KnowledgeBoat Logo
OPEN IN APP

Sample Paper

Sample Question Paper

Class 9 - Kips Cyber Beans CBSE Computer Code 165



Section A (1 mark each)

Question 1

Which of the following is not a cybercrime?

  1. Stealing personal data while working online
  2. Running malware on websites
  3. Unauthorised use of data available on the internet
  4. Using free online applications

Answer

Using free online applications

Reason — Cybercrime refers to any online illegal activity facilitated by the use of electronic communication devices. Using free online applications is not a cybercrime as a free application can be used by anyone.

Question 2

Talking to other people who are using internet at the same time as you are, is called ................. .

  1. Stalking
  2. Chatting
  3. Networking
  4. Emailing

Answer

Chatting

Reason — Talking to other people who are using internet at the same time as you are is called Chatting.

Question 3

Which one of the following is not used for wired transmission?

  1. Coaxial Cables
  2. Microwaves
  3. Optical Fiber
  4. Twisted Pair Cable

Answer

Microwaves

Reason — Microwaves are a medium of unguided data transmission while coaxial cable, optical fiber and twisted pair cables are mediums of guided data transmission.

Question 4

Which is the type of system that manages an employee's salary?

  1. Reservation System
  2. Inventory Management System
  3. Payroll System
  4. Accounting System

Answer

Payroll System

Reason — Payroll System manages an employee's salary.

Question 5

Which technology can Jayu use to directly share a video from her mobile to her friend's mobile without using the internet?

  1. Network
  2. Mobile Data
  3. Bluetooth
  4. Wi-Fi

Answer

Bluetooth

Reason — Jayu can use Bluetooth to directly share a video from her mobile to her friend's mobile without using the internet.

Question 6

Name the set of rules that is used for transmission of data over a network.

  1. LAN
  2. WAN
  3. Protocol
  4. Transmission Media

Answer

Protocol

Reason — Protocol is the set of rules that is used for transmission of data over a network.

Question 7

Which among the following image formats uses animation?

  1. JPG
  2. BMP
  3. PNG
  4. GIF

Answer

GIF

Reason — The image format that supports animation is GIF (Graphics Interchange Format).

Question 8

A word processor application will most likely be used:

  1. by an accounting department to perform calculations
  2. by an author to type a novel
  3. by a company to keep a record of stocks
  4. by a teacher to create a slide presentation on a topic

Answer

by an author to type a novel

Reason — A word processor application will most likely be used by an author to type a novel as a word processor facilitates creating, editing, saving, and printing documents.

Question 9

Name the view that shows a thumbnail of each slide.

  1. Normal
  2. Notes view
  3. Slide Sorter
  4. Slide Show

Answer

Slide Sorter

Reason — Slide Sorter view shows a thumbnail of each slide.

Question 10

Choose what constitutes a cell reference.

  1. A column name followed by a row number
  2. A column number followed by a row name
  3. A row number followed by a column name
  4. A row name followed by a column number

Answer

A column name followed by a row number

Reason — A column name followed by a row number constitutes a cell reference.

Question 11

Assertion (A): Presentation graphics software provides options to include multimedia features in slides to enhance a presentation.

Reason (R): One of the options presentation graphics applications offer is animation, which helps create attractive presentations and highlight certain objects on slides

  1. Both Assertion (A) and Reason (R) are true, and Reason (R) is a correct explanation of Assertion (A).
  2. Both Assertion (A) and Reason (R) are true, but Reason (R) is not a correct explanation of Assertion (A).
  3. Assertion (A) is true and Reason (R) is false.
  4. Assertion (A) is false and Reason (R) is true.

Answer

Both Assertion (A) and Reason (R) are true, and Reason(R) is a correct explanation of Assertion (A).

Reason — Presentation graphics software indeed provides options to include multimedia features, and one of these features is animation, which enhances presentations by allowing objects to move or change on a slide, making the presentation more engaging.

Question 12

Assertion (A): Images can enhance the appearance of a document created using a word processing application and make it more meaningful.

Reason (R): It is possible to add images to a document but not possible to draw pictures using word processing applications.

  1. Both Assertion (A) and Reason (R) are true, and Reason (R) isa correct explanation of Assertion (A).
  2. Both Assertion (A) and Reason (R) are true, but Reason (R) is not a correct explanation of Assertion (A).
  3. Assertion (A) is true and Reason (R) is false.
  4. Assertion (A) is false and Reason(R) is true.

Answer

Assertion (A) is true and Reason (R) is false.

Reason — Assertion (A) is true as images can indeed enhance the appearance of a document created using a word processing application and make it more meaningful. Reason (R) is false as some tools/features of word processing applications allow us to draw shapes and pictures within the application.

Section B (2 marks each)

Question 13

What is an e-reservation system? What are the two benefits it offers?

Answer

An e-reservation system refers to an electronic reservation system that allows users to make reservations or bookings through online platforms. Users can access the system via the internet to book services, accommodations, tickets, or appointments.

The two benefits of an e-reservation system are:

  1. 24/7 accessibility of services
  2. Convenient and time saving

Question 14(i)

Write any two differences between RAM and ROM.

Answer

Two differences between RAM and ROM are:

RAMROM
RAM contents can be changed or altered as and when required.ROM cannot be easily altered or reprogrammed.
RAM is volatile i.e., its contents are lost when the device is powered off.ROM is non-volatile i.e., its contents are retained even when the device is powered off.

Question 14(ii)

Write any two advantages of a computer network.

Answer

Two advantages of a computer network are as follows:

  1. Hardware Sharing — In a network, we can share almost every peripheral device, such as a printer, scanner, modem, CD writer, etc., among several computers.
  2. Reduces Redundancy — Since people use the same data in a common workplace, they can share it over a network by saving and storing it centrally.

Question 15

Write the difference between a compiler and an interpreter.

Answer

Differences between a compiler and an interpreter are:

CompilerInterpreter
It translates the whole source program into target program at once.It translates the source program into target program one line at a time.
All the errors found during compilation are displayed together at once.Errors are displayed line by line as each line is translated and executed.

Question 16(i)

Write the difference between a standard software and customised software.

Answer

Standard softwareCustomised software
It is designed to meet the needs of a general audience. It cannot be customised.It is developed specifically for the needs of a particular business or organization.
It is less expensive.It is more expensive.

Question 16(ii)

What is chatting? State any two advantages of chatting.

Answer

Chatting is an online textual conversation happening in realtime.

Two advantages of chatting are:

  1. Users can communicate instantly.
  2. It is an inexpensive method of communication.

Question 17

State two symptoms of virus infection on a computer.

Answer

Two symptoms of virus infection on a computer are:

  1. The speed of the processor becomes comparatively slow.
  2. The programs may not run. Even if they run, they don't function properly.

Question 18(i)

Write the difference between a header and footer. Write the different elements that can be included in a header and footer.

Answer

A header appears at the top of each page, while a footer appears at the bottom of each page.

The different elements that can be included in a header and footer are page numbers, date, title of a book/chapters, author's name, etc.

Question 18(ii)

Write the difference between a relative reference formula and an absolute reference formula in a spreadsheet.

Answer

A Relative Reference formula changes its cell references based on its position when copied to another cell. This makes it flexible for copying and pasting in different cells.

For example, if we have a formula in cell C1 as =A1+B1= \text{A1} + \text{B1} and copy it to cell C2, the formula in C2 will automatically adjust to =A2+B2= \text{A2} + \text{B2}. The references will adjust relative to the original position.

An Absolute Reference formula maintains fixed cell references regardless of its position when copied to another cell. It utilizes dollar signs ($)(\text{\textdollar}) to anchor the references, ensuring they do not change.

For example, if we have a formula in cell C1 as =$A$1+$B$1= \text{\textdollar A\textdollar1} + \text{\textdollar B\textdollar1} and copy it to cell C2, the formula in C2 will remain as =$A$1+$B$1= \text{\textdollar A\textdollar1} + \text{\textdollar B\textdollar1}. The references do not adjust; they stay fixed as these are absolute references.

Question 19

Write in brief about confidentiality of information.

Answer

Confidentiality of information means that only authorized users can access the personal and sensitive information of any person like their bank details, credit card numbers, aadhaar number, etc.

Section C (3 marks each)

Question 20

Give three methods by which you can safely use a social networking site.

Answer

Three methods by which we can safely use a social networking site are:

  1. We should avoid sharing excessive personal details, such as home address or phone number, on public profiles and be cautious when accepting friend requests and ensure connections are from known and trusted individuals.
  2. We should adjust our social media privacy settings to control who can view our profile, posts, and personal information and limit the audience for our posts to trusted connections only.
  3. We should use a strong, unique password for our social networking account and enable two-factor authentication (2FA) when available to add an extra layer of security.

Question 21(i)

Sarita wants to create a test paper in the form of a worksheet for her students. The answers are to be written on the worksheet itself. Write the features in the Word processing application that she can use to:

  1. Make the heading of the document bold.
  2. Number the questions automatically.
  3. Ensure that there is enough space between lines for the students to write the answers on the worksheet itself.

Answer

The different features of the Word processing application that can be utilized for the given tasks are:

  1. Sarita can use the 'Bold' option from the 'Font' group on the 'Home' tab.
  2. She can use 'Numbering' option from the 'Paragraph' group on the 'Home' tab.
  3. She can use 'Line Spacing' feature from the 'Paragraph' group on the 'Home' tab.

Question 21(ii)

Karan has created a document in a word processor. Write the features to help him quickly achieve the following:

  1. Insert a page number at the bottom of each page.
  2. Give a heading to each page.
  3. Search for the word 'pink' wherever it occurs and replace it with "green".

Answer

Karan can use the following features of word processor to quickly achieve the given tasks:

  1. He can click 'Add Page Number' option and select 'Bottom of Page' from the 'Header and Footer' group present in the 'Insert' tab.
  2. He can use 'Header' feature from the 'Header and Footer' group present in the 'Insert' tab.
  3. He can use 'Replace' feature present in the 'Editing' group on the 'Home' tab.

Question 22

Shobha recently got a printer as a gift. She has connected the printer to her computer as well as to the power source. Everything seems to be in order but when she tries to print, the printer does not show up in her list of devices. What could be the problem? Can you suggest what Shobha can do to resolve this issue?

Answer

A possible issue can be that Shobha's computer cannot recognise the new printer. She can resolve this issue by following the given possible solutions:

  1. She can install the necessary printer drivers on the computer. Sometimes, printers require specific drivers to communicate with the operating system. She can check the printer manufacturer's website for the latest drivers and install them.
  2. Sometimes antivirus software or firewall blocks the communication between the computer and the printer. If the drivers for the printer are installed correctly and still it is not showing up in the list of devices, then Shobha can temporarily disable the antivirus/firewall to quickly check if that is causing the issue.

Section D (4 marks each)

Question 23(i)

Study the spreadsheet given below and write the solutions for the specifications that follow. You can write the answers for any four specifications out of the given five.

Study the spreadsheet given below and write the solutions for the specifications that follow. You can write the answers for any four specifications out of the given five. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Specification 1: Write the formula to be entered in cell H4 in order to calculate Rita's total marks out of 500. How can you easily enter the formula for totals in the four cells (H5 to H8) without typing each individually?

Specification 2: The percentage column should contain the percentage of each student. Write the formula to be entered in cell I4 to calculate the percentage for the first student.

Specification 3: Write the formula that will appear in cell I5 when we copy the formula from cell I4 to cell I5.

Specification 4: Write the formula that should be entered in cell C9 to calculate the average marks in English.

Specification 5: If a column chart is to be plotted of students name against the marks in English, write the range of cells that needs to be selected.

Answer

Specification 1 — The formula to be entered in cell H4 in order to calculate Rita's total marks out of 500 is = SUM (C4 : G4).

We can easily enter the formula for totals in the four cells (H5 to H8) without typing each individually by copying the formula of cell H4 in cell range H5 : H8. To copy the formula, we must select it and drag the cell handle to cell H8.

Specification 2 — The formula to be entered in cell I4 to calculate the percentage for the first student is = (H4 / 500) * 100.

Specification 3 — The formula that will appear in cell I5 when we copy the formula from cell I4 to cell I5 is = (H5 / 500) * 100.

Specification 4 — The formula that should be entered in cell C9 to calculate the average marks in English is = AVERAGE (C4 : C8)

Specification 5 — The range of cells that needs to be selected to plot a column chart of students name against the marks in English is B4 : C8.

Question 23(ii)

Study the Excel chart shown below and write the solutions for the specifications shown below it. You can write the solutions for any four specifications out of the given five:

Study the Excel chart shown below and write the solutions for the specifications shown below it. You can write the solutions for any four specifications out of the given five. Computer Applications Code 165 Kips Cyber Beans Solutions Class 9 CBSE.

Specification 1: Name the type of chart that has been used in the figure. What is the type of analysis that this type is giving?

Specification 2: What is the temperature in Sydney in the month of November?

Specification 3: Which is the hottest city in the month of August?

Specification 4: Which is the country which generally has the lowest temperatures across the year?

Specification 5: What is the use of charts in a spreadsheet? Name one more type of chart.

Answer

Specification 1 — The chart that has been used in the figure is line chart. It illustrates trends in data at equal intervals. The given chart illustrates the variation in temperature in a given year.

Specification 2 — The temperature in Sydney in the month of November is 20 degree Celcius.

Specification 3 — Dubai is the hottest city in the month of August.

Specification 4 — The country which generally has the lowest temperatures across the year is Paris.

Specification 5 — A chart is a graphical representation of data in a worksheet. It helps to provide a better understanding of large quantities of data. Charts make it easier to draw comparison and see growth, relationship among the values and trends in data. They provide an accurate analysis of information.

Another type of chart is column chart.

Section E (4 marks each)

Question 24

Case Study 1

Neeta has to create a presentation for a project on sustainable development. She is not very familiar with digital presentation software. Help her understand some of the concepts with reference to a slide presentation.

  1. Presentation
  2. Creating a slide
  3. Workspace Views - any two views
  4. Animations
  5. Slide Layout

Answer

  1. Presentation — A presentation is a collection of slides arranged in a sequential manner to convey, persuade, motivate, entertain or to provide information.

  2. Creating a slide — A slide can be created by following the given steps:

    1. Click on New Slide option present in the Slide group on the Home tab. A drop-down box will appear.
    2. Select the required slide layout and click on it.
  3. Workspace Views (any two views) — The two slide views in PowerPoint are as follows:

    1. Normal View — It is the main editing view, which is used to write and design a presentation. In Normal View, we can add text, graphics, sound, animation, and other effects as well.
    2. Slide Sorter View — It displays a miniature view of all the slides in a presentation arranged in horizontal rows. This view is useful in making changes to several slides in one go. We can change the order of slides, copy or delete the slides, add transitions, animation effects, and set the timings for the slide show.
  4. Animations — Animation effects can be applied to individual elements on a slide, allowing for more dynamic and engaging presentations.

  5. Slide Layout — Slide Layout defines the basic structure of a slide and arranges our slide content. It provides us with different ways to position our text, images, and other graphic options.

Question 25

Case Study 2

Hari receives a call for verification of his bank account details. He receives a link and he fills up his account details in the form available on clicking the link. Soon he gets an OTP which he is asked to give to the caller. After some time, he is surprised to get a message from his bank that Rs. 40,000 has been deducted from his bank account for an online transaction. He realises he has been cheated.

Based on the given information, answer the questions given below. Attempt any four questions.

a. Name the above mentioned type of theft in which Hari's personal information was stolen.

b. State the mistakes Hari made, which lead to his financial loss.

c. Write two safety measures to be taken by Hari to avoid repeating such mistakes in the future.

d. Apart from the bank account details, what is the other type of data that can be stolen by imposters on the internet?

e. Write in brief about any one type of cyber crime, other than the above, that you are aware of.

Answer

a. Hari has been a victim of phishing.

b. The mistakes made by Hari include the following:

  1. He clicked on an unverified link.
  2. He did not check if the URL was secure i.e., had an 'https' in the web address.
  3. He provided personal and sensitive information (bank account details) on an unsecured form
  4. He shared the received OTP with the unknown caller.

c. Two safety measures Hari can take to avoid such mistakes in the future are:

  1. Engage in safe web browsing — Do not open any link from unknown sources or any pop up that appears. Both could be spyware used to plant tracking cookies on our machine, which can steal our information, direct us to bogus phishing sites, and pound us with pop-ups.
  2. Avoid sharing personal and sensitive information over phone call — Never share sensitive information such as OTP, bank account details, credit card numbers, usernames, passwords, etc. over a phone call with an unverified caller.

d. Apart from bank account details, other types of data that can be stolen are credit card numbers, usernames, passwords, aadhaar numbers, etc.

e. Another type of cyber crime is cyber stalking. It refers to online stalking where someone uses Internet, chat rooms, social networking sites, emails etc. to stalk his/her victim. Cyber stalker follows the victim online everywhere and keeps posting/sending something which are unsolicited.

PrevNext