9TH. 100% Success
9TH. 100% Success
[Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.
Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.]
100% Success 9th. Computer 2023
Chapter#01
Q1. Define a Problem.
A problem is a situation or matter that requires proper attention and needs to be solved.
Q2. What is Problem Solving?
A process to identify a problem and find the best solution for it is called Problem solving.
Q3. Write the names of steps that are involved in problem solving.
Following are the steps to solve a problem.
1. Defining a Problem
2. Understanding a Problem
3. Problem Analysis
4. Planning a solution
5. Defining candid solution
6. Selecting the best solutions
Q4. What are the strategies of defining a problem?
Three strategies are used to define the problem as follows:
1. Gain Background Knowledge
2. Use Guesses
3. Draw a picture.
Q5. What is understanding a Problem?
A clear understanding of a problem makes it easier to solve and helps to save money, time and resources.
Q6. What is meant by problem Analysis?
The process of understanding the given problem is called problem analysis. It is very important to understand a
problem before trying to solve it.
Q7. What do you know about 5 W’s?
5 W‟s is a set of common questions. These questions are used to understand a problem. The 5 Ws are What, Who,
When, Where and why.
Q8. What are the strategies for planning the solution of the problem?
Different strategies to plan the solution of a problem are as follows:
1. Divide and conquer
2. Guess, Check and Improve
3. Act it Out
4. Prototype
Q9. What is “Divide and conquer” strategy?
In this strategy we divide a complex problem into smaller problems. Then the smaller problems are solved one by one.
This is best, simple and easy technique to solve the complex problems.
Q10. Define the “Prototype (Draw)” in planning a solution.
In this strategy or technique, we draw a pictorial representation for the solution of the problem. It is not the final
solution.
Q11. What is candid solution of a problem?
A process to find out the solution of a problem by estimation (guess) without proper planning is called candid solution.
2|Page
100% Success 9th. Computer 2023
Chapter#02
Q1. What is a number system?
A set of values to respect different quantities is known as number system.
Different number systems are as follow:
1. Binary number system
2. Hexadecimal number system
3. Decimal number system
Q2. What is Decimal Number System?
Decimal number system is commonly used in our daily life. The base of decimal number system is 10. It consists of
ten digits from (0-9). It is also known as Hindu-Arabic or Arabic. Examples: 5310, 89210
Q3. What is Binary Number System?
Digital computers used binary number system. Binary number system consists of two digits 0 and 1 and its base is 2.
Example: The binary value of the letter „A „is (01000001)2 and its decimal value is 65.
Q4. What is Hexadecimal Number System?
Hexadecimal system has total 16 digits. Its base is 16. It consists of 0 to 9 and A,B,C,D,E and F. Where
A=10,B=11,C=12,D=13,E=14 and F=15. Example: 3F2B16.
Q5. What is Computer Memory?
Computer memory is a physical device that can store data and programs. Some computer memories store data and
programs temporarily while others permanently.
There are two types of memory: (i) Volatile Memory (ii) Non- Volatile Memory
Q6. Difference between Volatile & Non-Volatile Memory OR Differentiate between temporary and permanent
storage.
Volatile Memory Non-Volatile Memory
A non-volatile memory is a device that can store
A volatile memory is a device that can store data as
data even if the power supply is not connected to it.
long as the power supply is connected to it. This
This type of memory is called non-volatile memory.
type of memory is called volatile memory. It is a
It is also known as secondary storage. It is a
temporary memory.
permanent storage.
Example: Random Access Memory (RAM)
Example: Hard Disk, flash drive and memory card
3|Page
100% Success 9th. Computer 2023
Q8. Difference between memory and storage/ Difference between temporary & Permanent Storage:
Memory (Temporary) Storage(Permanent)
Place where an application loads its data during processing. Place where data is stored for long or short term.
Temporary storage device. Permanent storage device.
Small in size. Greater in size.
High accessing speed. Low accessing speed.
It is called primary memory. It is called secondary memory.
Q9. Define Bit.
The smallest unit of data that can be used by a computer is called bit.
Q10. Define Byte:
A set of 8 bits is known as byte. One byte is required to store one character. The capacity of memory is often
measured in the number of bytes.
Q11. What is Boolean algebra?
Boolean algebra was introduced by a George Boole in 1854. Boolean algebra is the algebra of logic. It uses binary
values so it is also known as binary algebra or logical algebra.
Q12. Define Truth Values.
Every proposition takes one of two values true or false, these values are called the truth values.
Q13. Define Compound proposition.
Compound proposition is types of Boolean proposition that consist of two or more propositions. The logical AND, OR
are used to make compound propositions.
Q14. What are Logical Operators?
Logical operators are symbols use to combine more than one Boolean proposition or negate proposition. There are
three types of logical operators are AND, OR and NOT.
Q15. What is AND Operator (.)?
The AND operator is used to connect two or more propositions. The result is true if all propositions are true. It can be
denoted by (.). It is written as P AND Q or P.Q
Q16. What is OR Operator(+)?
The OR operator is used to connect two or more propositions. The result is true if at least one proposition is true. It
can be denoted by (+). It is written as P OR Q or P+Q
Q17. What is NOT Operator (¬)?
The logical operator “NOT” is not a connector but it is used to negate a proposition.
For example. if P= Today is Monday” then NOT(P) means “Today is not Monday”. It is denoted by “ ¬ “ symbol.
Q18. What is a Truth Table?
A truth table is used to check whether a proposition is true or false. It is typically used to check the truth value of a
proposition in which logical operators are used.
Q19. Write the truth table for AND.
P Q P AND Q
T T T
T F F
F T F
F F F
P Q P OR Q
T T T
T F T
F T T
F F F
Chapter#03
Q. Define network topology.
The physical layout of connected devices in a network is called network topology. Different network topologies are as
follows:
Bus topology
Star topology
Ring topology
Mesh topology
5|Page
100% Success 9th. Computer 2023
Q.Network layer:
The network layer is responsible for the delivery of data from source to destination across different networks.
Q.Data link layer:
The data link layer manages the transfer of data between the devices on the same network.
Q.Physical layer:
The physical layer is the bottom layer of TCP/IP model. This layer is about the physical medium used in
communication system like cabling.
Q.FTP: File transfer protocol is the standard TCP/IP protocol. It is used for transferring files form one computer to
another.
Q.HTTP: Hypertext Transfer Protocol is a protocol used by World Wide Web (WWW) to transfer webpage between a
client and a web server.
Q.SMTP: Simple Mail Transfer Protocol is a standard protocol to transmit emails.
Q.What is the difference between Static IP and Dynamic IP address?
Static IP address Dynamic IP address
If an IP address of a device is fixed in a network, it is If each time a new connection is made and a new IP
called static IP address. address is assigned it is called dynamic IP address.
Q. Define IP addressing.
IP address stands for Internet Protocol address, it is a unique identifier that is associated with a device when it is
connected to a network.
There are two standards of IP addressing, i.e IPv4 and IPv6.
Q. What are the size of IPv4 and IPv6?
32
IPv4 is a 32 bits or 2 in size. It provides 4.3 billion IP addresses.
128 38
IPv6 is a 128 bits or 2 in size. It provides 3.4x10 IP addresses.
Q. What is a Router?
A router is a networking device that connects multiple networks. It can transmit data from one network to another in
less time
Q. What are the main components of communication?
The main components of communication system are sender, receiver, message, protocol and transmission medium or
channel.
Q. Define communication channel or medium.
The path through which data transfer from one place to other is called transmission medium. Transmission medium is
also called communication channel.
Q. What are the advantages and disadvantages of star topology over bus topology?
Advantages Disadvantages
Star topology is more reliable than bus topology. Star topology consumes more cable than bus topology.
Star topology easy to manage and maintain than bus
Star topology is more expensive than bus topology.
topology.
CHAPTER NO. 4
Q1. What are computer ethics?
Computer ethics are the moral rules and guidelines that determine the proper use of computer system.
Q2. Use any five issues related to data security.
Five issues related to data security are as follows:
1. Confidentiality & privacy
2. Piracy
3. Patent,
4. Copyright
5. Trade secret.
Q3. Define confidentiality.
Confidentiality is the responsibility to keep other's personal information private.
Q4. What is data privacy?
Data privacy refers to keep personal information private. It is typically related to the personal information stored on the
computer.
Q5. What is difference between authorized and unauthorized access.
The process of accessing a computer system legally is called authorized access. The process of accessing a
computer system illegally is called unauthorized access.
Q6. What is meant by piracy?
Piracy means to making illegal copies of any work protected by the copyright law.
Q7. What do you mean by software piracy?
Software piracy is the illegal copying, distribution or use of copyright software.
Q8. What is open source software?
The open source software is available at no cost. Anyone can modify the source code and rearrange it.
Q9. What is key?
The software companies sell software along with a confidential text called key.
6|Page
100% Success 9th. Computer 2023
CHAPTER NO. 5
Q1. What is HTML?
HTML stands for Hyper Text Markup Language. It is a formatting language used to develop web pages.
Q2. Define the term hypertext.
The term hypertext is used to refer to the special text in a webpage called hyperlinks. The hyperlinks can be clicked to
move from one webpage to another.
Q3. What are the attributes of HTML tags?
The attributes of HTML are used to specify the working of HTML tags. They provide additional information about the
tags.
Q4.What is the types of HTML tags?
Two types of HTML tags are
1. Paired tags
2. Singular tags.
Q5. What is paired tags?
The paired tags have start tag and end tag such as <H1> and </H1>.
Q6. What are Singular tags?
The singular tags have start tags but no end tag.
Q7. Which are two main sections of an HTML page?
The two main sections of an HTML page are Head section and Body section.
Q8. Describe the basic text formatting tag.
The basic text formatting tag is <FONT>. It has different attributes such as font size, font color and font face.
Q9. What is the difference between <BR> tag and <P> tag?
<BR> is a line break tag and <P> is the paragraph tag.
Q10. Name the tag to add images in HTML.
The tag to add images is <IMG>.
Q11. Which types of lists can be created in HTML?
Different types of lists are Ordered Lists, Unordered Lists and Definition Lists.
Q.12. What is an ordered list?
An ordered list is a list of items in which each item is marked with a number. Ordered list is also known as numbered
list.
Q13. What is an unordered list?
An unordered list is a list of items in which each item is marked with a symbol.
Q14. What is a definition list?
A definition list is not a list of items. It consists of terms and description of terms.
Q15. What are the Nested Lists?
In a list, a list item can contain another list. Such list is called a nested list. Each list is created inside the <ul> </ul>
tags. Each item is added with <li> tag.
Q16. What is the use of OL tag?
<OL> tag is used to create an ordered list. It stands for ordered list. <LI> tag is used with each item in the list. It stands
for list item. It has no closing tag. </OL> tag is used to close an ordered list.
Q17. What is the use of UL tag?
<UL> tag is used to create an unordered list. It stands for unordered list. <LI> tag is used with each item in the list.
</UL> tag is used to close an unordered list.
Q18. What is the use of DL tag?
<DL> tag is used to create a definition list. It stands for definition list. <DT> tag is used with each term in the definition
list.
Q19. What is hyperlink?
Hyperlink is an icon, graphic or text in a document that links to other document or object.
8|Page
100% Success 9th. Computer 2023
Q24.What is a Website?
A website consists of WebPages.
(a) 1000 bytes (b) 8 bytes (c) 1024 bytes (d) 4 bytes
4- For (A)16 the binary value is __________.
(a) (0010)2 (b) (1010)2 (c) (0011)2 (d) (1111)2
5- The number system we use in daily life is ________ number system.
(a) Binary (b) Hexadecimal (c) Decimal (d) Base 16 system
6-The base of binary number system is.
(a) 16 (b) 8 (c) 2 (d) 10
7- 1 (one) Megabyte MB is equal to ______.
(a) (1024)2 bytes (b) (1024)3 bytes (c) (1024)4 bytes (d) (1024)5 bytes
8- ___ is used to check whether a proposition is true or false.
(a) Boolean algebra (b) Logical operator (c) Truth values (d) Truth Table
9- Hexadecimal system has total _________ numbers.
(a) 17 (b) 16 (c) 18 (d) 15
10- One (1) Bit is equal to __________.
(a) 1 or 2 (b) 3 or 4 (c) 1 or 0 (d) 5 or 6
11- Volatile memory is temporary and ______ is permanent memory.
(a) Non volatile (b) semi volatile (c) memory (d) RAM
12- Basically there are _________ types of memory.
(a) 2 (b) 1 (c) 4 (d) 3
13- 1 (one) Peta byte is equal to.
(a) 1024 KB (b) 1024 MB (c) 1024 GB (d) 1024 TB
14- The base of binary number system is.
(a) 16 (b) 10 (c) 02 (d) 08
Ch-03
1-The IPv4 is made up of _______ bits.
(a) 31 (b) 29 (c) 32 (d) 30
2- E-Mail stands for ____________.
(a) Electric mail (b) Electronic mail (c) Electronic medium (d) Electronic message
3- The receiver must be capable of accepting the __________.
(a) Protocol (b) message (c) Address (d) information
4- Routing is process of taking data from one device and sending it to another device in different
______________.
(a)Channel (b) Network (c) Path (d)Area
5-How many layers TCP/IP model have:
(a) 4 (b) 3 (c) 5 (d) 6
6- IP addressing must be understand as part of the ________________ for conversation.
(a) Computer (b) Protocol (c) Router (d) Switch
7-Which protocol is used to transfer mail from one place to another place?
(a) FTP (b) HTTP (c) SMTP (d) STP
8- 172.16.54.1 is an example of _________.
(a) Protocol (b) Domain (c) IPv4 Address (d) DNS
9- Internet service provided by.
(a) HTTP (b) ISP (c) TCP (d) SMTP
10- IPv4 divides into _________ parts.
(a) 2 (b) 4 (c) 6 (d) 8
11- Basic components of communication system are.
(a) 2 (b) 3 (c) 5 (d) 6
12- DHCP stands for.
(a) Data hosting (b) Data host (c) Dynamic host (d) Dynamic host
computer protocol computer protocol configuration protocol common protocol
13- Router connects multiple ______________ together.
(a) networks (b) addresses (c) layers (d) channels
14- _____________ is used to transfer data from one location to another location.
(d) Communication
(a)Message (b) Receiver (c) Protocol
system
15- __________ is a formal agreement between two parties.
(b) Transmission
(a) Protocol (c) Sender (d) Receiver
medium
10 | P a g e
100% Success 9th. Computer 2023
11 | P a g e
100% Success 9th. Computer 2023
CH-5
1-The ________ element is a container for meta data.
(a) <body> (b) <head> (c) <title> (d) <html>
2- _________ tag is used for inserting line break.
(a) <br> (b) <hr> (c) <u> (d) <b>
3- _____________ tag makes the enclosed text bold.
(a) <bold> (b) <bd> (c) <br> (d) <b>
4- _____________ tag makes the enclosed text underline.
(a) <p> (b) <b> (c) <u> (d) <i>
5- __________ links allow you to go from one part of same page to another part.
(a) Anchor (b) Hyperlink (c) Line break (d) Hypertext
6- There are ___________ of headings in HTML document.
(a) 4 (b) 5 (c) 6 (d) 1
7- Which type of language is HTML?
(a) Programming (b) Scripting (c) Object oriented (d) Markup
8- Which is correct HTML tag for inserting a line break?
(a) <BREAK> (b) <NEWLINE> (c) <BR> (d) <BL>
9- How many tags exist in HTML document?
(a) 3 (b) 2 (c) 4 (d) 5
10- HTML is a computer language which is used to create ____________.
(a) Attribute (b) Websites (c) Web server (d) Web browser
11- What is the extension of HTML file?
(a) .hml (b) .html (c) .htl (d) .htnl
12- Which tag is used to create hyperlink to webpage?
(a) <a> (b) <b> (c) <p> (d) <hr>
13- Which language is used to create a website?
(a) JAVA (b) C++ (c) VB (d) HTML
14- In hyper link image is added by using tag.
(a) <ser> (b) <pic> (c) <im> (d) <img>
15- ________ is a text in document by which you move around on the other document.
(a) Hyperlink (b) Text (c) table (d) HTML
16- Tag which are used to create a paragraph.
(a) <title> (b) <p> (c) <hr> (d) <br>
17- Example of singular tag.
(a) <br> (b) <p> (c) <body> (d) <head>
18- Which tag from the following is used for most important heading?
(a) <h1> (b) <h2> (c) <h5> (d) <h3>
19- A HTML document start with __________ tag.
(a) <head> (b) <heaf> (c) <html> (d) <title>
20- Head section end with __________ tag.
(a) </head> (b) <head> (c) </html> (d) <.head>
12 | P a g e