You are on page 1of 3

PRELIMINARY E X A M I N A T I O N 2021 – 2022

SUBJECT: COMPUTER T. MARKS: 60


CLASS: IX T. TIME: 3 Hours

Section – A (MCQs – Multiple Choice Questions)


Q.01: Choose the correct answer for each from the given options. 24

i. ENIAC and UNIVAC are the examples of:


(a) 5th Generation Computers (b) 4th Generation Computers
(c) 2nd Generation Computers (d) 1st Generation Computers

ii. The function which is used to re-arrange data according to specific criteria is called:
(a) Filtering (b) Sorting
(c) Organizing (d) Grouping

iii. If we want to change the overall design of a word document, we should use:
(a) Themes (b) Page layout
(c) Watermark (d) Margins

iv. DOS is an example of:


(a) Real Time Processing OS (b) Single User OS
(c) Multi Processing OS (d) Multi User OS

v. The operating system that allows frequent switching from one task to another is:
(a) Batch Processing (b) Real Time Processing
(c) Single User (d) Time Sharing

vi. The number of bits used in an IPV 4 address are:


(a) 16 (b) 32
(c) 64 (d) 128

vii. The loss of energy in transmission signal refers to:


(a) Attenuation (b) Distortion
(c) Noise (d) Jitter

viii. The broad term that encompasses different harmful software is:
(a) Virus (b) Malware
(c) Adware (d) Spyware

ix. The malware that replicates itself and doesn't need to attach with any files is:
(a) Virus (b) Adware
(c) Spyware (d) Worm

x. To create a clickable text which navigates to another page or section, we use:


(a) <input> tag (b) <li> tag
(c) <b> tag (d) ca> tag

xi. In a database table of "Students", the address of the student will be a:


(a) Record (b) Field
(c) Entity (d) Data type

xii. A key that allows only unique entries in a field is called:


(a) Primary key (b) Secondary Key
(c) Foreign Key (d) Super Key
xiii. It is considered as first computer prototype.
(a) Pascal’s Calculator (b) Slide Rule
(c) Napier’s Bones (d) Abacus

xiv. Slide Rule was invented by:


(a) John Napier (b) William Oughtred
(c) Blaise Pascal (d) Gottfried Leibniz

xv. The software which performs all basic tasks is:


(a) Antivirus (b) Start Menu
(c) Operating System (d) Office Automation

xvi. A program that enables user to interact with computer is called:


(a) My document (b) Start menu
(c) Desktop (d) Interface

xvii. The software that is used to format a document is:


(a) MS Word (b) MS Excel
(c) MS Power point (d) MS Access

xviii. The special character that initiates the formula mode in a cell is:
(a) / (b) =
(c) - (d) *

xix. Both Physical and Logical addresses are:


(a) Different (b) Unique
(c) Permanent (d) Temporary

xx. If you are an electrical or electronic engineer, you should join:


(a) IEEE (b) IETF
(c) ITU (d) ANSI

xxi. Software are mostly protected under:


(a) Patents (b) Trademarks
(c) Logos (d) Copyrights

xxii. Since it does not harm or steal data, the least harmful malware is:
(a) Virus (b) Adware
(c) Spyware (d) Trojan

xxiii. The service that is responsible for making websites publicly accessible through the internet is:
(a) Web Server (b) Web Hosting
(c) Web Site (d) Web Browser

xxiv. To differentiate the heading cells from rest of the data in a table, we use:
(a) <th> tag (b) <tr> tag
(c) <td> tag (d) <dt> tag
Section – B (Short Answer Questions)
Note: Attempt any eight questions from this Section. All question carry equal marks. 24

Q.02: What are the differences between RAM and ROM?


Q.03: Differentiate between Compiler and Assembler.
Q.04: Differentiate between CLI and GUI. Write any two benefits of each.
Q.05: What are the differences between Single User and Multi User OS?
Q.06: List four uses of spreadsheets in business.
Q.07: Write down the differences between Analog and Digital Signals.
Q.08: Describe IP Address and IPV4 Address.
Q.09: What are the steps involved in creating a Web Page in HTML?
Q.10: Why Database Management System is preferred over Flat File System?
Q.11: What is the difference between Design View and Datasheet View?
Q.12: Define Bus. Define different types of Buses.
Q.13: Draw the block diagram of computer's basic operations.
Q.14: What are the differences between Soft Real Time and Hard Real Time Systems?
Q.15: Define Antivirus. Why it is important to install an ‘Antivirus’?
Q.16: Define Cyber Attack. Discuss Cyber Harassment and what to do in case of becoming a victim?

Section – C (Descriptive Answer Questions)


Note: Answer any two questions, each question carry equal marks. 12

Q.17: Prepare a ‘Table of Generations’.


Q.18: Define different Components of a Communication System.
Q.19: Define Guided Media. Describe different types of Guided Media.
Q.20: Describe the physical layout of Bus, Ring and Star Topologies.
Q.21: Define Malware. Describe different types of Malware.
Q.22: Describe the functions of different Communication Devices.

You might also like