Annual Examination (2023 – 24)
Subject – I.T. (Code – 402)
Time Allowed: 2 hrs. Date: 03/03/2025
“SET – A”
Grade – IX Max. Marks – 50
General Instructions:
1. Please read the instructions carefully.
2. All questions of a particular section must be attempted in the correct order.
3. Section A: Objective Type Questions (24 Marks)
4. Section B: Subjective Type Questions (26 Marks)
Question 1. Answer any 4 out of the given 6 questions based on Employability Skills.
(4 × 1 = 4)
(i) Add, Subtract, Multiple and Logic operations are performed by _____.
(A) Registers (B) Control unit (C) ALU (D) None of
these
(ii)EEPROM stands for
(A) Electrically Erasable Programmable Read Only Memory
(B) Easily Erasable Programmable Read Only Memory
(C) Electronic Erasable Programmable Read Only Memory
(D) None of these.
(iii) How many antivirus programs should be installed on a single system?
(A) 1 (B) 2 (C) 3 (D) 4
(iv) Which type of software used to maintain the proper and smooth functioning of the
computer?
(A) Application Softwares (B) Utility Softwares
(C) Operating System (D) None of these
(v) If you are working with Excel, you can underline text by pressing key:
(A) Ctrl + V (B) Ctrl + U (C) Ctrl + Z (D) All of these
(vi) Hacking, when done with a positive intent, is called-
(A) Ethical hacking (B) Active hacking (C) Passive hacking
(D) Ethics
Question [Link] any 5 out of the given 6 questions. (5
× 1 = 5)
(i) MS Word is a popular ............... program.
(A)Database (B)Calculation (C)Presentation (D)Word Processing
(ii) Which key combination is used to display and minimize the Ribbon?
(A)Ctrl + F (B)Ctrl + F1 (C)Ctrl + F2 (D)Ctrl + F3
(iii) On which tab do you find the Show/Hide button?
(A)View (B)Insert (C)Home (D)Mailings
(iv) What is the file extension of Word document?
(A).docw (B).docx (C).dow (D).docu
(v) Which of the following is an example of page orientation?
(A) Landscape (B) Subscript (C) Superscript (D) A4
(vi) The ability to combine name and addresses with a standard document is called
________
(A)Document formatting (B)Database management
(C)Mail merge (D)Form letters
Question [Link] any 5 out of the given 6 questions. (5 × 1 = 5)
(i) Select all the text in MS Word document by
(A) Ctrl +S (B) Ctrl + 1 (C) Ctrl + A (D) Ctrl + V
(ii) The operating system of a computer serves as a software interface between the
user and
(A) Hardware (B) Peripheral (C) Software (D)
Screen
(iii) Which of the following is an example of computer software?
(A) Laser printer (B) Library Management System
(C) OBCR (D) console
(iv)The binary system uses the symbols ____ and ___.
(A) 1, 2 (B) 0, 1 (C) 1, 1 (D) 1, 10
(v) The Executable file has extension:
(A) .exe (B) .exc (C) .ex (D) .dat
(vi) ________ feature of Calc helps to track what data was changed, when the change
was What name is given to a malicious program that looks like a useful program?
(A) Trojan Horse (B) Invisible Man (C) Worm (D) Uninvited Guest
Question [Link] any 5 out of the given 6 questions. (5 × 1 = 5)
(i) IP refers to-
(A) Internet Provider (B) Internet Protocol
(C) Internal Protocol (D) Internal Provider
(ii)The shortcut key used to check Grammar and Spelling in word document is-
(A) CTRL+F7 (B) Shift+F7 (C) F7 (D) Alt+F7
(iii) Internet may be termed as an example of
(A) Local Area Network (B) Metropolitan Area Network
(C) Wide Area Network (D) All of these
(iv) What software can you use to avoid getting viruses?
(A) Disk cleanup software (B) Firewall
(C) Antivirus software (D) Safety software
(v) The shortcut key used for copying selected text into clipboard is-
(A) CTRL+X (B) CTRL+V (C) CTRL+C (D) CTRL+D
(vi) Which of the following gives the status of your document like- page number,
number of pages, number of word etc.?
(A) Status bar (B) Standard tool bar (C) Formatting tool bar (D) None of these
Question [Link] any 5 out of the given 6 questions (5 × 1 = 5)
(i) What is Cyber Security?
(A) Cyber Security provides security against malware.
(B) Cyber Security provides security against cyber-terrorists.
(C) Cyber Security protects a system from cyber attacks.
(D) All of the mention
(ii) Which one of the following is also referred to as malicious software?
(A) Malicious ware (B) Bad ware (C) Ilegalware (D)
Malware
(iii) Which of the following Language directly used by Computer?
(A) High Level Language (B) Assembly Language
(C) Binary Language (D) Middle Level Language
(iv) Identify which of the following is not a Storage Unit?
(A) Hard Disk Drive (B) Compact Disk (C) Magnetic Tape (D) OBCR
(v)Which one of the following is a type of antivirus program?
(A) NPAV (B) Quick Heal (C) Avast (D) All of these
(vi) Which one is an electronic spreadsheet application-
(A) MS Word (B) MS Excel (C) MS Power Point
(D) MS Access
Section B
Subjective Type Questions
Answer any 3 out of the given 5 questions based on Employability Skills.
Answer each question in 20-30 Words.
(3 × 2 = 6)
Question 6. What is Computer Memory? Mention its type.
Question 7. What is multimedia?
Question 8. What is the difference between RAM and ROM?
Question 9. Briefly discuss the role of Antivirus.
Question 10. What is Language Translator? Define with their types.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11. What are the basic units of computer system.
Question 12. What are the different types of networks?
Question 13. What is Presentation Graphic Software? Write the names of Presentation
Graphic Software.
Question 14. write the names of electronic spreadsheet application.
Question 15. List the basic functions of Operating System.
Question 16. Differentiate between worksheet and workbook.
Answer any 3 out of the given 5 questions in 50-80 words each. (3 × 4 = 12)
Question 17. Explain the following terms concerning positioning the graphics in a
document:
(a)Arrangement
(b) Text Wrapping
Question 18. explain the use of shortcut keyboard in word.
I. Ctrl+N, VI. Ctrl+Shift+V
II. Ctrl+S VII. Ctrl+A
III. Ctrl+W, VIII. Ctrl+B,
IV. Ctrl+X IX. Ctrl+I
V. Ctrl+C X. Ctrl+U
Question 19. Nowadays Cybercrime is a biggest problem faced by many Internet users
day to day. To encounter these problems government has created some laws and
amendments known as Cyber laws. But only the creation of law is not sufficient. A
proper education and awareness is needed to safe from online criminal activities. Cyber
Crime covers all those type of crimes performed on Internet using electronic
gadgets/devices.
There are a variety of crime comes under cyber-crime, such as Cyber fraud, Credit card
fraud, Identity theft etc. To protect against Cyber-crime use Strong passwords of Online
Accounts, Keep software update, Manage Social Media Setting, Antivirus, and don’t
share personal and financial information to unsecure sites. Ensure safe sites before
sharing info such web address start with [Link] website have a padlock sign.
(a) What is Cyber-crime?
(b) How to Prevent from Cyber-crime?
(c) What are the categories of Cyber Crime?
(d) How to make strong Passwords?
Question 20. Based on the given table answer the following questions:
i) Write the formula to calculate the sum of cell B1 to B5 and display the result
in cell B7.
ii) Write the formula to calculate the average of cell B1 to B5 and display the
result in cell B8.
iii) Write the formula to find the largest no. from cell B1 to B5 and display the
result in cell B9.
iv) Write the formula to find the smallest no. from cell B1 to B5 and display the
result in cell B10.
v) Write the formula to count
the no. of elements in cell B1
to B5 and display the result
in cell B11.