0% found this document useful (0 votes)
112 views12 pages

9TH. 100% Success

Uploaded by

aamirshahad3321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views12 pages

9TH. 100% Success

Uploaded by

aamirshahad3321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

ABBASIANS

100% Success 9th. Computer


Computer Notes
IT MIRZA IRFAN & IT ASHRAF
1/1/2023

[Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.
Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.]
100% Success 9th. Computer 2023

Chapter#01
Q1. Define a Problem.
A problem is a situation or matter that requires proper attention and needs to be solved.
Q2. What is Problem Solving?
A process to identify a problem and find the best solution for it is called Problem solving.
Q3. Write the names of steps that are involved in problem solving.
Following are the steps to solve a problem.
1. Defining a Problem
2. Understanding a Problem
3. Problem Analysis
4. Planning a solution
5. Defining candid solution
6. Selecting the best solutions
Q4. What are the strategies of defining a problem?
Three strategies are used to define the problem as follows:
1. Gain Background Knowledge
2. Use Guesses
3. Draw a picture.
Q5. What is understanding a Problem?
A clear understanding of a problem makes it easier to solve and helps to save money, time and resources.
Q6. What is meant by problem Analysis?
The process of understanding the given problem is called problem analysis. It is very important to understand a
problem before trying to solve it.
Q7. What do you know about 5 W’s?
5 W‟s is a set of common questions. These questions are used to understand a problem. The 5 Ws are What, Who,
When, Where and why.
Q8. What are the strategies for planning the solution of the problem?
Different strategies to plan the solution of a problem are as follows:
1. Divide and conquer
2. Guess, Check and Improve
3. Act it Out
4. Prototype
Q9. What is “Divide and conquer” strategy?
In this strategy we divide a complex problem into smaller problems. Then the smaller problems are solved one by one.
This is best, simple and easy technique to solve the complex problems.
Q10. Define the “Prototype (Draw)” in planning a solution.
In this strategy or technique, we draw a pictorial representation for the solution of the problem. It is not the final
solution.
Q11. What is candid solution of a problem?
A process to find out the solution of a problem by estimation (guess) without proper planning is called candid solution.

Q12. Define Flowcharts:


A flowchart is a graphical presentation of the steps to solve a problem. Standard symbols are used to represent
different steps of solution.
Q13. Describe the importance of Flowchart in Problem Solving.
1. It helps quickly understand problem solving process.
2. Graphical representation is much more effective than a text.
3. Communicating solution of the problem to other peoples is easy.

Q14. What are the main requirements for a Flowchart?


In a flow chart we use input, output, decision making and processing.

Q15. Write advantages of a Flowchart.


1. Easy to draw.
2. Easy to understand problem solving.
3. Easy to identify errors.
4. Easy to observe flow from one step to the other.
Q16. Write disadvantages or limitations of Flowchart.
1. More time is required to draw a flowchart.
2. Modifying a flowchart is not easy.
3. It is not suitable for very large and complex problems.
Q17. Algorithm:
An algorithm is a finite number of steps to solve a problem. It is written in natural language.

2|Page
100% Success 9th. Computer 2023

Q18. Role of Algorithms in Problem Solving:


1. It provides step-by-step guide to solve a problem.
2. It is a complete description of the solution.
3. It is easy to write.
4. Algorithm techniques are easy to understand.
5. To solve a large problem, algorithms are helpful.
Q19. What is meant by efficiency of Algorithm?
There can be more than one algorithm to solve a problem. Which one is better, depends upon the efficiency of
algorithms.
Q20. Difference between algorithm & Flowchart:
Algorithm Flowchart
An algorithm is a sequence of steps to solve a problem. Graphical representation of steps to solve a problem.
An algorithm uses natural language. Flow chart uses special symbols.
An algorithm is less time consuming. Flow chart is more time consuming.
An algorithm is easy to modify. Flow chart is difficult to modify.
Q21. What are the advantages of an algorithm?
1. Easy to write.
2. Techniques to write an algorithm are easy to understand.
3. To solve a large problem, algorithms are helpful.
Q22. What are the disadvantages or limitations of an algorithm.
1. Modifying an algorithm is not very easy every time.
2. Showing the flow from one step to other is not very easy.
3. Identifying errors is difficult.
Q23. What is the difference between verification and validation of an algorithm?
Verification Validation
Verification is the process to test if the solution Validation is the process to test whether the solution is
(algorithm) is solving the same problem or not. correct or not.
Q24. Define syntax error?
The error that occurs when statements of the algorithm (or program) are written incorrectly is called syntax error.
For example, when incorrect spelling of keyword is typed such as INPT is typed instead of INPUT.
Q25. Define trace table.
A trace table is a technique used to testing an algorithm to ensure that it does not have any logical error.

Chapter#02
Q1. What is a number system?
A set of values to respect different quantities is known as number system.
Different number systems are as follow:
1. Binary number system
2. Hexadecimal number system
3. Decimal number system
Q2. What is Decimal Number System?
Decimal number system is commonly used in our daily life. The base of decimal number system is 10. It consists of
ten digits from (0-9). It is also known as Hindu-Arabic or Arabic. Examples: 5310, 89210
Q3. What is Binary Number System?
Digital computers used binary number system. Binary number system consists of two digits 0 and 1 and its base is 2.
Example: The binary value of the letter „A „is (01000001)2 and its decimal value is 65.
Q4. What is Hexadecimal Number System?
Hexadecimal system has total 16 digits. Its base is 16. It consists of 0 to 9 and A,B,C,D,E and F. Where
A=10,B=11,C=12,D=13,E=14 and F=15. Example: 3F2B16.
Q5. What is Computer Memory?
Computer memory is a physical device that can store data and programs. Some computer memories store data and
programs temporarily while others permanently.
There are two types of memory: (i) Volatile Memory (ii) Non- Volatile Memory
Q6. Difference between Volatile & Non-Volatile Memory OR Differentiate between temporary and permanent
storage.
Volatile Memory Non-Volatile Memory
A non-volatile memory is a device that can store
A volatile memory is a device that can store data as
data even if the power supply is not connected to it.
long as the power supply is connected to it. This
This type of memory is called non-volatile memory.
type of memory is called volatile memory. It is a
It is also known as secondary storage. It is a
temporary memory.
permanent storage.
Example: Random Access Memory (RAM)
Example: Hard Disk, flash drive and memory card

3|Page
100% Success 9th. Computer 2023

Q7. Difference between primary memory and secondary memory.


Primary Memory Secondary Memory
It is a temporary memory. It is a permanent memory.
It is volatile memory. It is non-volatile memory.
It has low storage capacity. It has larger storage capacity.

Q8. Difference between memory and storage/ Difference between temporary & Permanent Storage:
Memory (Temporary) Storage(Permanent)
Place where an application loads its data during processing. Place where data is stored for long or short term.
Temporary storage device. Permanent storage device.
Small in size. Greater in size.
High accessing speed. Low accessing speed.
It is called primary memory. It is called secondary memory.
Q9. Define Bit.
The smallest unit of data that can be used by a computer is called bit.
Q10. Define Byte:
A set of 8 bits is known as byte. One byte is required to store one character. The capacity of memory is often
measured in the number of bytes.
Q11. What is Boolean algebra?
Boolean algebra was introduced by a George Boole in 1854. Boolean algebra is the algebra of logic. It uses binary
values so it is also known as binary algebra or logical algebra.
Q12. Define Truth Values.
Every proposition takes one of two values true or false, these values are called the truth values.
Q13. Define Compound proposition.
Compound proposition is types of Boolean proposition that consist of two or more propositions. The logical AND, OR
are used to make compound propositions.
Q14. What are Logical Operators?
Logical operators are symbols use to combine more than one Boolean proposition or negate proposition. There are
three types of logical operators are AND, OR and NOT.
Q15. What is AND Operator (.)?
The AND operator is used to connect two or more propositions. The result is true if all propositions are true. It can be
denoted by (.). It is written as P AND Q or P.Q
Q16. What is OR Operator(+)?
The OR operator is used to connect two or more propositions. The result is true if at least one proposition is true. It
can be denoted by (+). It is written as P OR Q or P+Q
Q17. What is NOT Operator (¬)?
The logical operator “NOT” is not a connector but it is used to negate a proposition.
For example. if P= Today is Monday” then NOT(P) means “Today is not Monday”. It is denoted by “ ¬ “ symbol.
Q18. What is a Truth Table?
A truth table is used to check whether a proposition is true or false. It is typically used to check the truth value of a
proposition in which logical operators are used.
Q19. Write the truth table for AND.

P Q P AND Q
T T T
T F F
F T F
F F F

Q20. Write the truth table for OR.

P Q P OR Q
T T T
T F T
F T T
F F F

Q21. Write the Truth Table for NOT. P NOT(P)


T F
F T
Q22. Define Logical Expression?
An expression in which some logical operator is applied is called logical expression.
Q23. What is Boolean proposition?
A Boolean proposition is a sentence that can be true or false.
For example the sentence “Are you a student” is a proposition because its result is true.
4|Page
100% Success 9th. Computer 2023

Q24. What are Boolean variables?


The variables used in Boolean algebra are called Boolean variables. Boolean variable is denoted by a single letter
such as „X‟, „Y‟, etc.
Q25. What are Boolean constants?
The quantities whose values cannot be changed are called constants. The constants used in Boolean algebra are
called Boolean constants. O and 1 are called Boolean Constants.
Q26. What is ACSII?
ASCII stands for American Standard Code for Information Interchange. It is the standard coding scheme for the
representation of data inside the computer‟s memory.
Q27. What is commutative law?
According this law, there is no change in result if order of propositions or Boolean variables is changed.
If `A and B` are Boolean variables then (i) A + B = B + A (ii) A . B = B . A
Q28. What is associative law?
According this law, there is no change in result if a grouping of expressions is changed.
If `A, B,C` are three Boolean variables then (i) A + (B+C) = ( A + B) C (ii) A . (B.C) = (A.B) . C
Q29. What is Distributive law?
The OR operation is distributive over AND, similarly AND operation is distributive over OR operation.
If `A, B,C` are three Boolean variables then: (i) A . (B+C) = A .B + A .C (ii) A + (B.C) = (A+B) . (A+C)
Q30. What is Identity law?
According to this law, there is an identity element `1` (true) with respect to AND operation.
And an identity element `0` (false) with respect to OR operation. (i) A+0 = A (ii) A.1 = A

Chapter#03
Q. Define network topology.
The physical layout of connected devices in a network is called network topology. Different network topologies are as
follows:
 Bus topology
 Star topology
 Ring topology
 Mesh topology

Q. What is Transmission Medium/communication channels?


Medium is the physical path that connects sender and a receiver. It is used to transmit data. The medium can be a
copper wire, a fiber optic, microwave etc.
Q. What is Messages?
The messages are the information or data that may be in the form of text, numbers, images, audio and video. Each
message consists of two parts called payload and control information.
Q. Define packet.
The message in data communication is sent in the form of packets.
Q. What is payload?
Payload is the actual content of the message.
For example. Suppose a user write an email to a friend. The content of the email message is the payload.
Q. What is control information?
Control information contains the information about the sender and receiver. The message cannot be delivered if the
control information is wrong or missing.
Q. What is Transmission Control Protocol/Internet Protocol (TCP/IP)?
TCP/IP stands for Transmission Control Protocol/Internet Protocol.
TCP/IP is a network model that is used to transfer data from one computer to other over the internet and other
networks.

Q. List five layers of the TCP/IP model:


1. Application layer
2. Transport layer
3. Network layer
4. Data link layer
5. Physical layer

Q. What is computer network model?


Network model is used to manage the communication between computers on a network. A Network model uses
different layers to carry out communication.
Q.Application layer:
Application layer is top most layer of TCP/IP model. It provides an interface between network services and application
programs.
Q.Transport layer:
The transport layer provides a method to transport data between sender and receiver. This layer controls the flow of
data.

5|Page
100% Success 9th. Computer 2023

Q.Network layer:
The network layer is responsible for the delivery of data from source to destination across different networks.
Q.Data link layer:
The data link layer manages the transfer of data between the devices on the same network.
Q.Physical layer:
The physical layer is the bottom layer of TCP/IP model. This layer is about the physical medium used in
communication system like cabling.
Q.FTP: File transfer protocol is the standard TCP/IP protocol. It is used for transferring files form one computer to
another.
Q.HTTP: Hypertext Transfer Protocol is a protocol used by World Wide Web (WWW) to transfer webpage between a
client and a web server.
Q.SMTP: Simple Mail Transfer Protocol is a standard protocol to transmit emails.
Q.What is the difference between Static IP and Dynamic IP address?
Static IP address Dynamic IP address
If an IP address of a device is fixed in a network, it is If each time a new connection is made and a new IP
called static IP address. address is assigned it is called dynamic IP address.

Q. Define IP addressing.
IP address stands for Internet Protocol address, it is a unique identifier that is associated with a device when it is
connected to a network.
There are two standards of IP addressing, i.e IPv4 and IPv6.
Q. What are the size of IPv4 and IPv6?
32
IPv4 is a 32 bits or 2 in size. It provides 4.3 billion IP addresses.
128 38
IPv6 is a 128 bits or 2 in size. It provides 3.4x10 IP addresses.
Q. What is a Router?
A router is a networking device that connects multiple networks. It can transmit data from one network to another in
less time
Q. What are the main components of communication?
The main components of communication system are sender, receiver, message, protocol and transmission medium or
channel.
Q. Define communication channel or medium.
The path through which data transfer from one place to other is called transmission medium. Transmission medium is
also called communication channel.
Q. What are the advantages and disadvantages of star topology over bus topology?

Advantages Disadvantages
Star topology is more reliable than bus topology. Star topology consumes more cable than bus topology.
Star topology easy to manage and maintain than bus
Star topology is more expensive than bus topology.
topology.

CHAPTER NO. 4
Q1. What are computer ethics?
Computer ethics are the moral rules and guidelines that determine the proper use of computer system.
Q2. Use any five issues related to data security.
Five issues related to data security are as follows:
1. Confidentiality & privacy
2. Piracy
3. Patent,
4. Copyright
5. Trade secret.
Q3. Define confidentiality.
Confidentiality is the responsibility to keep other's personal information private.
Q4. What is data privacy?
Data privacy refers to keep personal information private. It is typically related to the personal information stored on the
computer.
Q5. What is difference between authorized and unauthorized access.
The process of accessing a computer system legally is called authorized access. The process of accessing a
computer system illegally is called unauthorized access.
Q6. What is meant by piracy?
Piracy means to making illegal copies of any work protected by the copyright law.
Q7. What do you mean by software piracy?
Software piracy is the illegal copying, distribution or use of copyright software.
Q8. What is open source software?
The open source software is available at no cost. Anyone can modify the source code and rearrange it.
Q9. What is key?
The software companies sell software along with a confidential text called key.
6|Page
100% Success 9th. Computer 2023

Q10. Define cracking.


Some people try to get software key using illegal means. This process is known as Cracking.
Q11. List five types of software piracy.
Five types of software piracy are as follows:
1. Softlifting
2. Client-Server overuse
3. Hard disk loading
4. Counterfeiting
5. Online piracy
Q12. What is softlifting?
Softlifting is a process of borrowing a software application from a colleague and installing it on your device.
Q13. What is client-server overuse?
Client-server overuse is a process of installing more copies of the software than number of licenses.
Q14. What is hard disk loading?
Hard disk loading is a process of installing and selling unauthorized copies of the software on new computers.
Q15. What is counterfeiting?
Counterfeiting is a process of selling the duplicate copies of the software.
Q16. What is meant by online piracy?
Online piracy is a process of downloading the illegal copies of software.
Q17. What is patent?
A patent is a right that is granted to the owner for a certain period of time. It is effective way to protect the idea.
Q18. Why is it important to register a patent?
It is important to register a patent if someone is doing research in any field and has a new idea. It stops other people
to make or sell anything on the basis of that idea.
Q19. What is meant by trade secrets?
Trade secrets refer to the secret information of a company that play important role for its success.
Q20. What is sabotage?
Sabotage is a serious attack on a computer system remotely over the network.
Q21. What are cookies?
A lot of information is generated when the user browse the Internet. This information is usually stored with the Web
surfer known as cookies.
Q22. Define Encryption
Encryption is the process of encoding plain data into unreadable format.
Q23. What is ciphertext?
The unreadable format of data is called ciphertext. It is performed in encryption
Q24. Define decryption.
The process of converting ciphertext back to plain text is called decryption.
Q25. What is substitution cipher method?
Substitution cipher method is a method of encryption in which the characters of original text are replaced with some
other characters.
Two types of substitution cipher methods are Caesar cipher and Vigenere cipher.
Q26. What is Caesar cipher method?
Caesar cipher method replaces each alphabet in the plain text with another alphabet.
Q27. What is vigenore cipher method?
Vigenere cipher method uses a table known as Vigenere Cipher table. The Vigenere cipher method works with
substitution key. The key is combined with the plaintext to generate the ciphertext
Q28. What is Vigenere cipher table?
The Vigenere cipher table consists of 26 rows and 26 columns.
Q29. Write any three characteristics of a good password.
A good password consists of at least eight characters. It does not contain username, real name, children name or
company name. It is different from previous passwords.
Q30. What is difference between cryptographic key and password?
The cryptographic key is used to read an encrypted message whereas password is used for authentication to enter a
system whereas.
Q31. What is CAPTCHA?
CAPTCHA is a set of random letters and numbers that appear as a faint image and a textbox. CAPTCHA text is only
readable by humans not the computer.
Q32. What is cybercrime?
A cybercrime is a criminal activity carried out by means of computers and the Internet.
Q33. What is spyware?
Spyware is a type of software that is used in hacking. It connects the hacker to the computer to access important
information.
Q34. List any three types of cybercrimes.
Three types of cybercrimes are as follows:
1. Identity theft
2. Transaction fraud
3. Hacking
7|Page
100% Success 9th. Computer 2023

Q35. What is meant by DoS(Denial of service) Attack?


A Denial-of-Service (DoS) attack is a cyber attack in which a machine or network resources are unavailable for a user.
Q36. What is phishing attack?
A criminal activity in which the criminal uses take email and website to get sensitive information of the user.

CHAPTER NO. 5
Q1. What is HTML?
HTML stands for Hyper Text Markup Language. It is a formatting language used to develop web pages.
Q2. Define the term hypertext.
The term hypertext is used to refer to the special text in a webpage called hyperlinks. The hyperlinks can be clicked to
move from one webpage to another.
Q3. What are the attributes of HTML tags?
The attributes of HTML are used to specify the working of HTML tags. They provide additional information about the
tags.
Q4.What is the types of HTML tags?
Two types of HTML tags are
1. Paired tags
2. Singular tags.
Q5. What is paired tags?
The paired tags have start tag and end tag such as <H1> and </H1>.
Q6. What are Singular tags?
The singular tags have start tags but no end tag.
Q7. Which are two main sections of an HTML page?
The two main sections of an HTML page are Head section and Body section.
Q8. Describe the basic text formatting tag.
The basic text formatting tag is <FONT>. It has different attributes such as font size, font color and font face.
Q9. What is the difference between <BR> tag and <P> tag?
<BR> is a line break tag and <P> is the paragraph tag.
Q10. Name the tag to add images in HTML.
The tag to add images is <IMG>.
Q11. Which types of lists can be created in HTML?
Different types of lists are Ordered Lists, Unordered Lists and Definition Lists.
Q.12. What is an ordered list?
An ordered list is a list of items in which each item is marked with a number. Ordered list is also known as numbered
list.
Q13. What is an unordered list?
An unordered list is a list of items in which each item is marked with a symbol.
Q14. What is a definition list?
A definition list is not a list of items. It consists of terms and description of terms.
Q15. What are the Nested Lists?
In a list, a list item can contain another list. Such list is called a nested list. Each list is created inside the <ul> </ul>
tags. Each item is added with <li> tag.
Q16. What is the use of OL tag?
<OL> tag is used to create an ordered list. It stands for ordered list. <LI> tag is used with each item in the list. It stands
for list item. It has no closing tag. </OL> tag is used to close an ordered list.
Q17. What is the use of UL tag?
<UL> tag is used to create an unordered list. It stands for unordered list. <LI> tag is used with each item in the list.
</UL> tag is used to close an unordered list.
Q18. What is the use of DL tag?
<DL> tag is used to create a definition list. It stands for definition list. <DT> tag is used with each term in the definition
list.
Q19. What is hyperlink?
Hyperlink is an icon, graphic or text in a document that links to other document or object.

Q20. Define <A> tag.


All hyperlinks are created with <A> tag.

Q21. What is use of <TABLE> tag?


The <TABLE> tag is used to define a table. Attributes of TABLE tag are BORDER, COLSPAN and ROWSPAN.

Q22. What is the use of COLSPAN and ROWSPAN attribute of table?


The COLSPAN attribute is used to divide a cell into two or more columns.
The ROWSPAN attribute is used to divide a cell into two or more rows.

Q23.Write the use of <p>,<br> and <hr> tags.


<p> tag is used for paragraph. <br> tag is used for line break. <hr> tag is used for insert horizontal line.

8|Page
100% Success 9th. Computer 2023

Q24.What is a Website?
A website consists of WebPages.

Q25. What is difference between hyperlink and anchor?


Hyperlink Anchor
Hyperlink is an icon, graphic or text in a document by Anchor is used to move from one part of the same
which you move around on the other document. page to another part.

Q26. Differentiate between ordered and unordered Lists.


Ordered list Unordered list
An ordered list is a list of items in which each item is An unordered list is a list of items in which each item
marked with a number. is marked with a symbol.

Important MCQ’s from all book Computer Science 9th.


CH-1
i-________ is a graphical representation of an algorithm.
(a) Matrix (b) Graph (c) Flowchart √ (d) Solution
ii- Which word refers to something spontaneous and unplanned?
(a) Act it out (b) Candid solution √ (c) Prototype (d) To Guess
iii- Which solutions are not reached through proper algorithms or work.
(c) Strategized
(a) Prepared solution (b) Candid solution (d) Best solution
solution
iv- _______ is a set of steps to solve a problem.
(a) Flowchart (b) Algorithm (c) Guess (d) Prototype
v- Which strategy divides a complex problem into smaller problems?
(d) Divide and
(a)Guess (b) Act it out (c) Prototype
Conquer
vi- It is used to determine the flow of steps in a flowchart.
(a)Flow line (b) Terminal (c) Processing (d) Connector
vii- In a flowchart, rectangle symbol represents ______.
(a)input/output (b) decision (c) processing (d) Connector
viii- It is important _________ before solving a problem.
(a) Analysis (b) Define (c) No understand (d) Planning
ix- What show diamond symbol in flowchart?
(a) input/output (b) Decision making (c) Processing (d) Connector
x- Which symbol in the flowchart is used to either start or end the flowchart?
(a) Terminal (b) Connector (c) Process (d) Decision
xi- Total steps to solve a problem are:
(a) 2 (b) 3 (c) 5 (d) 7
xii- Which notation show starting point of an algorithm?
(a) Input (b) goto (c) set (d) start
xiii- An algorithm is a set of _______ to solve a problem.
(a) steps (b) terminal (c) output (d) analysis
xiv- A well defined problem does not contain?
(a) error (b) validation (c) ambiguities (d) picture
xv- It is important to ______ solving a problem before jumping into the solution.
(a) understand √ (b) defining (c) make picture (d) use guesses
xvi- Which notation of an algorithm is used for displaying values?
(a) if-else (b) output √ (c) stop (d) input
xvii-How many questions are necessary to understand a problem?
(a) 6 (b) 2 (c) 3 (d) 5 √
Chapter No. 02
1-Number “17” is equal to ______ in binary system.
(a) 10000 (b) 10110 (c) 10001 (d) 101000
2- ______ is used to assemble more than one proposition into one proposition.
(c) Compound
(a) Simple proposition (b) Mixed proposition (d) Full proposition
proposition
3- 1Kb = _______ Byte.
9|Page
100% Success 9th. Computer 2023

(a) 1000 bytes (b) 8 bytes (c) 1024 bytes (d) 4 bytes
4- For (A)16 the binary value is __________.
(a) (0010)2 (b) (1010)2 (c) (0011)2 (d) (1111)2
5- The number system we use in daily life is ________ number system.
(a) Binary (b) Hexadecimal (c) Decimal (d) Base 16 system
6-The base of binary number system is.
(a) 16 (b) 8 (c) 2 (d) 10
7- 1 (one) Megabyte MB is equal to ______.
(a) (1024)2 bytes (b) (1024)3 bytes (c) (1024)4 bytes (d) (1024)5 bytes
8- ___ is used to check whether a proposition is true or false.
(a) Boolean algebra (b) Logical operator (c) Truth values (d) Truth Table
9- Hexadecimal system has total _________ numbers.
(a) 17 (b) 16 (c) 18 (d) 15
10- One (1) Bit is equal to __________.
(a) 1 or 2 (b) 3 or 4 (c) 1 or 0 (d) 5 or 6
11- Volatile memory is temporary and ______ is permanent memory.
(a) Non volatile (b) semi volatile (c) memory (d) RAM
12- Basically there are _________ types of memory.
(a) 2 (b) 1 (c) 4 (d) 3
13- 1 (one) Peta byte is equal to.
(a) 1024 KB (b) 1024 MB (c) 1024 GB (d) 1024 TB
14- The base of binary number system is.
(a) 16 (b) 10 (c) 02 (d) 08
Ch-03
1-The IPv4 is made up of _______ bits.
(a) 31 (b) 29 (c) 32 (d) 30
2- E-Mail stands for ____________.
(a) Electric mail (b) Electronic mail (c) Electronic medium (d) Electronic message
3- The receiver must be capable of accepting the __________.
(a) Protocol (b) message (c) Address (d) information
4- Routing is process of taking data from one device and sending it to another device in different
______________.
(a)Channel (b) Network (c) Path (d)Area
5-How many layers TCP/IP model have:
(a) 4 (b) 3 (c) 5 (d) 6
6- IP addressing must be understand as part of the ________________ for conversation.
(a) Computer (b) Protocol (c) Router (d) Switch
7-Which protocol is used to transfer mail from one place to another place?
(a) FTP (b) HTTP (c) SMTP (d) STP
8- 172.16.54.1 is an example of _________.
(a) Protocol (b) Domain (c) IPv4 Address (d) DNS
9- Internet service provided by.
(a) HTTP (b) ISP (c) TCP (d) SMTP
10- IPv4 divides into _________ parts.
(a) 2 (b) 4 (c) 6 (d) 8
11- Basic components of communication system are.
(a) 2 (b) 3 (c) 5 (d) 6
12- DHCP stands for.
(a) Data hosting (b) Data host (c) Dynamic host (d) Dynamic host
computer protocol computer protocol configuration protocol common protocol
13- Router connects multiple ______________ together.
(a) networks (b) addresses (c) layers (d) channels
14- _____________ is used to transfer data from one location to another location.
(d) Communication
(a)Message (b) Receiver (c) Protocol
system
15- __________ is a formal agreement between two parties.
(b) Transmission
(a) Protocol (c) Sender (d) Receiver
medium
10 | P a g e
100% Success 9th. Computer 2023

16-2001:001:db01:01:5:800:7:16 is an example of _________.


(a) IPv6 address (b) Domain (c) IPv4 Address (d) DNS
17- IPv6 divides into _________ parts.
(a) 7 (b) 8 (c) 4 (d) 5
18-The IPv6 is made up of _______ bits.
(a) 128 (b) 129 (c) 32 (d) 256
CH-4
1-Making illegal copies of software is called ______________.
(a) Hacking (b) Piracy (c) Counterfeiting (d) Sabotage
2- _________ is used for authentication to enter a system.
(a)Key (b) Piracy (c) Patent (d) Password
3- ________ is a way to protection idea.
(a) Patent (b) Copyright Law (c) Trade secrets (d) Fraud
4- Encoding of data is an example of _____________.
(a) Patent (b) Confidentiality (c) Copyright (d) Encryption
5- Which of the following is not a cyber crime?
(a) Hacking (b) Phishing crime (c) Identity theft (d) Decryption
6- One common form of a cybercrime is _____________.
(a) Identity theft (b) Transaction fraud (c) Piracy (d) Hacking
7- The process of encoding data in such a way is called.
(a) Encryption (b) Sabotage (c) Copyright (d) Piracy
8- Which of the following is not good characteristic of good password?
(a) Is eight character (b) Does not contain (c) Contains upper (d) Password is your
long username case letters name only
9- __________ attack is a cyber attack to make a machine or network resource unavailable for user.
(a) DoS (b) Phishing (c) Hacking (d) Piracy
10- In which crime computer network is used?
(a) Software (b) Cyber (c) Program (d) Computer
11- A password is at least how many character long?
(a) 6 (b) 8 (c) 14 (d) 18
12- __________ is the process of encoding data.
(a) Sabotage (b) Patent (c) Encryption (d) Availability
13- Encrypted data is known as.
(a) Password (b) Plain text (c) Cipher text (d) Secret text
14- The person who gets illegal access to computer system is known as.
(a) Hacker (b) Network controller (c) Computer operator (d) Authorized user
15- _________ is an amazing way for communication.
(a) Software (b) Hacking (c) Internet (d) Phishing
16- __________ is a serious attack on a computer system.
(a) Trade secret (b) Sabotage (c) Cyber crime (d) Patent
17- Some software companies sell software with a confidential text, called.
(c) Key of that
(a) Password (b) Encryption (d) Text
password
18- __________ is used for authentication to enter a system.
(a) Password (b) Webpage (c) Keyboard (d) Network
19- Caesar used _________ method of encryption for sending messages to his soldiers and generals.
(c) Client server over
(a) Encryption (b) Decryption (d) Patent
use
20- Installing and selling unauthorized copies of software on refurbished or new computers are
known as.
(a) Client server over
(b) Online piracy (c) Hard disk loading (d) Counterfeiting
user
21- When a key has less number of characters than the text to encrypt, then repeating letters of the
key is called _________.
(a) Vigenere cipher
(b) Wegener Widget (c) Interim cipher text (d) Cipher text
table

11 | P a g e
100% Success 9th. Computer 2023

CH-5
1-The ________ element is a container for meta data.
(a) <body> (b) <head> (c) <title> (d) <html>
2- _________ tag is used for inserting line break.
(a) <br> (b) <hr> (c) <u> (d) <b>
3- _____________ tag makes the enclosed text bold.
(a) <bold> (b) <bd> (c) <br> (d) <b>
4- _____________ tag makes the enclosed text underline.
(a) <p> (b) <b> (c) <u> (d) <i>
5- __________ links allow you to go from one part of same page to another part.
(a) Anchor (b) Hyperlink (c) Line break (d) Hypertext
6- There are ___________ of headings in HTML document.
(a) 4 (b) 5 (c) 6 (d) 1
7- Which type of language is HTML?
(a) Programming (b) Scripting (c) Object oriented (d) Markup
8- Which is correct HTML tag for inserting a line break?
(a) <BREAK> (b) <NEWLINE> (c) <BR> (d) <BL>
9- How many tags exist in HTML document?
(a) 3 (b) 2 (c) 4 (d) 5
10- HTML is a computer language which is used to create ____________.
(a) Attribute (b) Websites (c) Web server (d) Web browser
11- What is the extension of HTML file?
(a) .hml (b) .html (c) .htl (d) .htnl
12- Which tag is used to create hyperlink to webpage?
(a) <a> (b) <b> (c) <p> (d) <hr>
13- Which language is used to create a website?
(a) JAVA (b) C++ (c) VB (d) HTML
14- In hyper link image is added by using tag.
(a) <ser> (b) <pic> (c) <im> (d) <img>
15- ________ is a text in document by which you move around on the other document.
(a) Hyperlink (b) Text (c) table (d) HTML
16- Tag which are used to create a paragraph.
(a) <title> (b) <p> (c) <hr> (d) <br>
17- Example of singular tag.
(a) <br> (b) <p> (c) <body> (d) <head>
18- Which tag from the following is used for most important heading?
(a) <h1> (b) <h2> (c) <h5> (d) <h3>
19- A HTML document start with __________ tag.
(a) <head> (b) <heaf> (c) <html> (d) <title>
20- Head section end with __________ tag.
(a) </head> (b) <head> (c) </html> (d) <.head>

12 | P a g e

You might also like