Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

SECOND ASSESSMENT 2021 – 2022

SUBJECT: COMPUTER T. MARKS: 60


CLASS: IX T. TIME: 3Hours

Section – A (MCQs – Multiple Choice Questions)

Q.01: Choose the correct answer for each from the given options. 12

i. The broad term that encompasses different harmful software is:


(a) Virus (b) Malware (c) Adware (d) Spyware

ii. The authentication mechanism that only allows the real person to access data or device is:
(a) Password (b) PIN (c) Biometric (d) Scan Code

iii. Software are mostly protected under:


(a) Patents (b) Trademarks (c) Logos (d) Copyrights

iv. Since it does not harm or steal data, the least harmful malware is:
(a) Virus (b) Adware (c) Spyware (d) Trojan

v. The malware that replicates itself and doesn't need to attach with any files is:
(a) Virus (b) Adware (c) Spyware (d) Worm

vi. Through which virus spreads?


(a) Email Attachments (b) Internet Downloads (c) Flash Disks and CDs (d) All of them

vii. "Click this link and win a $5 voucher at McDonald's". This is an example of:
(a) Scam (b) Phishing (c) Click jacking (d) Hacking

viii. Both Physical and Logical addresses are:


(a) Different (b) Unique (c) Permanent (d) Temporary

ix. Converting digital signal to analog is called:


(a) Modulation (b) Modification (c) Bandwidth (d) Multiplexing

x. The number of bits used in an IPV 4 address are:


(a) 16 (b) 32 (c) 64 (d) 128

xi. The topology in which all computers are connected to a central device called hub is:
(a) Bus (b) Star (c) Ring (d) Tree

xii. Communication system is made up of:


(a) 3 Components (b) 6 Components (c) 5 Components (d) 4 Components
Section – B (Short Answer Questions)
Note: Attempt any ten questions from this Section. All question carry equal marks. 30

Q.02: What is Ethical Hacking?


Q.03: How to keeping Backup of Data?
Q.04: Explain Plagiarism.
Q.05: Explain Software Piracy and its impacts.
Q.06: Your friend has become a victim of cyber harassment. What two advices will you give him or her?
Q.07: Why is Computer Security important? Write any three reasons.
Q.08: Write down the differences between Physical Address and Logical Address.
Q.09: Describe IP Address and IPV4 Address.
Q.10: Write down the differences between Analog and Digital Signals.
Q.11: Write the function of following network devices: Router, Modem, Hub
Q.12: Write down the classification of computer according to Purpose.
Q.13: Write the use of these storage devices: Hard Disk, USB Flash Disk, SD Card
Q.14: Discuss / Differentiate Impact and Non – Impact Printers with examples.
Q.15: Differentiate between Primary and Secondary memory.

Section – C (Descriptive Answer Questions)


Note: Answer any three questions, each question carry equal marks 18

Q.16: Describe the different Authentication Mechanisms.


Q.17: Described the different ways of computer viruses spread.
Q.18: Define Antivirus. Describe some types of Antivirus.
Q.19: Explain the importance of professional ethics in computer field
Q.20: Define Malware. Describe different types of Malware.

You might also like