0% found this document useful (0 votes)
102 views4 pages

Question Bank For Class 9 Computer Applications

This document is a question bank for Class IX Computer Applications, consisting of multiple-choice questions, assertion-reason questions, and short answer sections. It covers topics such as computer memory, networks, cybersecurity, spreadsheets, and software types. The document is structured into sections A through E, each with varying question formats and point values.

Uploaded by

beastav89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views4 pages

Question Bank For Class 9 Computer Applications

This document is a question bank for Class IX Computer Applications, consisting of multiple-choice questions, assertion-reason questions, and short answer sections. It covers topics such as computer memory, networks, cybersecurity, spreadsheets, and software types. The document is structured into sections A through E, each with varying question formats and point values.

Uploaded by

beastav89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

QUESTION BANK – CLASS IX

COMPUTER APPLICATIONS (165)

SECTION A: (1 Mark Each) - MCQs & Assertion-Reason


(10 Multiple Choice Questions + 10 Assertion-Reason Questions)

Multiple Choice Questions (MCQs)

1. Which of the following is an example of secondary storage?


a) RAM
b) ROM
c) Hard Disk
d) Cache
2. The CPU consists of which of the following components?
a) Monitor and Keyboard
b) ALU, CU, Memory Unit
c) Hard Disk and RAM
d) USB Drive and DVD
3. What type of network is commonly used within a school or office?
a) PAN
b) LAN
c) WAN
d) MAN
4. Which of the following is not an input device?
a) Scanner
b) Printer
c) Keyboard
d) Mouse
5. Which storage device is best for transferring files quickly between computers?
a) Hard Disk
b) CD-ROM
c) Flash Drive
d) DVD
6. Which of these is an example of system software?
a) MS Word
b) Antivirus Software
c) Operating System
d) Web Browser
7. What does a spreadsheet consist of?
a) Only Rows
b) Only Columns
c) Rows and Columns
d) Text and Pictures
8. The shortcut key to bold text in a Word Processor is:
a) Ctrl + U
b) Ctrl + B
c) Ctrl + I
d) Ctrl + P
9. Which of these is NOT a type of malware?
a) Virus
b) Firewall
c) Adware
d) Spyware
10. Which of the following allows wireless communication?
a) USB
b) LAN Cable
c) Bluetooth
d) Hard Disk

Assertion-Reason Questions

11. Assertion (A): ROM is a non-volatile memory.


Reason (R): ROM loses data when the power is turned off.
a) Both A and R are true, and R is the correct explanation of A
b) Both A and R are true, but R is NOT the correct explanation of A
c) A is true, but R is false
d) A is false, but R is true
12. Assertion (A): A strong password should contain letters, numbers, and symbols.
Reason (R): Strong passwords are harder to guess and protect online accounts.
(Options same as above)
13. Assertion (A): Cloud storage is more secure than local storage.
Reason (R): Cloud storage cannot be hacked.
14. Assertion (A): MS PowerPoint is used to create presentations.
Reason (R): A slide in PowerPoint can contain text, images, and animations.
15. Assertion (A): Spreadsheets can perform calculations.
Reason (R): MS Excel only allows text input, not numbers.
16. Assertion (A): Malware can damage data and steal information.
Reason (R): Installing antivirus software helps prevent malware attacks.
17. Assertion (A): Google Drive is an example of cloud storage.
Reason (R): Cloud storage is always free for unlimited use.
18. Assertion (A): A presentation slide can contain only one image.
Reason (R): The size of a slide limits content placement.
19. Assertion (A): Cyberbullying is a form of online harassment.
Reason (R): Reporting cybercrimes can help prevent online abuse.
20. Assertion (A): A workbook in Excel can contain multiple worksheets.
Reason (R): Each worksheet in Excel contains only 10 rows.
SECTION B: (2 Marks Each) – Short Answer (SA-I)
(Answer in 30-40 words each)

21. Define primary memory and secondary memory with examples.


22. What is cloud computing? Give two examples.
23. List two cyber safety measures to protect personal data.
24. What are two advantages of using spreadsheets?
25. Define malware and name two types of malware.
26. Differentiate between slide transition and animation in PowerPoint.
27. What are the main functions of an operating system?
28. Explain the difference between PAN and WAN with examples.
29. What is a presentation tool? Name any two types of slide layouts.
30. Define strong passwords and mention two password security tips.
31. What is data encryption, and why is it important for cybersecurity?
32. Mention two uses of multimedia in education.
33. What are the different types of software?
34. Write two differences between wired and wireless communication.
35. What is the importance of a spreadsheet in business applications?

SECTION C: (3 Marks Each) – Short Answer (SA-II)


(Answer in 50-60 words each)

36. Explain RAM and ROM with examples.


37. Describe three features of a word processor.
38. What are three common types of cyber threats?
39. Explain SUM(), AVERAGE(), and MAX() functions in Excel.
40. What are the steps to create a PowerPoint presentation?
41. How does Wi-Fi and Bluetooth differ in wireless communication?
42. Explain any three uses of spreadsheets.
43. What are two advantages and one disadvantage of cloud computing?
44. Describe three key elements of cyber safety.
45. What are the components of a computer system?
SECTION D: (4 Marks) – Long Answer (LA)
(Answer in 80-100 words each)

46. Explain types of computer networks (PAN, LAN, MAN, WAN) with examples.
47. How can a user protect their identity online? Mention four key measures.
48. Explain the different views available in MS PowerPoint.
49. Describe the importance of spreadsheets in financial data management.
50. Explain any four types of secondary storage devices with examples.

SECTION E: (4 Marks Each) – Case-Based Questions


Case Study 1: Cyber Safety

51. A student received an unknown email with a suspicious attachment.


a) What action should they take?
b) How can antivirus software help in this case?
52. A friend posts personal photos online without privacy settings.
a) What are the risks?
b) What steps should they take to improve privacy?

Case Study 2: Spreadsheets

53. A company tracks sales in an Excel sheet.


a) Which functions can help analyze the data?
b) How can charts be used to visualize trends?
54. A school maintains student attendance in Excel.
a) How can a teacher use Excel functions for automatic calculations?
b) What types of graphs would best represent attendance trends?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy