Computer Science14Paper I

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Page 1 of 4

AGA KHAN UNIVERSITY EXAMINATION BOARD

SECONDARY SCHOOL CERTIFICATE

CLASS IX EXAMINATION

MAY 2014

Computer Science Paper I

Time: 35 minutes Marks: 25

INSTRUCTIONS
1. Read each question carefully.
2. Answer the questions on the separate answer sheet provided. DO NOT write your answers on the
question paper.
3. There are 100 answer numbers on the answer sheet. Use answer numbers 1 to 25 only.
4. In each question there are four choices A, B, C, D. Choose ONE. On the answer grid black out
the circle for your choice with a pencil as shown below.

Candidate’s Signature

5. If you want to change your answer, ERASE the first answer completely with a rubber, before
blacking out a new circle.
6. DO NOT write anything in the answer grid. The computer only records what is in the circles.

S1401-0911110
Page 2 of 4

1. In 1906, which of the following 6. Which of the following is the


computing technologies was function of logical unit of CPU?
developed?
A. To control flow of
A. Vacuum tube information
B. Transistor B. To compare values
C. Microprocessor C. To transfer data
D. Integrated circuit D. To perform division and
multiplication
2. A language other than high level
7. Which of the following is used in
language is translated by
converting scanned documents into
A. a compiler. text?
B. an assembler. A. Handwriting recognition
C. an interpreter. B. Optical mark recognition
D. an algorithm. C. Optical character recognition
D. Magnetic ink character
3. Which of the following is used to recognition
connect external devices with
personal computers? 8. Which of the following input devices
is like a lever that moves in all
A. Address Bus directions?
B. Control Bus
C. Data Bus A. A mouse
D. Universal Serial Bus B. A joystick
C. A trackball
4. The term used for retrieving existing D. A light pen
data from memory is called
9. Two kilobytes (KB) is equal to
A. copy.
B. cut. A. 2000 bits.
C. read. B. 2000 bytes.
D. write. C. 2048 bits.
D. 2048 bytes.
5. If new data are entered into Random
Access Memory location then this 10. All of the following statements are
data valid about hard disk EXCEPT that
A. it can store data permanently.
A. will be added to the existing B. it is a sequential storage
data in this location. device.
B. will alter the memory location C. it can store huge amount of
address. data.
C. will erase the previously D. it is a magnetic storage
saved data. device.
D. will crash the memory
location. 11. The decimal number (64)10 is equal to
the hexadecimal number

A. (4F)16
B. (416)16
C. (64)16
D. (40)16

S1401-0911110
Page 3 of 4

12. The number of characters in a 16 bit 17. In MS Word, the default paper size
coding scheme is for a document is

A. 216 A. custom.
B. 162 B. legal.
C. 215 C. letter.
D. 152 D. tabloid.

13. Which of the following is the 18. The icon is used in MS Word to
CORRECT way to convert an octal show hidden
number (2014)8 into a decimal
number? A. formatting symbols.
B. files.
A. 2 × 103 + 0 × 102 + 1 × 101 + C. folders.
4 × 100 D. viruses.
B. 2 × 83 + 0 × 82 + 1 × 81 +
4 × 80 19. A science teacher is preparing a
C. 2 × 104 + 0 × 103 + 1 × 102 + slideshow with audio-visual effects to
4 × 101 explain a concept to his students. All
D. 2 × 84 + 0 × 83 + 1 × 82 + of the following are required for this
4 × 81 purpose EXCEPT a

14. All of the following are examples of A. laser printer.


alphanumeric data EXCEPT B. laptop.
C. multimedia projector.
A. email id. D. speaker.
B. home address.
C. employee name. 20. You can add a new slide in your
D. passport number. PowerPoint presentation by clicking

15. In MS Windows, the data that are A. edit, ‘new slide’.


copied from a program or an B. file, ‘new slide’.
application is stored in C. insert, ‘new slide’.
D. tools, ‘new slide’.
A. control panel.
B. clipboard. 21. Which of the following software is
C. taskbar. used for storing large volumes of
D. recycle bin. bank transactions?

16. To find where a file has been saved A. Database


on a disk, the user should B. Operating system
C. Web browser
A. use ‘find and replace’. D. Word processor
B. use the backup facility.
C. search each file in turn.
D. use the directory search tools.

PLEASE TURN OVER THE PAGE


S1401-0911110
Page 4 of 4

22. Which of the following is allowed in


an operating system to communicate
with scanner, printer and webcam?

A. Device driver
B. Firewall
C. Interpreter
D. Utility software

23. Which of the following is a feature of


Disk Operating System (DOS)?

A. Graphical User Interface


(GUI)
B. Fewer memory resources
C. Multitasking ability
D. Multi-user environment

24. Which of the following is an internal


DOS command?

A. XCOPY
B. TREE
C. DELTREE
D. CLS

25. Which of the following DOS


commands is used to change the disk
name?

A. FORMAT
B. LABEL
C. TYPE
D. VER

END OF PAPER
S1401-0911110

You might also like