0% found this document useful (0 votes)
229 views

Class Ix - 165 Sample Paper 1

This document provides a sample question paper for Class 9 Computer Applications with 3 sections (A, B, C) consisting of multiple choice questions to test knowledge of key computer and cyber security concepts. Section A has 20 questions and students should attempt 16, Section B has another 20 questions with 16 to attempt, and Section C has 10 questions with 8 to attempt. The paper is out of a total of 25 marks and allows 90 minutes for completion.

Uploaded by

Manav Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
229 views

Class Ix - 165 Sample Paper 1

This document provides a sample question paper for Class 9 Computer Applications with 3 sections (A, B, C) consisting of multiple choice questions to test knowledge of key computer and cyber security concepts. Section A has 20 questions and students should attempt 16, Section B has another 20 questions with 16 to attempt, and Section C has 10 questions with 8 to attempt. The paper is out of a total of 25 marks and allows 90 minutes for completion.

Uploaded by

Manav Shukla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Sample Question Paper (Term 1)

Class: IX Session: 2021-22


Computer Applications (Code 165)
Sample paper - 1

Maximum Marks: 25 Time Allowed: 90 Minutes


General Instructions:
1. The Question Paper contains three sections A, B and C.
2. Section A has 20 questions. Attempt any 16 questions.
3. Section B has 20 questions. Attempt any 16 questions.
4. Section C has 10 questions. Attempt any 8 questions.
5. All questions carry equal marks.
6. There is no negative marking.
Section-A
                         This section consists of 20 questions of MCQ type. Answer any 16 questions.
1. Practice and technology used to prevent cyber-crime is called:

a. Cyber-safety b. Cyber-security
c. Cyber-health d. Firewall
2. Which of the following is not a way of online user tracking over internet?
a. Fingerprinting b.  Cookies
c. Adware d. Online Advertising 
3. Which of the following is promoted as useful program and, once installed, affects the computer
system?

a. Trojan b. Spam

c. Worm d. Spyware
4. Fraudulently acquiring sensitive information from the users by impersonating trusted website is
called______.
a. Spam b. Phishing
c. Cyber-bullying d. . Pharming
5. A firewall is a security combination of __________and ________.
a. Virus, anti-virus b. SSL, HTTPS
c. Hardware, software d. Windows, MS-Office
6. For what purpose is word processors used?
a. Photo editing b. Typing
c. Engineering Drawing d. Downloading
7. Which of the following is not a part of writer interface?
a. Standard Toolbar b. Status Bar
c. Formatting Toolbar d. Formula Bar
8. Shortcut key to create a new document is,
a. Ctrl + D b. Ctrl + N
c. Ctrl + C d. Ctrl + F
9. Which option is used to copy the text from one location to another?
a. Cut, paste b. Redo
c. Copy, paste d. Format Painter
10. _______ feature is used to search for a word in a document.
a. Find & Replace b. Track Change
c. Spell Check d. None of these
11. A fake online lottery is an example of__________.
a. Cyber-bullying b. Internet fraud or scam
c. Phishing d. Pharming
12.  Stealing someone’s authentication details is an example of_________.
a. Identity theft b. Internet scam
c. Phishing d. Trojan
13. SSL stand for Secured ________ Layer.
a. Security b. Server
c. Software d. Socket
14. Spam filtering is an effective measure against______________.
a. Phishers b. Pharmers
c. Undesired emails d. Adware
15. Whom should children inform very first in case of cyber-bullying?
a. Parents b. Neighbours
c. Police d. School Principal
16. Home key is used to move the cursor to
a. End of the document b. End of the line
c. Beginning of the document d. Beginning of the line
17. Writer saves the document with extension _______.
a. .doc b. .txt
c. .htm d. .odt
18. Shortcut key to select the text in a paragraph from the cursor position to the end of the
paragraph is
a. Shift + Home b. Ctrl + A
c. Ctrl + Shift + Home d. Ctrl + Shift + Down
19. Which tool is used to find all the spelling and grammatical mistakes in the document?
a. Track Change b. Spelling & Grammar
c. Find & Replace d. None of these
20.  ________ is the most basic way of identifying a user’s device.
a. Home Page b. IP Address
c. Anti-Virus d. All of these
Section-B
                         This section consists of 20 questions of MCQ type. Answer any 16 questions.
21 . Which of the following feature will be used to give the chapter name on top margin of the
document?
a. Bullets and Numbering b. Headers and Footers
c. Both (a) and (b) d. None of these
22. To insert a list in the document, click
a. Format-> Bullets and Numbering b. View-> Bullets and Numbering
c. Insert-> Characters d. Both (a) and (b)
23 . Which of the following tab contains the numbering list formats in Bullets and Numbering dialog
box?
a. Options b. Position
c. Outline d. Numbering type
24. In which of the following way images can be inserted in the document?
a. Using Gallery b. From file
c. Both a and b d. None of these
25. To insert an image from file, click
a. Tools-> Picture b. Insert-> Gallery
c. Tools-> Gallery d. Insert-> Picture
26. Which of the following toolbar provides tools to insert graphical objects in the documents?
a. Standard toolbar; b. Drawing toolbar

c. Formatting toolbar d. None of these


27. Which of the following format is suitable to present record of the students in a school?

a. Paragraph b. Plain text

c. Both (a) and (b) d. Tabular

28. Default number of rows and columns specified in the Insert Table dialog box are

a. 2 columns and 2 rows b 1 columns and 2 rows

c. 2 columns and 1 row d. 0 column and 0 row

29. AutoFormat feature is used to: 

a. Split the table b. Apply table border

c. Apply predefined table layout d. All of these

30.  Which of the following purpose is Mail Merge used for? 

a. To insert graphical images.


b. To format the text.
c. To auto-format the tables.
d. To combine a document with   data source and send the letters to several recipients.

31. Firewall is a type of ____________.

a. Virus b. Worm

c. Security Threat d. None of these

32. Which of the following is considered as the unsolicited commercial email?

a. Malware b. Spam  

c. Virus d. None of these

33. _________________ observe each activity on the internet of the victim, gather all information in
the background, and send it to someone else?

a. Spyware b. Malware

c. Virus d. Worms

34. Sonal wants to be protected on internet what should she has to follow?

a. Use Spam filtering setting b. Share personal email on trust

c. Create separate email for public use d. All of these


35. Which of the following comes under the Cyber Security?

a. Provides security against malware


b. Protects a system from cyber attacks
c. It allows the Spyware on the system.
d. Both a & b

36. What is the full form of Malware?

a) Malfunctioning of Security b) Malicious Software

c) Malfunctioned Software d) Multipurpose Software

37. When website’s traffic is redirected to another unauthorized fake URL, then it called_____.

a. Pharming b. phishing

c. Cyber bullying d. None of these 

38. What step/steps must parents should take for internet protection for their children?

a. Educate children to maintain privacy b. Surprise audit the  computer 

c. Parents should keep internet access control d. All of these

39.  What is mean by a Zombie cookie?

a. It is also known as Super cookie b. Stored in different backups

c. Recreated even after deletion d. All of these

40. ________ intended to pitch advertisements upon the user’s screen, most often within a web
browser.
a. Online Advertisement b. Worms

c. Internet Protocol d. None of these 

Section-C 
Case study-based questions 
Section C consists of 10 questions. Any 8 questions are to be attempted. 
Case Study –I 
Protecting an online computer is crucial. An online computer is exposed to the threat of viruses,
spyware, unauthorized access and information theft. Once information is stolen it can be used for
criminal purposes by hackers. Hackers can use a computer to launch attacks, commit criminal
activities, and send out spam. Users must protect their computers and devices as much as possible
by setting up suitable security measures. Viruses are malicious codes that attach themselves with
program files and corrupt them. They destroy useful data, format or corrupt data storage and
eventually render entire computer system useless. Trojans are the malicious programs that are
promoted as useful utilities or software and, once installed affect the computer system and files.
Worms are the program codes that replicate over a network from one computer to the other and
make the computers slower and sluggish in speed.
41. Mohit is a frequent user of internet and never uses anti -virus , one day all of sudden he lost all
his data of his computer. What might be happen to Mohit?
a. Virus attack b. Spam 
c. phishing d. None of these
42. ________ replicate over a network from one computer to the other.
a. Worms b. Trojans
c. Viruses d. None of these
43. ___________ are the malicious programs that are promoted as useful utilities or software and,
once installed affect the computer system and files.
a. Spam b. Trojans
c. Viruses d. phishing
44. _______________ is exposed to the threat of viruses, spyware, unauthorized access and
information theft.
a. An online computer b. Physical Identity 
c. An offline computer d. All of these
45. ________________can use a computer to launch attacks, commit criminal activities, and send
out spam.
a. Ethical Hackers b. Hackers
c. Both a & b d. None of these
Case Study – II
Editing is the process to make changes in the document. There are many ways through which we can
edit the document. The term ‘editing’ includes deleting, moving and replacing the text. Formatting
refers to changing the text apparently by changing the alignment, font type, style, size, etc. To
perform operations like moving, copying, changing, the type, style or size of the text, you need to
select the text. By selecting a piece of text, you tell the application that you want to work with this
specific piece of text. Follow these steps to select a gives piece of text.
46. Aman deleted some paragraph and replaced it with new one in a document. What actually he
did?
a. Saving b. Editing
c. Moving c. None of these

47. To perform operations like moving, copying, changing, etc. we must have to __________ the
text.
a. Select b. Break 
c. Replace d. All of these
48. Arohi wants to use only keyboard to select the entire text in a document. She must follow:
a. CTRL + V b. CTRL+A
c. CTRL+C d. CTRL+X
49. _________ refers to changing the text apparently by changing the alignment, font type, style,
size, etc.
a. Formatting b. Print Preview
c. Editing d. None of these
50.  __________________ includes deleting, moving and replacing of the text.
a. Saving b. Formatting
c. Editing d. All of these

You might also like