Annual Exam
Question Paper (Theory) Session: 2022-23
Class: IX
Computer Applications (Code 165)
Maximum Marks: 50 Time Allowed:
2 hours
General Instructions:
1. This Question Paper has 4
Sections A-D.
2. All Questions are compulsory.
However, an internal choice of approximately 30% is provided.
3. Section A has 12 questions
carrying 01 mark each.
4. Section B has 7 Very Short Answer
(VSA) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA)
type questions carrying 03 marks each.
6. Section D has 3 Long Answer (LA) type question carrying 04 marks.
Section – A (All questions are compulsory)
1. Brain of computer-
i. RAM iii. ROM iii.
SMPS iv. CPU
2. Which of the
following is defined as an attempt to harm, damage or cause threat to a system
or network?
a) Digital crime b) Threats
c) System hijacking d)
Cyber Attack
3. What is shortcut key
of Italic?
a. Ctrl+B b. Ctrl+C c. Ctrl+I d. Ctrl+U
4. Which of the
following is not an Operating System?
a) Linux b) UNIX c)
Windows d) MS Office
5. Which one is logical
function in electronic spreadsheet?
a. SUM b. IF c.
MAX d. AVERAGE
6. Which device is used
to read the codes written on bank cheque?
a ) Scanner b ) OCR c
) Light Pen d ) MICR
7. Which of the
following is a best printer in terms of quality of printing?
a ) Dot Matrix Printer b)
Inkjet Printer
c ) Laser Printer d) Daisy Wheel Printer
8. Fraudulently
acquiring sensitive information from the users by impersonating trusted website
is called _______.
a ) Spam b ) Phishing c
) Pharming d ) Cyber – bullying
9. Which is most common
input device?
a) Mouse b) Keyboard c)
Scanner d) monitor
10. We can insert in
presentation:-
a. Text b. Image c.
Audio d. All of these
11. ____________ is a
collection of raw facts .
a) Rock b) Information c
) Data d ) All of these
12. Stealing someone's
authentication details is an example of -
a ) Identity theft b ) Internet scam c ) Trojan d
) Phishing
To Download the pdf Click here
Section –B (2 marks each)
13.
Write any 3 wireless communication technology.
14.
What is cyber stalking?
Or
Why
Cyber security is important?
15.
What is an Operating System? Give any 2 Example.
16.
What is word wrap?
Or
What
is electronic spreadsheet?
17.
Write any 2 method to secure our computer.
18.
What is use of formatting in word processor?
19.
Write any 5 Input Device.
Or
Write
any 5 Output Device.
To Download the pdf Click here
Section –C (3 marks each)
20.
Write the difference between RAM and ROM.
21.
Write the rule of Strong password.
22.
Write the characteristics of a computer.
OR
What
is Application software? Give any 2 example of application software.
23.
Write the different views of presentation? Which one is default view?
To Download the pdf Click here
Section –D (4 marks each)
24. What
is Word Processor? Write the different features of word processor?
25.
What is computer network? Explain different types of computer network.
26. What
is security threats? Explain different types of security threats.
The End
0 Comments
Post a Comment