EasyAutoPaper CLASS 9 COMPUTER All Chapters - 2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Both

SHERAZ SCIENCE HIGH SCHOOL PIRMAHAL

Name : ______________ Roll No : ______________ Teacher Name : ______________ Date : 20-03-2024

CLASS 9 Total Marks : 10 Passing Marks : 3.3 Paper : COMPUTER Total Time : 00:15 Mins Chapters : All Chapters

Instructions : You have four choices for each objective type question as A, B, C and D. The choice which you think is correct; fill that circle in front
of that question number. Use marker or pen to fill the circles. Cutting or filling two or more circles will result in zero mark in that question.

OBJECTIVE TYPE

Q No.1 ENCIRCLE THE CORRECT ANSWER. (1 Marks/Q)


#
Questions / ‫ا ت‬ A B C D
‫ر‬

in "body'tag ____________ is used to make a pictuire


of a background image of a webpage?
(i) bd background bg image Both a and b
‫ ____________ و‬body'tag
‫؟‬ ‫ا ل‬

In this law, variable ramain unchanged if it is ORed with


Commutative Complement Distributive
'False' or ANDed with 'True': Identity law
(ii) law law law
AND True OR False ‫اس ن‬ ‫ذا‬ ‫و‬
‫آڈ‬ ‫ن‬ ‫ن‬ ‫ا‬
‫آ ۔‬

Associative Commutative
The order of application of two separate terms is not Distributive Identity Law
Law Law
(iii) important in ______________ Law Distributive
Associative Commutative
‫______________ ا‬ ‫ا ق‬ ‫ا‬ ‫ا‬ ‫دو ا‬ Identity Law Law
Law Law

HTML tags are enclosed in:


(iv) <> //
: ‫در ن‬ ‫اس‬ HTML

Doesn't Contains Password is


Is eight
which of the following ois not a characteristics of good contains uppercase your name
characters long
(v) password? username letters only
‫۔‬ ‫وف‬ ‫آ‬
‫؟‬ ‫س و رڈ‬ ‫ن س و رڈ ا‬ ‫ر ذ‬ ‫رف م‬ ‫ے وف‬ ‫س و رڈ ف آ پ‬
‫۔‬ ‫۔‬ ‫م ۔‬

Which of the following tasks are performed by most of the


Input Output Processing All
(vi) algorithms?
‫ان‬ ‫آؤ ٹ‬ ‫ا‬ ‫م‬
‫؟‬ ‫ا مد‬ ‫ز دہ ا ر د ر ج ذ‬

The process of understanding the problem is called ......... of


Identification Analysis Planning Documentation
(vii) the problem.
‫ى‬ ‫ڈا‬
: .........

The word ............. comes from the name of an Arabic writer


Algorithm Flowchart Syntax Flow
(viii) Mohammed ibn Musa al Khwarizmi.
‫ا ر‬ ‫رٹ‬
‫ذ ۔‬ ‫م‬ ‫ٰ ا ارز‬ ‫ا‬ ...........

The minimum number of computers is in a computer


Two Three Four Many
(ix) network is:
‫دو‬ ‫ر‬
: ‫اد‬ ‫ز‬ ‫ور ك‬

________means to test if the required solution in there verification Algorithm Validation Flowchart
(x)
‫د ۔‬ ‫آ وں‬ ________ ‫ا ر‬ ‫رٹ‬

In the encryption prcess, the unencrypted and readable data


ciphertext Plaintext Secret text Password
(xi) is called:
‫ٹ‬ ‫س و رڈ‬
: ‫ا‬ ‫ا‬

Which of the following is required to create HTML page? Text Editor Web Browser Both A and B None
(xii)
‫؟‬ ‫ور ت‬ ‫در ج ذ‬ HTML ‫ا‬ ‫اؤ ز ر‬ ‫و‬ A ‫ او ر‬B ‫دو ں‬

The entire network goes down in ............. topology if the


backbone cable fails. Bus Star Mesh Ring
(xiii)
‫ور ك‬ ‫را‬ ............ ‫ن ر اب‬ ‫ا‬ ‫ر‬ ‫ر‬
‫۔‬

Similar domain Using of forms


Actual link to Email acount
which of the following is not characteristics of phishing of actual to collect
web content update
(xiv) website? website visitors
‫اد ا‬ ‫و‬ ‫ا ؤ اپ‬ ‫اى‬
‫؟‬ ‫ت‬ ‫و‬ ‫ن‬ ‫ر ذ‬ ‫ا‬ ‫ا و‬ ‫زا‬
‫ڈ‬
‫ح ڈو‬ ‫رم ا ل‬

The receiver must be capable of accepting the_________ Protocal Message Address Information
(xv)
‫ل‬ _________ ‫و ل ہ‬ ‫م‬ ‫و‬ ‫ت‬ ‫ا ڑس‬

The information to be communicated in a data


Protocol Message Transmission Medium
(xvi) communications system is .............. .
‫و ل‬ ‫م‬ ‫ا‬
‫ت ۔‬ ‫وا‬ ‫ ڈ‬.............

Hexadecimal system has total ____________ number.


(xvii) 17 16 18 15
‫۔‬ Hexadecimal

A person who gains illegal access to a computer system is Network Computer Authorized
Hacker
(xviii) called: controller operator person
: ‫وا‬ ‫ر‬ ‫ور ك و‬ ‫آ‬ ‫ز رف‬

Which of the following computer share resources on a


Client Server Notebook Laptop
(xix) network for others to use?
‫ور‬ ‫ٹ‬ ‫پ‬
‫؟‬ ‫ا اك‬ ‫و‬ ‫ا ل‬ ‫د‬

Which of the following is not a binary number?


(xx) 1111 101 11E 000
‫؟‬ ‫د‬

............ meas making illegal copies. Piracy Right Browsing Privacy


(xxi)
‫۔‬ ‫ں‬ ‫اد‬ ............ ‫را‬ ‫اؤ ز‬ ‫ا‬

A .............. is a sentance that can either be true or false: Operator Proposition Truth table Logic gate
(xxii)
: ‫در‬ ‫ ا ا‬................ ‫آ‬ ‫ا ز‬

Which of the following is the HTML tag for the


(xxiii) largest heading? <HEADING> <H10> <H6> <H1>
‫؟‬ ‫ى‬ ‫در ج ذ‬

Client server
which of the following doesn't includes the types of
Softlifitying Liablilty overuse Online piracy
(xxiv) software piracy?
‫ا‬ ‫ذ دا ر ى‬ ‫و ر ز دہ‬ ‫آن‬
‫؟‬ ‫ا م‬ ‫و‬ ‫ر ذ‬
‫ا ل‬

A hyperlink can be applied to _________


(xxv) image text Both a and b table
_________ ‫ا‬

Webpages can be created and modified by


Notepad ++ Notepad Text Edit All of above
(xxvi) using__________
Notepad ++ Notepad Text Edit ‫او‬
‫او ر‬ ‫ت _________ ا ل‬ ‫و‬

F in hexadecimal system is equivalent to .............. in


(xxvii) decimal system. 16 15 17 8
‫۔‬ ‫ا‬ ............. ‫ ا ر ى م‬F ‫م‬ ‫ڈ‬

Which type of test data complies with input requirement of Invalid test Boundry test
Valid test data Absent data
(xxviii) the algorithm? data data
‫ڈ‬ ‫در‬ ‫مد بڈ‬
‫؟‬ ‫از ت‬ ‫ان‬ ‫ا ر‬ ‫ڈ‬ ‫ڈ‬ ‫در‬ ‫ڈ‬ ‫ؤ رى‬

which solutions are not reached through peoper algorithms prepared Candid strategized
best solution
(xxix) or work planning? solution solution solution
‫؟‬ ‫ى ذر‬ ‫م‬ ‫ں ا ر‬ ‫ن‬ ‫وا‬ ‫ر‬

Communications protocols cover_______ Authentication Error detection Correction Above all


(xxx)
‫۔‬ ‫و ل‬ ‫ا‬ ‫ا‬ ‫در‬ ‫م‬
GOOD LUCK

You might also like