9 COMP Sa 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

S.A.

-I
Sub- Computer.
Class-IX
Time:- 1:30 hour [M.M- 50]
Attempt all the questions.

Ques.1:- Tick the correct option. (10)


i. Which of the following is NOT an example of Cybercrime?
a) Stealing computer hardware b) Cyber Bullying
c) Cyber Stalking d) Stealing someone’s online identity.
ii. What is the most common way people’s computers get infected by a virus?
a) receive a fax b) install new hardware
c) Download email attachments d) Run/open an infected disk
iii. Interactive combination of text, images, Graphic, audio, video etc. is known as
a) Data b) Information c) Multimedia d) Internet
iv. Storing and accessing data and programs over the Internet is generally known as. ___.
a) Modern computing b) Internet computing
c) Wireless computing d) Cloud computing
v. Which is the layer of a computer system between the hardware and the user program?
a) Operating environment b) operating system
c) System environment d) none
vi. Which type of software is designed to perform a specific personal, business or scientific
processing tasks?
a) System b) GUI c) applications d) compiler
vii. In computer terminology, a compiler means
a) A person who computes source programs b) the same things as a programmer
c) A key puncture operator
d) A Program which translates high level language program to machine language.
viii. What does OCR stand for
a) Optical Character Reader b) Optical Character Recognition
c) Operational Character Reader d) Only Character Reader
ix. Which of the following is storage device can be used for storing large backup data
a) Floppy disk b) hard disk c) magnetic tape d) none of the above
x. Networks are useful because
a) No one can copy your files b) you only need one printer per network
c) the computers use less electricity
d) each user of the network can access files more easily

Ques.2 – Fill in the blanks- (10)


i. 1 GB =_______ MB
ii. An _________ is a system software. It manages the resources of a computer system and makes
a computer easy to use.
iii. The programs designed to govern the computer hardware system are called the___________.
iv. Software designed for a specific application such as pay calculations, processing of examination
result etc. are known as _______________________.
v. Printed copy is often called _________________.
vi. The part of computer that allows the user to view information on a screen is called _________.
vii. Full form of GUI is ____________.
viii. Computers have __________ IQ.
ix. __________ is the most powerful computer.
x. Computers are __________than human beings.

Ques.3 :- Answer the following questions in short.– (12)


i. What is a network? Why is networking needed?
ii. What is pointing device? Name a popular pointing device.
iii. Define the term Shell.
iv. What is cyber stalking?
v. Define compiler.
vi. What are cookies? How are they used by websites to track you?
vii. What is output device? Name them.
viii. What is computer virus? How can it affect your computer?

Ques.4:- Answer the following questions in Detail.– (14)


i. Describe the functioning of CPU.
ii. What is cyber safety? Why is it important?
iii. What is cloud computing? Explain its types.
iv. What is an operating system? Write its functions.
v. Explain guided and unguided media with example.
vi. What is internet? Write its uses.
vii. Explain :
a) LAN b) MAN C) WAN

Ques.5:- Write full form of the following: (4)


a) CRT b) LCD c) FTP d) HTML

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy