0% found this document useful (0 votes)
14 views2 pages

2nd Book Test A+B

The document is a test for 9th-grade Computer Science students at The Educators, Committee Chowk campus, consisting of objective and subjective questions. The objective section includes multiple-choice questions about HTML, cybercrime, and data protection, while the subjective section requires short answers on topics such as cybercrime, HTML structure, and encryption. The test is designed to assess students' understanding of key computer science concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views2 pages

2nd Book Test A+B

The document is a test for 9th-grade Computer Science students at The Educators, Committee Chowk campus, consisting of objective and subjective questions. The objective section includes multiple-choice questions about HTML, cybercrime, and data protection, while the subjective section requires short answers on topics such as cybercrime, HTML structure, and encryption. The test is designed to assess students' understanding of key computer science concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

THE EDUCATORS CLASS: 9th A+B

2nd half Book Test (2024-25)


Subject: Computer
______________
Science Campus: Committee Chowk
Name: ……………………………. Roll No: ……………………………
Time Duration: 15min Total Marks: 10

Objective Type
Note: Four possible answers A, B, C and D to each question are given. The choice which you think is
correct, fill that circle in front of that question with Marker or Pen ink in the answer-book. Cutting or filling
two or more circles will result in zero mark in that question.

Q No 1: Choose the correct answer.

S.No Question A B C D

HTML is not a ____________ Programming Markup Both i and ii None of the


1-
language. above
An HTML element usually
2- Start End Start and End None of the
consists of a ______ tags. above
Which of the following is not a
3- Hacking Phishing Crime Identity Theft Decryption
cybercrime?

Which one of the following


4- () </> <> {}
symbols is used as opening tags:

HTML is a simple language to


5- Programs Webpage Software Virus
create:

________________ is a way to
6- Copyright Phishing Fraud Patent
protect an idea:

The _________ element is a


7- <body> < head> <title> < html>
container for metadata (data about
data).
Nadra keeps a huge data records of
8- America Australia Pakistan China
all the citizens of:

A hyperlink can be applied to


9- image text Both (i) and None of the
________. (ii) above
Using ________ devices to
10- Mobile Input Output Key
transfer data from device to device
is risky.
THE EDUCATORS CLASS: 9th A + B
2nd half Book Test (2024-25)
Subject: _______________
Computer Science Campus: Committee Chowk
Name: ……………………………. Roll No: ……………………………
Time Duration: 1 hour 45 min Total Marks: 40

Subjective Part
Part I

Q No 2: Write short answer to any Four (4) questions: 2×4=8

i- HTML stands for which?


ii- How many types of tags are used in HTML?
iii- What did Caesar do?
iv- Define client-server overuse.
v- What is the uses of cookies?
vi- Differentiate between "colspan" and "rowspan".

Q No 3: Write short answer to any Four (4) questions: 2×4=8

i- Why it is important to keep trade secret in the computer science field?


ii- Differentiate between ordered and unordered list.
iii- Why border attribute is added to image?
iv- Who is hacker?
v- Which tag is used for table?
vi- Describe five-character Caesar Cipher method with example.

Q No 4: Write short answer to any Four (4) questions: 2×4=8

i- Differentiate between password and key.


ii- Does DOS is used in information theft?
iii- What is the purpose of bgcolor attribute?
iv- Which type of unauthorized activities can take place on the internet?
v- Write output of the following: <p> This is <b> a paragraph </p>.
vi- How does spyware activate in computer?

Part II
NOTE: Attempt any Two (2) questions. 8×2=16

Q No 5: What is Cyber Crime? Explain its any three types.


Q No 6: Describe main sections in a Webpage, HTML , HEAD and BODY.
Q No 7: Describe importance of encryption for everyday life on the internet.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy