


i. Scanner
ii. Printer
iii. Flash drive

26(5 m) a. Make a comparison between twisted pair cable, co-axial 5


cable and optical-fiber media.
b. Define Multimedia. Name any two applications of
Multimedia

OR

c. What do you mean by software? Explain its types.

You might also like