0% found this document useful (0 votes)
50 views

Chapter 6

Chapter 6 of the document focuses on Cyber Safety, providing objective and assignment questions related to computer security, malware, and safe internet practices. Key topics include the definition and importance of anti-virus software, firewalls, secure passwords, and the risks associated with cybercrime and cyberbullying. The chapter emphasizes the significance of maintaining personal information confidentiality and the methods to protect oneself online.

Uploaded by

dmonslays
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Chapter 6

Chapter 6 of the document focuses on Cyber Safety, providing objective and assignment questions related to computer security, malware, and safe internet practices. Key topics include the definition and importance of anti-virus software, firewalls, secure passwords, and the risks associated with cybercrime and cyberbullying. The chapter emphasizes the significance of maintaining personal information confidentiality and the methods to protect oneself online.

Uploaded by

dmonslays
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 68

Chapter 6

Cyber Safety

Class 9 - Sumita Arora CBSE Computer Code 165

Objective Type Questions

Question 1

What name is given to a malicious program that comes in disguise of a useful program ?

1. Trojan Horse

2. Invisible Man

3. Stowaway

4. Uninvited guest

Answer

Trojan Horse

Reason — A trojan horse is a program that appears harmless, such as a text editor or a utility
program, but actually performs malicious functions such as deleting or damaging files.

Question 2

Which of these is classed as personal information ?

1. Date of birth

2. Online nickname

3. Gender

4. Largest peak in your continent

Answer

Date of birth, Online nickname, Gender

Reason — 'Date of birth', 'Online nickname' and 'Gender' is personal information. 'Largest peak in
your continent' is a public information.

Question 3

What software can you use to avoid getting viruses ?

1. Disk Cleanup software

2. Firewall

3. Anti-virus software

4. Safety software
Answer

Anti-virus software

Reason — Anti-virus software protects the computer from viruses.

Question 4

What is a computer virus ?

1. a program written to cause harm to a computer

2. a hardware fault which causes data to be damaged

3. a fault with the CPU which means that data is lost or damaged

4. Weather affecting the performance of your computer

Answer

a program written to cause harm to a computer

Reason — Computer viruses are malicious codes/programs that cause damage to data and files on a
system.

Question 5

What is the most common way people's computers get infected by a virus ?

1. receive a fax

2. install new hardware

3. download email attachments

4. Run/open an infected disk

Answer

Run/open an infected disk

Reason — The most common way computers get infected by a virus is by running or opening an
infected disk or file.

Question 6

What purpose does anti-virus software serve ?

1. it deletes every file it suspects is infected

2. it stops people gaining unauthorised access to your computer via the internet

3. it inspects computer files and email attachments for viruses and removes or quarantines any
that it finds

4. it changes the code of malicious software.

Answer
it inspects computer files and email attachments for viruses and removes or quarantines any that it
finds

Reason — An anti-virus software inspects computer files and email attachments for viruses and
removes or quarantines any that it finds.

Question 7

Which of the following is NOT an example of Cybercrime ?

1. Stealing computer hardware

2. Cyber Bullying

3. Cyber Stalking

4. Stealing someone's online identity

Answer

Stealing computer hardware

Reason — Stealing computer hardware does not involve the use of electronic communication or
information systems. Thus, it is not a cyber crime.

Question 8

What does a firewall do ?

1. prevents unauthorised access to your computer via the Internet

2. stops you installing software that may harm your computer

3. records everything you do on your computer

4. runs checks every time to prevent virus attacks

Answer

prevents unauthorised access to your computer via the Internet

Reason — Firewall is a program that monitors all communications and traps all illicit packets. Thus, it
prevents unauthorised access to your computer via the Internet.

Assignment Questions

Question 1

What makes a secure password ?

1. A secure password should be one that you will easily remember

2. A secure password should be one that you will easily remember and be a mixture of upper-
case and lower-case letters, numbers and characters

3. A secure password should be something familiar like a birthday or a pet's name

Answer
A secure password should be one that you will easily remember and be a mixture of upper-case and
lower-case letters, numbers and characters

Reason — A password that is a mixture of upper-case and lower-case letters, numbers and
characters becomes difficult to guess or crack.

Question 2

What is the purpose of anti-virus software?

1. To prevent a virus from attacking the network

2. To prevent hackers from accessing the network

3. To block unauthorised connections to the network

Answer

To prevent a virus from attacking the network

Reason — Anti-virus software protects the computer from viruses.

Question 3

Which of the following are types of malicious software?

1. Viruses, worms, adware, trojans and spyware

2. Word processing packages

3. Anti-virus software

Answer

Viruses, worms, adware, trojans and spyware

Reason — Malware is a general term used to refer to viruses, worms, spyware, adware etc. Malware
infects our computer, making it behave in a way, which we do not approve of.

Question 4

How do you know if a website is secure?

1. When you visit the site, a message appears telling you it is secure

2. The prefix of the website is https

3. Websites cannot be made secure

Answer

The prefix of the website is https

Reason — A safe site's URL starts with https:// and it means that the website is secure.

Question 5

When accessing a website, which icon can be seen in the address bar to indicate that the website is
secure ?
1. Arrow

2. padlock

3. shield

4. house

Answer

padlock

Reason — A padlock icon can be seen in the address bar to indicate that the website is secure.

Question 6

What is the purpose of a firewall ?

1. To detect viruses on a system and prevent them from attacking it and spreading

2. To prevent unauthorised connections coming in to and out of a network

3. To prevent a hacker from logging on to the network

Answer

To prevent unauthorised connections coming in to and out of a network

Reason — Firewall is a program that monitors all communications and traps all illicit packets. It helps
to prevent unauthorised connections coming in to and out of a network.

Question 7

What is cyber safety ? Why is it important ?

Answer

Cyber Safety refers to the safe and responsible use of Internet so as to ensure safety and security of
personal information and not posing threat to anyone else's information.

Although Internet has made things easier but at the same time it has posed many security risks too,
if not used in a proper way. Thus, it is important to know about possible threats, challenges and risks
of working on Internet to ensure personal safety and information security. Hence, cyber safety
becomes very important to know and prevent possible threats to personal safety online.

Question 8

What should you do to protect your identity on Internet ?

Answer

We can protect our identity on the Internet by using the following solutions:

1. Anonymous Browsing — Anonymous browsers allow users to view websites without


revealing any personal information of the user like their IP address, machine type, location
etc.

2. Private browsing — We can use the following to safely browse internet:


i. Incognito browsing — It opens up a version of the browser that will not track our
activity.

ii. Proxy — It works by acting as a middleman between our computer and the website
we want to access.

iii. Virtual Private Network — It is a method used to protect our system from hackers
trying to access our sensitive information.

Question 9

How do websites track you online ?

Answer

Various types of information used by websites to track us online are as follows:

1. IP Address — From our IP address, a website can determine our rough geographical
location.

2. Cookies and Tracking Scripts — They can identify and track our browsing activity across a
website.

3. HTTP Referrer — When a link to an outside website on a webpage is clicked, then the linked
website will get opened and internally our information will be provided to the linked
website.

4. Super Cookies — Super Cookies are persistent cookies that come back even after we delete
them.

5. User Agent — It tells websites our browser and operating system, providing another piece of
data that can be stored and used to target ads.

Question 10

What are cookies ? How are they used by websites to track you ?

Answer

Cookies are small text files on our computer storing small pieces of information related to our online
habits.

Cookies are of two types:

1. First party cookies — These store our own login id, passwords, auto fill information etc. for
some websites that we frequently visit. They can identify us and track our browsing activity
across a website.

2. Third party cookies — The websites store these cookies to know about our search history
and web browsing history so as to place advertisements as per our interests. Third party
cookies may result in many unwanted advertisements on our webpages.

Question 11

What is Private browsing ? Why is it considered a better way of browsing the Internet?

Answer
A type of browsing wherein browser opens in incognito mode or through proxy or VPN, and does not
store cookies about our online activity, is called Private browsing.

It is considered a better way of browsing the Internet as it allows the user to use the Internet
without revealing his/her search history and sharing data.

Question 12

Why are passwords considered an important safety tool?

Answer

Passwords are considered an important safety tool as a password helps to :

1. Keep our personal information safe.

2. Protect our emails, files, and other content.

3. Prevent someone from breaking into our account.

Question 13

What should you keep in mind while choosing an effective password?

Answer

We should keep the following things in mind while choosing an effective password:

1. Use different passwords on different systems and accounts.

2. Don't use passwords that are based on personal information that can be easily accessed or
guessed.

3. Use a combination of capital and lowercase letters, numbers, and special characters.

4. Don't use words that can be found in any dictionary of any language.

5. Develop mnemonics such as passphrases for remembering complex passwords.

Question 14

What is confidentiality of information ? How do you ensure it ?

Answer

Confidentiality of information ensures that only authorized users get access to sensitive and
protected data.

To ensure confidentiality of information, we must follow the following best practices:

1. Use firewall wherever possible to ensure only authentic users connect to the computer.

2. Control Browser settings to block tracking.

3. Browse privately whenever possible to avoid tracking by websites by not storing cookies.

4. Be careful while posting on Internet and avoid sharing personal information like address,
mobile number, bank details, etc on public Internet sites.

5. Ensure safe sites while entering crucial information by checking for https and padlock sign.
6. Carefully handle emails by not opening attachments from unknown senders and avoid
clicking on links contained in the email.

7. Do not give sensitive information on wireless networks.

8. Avoid using public computers while dealing with crucial data.

Question 15

What is a computer virus ? How can it affect your computer ?

Answer

A computer virus is a computer program that can infect other computer programs by modifying
them in such a way as to include a copy of itself.

Viruses can alter, corrupt and delete files, freeze the computer, flash unknown or unasked messages
or display unwanted graphics on the computer screen, play unwanted music and interfere with the
computer operation.

Question 16

Why are antivirus software considered important ?

Answer

An antivirus software is considered important because it scans our disk for viruses and removes
them, if any virus is found. Moreover, some antivirus software remains present in memory all the
time so that they can detect the viruses and counterattack them.

Question 17

What type of damages can be caused by viruses to your computer?

Answer

A virus can damage our computer in the following ways:

1. Some viruses may delete or damage random documents or specific files that are crucial to
the operating system.

2. Viruses can run in the background, without being seen, and may cause the computer to run
extremely slow.

3. Some forms of viruses may infect the email program and spread themselves to the contacts
in the address book.

Question 18

What are Malware ? What type of damages can they cause to your computer ?

Answer

Malware is a general term used to refer to viruses, worms, spyware, adware etc. It is unwanted
software that someone else wants to run on our computer. Malware infects our computer, making it
behave in a way, which we do not approve of.

Malware can damage our computer in the following ways:


1. Some viruses may delete or damage random documents or specific files that are crucial to
the operating system.

2. Viruses can run in the background, without being seen, and may cause our computer to run
extremely slow.

3. Some forms of viruses may infect the email program and spread themselves to the contacts
in the address book.

4. Spyware can monitor information about our computing habits which in the end can lead to
identity theft.

5. Some forms of spyware can also alter computer settings like our web browser home page
setting or the placement of our desktop icons.

6. Spyware can rob our PC or system speed and Internet access efficiency.

7. Adware tracks information about our data and computing habits to produce targeted
advertising, such as pop-up ads, on your computer screen.

8. When infected with adware, we will likely see frequent pop-up ads appear out of nowhere.

Question 19

What is the significance of a firewall in a computer's security scheme ?

Answer

A firewall secures the computer such that only authentic users can connect to it. The significance of
firewall lies in its ability to monitor, filter, and control incoming and outgoing network traffic based
on predefined security rules. This helps prevent unauthorized access, data breaches, and malicious
attacks, such as viruses, malware, and hacking attempts, from reaching the protected computer
system.

Question 20

What is cyber crime ? How can you report it ?

Answer

Any criminal offence that is facilitated by, or involves the use of, electronic communications or
information systems, including any electronic device, computer, or the Internet is referred to as
Cyber crime.

A cyber crime can be reported in the following ways:

1. The local police stations can be approached for filing complaints with the cyber crime cells
specially designated with the jurisdiction to register complaint.

2. Provisions have now been made for filing of 'E-FIR' in most of the states.

3. The Ministry of Home Affairs is also launching a website for registering crimes against
women and children online including cyber crimes.

Question 21

What is cyber bullying and cyber stalking ?


Answer

Harassing, demeaning, embarrassing, defaming or intimidating someone using modern technologies


like Internet, cell phones, instant messengers, social networks etc., is called Cyber Bullying.

Cyber stalking refers to online stalking where someone uses Internet, chat rooms, social networking
sites, emails etc. to stalk his/her victim. Cyber stalker follows the victim online everywhere and
keeps posting/sending something which are
Chapter 5

Computer Networking, Multimedia Basics

Class 9 - Sumita Arora CBSE Computer Code 165

Objective Type Questions

Question 1

Transmission of computerised data from one location to another is called

1. data transfer

2. data flow

3. data communication

4. data management

Answer

data communication

Reason — Transmission of computerised data from one location to another is called data
communication.

Question 2

When a group of computers is connected together in a small area without the help of some cables, it
is called

1. Remote Communication Network (RCN)

2. Local Area Network (LAN)

3. Wide Area Network (WAN)

4. Value Added Network (VAN)

Answer

Local Area Network (LAN)

Reason — When a group of computers is connected together in a small area without the help of
some cables, it is called Local Area Network (LAN).

Question 3

Full form of LAN is

1. Legal All Network

2. Legal Area Network

3. Local Area Network


4. Lost Area Network

Answer

Local Area Network

Reason — Full form of LAN is Local Area Network.

Question 4

Interactive combination of text, graphics, images, audio, video etc. is known as :

1. Data

2. Information

3. Multimedia

4. Internet

Answer

Multimedia

Reason — Interactive combination of text, graphics, images, audio, video etc. is known as
multimedia.

Question 5

Internet may be termed as an example of

1. LAN

2. MAN

3. WAN

4. All the above

Answer

WAN

Reason — Internet may be termed as an example of Wide Area Network (WAN).

Question 6

A Local Area Network (LAN) is a :

1. network within a building or site

2. network across a city, country or even the world

3. network that contains servers across the world

4. a network with 2000 or more computers.

Answer

network within a building or site


Reason — A Local Area Network (LAN) is a network within a building or site.

Question 7

A Wide Area Network (WAN) is a :

1. network within a building or site

2. network across a city, country or even the world

3. network that contains no server

4. network with fewer than two computers.

Answer

network across a city, country or even the world

Reason — A Wide Area Network (WAN) is a network across a city, country or even the world.

Question 8

Networks are useful because :

1. no-one can copy your files

2. you only need one printer per network

3. the computers use less electricity

4. each user of the network can access files more easily.

Answer

you only need one printer per network

Reason — Networks are useful because resources such as a printer, can be shared within a network.

Question 9

Storing and accessing data and programs over the internet is generally known as

1. Modern computing

2. Internet computing

3. Wireless computing

4. Cloud computing

Answer

Cloud computing

Reason — Storing and accessing data and programs over the internet is generally known as Cloud
computing.

Question 10

The communication media used for wireless network is collectively called


1. Cables media

2. Satellite media

3. Guided media

4. Unguided media

Answer

Unguided media

Reason — The communication media used for wireless network is collectively called unguided
media.

Theoretical Questions

Question 1

What do you understand by communication ?

Answer

Communication is the transfer of information from one person or device to another.

Question 2

What is networking ?

Answer

Networking is the process of joining computers together to form a network.

Question 3

What is a communication channel ?

Answer

A communication channel refers to a physical or virtual pathway that allows data and information to
be transmitted between sender and receiver, facilitating communication in various forms.

Question 4

Name the different types of computer networks.

Answer

The different types of computer networks are:

1. Local Area Networks (LANs)

2. Metropolitan Area Networks (MANs)

3. Wide Area Networks (WANs)

Question 5

What is Internet ? What are its uses ?

Answer
Internet is a computer-based world wide information network. It is composed of a large number of
smaller interconnected networks.

Some of the uses of Internet are:

1. Businesses use the Internet to provide access to complex databases, such as financial
databases.

2. Companies carry out electronic commerce (commerce on internet) including advertising,


selling, buying, distributing products, and providing after sales services.

3. Businesses and institutions use the Internet for voice and video conferencing and other
forms of communication that enable people to telecommute, or work from a distance.

4. The use of electronic mail (e-mail) over the Internet has greatly speeded communication
between companies among coworkers, and between other individuals.

5. Individuals use the Internet for communication, entertainment, finding information and to
buy and sell goods and services.

Question 6

A communication network which is used by large organisations over regional, national or global area
is called

1. LAN

2. WAN

3. MAN

4. VAN

Answer

WAN

Reason — WAN (Wide Area Network) spans a larger geographical area and connects multiple LANs
or other networks together. It can cover regional, national, or even global distances.

Question 7

Discuss the following types of networks in brief :

(i) LAN

(ii) MAN

(iii) WAN

Answer

(i) LAN — LANs (Local Area Network) are small computer networks confined to a localised area like
an office, a building or a factory. They facilitate resource sharing among users, including data,
programs, printers, hard-disks, modems etc.
(ii) MAN — MANs (Metropolitan Area Network) are the networks spread over a city. For example,
cable TV networks that are spread over a city. The purpose of a MAN is also the sharing of hardware
and software resources among its users.

(iii) WAN — WANs (Wide Area Network) connect computers across countries, spanning large
distances. They can link LANs from different locations, acting as a unified network for efficient, cost-
effective and high speed information exchange.

Question 8

How is LAN different from WAN ?

Answer

Local Area Network (LAN) Wide Area Network (WAN)

LAN stands for Local Area Network. WAN stands for Wide Area Network

LAN is spread over a small area of upto 1 km. WAN is spread over a very large area.

LAN usually costs less to set up. WAN costs higher to setup.

LAN is usually a single network. WAN is usually a network of many networks.

Question 9

Differentiate : Data, Information & Multimedia

Answer

Data — Data is raw, unprocessed facts and figures. For example, consider the digits — 4, 8, 12. These
are data.

Information — Information refers to processed data which is conveying some meaning as per
context. For example, 4 + 8 = 12 is information as it conveys a clear meaning.

Multimedia — Multimedia refers to usage of many types of media like text, photographs, graphics,
video and audio at the same time.

Question 10

What do you understand by the terms WiFi and Bluetooth ?

Answer

WIFI — Wi-Fi refers to Wireless Fidelity, which lets us connect to the Internet without a direct line
from our PC to the ISP.

Bluetooth — Bluetooth is a telecommunications industry specification that describes how mobile


phones, computers and personal digital assistants (PDAs) can be easily interconnected using a short-
range wireless connection.

Question 11
What are guided and unguided media ?

Answer

Guided media — The communication media used for wired connection are called guided media. For
example, twisted pair cables, coaxial cables etc.

Unguided media — The communication media used for wireless connection are called unguided
media. For example, radio waves, microwaves, satellites etc.

Question 12

What is cloud computing ?

Answer

Cloud computing refers to storing and accessing data and programs over the Internet instead of the
computer's hard drive.

Question 13

How are private clouds different from public clouds ?

Answer

Private clouds Public clouds

A private cloud consists of computing resources used and Public cloud refers to a common cloud service
exclusively owned by one business or organization. made available to multiple subscribers.

In public cloud, the same hardware, storage, and


Private cloud resides on company's intranet or hosted data
network devices are shared among the cloud
center where all the data is protected behind a firewall.
tenants.

Private clouds are often used by government agencies, Public cloud deployments are frequently used to
financial institutions, any other mid to large-size organizations provide web-based email, online office
with business-critical operations seeking enhanced control applications, storage, and testing and
over their environment. development environments.

Application Oriented Questions

Question 1

A company has brought laptop computers for training purposes and for information retrieval. These
computers will use the internet and have multimedia capabilities.

(a) State two advantages and one disadvantage of using the internet to search for information when
compared to using CD-ROMs or paper-based systems.

(b) The laptops are linked to the network using wireless connections. Give one advantage and one
disadvantage of using wireless connections.

Answer
(a) The advantages of using the internet for information retrieval compared to CD-ROMs or paper-
based systems are:

1. Vast Information — The internet offers a vast and constantly updated pool of information,
providing a wider range of resources than limited CD-ROMs or static paper-based systems.

2. Convenience and Speed — Internet access allows quick and convenient access to
information from anywhere, eliminating the need to carry physical media like CD-ROMs or
search through printed materials.

Disadvantage — Internet searching lacks the reliability and authenticity of CD-ROMs or printed
sources due to mixed accuracy, making verification harder.

(b) An advantage of using wireless connections is mobility. Wireless connections enable laptops to
connect from different locations within coverage area without cables.
A disadvantage of using wireless connections is that wireless connections can suffer from
interference and obstacles, causing potential connectivity problems and lower reliability than wired
connections.

Question 2

Booking seats on an aeroplane can be done by the Internet.

(a) Give two advantages of using the Internet rather than making a telephone call for this task.

(b) What type of file access would be needed to make a booking ? Give a reason for your choice.

Answer

(a) Two advantages of using the Internet rather than making a telephone call for this task are:

1. 24/7 Availability — Internet booking is available round the clock, allowing users to make
reservations at any time, whereas telephone calls are limited by business hours and
potential wait times.

2. Self-Service and Control — Internet booking empowers users to independently browse


available seats, choose preferences, and make reservations without relying on a customer
service representative, providing greater control and customization.

(b) For making a booking through the Internet, the type of file access needed is "Read-Only File
Access." This allows users to view available flight options, seat layouts, and other booking-related
information without altering the underlying data. Users can read and interact with the data to make
informed decisions about their seat selections and travel plans.

Question 3

Computer technology has now allowed employees to work from home.

(a) Give three advantages to employers of allowing employees to work from home.

(b) Describe two advances in computer technology which have allowed working from home to
become possible.

Answer

(a) Three advantages to employers of allowing employees to work from home are:
1. Increased Productivity — Employees often experience fewer distractions and a more
comfortable work environment at home, leading to potential boosts in productivity and task
completion.

2. Cost Savings — Allowing remote work can lead to reduced overhead costs, including office
space, utilities, and amenities, contributing to cost savings for employers.

3. Wider Talent Pool — Employers can tap into a broader talent pool by hiring remote workers,
without being restricted by geographic location, potentially leading to the recruitment of
specialized or diverse skill sets.

(b) Two advances in computer technology enabling working from home are:

1. High-Speed Internet — The widespread availability of high-speed internet connections


allows seamless communication, data sharing, video conferencing, and access to cloud-
based resources, enabling remote employees to collaborate effectively.

2. Cloud Computing and Collaboration Tools — Cloud computing centralizes data and
applications, eradicating the need for local servers. This lets remote workers access files and
tools online, aided by collaborative platforms like video conferencing, project management,
and document sharing, enabling teamwork and productivity despite physical separation.

Question 4

Mr. Singh has offices in three cities. He wants to connect his computers at various offices. He is
unable to decide whether he should go for three LANs for different offices or should also create a
WAN connecting these three LANs. Help him decide by suggesting what should he go for. Support
your answer with proper justification.

Answer

Considering Mr. Singh's situation, where he has offices in three cities, the need for centralized
resources, and the potential benefits of inter-office collaboration, it is advisable for him to create a
WAN connecting the three LANs. Creating a WAN will give him the following benefits:

1. Centralized Resources — A single WAN would allow centralized resources, such as servers
and databases, to be shared among all offices. This can improve efficiency and data
consistency.

2. Efficient Communication — A WAN facilitates seamless communication and collaboration


between offices, making it easier for employees to work together regardless of their physical
location.

3. Cost Efficiency — Sharing resources over a WAN can reduce the need for redundant
equipment, leading to potential cost savings.

Question 5

Mr. Shah wants to have an online storage that his company and employees can use and it should not
be shared by anyone else outside company. His business has offices in all major continents.

(a) What type of computing is such type of online storage and usage known as ?

(b) What type of communication media would be required by Mr. Shah's offices to communicate
among themselves ?
Answer

(a) Private Cloud Computing.

(b) To communicate among his offices located in different continents, Mr. Shah's company would
require a communication medium that offers global connectivity and reliability. Wide Area Network
would be most appropriate for his company as WANs can be implemented using dedicated lines and
secured by virtual private networks (VPNs) to ensure data privacy and security.
Chapter 3

Types of Software

Class 9 - Sumita Arora CBSE Computer Code 165

Objective Type Questions

Question 1

The programs designed to govern the computer hardware system are called the ............... .

Answer

The programs designed to govern the computer hardware system are called the System software.

Question 2

Software designed for a specific application such as pay calculations, processing of examination
result etc. are known as ............... .

Answer

Software designed for a specific application such as pay calculations, processing of examination
result etc. are known as Application software.

Question 3

In computer terminology, a compiler means

1. a person who computes source programs

2. the same thing as a programmer

3. a key puncher operator

4. a program which translates high level language program to machine language

Answer

a program which translates high level language program to machine language

Reason — In computer terminology, a compiler means a program which translates high level
language program to machine language

Question 4

The primary job of the operating system of a computer is to

1. command resources

2. be user friendly

3. provide utilities

4. all the above


Answer

all the above

Reason — The primary goal of an operating system is to make the computer system convenient to
use and secondary goal is to use computer hardware in an efficient manner.

Question 5

The operating system of a computer serves as a software interface between the user and

1. hardware

2. peripheral

3. memory

4. screen

Answer

hardware

Reason — The operating system of a computer serves as a software interface between the user and
hardware.

Question 6

The term "operating system" refers to

1. a set of programs which controls computer working

2. the way a computer operator works

3. conversion of high level language into machine code

4. the way a floppy disk drive operates

Answer

a set of programs which controls computer working

Reason — An operating system is a set of programs that manage computer hardware resources,
provide services to software applications, and act as an intermediary between hardware and
software, ensuring proper execution and functioning of the computer.

Question 7

Operating System is

1. a collection of hardware components

2. a collection of input-output devices

3. a collection of software routines

4. all of the above

Answer
a collection of software routines

Reason — An operating system is a set of programs that manage computer hardware resources,
provide services to software applications, and act as an intermediary between hardware and
software, ensuring proper execution and functioning of the computer.

Question 8

Operating System

1. links a program with the subroutines it references

2. provides a layered, user-friendly interface

3. enables the programmer to draw a flowchart

4. all the above

Answer

provides a layered, user-friendly interface

Reason — An Operating System is a program, which acts as an intermediary between a user and the
hardware by providing a layered, user-friendly interface.

Question 9

Which of the following is an example of computer software?

1. Impact printer

2. Console

3. Payroll package

4. OCR

Answer

Payroll package

Reason — Payroll package is an example of computer software.

Question 10

Which type of software is designed to perform specific personal, business, or scientific processing
tasks ?

1. System

2. Applications

3. GUI

4. Compiler

Answer

Applications
Reason — Application Software is the set of programs necessary to carry out operations for a
specified application.

Question 11

Which software takes control of computer system on startup ?

1. Compiler

2. Operating system

3. Application software

4. All of these

Answer

Operating system

Reason — Operating system takes control of computer system on startup.

Theoretical Questions

Question 1

Differentiate between hardware and software.

Answer

Hardware Software

It refers to the programs that enable a computer to perform


It is required to store and run a software.
specific tasks.

Hardware starts functioning once a software is Software is installed on the hardware to deliver its set of
loaded. instructions.

Hardware is physical in nature. Software is logical in nature.

There are more chances of failure in hardware


Software does not have a failure rate and hence, is more reliab
devices.

Hardware components can be seen and


Software can be viewed at the time of execution/loading.
touched.

Question 2

How can computer software be classified ?

Answer

A computer software can be classified broadly into two categories:


1. System Software — System software refers to the programs that control internal computer
operations and make best use of the hardware. For example, operating system, language
translators etc.

2. Application Software — Application Software is the set of programs necessary to carry out
operations for a specified application. For example, word processing software, spreadsheet
software etc.

Question 3

What are two categories of system software ?

Answer

The two categories of system software are :

1. Operating System — An operating system is a program which acts as an interface between a


user and the hardware. For example, Windows 11, Linux etc.

2. Language processor — This program is responsible for converting an HLL code (High Level
Language Code) into machine understandable code. For example, compiler, interpreter.

Question 4

What is an operating system ? What is its role ?

Answer

An operating system is a program which acts as an interface between a user and the hardware. For
example, Windows 11, Linux etc.

An operating system performs mainly following tasks :

1. Provides user Interface

2. Controls hardware

3. Assigns Memory

4. Handles applications

5. Handles/Manages devices.

Question 5

Give examples of

(i) OS

(ii) language processors

Answer

(i) OS — Windows 11, Linux, Mac, etc.

(ii) Language processors — assembler, interpreter, compiler

Question 6
What is application software? What are the three categories of applications software ?

Answer

Application Software is the set of programs necessary to carry out operations for a specified
application.

The three categories of applications software are:

1. General Purpose Application Software.

2. Specific Purpose Application Software.

3. Customised Software / Bespoke Software.

Question 7

What is system software ? What role does it play in the functioning of the computer ?

Answer

System software refers to the programs that control internal computer operations and make best
use of the hardware. For example, operating system, language translators etc.

A system software is responsible for reading data from input devices, transmitting processed
information to the output devices, checking system components, converting data/instructions to
computer understandable form etc. Thus, it is responsible for the smooth functioning of the
computer system and efficient utilisation of computer resources.

Question 8

Write short notes on the following :

(i) word processor

(ii) electronic spreadsheet

(iii) DBMS

(iv) presentation software

Answer

(i) Word Processor — A word processor is an application program that allows entering, editing,
formatting and printing text. We can use a word processor to create almost any kind of document be
it a term paper, business letter, thesis work, memos, legal document, newsletter, reports and even a
book. For example, Microsoft Word, Wordperfect, etc.

(ii) Electronic Spreadsheet — An Electronic Spread-sheet is a program that accepts data in a tabular
form and allows users to manipulate / calculate / analyze data in the desired manner. Spreadsheets
also allow visualisation of data through graphs and charts. For example, Microsoft Excel, LibreOffice
Calc etc.

(iii) DBMS — A Database Management System or DBMS is a software application that enables users
to efficiently store, organize, manage, and retrieve data in a structured manner. It is like a big digital
filing cabinet where data is kept in neat tables and rows. A DBMS provides the necessary tools to
create and manipulate data in the database. For example, Microsoft Access, Oracle, etc.
(iv) Presentation Software — The software that can create professional looking visual aids is called
Presentation Graphic Software. Presentation graphics software provides predefined backgrounds
and sample page layouts to assist in the creation of computer-driven slide shows. For example,
Microsoft PowerPoint, Keynote etc.

Question 9

Discuss the role of utility software in the context of computer performance.

Answer

Utilities are those application programs that assist the computer by performing housekeeping
functions like backing up disk or scanning / cleaning viruses or arranging information etc.

Utilities bridge the gaps by helping to solve the problems and maximize our computer's potential.
Some important utilities are as follows:

1. Text Editor — This utility program is used for creating, editing text files.

2. Backup Utility — This utility program facilitates the backing-up of disk so that in case of any
damage or data-loss, this backed up data may be used.

3. Compression Utility — This utility program facilitates compression of files. Large files can be
compressed so that they take less storage area.

4. Disk Defragmentor — This program speeds up disk access by rearranging the files and free
space on our computer, so that files are stored in contiguous units and free space is
consolidated in one contiguous block.

5. Antivirus Software — This utility program ensures virus-free work environment. It scans our
disk for viruses and removes them, if any virus is found. Moreover, some antivirus software
remains present in memory all the time so that they can detect the viruses and
counterattack them.

Question 10

What is a computer virus ? How can it affect your computer ?

Answer

A computer virus is a computer program that can infect other computer programs by modifying
them in such a way as to include a copy of itself.

Viruses can alter, corrupt and delete files, freeze the computer, flash unknown or unasked messages
or display unwanted graphics on the computer screen, play unwanted music and interfere with the
computer operation.

Question 11

Why are antivirus software considered important?

Answer

An antivirus software is considered important because it scans our disk for viruses and removes
them, if any virus is found. Moreover, some antivirus software remains present in memory all the
time so that they can detect the viruses and counterattack them.
Question 12

What is the importance of application software?

Answer

An application software pertains to one specific application. It allows users to perform specific tasks
in an easy and efficient way. System software cannot carry out the routine jobs performed by a user
which the application software can easily do.

Question 13

How is utility software important ?

Answer

Utilities are important because of the following reasons:

1. Utility software ensure the smooth functioning of the computer.

2. They bridge the gaps by helping to solve the problems and maximize our computer's
potential.

3. Utility softwares backup data, remove outdated files, recover accidentally deleted files, find
and arrange the needed information, do housekeeping functions, protect against viruses,
etc.

Question 14

What is encryption and decryption ?

Answer

The conversion of readable data into an unreadable form that cannot be understood by anyone
except authorized parties is termed as encryption.
The conversion of encrypted data into its readable original form using the correct key is termed as
decryption.

Question 15

Define ciphertext.

Answer

Ciphertext is a term used to refer to altered data (using an algorithm) so as to make the data
unintelligible to unauthorized users.

Question 16

What is the role of a virus scanner ?

Answer

A virus scanner scans our disk for viruses and removes them, if any virus is found. Moreover, some
antivirus software remains present in memory all the time so that they can detect the viruses and
counterattack them.

Question 17
How is a file management software useful ?

Answer

File Management Software is a program to organize and keep track of files. It lets us create a new
file, edit an existing file, and save a file. It even lets us manage files with the ability to group them
into folders. It maintains a hierarchical file system that uses directories/folders to organize files into
a tree structure.

Question 18

What is Bespoke Software ? What are its advantages and disadvantages ?

Answer

Bespoke software is a tailor-made software according to a user's requirements. This type of software
is developed to meet all the requirements specified by the user. Such a software is customized
according to the users' needs.

The advantages of bespoke software are:

1. The company will get the exact software/system that they need.

2. The software will work exactly how they want it to work.

3. The software will only have the features that they specifically need in their business.

The disadvantages of bespoke software are:

1. It takes a long time to develop such a system, between a few months to years.

2. It costs a great deal of money to develop such a system.

3. The company may need to employ a team of people such as business analysts,
programmers, testers etc.

4. There will be little in the way of user support and online help.

5. These cannot be directly installed at other user's workplace as the requirements may wary.

Application Oriented Questions

Question 1

Describe four tasks that are carried out by an operating system.

Answer

The four tasks that are carried out by an operating system are:

1. Processor Management — The management of CPU by the operating system is known as


processor management.

2. Memory Management — The operating system allocates memory to a program for


execution and de-allocates it when the program finishes executing.
3. File System Management — The Operating System organizes and manages data on storage
devices, creating, reading, writing, and deleting files, and handling directories and
permissions.

4. Device Management — The operating system keeps track of all the devices, enables and
controls the input-output (I/O) devices attached to a computer system.

Question 2

Complete the sentences using words from this list:

● the applications software

● a dialogue box

● an icon

● the keyboard

● the operating system

(i) When a computer is turned on, the first program to run is ............... .

(ii) Software that designs the pamphlets, brochures etc is an example of ............... .

Answer

(i) When a computer is turned on, the first program to run is the operating system.

(ii) Software that designs the pamphlets, brochures etc. is an example of the applications software.

Question 3

John's new computer has a Linux operating system.

(a) List one task carried out by the operating system.

(b) John wants to protect his computer from viruses. Which type of software can serve his purpose ?

Answer

(a) Memory Management — The operating system allocates memory to a program for execution and
de-allocates it when the program finishes executing.

(b) Antivirus software.

Question 4

The operating system of a computer is :

1. Hardware which helps to manage the computer system

2. Software which helps to manage the computer system

3. Hardware which creates programs for use by the computer system

4. Software which creates programs for use by the computer system

Answer
Software which helps to manage the computer system

Reason — An operating system is a set of programs that manage computer hardware resources,
provide services to software applications, and act as an intermediary between hardware and
software, ensuring proper execution and functioning of the computer.

Question 5

Name the Software that performs system tasks other than that of operating system.

Answer

Utility software.

Question 6

A company provides on-line training courses.

(a) Give one use for each of the following to help the company run these courses :

(i) Spreadsheet package

(ii) Database package

(iii) Accounting package

(iv) Word processing package

(b) A leaflet designed using word processing software to advertise a course is currently too big to fit
on a single printed page. What features of the word processing software could be used to alter the
design so that it does fit on one page ?

Answer

(a) Use of software packages for online training courses:

(i) Spreadsheet package — The company can use a spreadsheet package to manage and analyze data
related to course registrations, student progress, and assessment scores. It can create grade books,
attendance records, and financial projections for the courses.

(ii) Database package — With a database package, the company can organize and store information
about students, instructors, course content, and other relevant data. It can efficiently retrieve and
update records, track student progress, and generate reports.

(iii) Accounting package — An accounting package can help the company manage its financial
transactions, track revenue and expenses from the courses, handle invoicing, and create financial
reports for budgeting and analysis.

(iv) Word processing package — The company can use a word processing package to create and edit
course materials, such as lesson plans, training manuals, and promotional materials like brochures
and flyers.

(b) The following features of Word processing software can be used to adjust the design and fit the
leaflet on a single printed page:

1. Page Margins — Adjusting the margins can create more space on the page, allowing more
content to fit within the available area.
2. Font Size and Formatting — Reducing the font size or adjusting the text formatting (e.g., line
spacing, character spacing) can make the text more compact, freeing up space.

3. Paragraph and Text Alignment — Changing the alignment of paragraphs and text can
improve space utilization and overall layout.

4. Image Size and Placement — Resizing images and adjusting their placement can help
optimize the use of space on the leaflet.

Question 7

(a) Give the name of the operating system that you use at school or at home.

(b) Write down two tasks that your operating system performs.

(c) Where in the computer is the operating system normally stored when the power to the computer
is off ?

Answer

(a) Microsoft Windows.

(b) Two tasks performed by the operating system are:

1. Memory Management — The operating system allocates memory to a program for


execution and de-allocates it when the program finishes executing.

2. Device Management — The operating system keeps track of all the devices, enables and
controls the input-output (I/O) devices attached to a computer system.

(c) The operating system is normally stored on a secondary storage device such as a hard disk drive
(HDD) when the power to the computer is off.

Question 8

Below is a list of various types of software :

Database, File Management, Spread sheet, Word Processing, Encryption, Antivirus

Which would be most suitable for :

(i) Rotation of Shapes

(ii) Typing text for a report

(iii) Replication of cells

(iv) Carrying out complex calculations on two or more criteria

(v) Storing employees' details

(vi) Organizing files for faster search

(vii) Scanning and cleaning a computer for harmful files

Answer

(i) Rotation of Shapes — Word Processing


(ii) Typing text for a report — Word Processing

(iii) Replication of cells — Spread sheet

(iv) Carrying out complex calculations on two or more criteria — Spread sheet

(v) Storing employees' details — Database

(vi) Organizing files for faster search — File Management

(vii) Scanning and cleaning a computer for harmful files — Antivirus


Objective Type Questions

Question 1

The part of a computer that allows the user to view information on a screen.

1. Mouse

2. RAM

3. CPU

4. Monitor

Answer

Monitor

Reason — Monitor allows the user to view information on a screen.

Question 2

This part sends signals to other parts of the computer to tell them what to do.

1. CPU

2. Keyboard

3. Mouse

4. Hard disk

Answer

CPU

Reason — CPU (Central Processing Unit) sends signals to other parts of the computer to tell them
what to do.

Question 3

This memory is for short term storage and is lost when the computer is turned off.

1. ROM

2. CPU

3. Hard disk

4. RAM

Answer

RAM

Reason — RAM (Random Access Memory) is for short term storage and is lost when the computer is
turned off.

Question 4
This part allows the user to hear information from the computer.

1. Monitor

2. Software

3. Input

4. Speaker

Answer

Speaker

Reason — Speaker is an output device which allows the user to hear information from the
computer.

Question 5

Another name for all the parts of a computer.

1. Process

2. Hardware

3. Monitor

4. Software

Answer

Hardware

Reason — Hardware refers to all the parts of a computer that we can see and touch.

Question 6

This part stores data, programs, settings, and the operating system while the computer is off. While
it is on, it spins inside the computer reading and writing data.

1. CPU

2. ROM

3. RAM

4. Hard Disk

Answer

Hard Disk

Reason — Hard disk is the secondary storage device which stores data, programs, settings, and the
operating system while the computer is off. While it is on, it spins inside the computer reading and
writing data.

Question 7

There are two basic types of disk-drives ............... disk-drives and flash drives.
Answer

There are two basic types of disk-drives hard disk-drives and flash drives.

Question 8

Printed copy is often called ............... .

Answer

Printed copy is often called hard copy.

Question 9

............... printers do not use physical impact to transfer characters to paper.

Answer

Non-impact printers do not use physical impact to transfer characters to paper.

Question 10

Data representation in a computer uses the ............... number system.

Answer

Data representation in a computer uses the binary number system.

Question 11

The CPU is made up of two smaller components: the ............... or ............... and the ...............
or ............... .

Answer

The CPU is made up of two smaller components: the ALU or Arithmetic and Logic Unit and
the CU or Control unit.

Question 12

The binary system uses the symbols ............... and ............... .

Answer

The binary system uses the symbols 0 and 1.

Question 13

The digits of the binary system are called ............... .

Answer

The digits of the binary system are called bits.

Question 14

A unit of eight bit memory cell groups is called a ............... .

Answer

A unit of eight bit memory cell groups is called a byte.


Question 15

A KB in computer terminology is equal to ............... bytes.

Answer

A KB in computer terminology is equal to 1024 bytes.

Question 16

The most familiar output device for the microcomputer is the ............... .

Answer

The most familiar output device for the microcomputer is the monitor.

Question 17

The four functional components of a digital computer are: input device, ............... , ............... and
output device.

Answer

The four functional components of a digital computer are: input device, CPU (Central Processing
Unit) , Memory and output device.

Question 18

Internal storage is also called main ............... .

Answer

Internal storage is also called main memory.

Question 19

Instructions to computer are given through ............... .

Answer

Instructions to computer are given through input devices.

Question 20

Calculations are made in computer with the help of its ............... .

Answer

Calculations are made in computer with the help of its ALU (Arithmetic and Logic Unit).

Question 21

The term bit stands for ............... .

Answer

The term bit stands for binary digit.

Question 22

A unit of measure equal to approximately 1 billion bytes is called a ............... .


Answer

A unit of measure equal to approximately 1 billion bytes is called a 1 GB or 1 Giga Byte.

Theoretical Questions

Question 1

A collection of eight bits is called ............... .

1. byte

2. word

3. record

4. file

Answer

byte

Reason — A collection of eight bits is called a byte.

Question 2

Which of the following is an example of non-volatile memory?

1. ROM

2. RAM

3. LSI

4. VLSI

Answer

ROM

Reason — ROM (Read Only Memory) is an example of non-volatile memory as the instructions
stored in it are retained even when the computer is switched off.

Question 3

Which of the following is a unit of measurement used with computer system ?

1. byte

2. megabyte

3. gigabyte

4. All of the above

Answer

All of the above

Reason — Bytes, megabytes and gigabytes are all units of measurement used with computer
system.
Question 4

Which of the following statements is false?

1. secondary storage is non-volatile

2. primary storage is volatile

3. when the computer is turned off, data and instructions stored in primary storage are erased

4. None of the above

Answer

None of the above

Reason — All the given statements are true. Secondary storage retains data when the system is
turned off. Thus, it is non volatile.

Considering RAM as primary memory, we can say that RAM is volatile and when the computer is
turned off, data and instructions stored in primary storage are erased.

Question 5

What does OCR stand for?

1. Optical Character Reader

2. Optical Character Recognition

3. Operational Character Reader

4. Only Character Reader

Answer

Optical Character Reader

Reason — OCR stands for Optical Character Reader.

Question 6

Dot Matrix is a type of ................. .

1. Tape

2. Disk

3. Printer

4. Bus

Answer

printer

Reason — Dot Matrix is a type of printer.

Question 7

The secondary storage devices can only store data but they cannot perform ................. .
1. Arithmetic operations

2. Logic operations

3. Fetch operations

4. Either of the above

Answer

Either of the above

Reason — The secondary storage devices can only store data but they cannot perform arithmetic,
logic or fetch operations.

Question 8

Which of the following does not represent an I/O device?

1. Speaker which beeps

2. Plotter

3. Joystick

4. ALU

Answer

ALU

Reason — ALU (Arithmetic and Logical Unit) is a part of CPU which performs arithmetical operations.
Speaker and plotter are output devices while joystick is an input device.

Question 9

Which of the following is a correct definition of volatile memory?

1. It loses its contents at high temperatures

2. It is to be kept in airtight boxes

3. It loses its contents on failure of power supply

4. It does not lose its contents on failure of power supply

Answer

It loses its contents on failure of power supply

Reason — Volatile memory loses its contents on failure of power supply.

Question 10

One thousand bytes represent a ............... .

1. Megabyte

2. Gigabyte

3. Kilobyte
4. None of the above

Answer

Megabyte

Reason — One thousand bytes represent a megabyte. (1024 bytes = 1 Mb)

Question 11

Large amounts of cheques are processed by using ............... .

1. OCR

2. MICR

3. OMR

4. All of the above

Answer

MICR

Reason — Large amounts of cheques are processed by using MICR (Magnetic Ink Character Reader).

Question 12

The concentric circles on the floppy disk are further divided into :

1. Tracks

2. Sectors

3. Cylinders

4. None of the above

Answer

sectors

Reason — Each circular path on the surface of the floppy disk is called a track. Each track is divided
into smaller, pie-shaped sections called sectors.

Question 13

Which of the following storage devices can be used for storing large backup data ?

1. Floppy disks

2. Hard disk

3. Magnetic tapes

4. None of the above

Answer

Hard disk
Reason — Hard disk can be used for storing large backup data.

Question 14

Control Unit (CU) is called the .................. of a computer.

1. Heart

2. Nerve centre or brain

3. Primary memory

4. All of the above

Answer

Nerve centre or brain

Reason — Control Unit (CU) is called the nerve centre or brain of a computer.

Question 15

What does a storage unit provide ?

1. A place to show data

2. A place to store currently worked on information

3. A place to store information

Answer

A place to store information

Reason — A storage unit provides a place to store information.

Question 16

What are the four basic components of a computer ?

1. Input devices, output devices, printing, and typing

2. Input devices, processing unit, storage, and output devices

3. Input devices, CPU, output devices, and RAM

Answer

Input devices, processing unit, storage, and output devices

Reason — The four functional units of a computer are input devices, processing unit, storage, and
output devices.

Question 17

What are examples of storage devices ?

1. Keyboards, flash drive, printer

2. Flash drive, RAM, DVD-ROM


3. Hard drive, DVD-ROM, flash drive

Answer

Hard drive, DVD-ROM, flash drive

Reason — Hard drive, DVD-ROM, flash drive are examples of storage devices.

Question 18

What is the processing unit ?

1. The brains of the computer

2. This is the main circuit board that all other internal components are connected to.

3. A device that receives, processes, and presents information.

Answer

The brains of the computer

Reason — The processing unit (CPU) is the brain of the computer.

Question 19

What does RAM stand for?

1. Retrieve Alternate Memory

2. Read Always Memory

3. Random Access Memory

Answer

Random Access Memory

Reason — RAM stands for Random Access Memory.

Question 20

What kind of information can be found in a ROM ?

1. Software

2. The operating system

3. Basic Input/Output System

Answer

Basic Input/Output System

Reason — Basic Input/Output System (BIOS) can be found in a ROM.

Question 21

Which of the following is a soft copy and a hard copy ?

1. Output on a monitor
2. Output on a printer

Answer

Output on a monitor is soft copy as we cannot touch and feel it.

Output on a printer is hard copy as we can touch and feel it.

Question 22

What role do Input unit and Output unit play in a computer system ?

Answer

The input unit is responsible for accepting input i.e., data and instructions from the user. The output
unit is responsible for producing the output in user readable form.

Question 23

Describe the functioning of CPU.

Answer

CPU is the brain of a computer system and it executes the programs in following manner :

1. When a program reaches into memory, the control unit (CU) of CPU reads the program
instructions one by one.

2. The CU then determines the type of instruction i.e., whether it is an arithmetic (calculations)
or logical (comparisons) or I/O (reading or writing) type of instruction.

3. For arithmetic or logical type of instructions, CU directs the ALU (Arithmetic and logic unit)
to carry out the instructions.

4. For input type of instruction, CU directs the Input unit to carry out the instruction and for
Output type of instruction, it directs the output unit to carry out the instruction.

Question 24

What role does the memory play in the functioning of a computer system ?

Answer

Computer makes use of two types of memories :

1. Internal memory (primary or main memory) — It is the built-in memory which the CPU uses
to hold data and instructions. The internal memory is temporary and has limited storage
capacity.

2. External memory (auxiliary or secondary memory) — It is the external storage used by


computer to store data and instructions permanently. Floppy disks, hard disks, CD ROM,
DVDs etc. comprise this memory.

Question 25

Discuss two popular input devices.

Answer
Two popular input devices are:

1. Keyboard — Keyboard is a typewriter like device which is used to type in the letters, digits
and commands. It contains a matrix of switches (one switch per key). Each key, when
pressed, sends a digital code to the computer that determines which key has been pressed.

2. Mouse — The mouse is pointing device that points to a position on computer screen. Mouse
controls movement of pointer on screen. When a mouse moves on a flat surface, the cursor
on the screen also moves in the direction of mouse's movement. A mouse generally has two
or three buttons and it may or may not have a wheel.

Question 26

What is a pointing device ? Name a popular pointing device.

Answer

A pointing device is an input device used to interact with a computer by controlling the on-screen
pointer or cursor. It allows users to move the pointer across the screen and make selections or
perform actions by clicking buttons.

A mouse is a popular pointing device.

Question 27

When is a scanner used for input ? Discuss various types of scanners.

Answer

A scanner is used for input when we want to convert physical documents or images into digital
format and store them on a computer or other electronic device. It allows us to create electronic
versions of physical documents, photographs, or artwork.

The various types of scanners are as follows:

1. Hand-held Scanners — These are very small which can be held in a hand.

2. Flatbed Scanners — These are larger and more expensive scanners but they definitely create
higher quality images. These scanners have a flat surface on which the printed image to be
scanned, is placed.

3. Drum Scanners — These are medium-size scanners with a rolling drum. The sheet is fed
through the scanners so that the drum rolls over the entire sheet to be scanned.

Question 28

Discuss the functioning of a light pen.

Answer

A light pen is a light-sensitive input device shaped like a pen, used to draw on the computer screen
or make menu selections. It works by detecting flashes of light emitted from the computer screen to
determine its position and interact with the display.

Question 29

When is a bar code reader used for input and how ?


Answer

A barcode reader is used to read bar codes which can be found on products in shops. The barcode
reader uses lasers to identify the position and thickness of the bars. These bar codes convey the
required information to the computer and make the billing smooth and efficient.

Question 30

How important is control unit in a computer system ?

Answer

The control unit is highly important in a computer system as it directs and coordinates all operations
of the CPU. When a program reaches into memory, the control unit (CU) of CPU reads the program
instructions one by one and executes the program as follows:

1. The Control Unit determines the type of instruction i.e., whether it is an arithmetic
(calculations) or logical (comparisons) or I/O (reading or writing) type of instruction.

2. For arithmetic or logical type of instructions, Control Unit directs the ALU (Arithmetic and
logic unit) to carry out the instructions.

3. For Input type of instruction, Control Unit directs the Input unit to carry out the instruction
and for Output type of instruction, it directs the output unit to carry out the instruction.

Thus, without the Control Unit, the CPU would not function effectively, impacting the overall
performance and functionality of the computer.

Question 31

Discuss various storage units.

Answer

Various storage units are as follows:

1. Hard Disks — Hard disk memories store information on spinning circular platters coated
with magnetic material and stacked with space between them. Magnetic heads record tiny
magnetic spots on the rotating disk surface to store information.

2. Compact Disks (CDs) — Compact disks (CDs) are optical media with storage capacity up to
700 MB. They come in various forms, such as CDROM (CD-Read Only Memory), CD-R (CD-
Recordable), and CD-RW (CD-Rewritable), and are relatively inexpensive.

3. DVDs — DVD is an optical storage device resembling a compact disc but with approximately
15 times more storage capacity and 20 times faster data transfer than a CD-ROM. It can hold
up to 17 GB of data. DVDs come in various varieties: DVD-ROM (DVD-Read Only Memory),
DVD-R (DVD-Recordable), and DVD-RW (DVD-Rewritable).

4. Pen/Thumb Drives — It uses a memory technology called 'Flash'. Flash is a 'solid state'
memory i.e., it has no moving parts. It retains data even when the power is switched off.

5. Blu-Ray disc — Blu-ray is the successor to DVD. It is called Blu-ray because it uses a blue
laser to read from and write to the disc. It offers significantly higher data storage in the same
12-centimeter space, with common capacities of 25 GB and 50 GB.
6. Memory Stick — A memory stick is a removable memory card used to store information in
devices like digital cameras, smartphones, music players, and portable PlayStations.
Capacities range from 4 GBs to 128 GBs.

Question 32

There are two types of internal memory in computer system. Name and discuss them.

Answer

The two types of internal memory in computer system are as follows:

1. Read Only Memory (ROM) — In this memory, information once stored remains fixed i.e., it
cannot be changed. So, ROM can only be read and used. It cannot be changed or written
onto.
Generally, ROM contains a set of start-up instructions i.e., what to do when a computer is
turned on. The contents of ROM remain stored even if power is turned off.

2. Random Access Memory (RAM) — The internal memory that can be read from as well as
written to is called RAM i.e., Random Access Memory. The random access memory (RAM) is
volatile i.e., its contents are lost when power is turned off.

Question 33

Compare and contrast internal memory and external memory.

Answer

S.
Internal memory External memory
No.

This memory is directly connected to and accessed This memory is not directly connected to and
1.
by a computer's CPU. accessed by a computer's CPU.

2. Volatile. Non-volatile.

3. Faster data access. Slower data access.

It is used for storing large amounts of data


4. It is used for processing data.
permanently.

5. It is small in size. It is of large size.

It is also called auxiliary memory or secondary


6. It is also called main memory or primary memory.
memory.

Question 34

Why is auxiliary memory required ?

Answer
The auxiliary memory is required because of the following reasons:

1. Capacity — Main memory has limited capacity whereas auxiliary memory capacity is many
more times compared to main memory.

2. Permanent in nature — RAM is volatile and auxiliary memory is permanent. Data in main
memory is lost when the power goes off but in auxiliary memory, the data remains there
even after the power goes off.

Question 35

Discuss the usage of hard disk.

Answer

Hard disk is an external memory. Hard disk memories store information on spinning circular platters
coated with magnetic material and stacked with space between them. Magnetic heads record tiny
magnetic spots on the rotating disk surface to store information.

Question 36

Discuss the functioning of DVDs.

Answer

DVD (Digital Versatile Disk) is an optical storage device resembling a compact disc but with
significantly greater capacity and faster data transfer. It can hold up to 17 GB of data. DVDs use a
laser to read and store digital data as pits and lands on a reflective disc coated with a thin metal
layer. These data patterns, representing 0s and 1s, are decoded to retrieve audio, video, or other
information.

Question 37

When are magnetic tapes used and how ?

Answer

Magnetic tapes are used for long-term data storage and archival purposes in various industries.

Magnetic tapes store data sequentially on a thin, magnetized strip and are commonly employed for
backup storage, data retrieval, and offline data preservation. They offer cost-effective and reliable
storage solutions.

Application Oriented Questions

Question 1

What is the most suitable storage medium for storing an encyclopedia ?

1. floppy disk

2. spreadsheet

3. CD ROM

4. database

Answer
CD ROM

Reason — CD-ROMs have larger storage capacity compared to other storage media and they are
portable and can be easily accessed on various devices with CD-ROM drives.

Question 2

Which of the following statements is not correct ?

1. RAM stores the instructions for starting up the computer

2. RAM holds the data that is being worked upon

3. RAM is volatile

4. RAM can be read from and written to

Answer

RAM stores the instructions for starting up the computer

Reason — ROM (Read Only Memory) stores the instructions for starting up the computer.

Question 3

Part of the Central Processing Unit is the CPU. What does ALU stand for ?

1. Analogue Logic Unit

2. Arithmetic Learning Unit

3. Arithmetic Logic Unit

4. Analogue Learning Unit

Answer

Arithmetic Logic Unit

Reason — The full form of ALU is Arithmetic Logic Unit.

Question 4

At the moment when an item is sold at the refreshment kiosk, the item code is keyed in using a
conventional keypad. During busy periods this method is too slow and queues develop. Recommend
a more suitable input device. Explain how this device works.

Answer

A concept keyboard is a more suitable option to key in items at a refreshment kiosk as it will be
faster.

Concept keyboards provide a practical alternative to standard keyboards in scenarios requiring


simplicity, ease of use, and customization. They display graphical symbols or icons representing
specific functions, commands, or data inputs on a flat surface or panel.

Question 5

There are two types of memory, random access memory (RAM) and read only memory (ROM).
(i) Give one use for RAM

(ii) Give one use for ROM

(iii) Describe the differences between RAM and ROM.

Answer

(i) RAM stores the required data and information during the processing phase.

(ii) ROM stores a set of start-up instructions that tell the computer what to do when it is powered
on.

(iii) The differences between RAM and ROM are as follows:

Category RAM ROM

Full form Random Access Memory Read-only memory

RAM is a form of data storage that ROM is also a form of data storage that generally store
Definition can be accessed randomly at any hardwired instructions (instructions stored as form of
time, in any order by CPU. circuit) for the computer to start initially.

RAM contents can be changed or


Alterations ROM cannot be easily altered or reprogrammed.
altered as and when required.

RAM allows the computer to read ROM stores the program required to initially boot the
Use
data quickly to run applications. computer or reboot the computer.

Operations
It allows reading and writing. It only allows reading.
supported

RAM is volatile i.e., its contents are It is non-volatile i.e., its contents are retained even wh
Volatility
lost when the device is powered off. the device is powered off.

Larger than ROM; can be up to some Smaller but large enough to hold basic instructions ; is
Size
Giga Bytes (GBs) up to some Mega Bytes (MBs)

RAM chips can read data faster than


Speed ROM is slower as compared to RAM.
ROM.

Question 6

All workstations in the Betterview shops have TWO input devices and TWO output devices.

(a) Give the names of two input devices that must be part of a workstation.

(b) Give the names of two output devices that must be part of a workstation.

Answer
(a) Keyboard and Mouse.

(b) Monitor and Printer.

Question 7

Lorretta produces publicity leaflets for Betterview.

Publicity leaflets contain articles, photographs and diagrams.

Lorretta has additional hardware for producing these leaflets.

This includes a colour scanner.

(a) Describe how Loretta should use her computer workstation to :

1. store a photograph as a computer file ;

2. load the stored photograph into one of the blank boxes.

(b) Lorretta needs to produce a proof colour copy of the leaflet to show to her manager. Describe
two features of a printer which would be needed to produce the leaflet.

Answer

(a)

1. Loretta should use a colour scanner to store a photograph as a computer file by following
the given steps:

i. She should place the photograph on the scanner bed and use the scanning software
on the computer to initiate the scanning process.

ii. Choose the desired format and resolution for the scan.

iii. Save the scanned photograph to a specific folder on the computer's hard drive.

2. To load the stored photograph into one of the blank boxes on the leaflet, Loretta can use
desktop publishing software in the following manner:

i. Open the software and create a new project or open the existing leaflet design.

ii. Locate the blank box where the photograph should be inserted.

iii. Use the software's "insert image" or "import image" function to browse and select
the previously scanned photograph.

iv. Resize and position the photograph within the box as needed.

(b) Two features of the printer which would be needed to produce the leaflet are:

1. High-resolution printing — A high-resolution printer of minimum 300 DPI (dots per inch) is
essential to produce a proof colour copy with sharp images and text.

2. Color accuracy and calibration — To ensure the printed leaflet's colours match the digital
design, Loretta needs a printer with good color accuracy and calibration.

Question 8
Give two ways in which a CD-ROM disc is different from a floppy disc.

Answer

Two ways in which a CD-ROM disc is different from a floppy disc are:

1. Storage capacity — CD-ROMs can hold around 700 MB of data, while floppy discs typically
have a storage capacity ranging from 1.44 MB (3.5-inch) to 1.2 MB (5.25-inch).

2. Durability and reliability — Floppy discs are susceptible to physical damage, data corruption,
and magnetic interference. CD-ROMs, on the other hand, use optical technology, which
makes them more resistant to physical damage and offers better data integrity over time.

Question 9

A pupil is researching material for a school project. The pupil has a computer that has a CD-ROM
drive and access to the Internet.

(i) Give one advantage of using the Internet rather than a CD-ROM.

(ii) Give one advantage of using a CD-ROM rather than the Internet.

Answer

(i) An advantage of Internet is that it provides access to a wide range of resources, including articles,
research papers, multimedia content, and the latest news, allowing the pupil to access the most
current and relevant information for their school project.

(ii) One advantage of using a CD-ROM rather than the Internet is that it does not require an active
internet connection to access the information. CD-ROMs are self-contained and can be accessed
directly from the computer's CD-ROM drive, making them a reliable source of information even in
areas with limited or no internet access.

Question 10

A company is developing a piece of multimedia language software for use in a school. Give two
reasons why the company decides to issue the software on CD-ROM and not on floppy discs.

Answer

The company chooses CD-ROMs over floppy discs for the following reasons:

1. Larger storage capacity — Multimedia language software typically contains a large amount
of data, including audio, video, and interactive elements. CD-ROMs offer a significantly larger
storage capacity compared to floppy discs.

2. Better data transfer rate — CD-ROMs have a faster data transfer rate compared to floppy
discs. This means that the software can load and access data more quickly from a CD-ROM,
resulting in a smoother and more responsive user experience.

Question 11

A newspaper needs some pictures to insert onto the front page. Give three ways you can use
Information Technology to obtain the pictures in electronic form.

Answer
The pictures can be obtained in electronic form using Information Technology in the following ways:

1. Online Image Databases — They can access stock photo websites for a wide selection of
pictures.

2. Social Media & User-Generated Content — They can search for relevant images shared by
users on social media platforms like Twitter, Instagram, Facebook, etc. and use them with
proper permission and attribution.

3. Digital Cameras and Smartphones — They can capture original pictures using digital cameras
or smartphones.

Question 12

Give one reason why a digital camera is suitable for obtaining pictures for a multimedia
presentation.

Answer

Digital cameras capture high-resolution, digital images that look sharp, vibrant and engaging when
displayed on screens or projected onto larger surfaces.

Question 13

Give one reason why you would not edit a large movie file on a CD-ROM.

Answer

CD-ROMs are read only storage devices i.e., once data is written to the CD-ROM, it cannot be
modified, edited, or deleted. Hence, editing a large movie file directly on a CD-ROM is not possible as
it would restrict us from saving the changes made.

Question 14

Each piece of hardware in the table below is either an input, output or storage device. For each, put
a tick in the correct box. As an example, a keyboard is an input device so a tick is placed in the Input
column. Tick one box only for each device.

Device Input Output Storage

Keyboard ✓

CD-ROM drive

Digital Camera

Graphics digitiser

Hard disk drive

Laser Printer
Light pen

Monitor

OMR reader

RAM

Touch pad

Answer

Device Input Output Storage

Keyboard ✓

CD-ROM drive ✓

Digital Camera ✓

Graphics digitiser ✓

Hard disk drive ✓

Laser Printer ✓

Light pen ✓

Monitor ✓

OMR reader ✓

RAM ✓

Touch pad ✓

Question 15

Some storage devices have volatile memory. Explain what is meant by the term volatile.

Answer

Volatile memory means that the contents of the memory are lost when power is turned off.

Question 16
A veterinary surgery is going to install a new computer system. The vets must choose suitable
hardware to use in their practice.

(a) Give three input devices that would be suitable for use in their practice.

(b) Give three output devices that would be suitable for use in their practice.

(c) Give two storage devices that would be suitable for use in their practice.

Answer

(a) Three suitable input devices for the veterinary surgery practice are:

1. Keyboard

2. Mouse

3. Barcode Scanner

(b) Three suitable output devices for the veterinary surgery practice are:

1. Monitor

2. Printer

3. Speakers

(c) Two suitable storage devices for the veterinary surgery practice are:

1. Hard disk

2. Pen drive
Chapter 1

Computer System

Class 9 - Sumita Arora CBSE Computer Code 165

Objective Type Questions

Question 1

The physical components of the computer system are called ............... .

1. Software

2. Hardware

3. Firmware

4. Liveware

Answer

Hardware

Reason — Hardware refers to the physical parts of the computer; the ones that we can touch e.g.,
keyboard, monitor etc.

Question 2

The programs or instructions that tell the computer what to do, are known as ............... .

1. Software

2. Hardware

3. Firmware

4. Liveware

Answer

Software

Reason — The programs or instructions that tell the computer what to do, are known as software.

Question 3

This part sends signals to other parts of the computer to tell them what to do.

1. CPU

2. Motherboard
3. Icon

4. Hard drive

Answer

CPU

Reason — Central Processing Unit sends signals to other parts of the computer to tell them what to
do.

Question 4

Which one is the device that is the "brain" of a computer system?

1. CPU

2. CD-ROM

3. Mouse

4. Scanner

Answer

CPU

Reason — Central Processing Unit is the "brain" of a computer system.

Question 5

Computer ............... are the physical parts that make up a computer system. They are the parts that
you can see and ............... .

Answer

Computer hardware are the physical parts that make up a computer system. They are the parts that
you can see and touch.

Question 6

............... is used to provide instructions to the computer so that it can perform certain tasks.

Answer

Software is used to provide instructions to the computer so that it can perform certain tasks.

Question 7

............... are the raw facts from which ............... is derived.

Answer

Data are the raw facts from which information is derived.

Question 8

The ............... directs other components of the computer to perform the tasks specified in the
program instructions.
Answer

The Control Unit directs other components of the computer to perform the tasks specified in the
program instructions.

Question 9

Collecting the data and converting it into information is called ............... .

Answer

Collecting the data and converting it into information is called processing.

Question 10

Results are obtained from computer through its ............... unit.

Answer

Results are obtained from computer through its output unit.

Question 11

............... is the most powerful computer.

Answer

Supercomputer is the most powerful computer.

Question 12

Computers are ............... than human beings.

Answer

Computers are faster than human beings.

Question 13

Computers are ............... to tiredness and ............... .

Answer

Computers are immune to tiredness and boredom.

Question 14

Computers have ............... IQ.

Answer

Computers have zero IQ.

Theoretical Questions

Question 1

Which of the following is not a characteristic of a computer system ?

1. Performs fast
2. Performs mathematical calculations accurately

3. Apply judgements on its own in unknown/unexpected situations

4. Safer in dangerous places like mines

Answer

Apply judgements on its own in unknown/unexpected situations

Reason — A computer has zero IQ. It cannot make decisions on its own.

Question 2

Which of the following correctly defines a computer system ?

1. Hardware

2. Software

3. Hardware + Software + Data

4. Hardware + Software + Data + Human Being

Answer

Hardware + Software + Data

Reason — A computer is a combination of hardware and software, which transforms some data into
information.

Question 3

Unprocessed raw facts and figures are known as :

1. Information

2. Storage

3. Data

4. All the above

Answer

Data

Reason — Unprocessed raw facts and figures are known as data.

Question 4

In computer science, by information we mean :

1. Any output coming out from computer

2. Processed data put in an intelligent form

3. A report printed by the computer

4. Plural of data
Answer

Processed data put in an intelligent form

Reason — A computer processes data and produces information in a user-readable form.

Question 5

Which of the following activities can a computer system perform with Airlines ?

1. Display Arrival and Departure times of flights

2. Display important messages

3. Check seat availability and flight times

4. None of the above

5. All the above

Answer

All the above

Reason — A computer system can display arrival and departure times of flights, display important
messages and check seat availability and flight times.

Question 6

What is a computer ? How is it a useful device ?

Answer

A computer is an electronic device that can perform a variety of operations according to a set of
instructions called program.

Computer is a useful device as it can be used in almost all the fields such as :

1. Business and administration

2. Medicine and health care

3. Communications and media

4. Education and reference

5. Science and Technology

6. Research and engineering

7. Manufacturing and delivery

8. Law enforcement by police and government

9. Military operations

10. Music and theatre

11. Household purposes, etc.

Question 7
What are strengths and weaknesses of a computer system ?

Answer

The strengths of a computer are as follows:

1. Speed.

2. High Storage Capacity.

3. Accuracy.

4. Reliability.

5. Versatility.

The weaknesses of a computer are as follows:

1. Lack of Decision-Making Power.

2. IQ Zero.

3. No Heuristics.

Question 8

What do you understand by IPO cycle ?

Answer

IPO cycle stands for Input-Process-Output cycle. In IPO cycle, some input is needed to accomplish a
task, a process is carried out on the input to obtain the output. A computer also follows the IPO cycle
as it takes an input, carries out a process upon it, and produces an output.

Question 9

What are the four basic components of a computer system ?

Answer

The four basic components of a computer system are:

1. Input Unit.

2. Central Processing Unit.

3. Storage Unit.

4. Output Unit.

Question 10

How can computers be classified ?

Answer

Computers can be classified into following types :

1. Embedded Computers — These computers are in the form of tiny chips embedded within
the circuitry of appliances such as televisions, washing machines, wrist watches, etc.
2. Programmable Computers — These computers can be used as notepads, scheduling
systems, address books etc. With cellular phones, these can connect to worldwide computer
networks to exchange information regardless of location.

3. Laptop Computers & Personal Computers — These computers are typically used in
businesses and at home to communicate on computer networks, for word processing to
track finances, to play games etc.

4. Workstations — These computers are similar to PCs but have more capabilities. These are
typically found in scientific, industrial and business environments that require high levels of
computational abilities.

5. Mainframes — These computers are even more capable than workstations and can be used
by multiple users.

6. Supercomputers — These computers are the most powerful computers that are used to
process complex and time-consuming calculations. They are used by the largest business
institutes/houses, scientific institutions and the defence.

Application Oriented Questions

Question 1

All computer systems can be split into three main components. These are shown in the following
diagram.

Complete the diagram below by adding the names of four different input devices and four different
output devices.

Answer

The completed diagram showing four different input & output devices is given below:
Question 2

The diagram shows the main components of a computer system. R could represent :

1. mouse or printer

2. printer or screen

3. printer or disc drive

4. screen or keyboard

Answer

printer or screen

Reason — The output unit uses devices like printer or screen to display output in user readable
form.

Question 3
Q represents the central processing unit which consists of :

1. processor and main storage

2. input devices and processor

3. input devices, output devices and backing storage

4. all of the above

Answer

processor and main storage

Reason — The CPU consists of processor to process instructions given to the computer and main
storage to store those instructions and intermediate results during the processing phase.

Question 4

Which one of the following is not a function of the CPU ?

1. handling control functions

2. performing arithmetical operations

3. storing data

4. file management

Answer

storing data

Reason — CPU is responsible for processing the given instructions which consists of handling control
functions, performing arithmetical and logical operations and storing the data and instructions being
processed. File management is usually handled by the operating system of the computer.

Question 5

Draw a diagram to show how these components are connected in an ICT system :

1. Process

2. Input
3. Output

4. Backing Store

Answer

Below diagram shows an ICT system along with its different components:

Question 6

For the following situations advise which type of software you would use.

Typing a letter

Creating a graph

Keeping a list of telephone numbers

Creating a poster

Creating an original image

Editing a digital photograph

Comparing which mobile phone tariff is the best for you

reading a webpage on the Internet

Answer

Typing a letter Word Processor Software

Creating a graph Spreadsheet Software


Keeping a list of telephone numbers Spreadsheet Software

Creating a poster Photo Editing software

Creating an original image Photo Editing software

Editing a digital photograph Photo Editing software

Comparing which mobile phone tariff is the best for you Spreadsheet software

reading a webpage on the Internet Internet Browser Software

Question 7

Arrange the following statements into the advantages or disadvantages of the different computers.
(some of the statements can be used for more than one type of computer)

1. Can use many different types of software

2. Can only use very limited software such as email or diary events

3. Portable

4. Light to carry

5. Fits in your pocket

6. Around Rs.50000

7. Around £1500 - £2000 to buy

8. Can easily be broken

9. Easy to upgrade or expand

10. Cannot upgrade

11. Very difficult to expand

12. Easy to steal

13. No mouse but touch-pad or button control


14. Stylus control

15. Mouse control

16. Ergonomically designed

17. Uncomfortable to use for long periods of time

18. Can run on electricity or battery

19. Standard equipment for businesses, schools and home

20. Not as powerful as a desktop PC

21. Very strong

22. Cost around Rs. 40000 to buy

23. No keyboard - handwriting recognition used

24. Difficult to move around

Desk-Top PC Notebook PDA

Advs Disadvs Advs Disadvs Advs Disadvs

1 24

Answer

Desk-Top PC Notebook PDA

Advs Disadvs Advs Disadvs Advs Disadvs

1, 9, 15, 16, 19, 21, 22 17, 24 1, 3, 13, 18, 6 11 3, 4, 5, 14 2, 7, 8, 10, 12, 20

Question 8

Imagine you have an older friend who is moving away to University soon. He wants to buy a new
computer to take with him - remembering of course that he must come home for every holiday.
Which type of computer would you suggest ? Explain fully your answer - why would you suggest that
type.

Answer

For my older friend who is moving away to university but will return home for every holiday, I would
suggest a laptop as the ideal type of computer for the following reasons:

1. Portability — Easy to carry between classes and home during holidays.

2. Space-saving — Doesn't require separate peripherals like a desktop.

3. Flexibility — Can be used for academics, entertainment, and socializing.

4. Power efficiency — Energy-efficient for extended usage.

5. Battery life — Decent battery life for on-the-go work.

6. Homecoming convenience — Convenient to pack and carry during breaks.

7. Access to university resources — Optimized for university platforms and materials.

8. Future-proofing — All-in-one solution with built-in display and input devices.

You might also like