9th-Computer-Guess-Paper-2025
9th-Computer-Guess-Paper-2025
25% Conceptual
75% Knowledge-Based
25% Analytical + Application-Based
Question no # 5
S.No Chapter # 1
1 Define flowchart and write its advantages and disadvantages.
2 Explain the formulation of an algorithm.
3 How does an algorithm play an important role in problem-solving?
4 What is test data? Write a note on three types of test data.
What is meant by defining a problem? Which strategies can be used to define a
5
problem?
6 Draw a flowchart to find the area of a rectangle.
7 Define flowchart. Draw and describe different symbols of a flowchart.
8 Explain determining requirements for a flowchart.
Suppose a problem has multiple solutions. How would you choose the most efficient
9
algorithm to solve it? Explain with an example.
Question no # 6
S.No Chapter # 3
1 Explain any four components of a communication system.
2 What is network topology? Describe ring topology with a diagram.
3 Why do we need a computer network? Explain in detail (only four needs).
Differentiate between Star Topology and Ring Topology. Also, give two advantages of
4
each topology.
5 Explain the protocol in the TCP/IP suite.
6 Write a note on different components of a communication system.
7 What is meant by star topology and how does it work?
8 Write a note on Star Topology and Mesh Topology.
9 What is router? Explain the process of routing with the help of example.
10 Write a note on any four in TCP/IP models
QUESTION NO. 7
S.No Chapter # 4
1 Explain substitution cipher method with four examples.
2 Describe the importance of encryption in everyday life on the internet.
3 Write a note on the following: 1. Copyright 2. Sabotage.
4 Explain the types of cybercrime.
5 What is encryption? Explain its importance for everyday life on the internet.
6 Write the names of ethical issues related to data security and explain any three in detail.
Analyze the personal piracy and security concerns that arise with the use of a
7
computational system.
8 Explain the types of piracy.
9 What is encryption? Explain the importance of encryption for everyday life on.
10 Describe DOS (Denial of Service) attack in detail.
11 State the purpose of password and write characteristics of good password.