Class Ix - 165 Sample Paper 1
Class Ix - 165 Sample Paper 1
a. Cyber-safety b. Cyber-security
c. Cyber-health d. Firewall
2. Which of the following is not a way of online user tracking over internet?
a. Fingerprinting b. Cookies
c. Adware d. Online Advertising
3. Which of the following is promoted as useful program and, once installed, affects the computer
system?
a. Trojan b. Spam
c. Worm d. Spyware
4. Fraudulently acquiring sensitive information from the users by impersonating trusted website is
called______.
a. Spam b. Phishing
c. Cyber-bullying d. . Pharming
5. A firewall is a security combination of __________and ________.
a. Virus, anti-virus b. SSL, HTTPS
c. Hardware, software d. Windows, MS-Office
6. For what purpose is word processors used?
a. Photo editing b. Typing
c. Engineering Drawing d. Downloading
7. Which of the following is not a part of writer interface?
a. Standard Toolbar b. Status Bar
c. Formatting Toolbar d. Formula Bar
8. Shortcut key to create a new document is,
a. Ctrl + D b. Ctrl + N
c. Ctrl + C d. Ctrl + F
9. Which option is used to copy the text from one location to another?
a. Cut, paste b. Redo
c. Copy, paste d. Format Painter
10. _______ feature is used to search for a word in a document.
a. Find & Replace b. Track Change
c. Spell Check d. None of these
11. A fake online lottery is an example of__________.
a. Cyber-bullying b. Internet fraud or scam
c. Phishing d. Pharming
12. Stealing someone’s authentication details is an example of_________.
a. Identity theft b. Internet scam
c. Phishing d. Trojan
13. SSL stand for Secured ________ Layer.
a. Security b. Server
c. Software d. Socket
14. Spam filtering is an effective measure against______________.
a. Phishers b. Pharmers
c. Undesired emails d. Adware
15. Whom should children inform very first in case of cyber-bullying?
a. Parents b. Neighbours
c. Police d. School Principal
16. Home key is used to move the cursor to
a. End of the document b. End of the line
c. Beginning of the document d. Beginning of the line
17. Writer saves the document with extension _______.
a. .doc b. .txt
c. .htm d. .odt
18. Shortcut key to select the text in a paragraph from the cursor position to the end of the
paragraph is
a. Shift + Home b. Ctrl + A
c. Ctrl + Shift + Home d. Ctrl + Shift + Down
19. Which tool is used to find all the spelling and grammatical mistakes in the document?
a. Track Change b. Spelling & Grammar
c. Find & Replace d. None of these
20. ________ is the most basic way of identifying a user’s device.
a. Home Page b. IP Address
c. Anti-Virus d. All of these
Section-B
This section consists of 20 questions of MCQ type. Answer any 16 questions.
21 . Which of the following feature will be used to give the chapter name on top margin of the
document?
a. Bullets and Numbering b. Headers and Footers
c. Both (a) and (b) d. None of these
22. To insert a list in the document, click
a. Format-> Bullets and Numbering b. View-> Bullets and Numbering
c. Insert-> Characters d. Both (a) and (b)
23 . Which of the following tab contains the numbering list formats in Bullets and Numbering dialog
box?
a. Options b. Position
c. Outline d. Numbering type
24. In which of the following way images can be inserted in the document?
a. Using Gallery b. From file
c. Both a and b d. None of these
25. To insert an image from file, click
a. Tools-> Picture b. Insert-> Gallery
c. Tools-> Gallery d. Insert-> Picture
26. Which of the following toolbar provides tools to insert graphical objects in the documents?
a. Standard toolbar; b. Drawing toolbar
28. Default number of rows and columns specified in the Insert Table dialog box are
a. Virus b. Worm
a. Malware b. Spam
33. _________________ observe each activity on the internet of the victim, gather all information in
the background, and send it to someone else?
a. Spyware b. Malware
c. Virus d. Worms
34. Sonal wants to be protected on internet what should she has to follow?
37. When website’s traffic is redirected to another unauthorized fake URL, then it called_____.
a. Pharming b. phishing
38. What step/steps must parents should take for internet protection for their children?
40. ________ intended to pitch advertisements upon the user’s screen, most often within a web
browser.
a. Online Advertisement b. Worms
Section-C
Case study-based questions
Section C consists of 10 questions. Any 8 questions are to be attempted.
Case Study –I
Protecting an online computer is crucial. An online computer is exposed to the threat of viruses,
spyware, unauthorized access and information theft. Once information is stolen it can be used for
criminal purposes by hackers. Hackers can use a computer to launch attacks, commit criminal
activities, and send out spam. Users must protect their computers and devices as much as possible
by setting up suitable security measures. Viruses are malicious codes that attach themselves with
program files and corrupt them. They destroy useful data, format or corrupt data storage and
eventually render entire computer system useless. Trojans are the malicious programs that are
promoted as useful utilities or software and, once installed affect the computer system and files.
Worms are the program codes that replicate over a network from one computer to the other and
make the computers slower and sluggish in speed.
41. Mohit is a frequent user of internet and never uses anti -virus , one day all of sudden he lost all
his data of his computer. What might be happen to Mohit?
a. Virus attack b. Spam
c. phishing d. None of these
42. ________ replicate over a network from one computer to the other.
a. Worms b. Trojans
c. Viruses d. None of these
43. ___________ are the malicious programs that are promoted as useful utilities or software and,
once installed affect the computer system and files.
a. Spam b. Trojans
c. Viruses d. phishing
44. _______________ is exposed to the threat of viruses, spyware, unauthorized access and
information theft.
a. An online computer b. Physical Identity
c. An offline computer d. All of these
45. ________________can use a computer to launch attacks, commit criminal activities, and send
out spam.
a. Ethical Hackers b. Hackers
c. Both a & b d. None of these
Case Study – II
Editing is the process to make changes in the document. There are many ways through which we can
edit the document. The term ‘editing’ includes deleting, moving and replacing the text. Formatting
refers to changing the text apparently by changing the alignment, font type, style, size, etc. To
perform operations like moving, copying, changing, the type, style or size of the text, you need to
select the text. By selecting a piece of text, you tell the application that you want to work with this
specific piece of text. Follow these steps to select a gives piece of text.
46. Aman deleted some paragraph and replaced it with new one in a document. What actually he
did?
a. Saving b. Editing
c. Moving c. None of these
47. To perform operations like moving, copying, changing, etc. we must have to __________ the
text.
a. Select b. Break
c. Replace d. All of these
48. Arohi wants to use only keyboard to select the entire text in a document. She must follow:
a. CTRL + V b. CTRL+A
c. CTRL+C d. CTRL+X
49. _________ refers to changing the text apparently by changing the alignment, font type, style,
size, etc.
a. Formatting b. Print Preview
c. Editing d. None of these
50. __________________ includes deleting, moving and replacing of the text.
a. Saving b. Formatting
c. Editing d. All of these