Class 9 Computer Science Solved Past Paper 2018
Q.2 Attempt any NINE parts from the following. All parts carry equal marks.
(i) Describe briefly PAN networking.
Ans: Personal Area Network (PAN):
A personal area network (PAN) is a computer network organized around an individual person. Personal Area Networks typically involve a mobile computer, a cell phone, and/or a handheld computing device such as a DA. Users can use these networks to transfer files including emails, calendar appointments, photos, and audio/video files.
Personal area networks can be wired or wireless. USB and FireWire technologies often link together a PAN, while wireless PANs typically use Bluetooth or sometimes infrared connections.
(ii) List the advantages of ring topology.
Ans: Advantages of Ring Topology:
- High network performance.
- A server or switch is not required to manage the network.
- All the computers have equal opportunity to transmit data.
(iii) Give any three common symptoms of infected computers by malware attacks.
Ans: Common Symptoms of Malware Attacks:
A list of common symptoms of infected computers is given below.
- The computer does not start or it reboots automatically when it is on.
- Different types of error messages appear on the screen.
- Unexpected messages appear on the screen.
(iv) Why is operating system important software for a computer? Give any three reasons.
Ans: An operating system is an important software for a computer because it makes the compute} more convenient to use. It allows computer resources such as CPU, memory, input/output devices, and the Internet to be used in an efficient manner. It can be viewed as a resource manager. It also performs the following functions:
- Process Management
- Memory Management
- Input/Output Management
- File Management
- Resource Management
- User Management
(v) Define Real Time System.
Ans: Real-time System:
A real-time operating system must process information and produce a response within a specified time It is developed for special applications.
For example, a measurement from an oil refinery indicating that temperatures are getting too high might demand a quick response to avert an explosion.
(vi) What is meant by CDMA?
Ans: CDMA Technology:
CDMA stands for Code Division Multiple Access. It is a wireless cellular communication technology CDMA services include short messaging, voice, data, and video transmission. It can provide a speed of several Mbps for video transmission.
(vii) State any three problems which may occur if a peer-to-peer network is used for a large (WI) number of user in a large organization.
Ans. Problems of Peer-to-Peer Networks:
i) Peer-to-peer networks are suitable only for a small number of users, ranging between two to ten computers. Large peer-to-peer networks become difficult to manage.
ii) It does not provide centralized security.
iii) No single person is assigned to administer the resources of a network.
(viii) Compare Macintosh OS and Linux OS.
|Macintosh Operating System||Linux Operating System|
|Mac OS is developed by Apple Incorporation for their Macintosh computers in 1984.||Linux is a free open-source operating system introduced by Linus Torvalds in 1991.|
|It is a UNIX-based user-friendly operating system as it has GUI.||It is faster but difficult to use as compared to Macintosh and Windows operating systems.|
|There are some specialized versions of Mac OS X used on devices such as iPhone, iPod, iPad, and new Apple TV.||Popular Linux OS distributions include Debian, Ubuntu, Fedora, Red Hat, and OpenSUSE.|
(ix) Write down a brief note on Asynchronous transmission.
Ans: Asynchronous Transmission:
The transmission mode in which the time interval between each character is not the same is known as asynchronous transmission.
- In asynchronous transmission, each character is transmitted with additional control information (start and stop bits). The start bit is generally 0 and stop bit is 1.
- Between the start and stop bits, the bits representing a character are transmitted at uniform time intervals.
- It is suitable for a low-speed connection between the system unit and keyboard or mouse.
(xii) Differentiate between attenuation and amplification.
|Attenuation is the fall of signal strength with the distance as a signal travels through the communication media.||Amplification refers to the strengthening of signals to solve the problem of attenuation in data transmission.|
|If the attenuation is too much, the receiver may not be able to detect the signal at all.||Too much amplification saturates the receiver.|
(xiii) What is network architecture? Name its different types.
Ans: Network Architecture:
Network architecture refers to the layout of a network that consists of computers, communication devices, software, wired or wireless transmission of data, and connectivity between components.
A computer network can be as small as two computers linked together by a single cable whereas large networks connect thousands of computers and other devices.
Types of Network Architectures:
Three types of network architectures are commonly used which are:
- Client/server network
- Peer-to-peer network
- Point-to-point network
Class 9 Computer Science Solved Past Paper 2018
Note: Attempt any TWO questions.
Q.3 Discuss any four output devices.
Ans: Output devices:
It is an output device that has a screen on which information is displayed.
Types of Monitor:
It has two common types i.e. CRT (Cathode Ray Tube) monitor and LCD (Liquid Crystal Display) monitor.
The CRT monitor is very similar to an old television. It is almost obsolete due to its big size and low display quality.
An LCD monitor is slim, uses less power, and has better display quality than a CRT monitor.
A printer is an output device that prints text and graphics on paper which is known as a hardcopy.
Types of Printers:
There are two types of printers which are impact and non-impact printers.
The impact printer uses an electro-mechanical mechanism that causes the character shape to strike against the paper and leave an image of the character on the paper. Dot-matrix printer is the most commonly used impact printer.
Non-Impact Printer prints without striking the paper. There are two types of non-Impact printers which are inkjet and laser printers.
A plotter is an output device used for printing engineering drawings, machine parts, building designs, maps, charts, and panaflexes, etc. on large-size papers/sheets. Such large size printing is not possible on printers. It is more expensive than a printer.
Types of plotters:
There are two types of plotters, that is ink plotter and pen plotter.
Uses of plotters:
A plotter is used for printing images whereas a pen plotter is used for printing engineering drawings, machine parts, building designs, etc. A plotter is a slow output device but its printing quality is good.
Speaker is a device used to produce audio output. A pair of speakers are attached to the sound card on the motherboard. Speakers are commonly used with multimedia software and for playing music and videos on computers.
Q.4 Write a note on the following:
Ans: (i) Router:
1. A router is a communication device that is used when two networks have to be connected for communication.
2. They send information from one network to another by selecting the best pathway available.
3. There are two types of routers i.e. wired and wireless.
1. Bluetooth is a wireless communication technology that uses radio waves to connect portable electronic devices over a short distance.
2. It eliminates the need for cable connections and provides fast and reliable transmission.
3. It supports the networking of a wide range of portable devices that work on low batteries. These devices include a mobile phone, mouse, keyboard, wireless speaker, wireless headset, tablet, laptop computer, and personal computer.
ISDN stands for Integrated Services Digital Network. It provides a maximum speed of 128Kbps which is more than a Dial-up connection but less than DSL. It can transmit both voice and data at the same time over a single cable It requires that the user has ISDN digital telephone service from a telephone company and uses a faster modem than a Dial-up modem. ISDN service is being replaced by a faster DSL service.
Q.5 Define computer ethics and write down some important moral guidelines for the ethical use of computer technology.
Ans: Computer Ethics:
Computer ethics means an acceptable behavior for using computer technology. A computer user should be honest, respect the rights of others on the Internet, and obey laws that apply to online behavior. We should not use bad language while chatting and on social networking. We need to respect others’ views, and should not criticize people.
Ethical Use of Computer:
The following are some important moral guidelines for the ethical use of computer technology.
i. Computer should not be used to harm other people.
ii. Computer users should not break into others’ computer systems to steal, change or destroy information,
iii. Computer users should not read documents and e-mails of other users without their consent.
iv. People should not make illegal copies of copyright software and sell it for financial benefit.
v. Computer users who have special computer knowledge and ability should not create malicious software (such as computer viruses) and spread it to other computers.
vi. People should not commit any type of crime with the help of computer technology.
vii. Computer users should respect the privacy of others.