Annual Exam
Question Paper (Theory) Session: 2022-23
Class: IX
Computer Applications (Code 165)
Maximum Marks: 50 Time Allowed:
2 hours
To Download the PDF Click Here
General Instructions:
1. This Question Paper has 4
Sections A-D.
2. All Questions are compulsory.
However, an internal choice of approximately 30% is provided.
3. Section A has 12 questions
carrying 01 mark each.
4. Section B has 7 Very Short Answer
(VSA) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA)
type questions carrying 03 marks each.
6. Section D has 3 Long Answer (LA)
type question carrying 04 marks.
Section – A (All questions are compulsory)
1. Brain of computer-
i. RAM iii. ROM iii.
SMPS iv. CPU
2. Which of the
following is defined as an attempt to harm, damage or cause threat to a system
or network?
a) Digital crime b) Threats
c) System hijacking d) Cyber Attack
3. What is shortcut key
of Italic?
a. Ctrl+B b. Ctrl+C c. Ctrl+I d. Ctrl+U
4. Which of the
following is not an Operating System?
a) Linux b) UNIX c)
Windows d) MS Office
5. Which one is logical
function in electronic spreadsheet?
a. SUM b.
IF c. MAX d. AVERAGE
6. Which device is used
to read the codes written on bank cheque?
a ) Scanner b ) OCR c
) Light Pen d ) MICR
To Download the PDF Click Here
7. Which of the
following is a best printer in terms of quality of printing?
a ) Dot Matrix Printer b)
Inkjet Printer
c ) Laser Printer d)
Daisy Wheel Printer
8. Fraudulently
acquiring sensitive information from the users by impersonating trusted website
is called _______.
a ) Spam b )
Phishing c )
Pharming d ) Cyber – bullying
9. Which is most common
input device?
a) Mouse b)
Keyboard c) Scanner
d) monitor
10. We can insert in
presentation:-
a. Text b. Image c.
Audio d. All of these
11. ____________ is a
collection of raw facts .
a) Rock b) Information c ) Data d ) All of these
12. Stealing someone's
authentication details is an example of -
a ) Identity theft b ) Internet scam c ) Trojan d
) Phishing
To Download the PDF Click Here
Section –B (2 marks each)
13.
Write any 3 wireless communication technology.
Answer:- 3 wireless communication technology are:-
1. Wi-Fi 2.
Bluetooth c. Infrared
14.
What is cyber stalking?
Answer:- Cyberstalking involves using the internet, cell phone,
and/or any other electronic communication device to stalk another person.
Or
Why
Cyber security is important?
Answer:- Cybersecurity is the art of protecting networks,
devices, and data from unlawful access or criminal use and the practice of
guaranteeing confidentiality, integrity, and availability of information.
15.
What is an Operating System? Give any 2 Example.
Answer:- An operating system (OS) is a collection of software
that manages computer hardware resources and provides common services for
computer programs.
Example of Operating System:-
Windows
Linux
16.
What is word wrap?
Answer:- a word processing feature that automatically transfers a
word for which there is insufficient space from the end of one line of text to
the beginning of the next.
Or
What
is electronic spreadsheet?
Answer:- A spreadsheet is a grid which interactively manages
and organizes data in rows and columns. It is also called as Electronic
Spreadsheet.
17.
Write any 2 method to secure our computer.
Answer:- 2 Method to secure our computer:-
1. Using Antivirus 2.
Don’t use unknown software
18.
What is use of formatting in word processor?
Answer:- The process of formatting a document
involves specifying how the document will look in its final form on the
screen and when printed.
19.
Write any 5 Input Device.
Answer:- 5 Input Device name:-
1. Mouse 2. Keyboard 3. Joystick 4. OMR 5.
Light Pen
Or
Write
any 5 Output Device.
Answer: 5 Output Device name:-
1. Monitor 2. Speaker 3. Projector 4. Printer 5. Headphone
To Download the PDF Click Here
Section –C (3 marks each)
20.
Write the difference between RAM and ROM.
Answer:- Difference between RAM and ROM are:-
RAM |
ROM |
1. RAM full form is Random Access Memory. |
1. ROM full form is Read Only Memory. |
2. RAM is volatile memory. |
2. ROM is non volatile memory. |
3. RAM is Expensive. |
3. ROM is cheap. |
21.
Write the rule of Strong password.
Answer:- Rules of Strong Password:-
·
At least 12 characters long
but 14 or more is better.
·
A combination of uppercase letters,
lowercase letters, numbers, and symbols.
·
Not a word that can be found in a
dictionary or the name of a person, character, product, or organization.
22.
Write the characteristics of a computer.
Answer: The characteristics of a computer are speed, accuracy,
diligence, versatility and memory.
OR
What
is Application software? Give any 2 example of application software.
Answer:- application software, also called application
program, software designed to handle specific tasks for users.
Example of Application software:-
1. MS Office 2. Photoshop
23.
Write the different views of presentation? Which one is default view?
Answer:- View of presentation :-
Normal view,
Slide sorter view
Hand-outs
Notes Page view
Default view of presentation is Normal View.
To Download the PDF Click Here
Section –D (4 marks each)
24. What
is Word Processor? Write the different features of word processor?
Answer:- A word processor is a type of software application used for
composing, editing, formatting and printing documents.
Some important features of word-processing software are as follows:-
Word Wrap
The word processor automatically moves to the next line when the
user has one line filled with text and adjusts the text if the margins are
changed.
Formatting
Word processing software provides a wide range of formatting
facilities. The user can change the codes, background color, and size style of
a text. The formatting can be applied to characters, paragraphs, or whole
pages.
Printing
Word processing software provides a printing facility. The user can
print the document to get a hard copy.
The user can print the whole document or any range of pages.
Find and Replace
The Find feature is used to find a certain character word or phrase
in the document. The Replace feature is used to find a certain character word
or phrase in the document and replace it with another.
Spelling and Grammar
Spelling and Grammar features are used to detect and correct
spelling and grammatical mistakes in the documents the
AutoCorrect
Word processing software automatically corrects many commonly
misspelled words and capitalization errors with the AutoCorrect feature
25.
What is computer network? Explain different types of computer network.
Answer:- Computer networking refers to interconnected computing
devices that can exchange data and share resources with each other.
Types of Computer Network:-
PAN (Personal Area Network)
LAN (Local Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
PAN (Personal Area Network)
A personal area network (PAN) connects electronic devices
within a user's immediate area. The size of a PAN ranges from a few centimeters
to a few meters. One of the most common real-world examples of a PAN is the
connection between a Bluetooth earpiece and a smartphone.
LAN (Local Area Network)
The Local Area Network (LAN) is designed to connect
multiple network devices and systems within a limited geographical distance.
The devices are connected using multiple protocols for properly and efficiently
exchanging data and services.
MAN (Metropolitan Area Network)
The Metropolitan Area Network (MAN) is a network type
that covers the network connection of an entire city or connection of a small
area. The area covered by the network is connected using a wired network, like
data cables.
WAN (Wide Area Network)
The Wide Area Network (WAN) is designed to connect
devices over large distances like states or between countries. The connection
is wireless in most cases and uses radio towers for communication.
26. What
is security threats? Explain different types of security threats.
Answer:- security threats means any threat or connected series
of threats to commit an intentional attack against a Computer System for the
purpose of demanding money, securities or other tangible or intangible property
of value from an Insured.
1. Malware
Malware is malicious software such as spyware, ransomware, viruses
and worms. Malware is activated when a user clicks on a malicious link or
attachment, which leads to installing dangerous software.
2. Phishing
Phishing attacks use fake communication, such as an email, to trick
the receiver into opening it and carrying out the instructions inside, such as
providing a credit card number.
3. Computer Virus
A computer virus is a type of malware that attaches itself to
other programs, self-replicates, and spreads from one computer to another.
4. Trojan Horse
A Trojan Horse (Trojan) is a type of malware that disguises
itself as legitimate code or software.
5. Ransomware
Ransomware is a form of malware that locks the user out of
their files or their device, then demands a payment to restore access.
The End
2 Comments
This blog post is really very informative. Where you are providing the information about “Class 9 Computer Application Solved Question Paper 2022-23 | PDF Download” That is really such nice information for those who need it. Here in this post, you are also providing the information about “All Questions are compulsory. However, an internal choice of approximately 30% is provided.
ReplyDelete3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Very Short Answer (VSA) type questions” that is one of the most important information. But here my opinion is that you can have to create a website and spread your information to worldwide. So, that you can choose Ritz Media World for Web Design Company In Delhi NCR.
As you are providing the information that is very important and useful for all. We also want to provide some information about Smart Watering System using IoT by Digicane Systems.
ReplyDeletePost a Comment