Class 9 Computer Science Solved Past Paper 2019
Q.2 Attempt any NINE parts from the following. All parts carry equal marks.
(i) Compare 1st and 3rd generation computers.
Ans. Comparison of 1st and 3rd generation computers:
|First Generation Computers|
(1940 — 1956)
|Third Generation Computers|
(1963 — 1971)
|Vacuum tubes were used.||Integrated Circuits (ICs), were used instead of transistors.|
|Speed was slow and memory was very small.||IC chips improved the speed and memory of computers.|
|They were huge in size taking up the entire room.||They became smaller, cheaper, and more reliable than second-generation computers.|
|They consumed a lot of power and generated a lot of heat.||They consumed less electricity and less heat.|
|The input was based on punched cards.||These computers could run different application programs at the same time.|
(ii) Briefly describe Napier’s Bone.
Ans: Napier’s Bone:
John Napier, a Scottish mathematician inventing a calculating device called Napier’s Bone in 1614.
It consisted of a wooden box containing rotating cylinders each of which had digits from 0 to 9.
It could multiply, divide and find square roots of numbers by using simple addition and subtraction. His biggest achievement was the invention of the logarithm.
(iii) Give any three objectives of operating system.
Ans: Objectives of Operating System (OS):
1. The main objectives of the operating system are convenience and efficiency.
2. It makes the computer more convenient to use.
3. It allows computer resources such as CPU, memory, input/output devices, and the Internet to be used in an efficient manner. It can be viewed as a resource manager.
(v) Briefly describe time sharing operating system.
Ans: Time-sharing System:
A Time-sharing system is a feature of an operating system in which multiple users can run different programs on a large-scale computer. It allows many users to have access to a computer at the same time and share the computer’s time. In a time-sharing system, the central processing unit is switched rapidly between the programs so that all the user programs are executed simultaneously.
For example, hundreds of students access the university’s mainframe computer at the same time and run different programs.
(viii) Differentiate attenuation and distortion.
|Attenuation is the fall of signal strength with the distance as the signal travels through the communication media.||Distortion refers to a change in the shape or frequency of a digital signal when it is transmitted over a communication line.|
|If the attenuation is too much, the receiver may not be able to detect the signal at all.||The communication line delays the signal frequency by different amounts because different frequency components travel at different speeds. This causes distortion in digital signals.|
(ix) What is bandwidth?
Bandwidth describes the overall data transmission capacity of a medium or channel. It represents the amount of data that passes through a network connection per unit of time.
Bandwidth is also measured in bits per second like data rate.
(x) What is meant by data transmission?
Ans: Data Transmission:
Data transmission is the process of sending data from one device to another. It consists of a sender, receiver, and the medium which carries the information.
There are three modes of data transmission which are simplex, Half-duplex, and Full-duplex.
(xi) Differentiate between a server and a client computer.
Ans: Server Computer:
A Server is the main computer in a network that is used to manage network resources and facilitates other computers.
Clients are computers in a network that access services made available by a server.
In a client/server network, each computer on the network acts as either a server or a client. Servers are not used as client computers and client computers are not used as servers.
In a client/server network, the server shares its resources such as hard disk, printers, and Internet connection with client computers.
(xii) What is meant by information privacy?
Ans: Information Privacy:
Information privacy refers to an individual’s right to the privacy of personal information. In the modem information age, people are concerned that computers may be taking away their privacy.
The Data Protection Act (Law) protects the rights of individuals against the misuse of personal information by organizations. Organizations that hold the information should not allow unauthorized people to have access to information or disclose it to anyone outside the organization.
(xiii) Differentiate authentication and authorization.
Authentication means identifying a person based on a method such as a Username and a Password, Personal Identification Number (PIN), Access Card, or Biometrics. It verifies who the person is.
For example, when a user wants to log in to his email account, he is asked to enter a username and Password to verify his identity. This is authentication.
Authorization means to give someone permission to do something.
For example, if the correct username and password are entered, the user is authorized or allowed to check his emails, send an email or perform other tasks related to the email service. This is an authorization.
Class 9 Computer Science Solved Past Paper 2019
Note: Attempt any TWO questions.
Q3. a. Explain four types of application software.
Ans: Types of application software:
i. Productivity Software:
Productivity software includes word-processing, spreadsheet, and database management software packages. These software packages are used by individuals to speed up their daily routine tasks by doing their work in an organized and efficient way.
ii. Business software:
Any software that helps in running a business in a more efficient way to improve productivity is known as business software. Some examples of commonly used business software are accounting, sales and marketing, inventory control, project management, and payroll software.
iii. Entertainment Software:
Software developed to entertain people is known as entertainment software. Video games are one of the most popular forms of entertainment software. Many games are a lot of fun to play but sometimes they can also help to improve skills such as typing or reading. The term edutainment merges games and education software into a single software. Edutainment software is used mainly for entertainment but it educates as well.
iv. Education Software:
Software developed for educational purposes is known as education software. A large variety of I education software has been developed. Education software includes typing tutor, spelling tutor, language taming, medical and healthcare, driving test and flight simulation software, etc.
b. Write a note on Dial-up and DSL Internet Connection.
Ans: Dial-up Line:
The dial-up line uses standard telephone lines for an Internet connection. It requires a Dial-up modem that provides a maximum Internet connection speed of 56 Kbps.
The main advantage of using a Dial-up line is that it uses a complex network of telephone lines that allows data to be transmitted to almost any location in the world. It is becoming outdated due to a very slow Internet connection.
DSL (Digital Subscriber Line) provides a very high-speed broadband Internet connection. It is called broadband because it has a broad range of frequencies for transmitting digital data.
Any type of Internet speed that is 256 Kbps or above is known as broadband. A DSL modem is required for setting up the DSL Internet connection. Internet Service Providers (ISPs) have several DSL speeds available with different monthly rates.
Q4. a. Explain Asynchronous and Synchronous data transmission modes with example.
Ans: Asynchronous and Synchronous Transmission modes:
Asynchronous and synchronous transmissions are the methods by which characters are transferred between components within the computer or between the computer and an external network.
The transmission mode in which the time interval between each character is not the same is known as Asynchronous transmission. This is shown in Fig.
- In asynchronous transmission, each character is transmitted with additional control information. Control information consists of additional start and stop bits. Start bit indicates that transmission is about to start and stop bit indicates that it is about to stop.
- The start bit is generally 0 and stop bit is 1.
- Between the start and stop bits, the bits representing a character are transmitted at uniform time intervals.
- Asynchronous transmission is slow because of the additional bits transmitted with each character. It la suitable for a low-speed connection between the system unit and keyboard or mouse.
The transmission mode, in which the time interval between the characters is always the same, is known as synchronous transmission. This is shown in Fig.
- In synchronous transmission, there is no control information added with the characters.
- Data consisting of 0s and 1s is transmitted as one long stream of bits. The receiver counts the bits as they arrive and recognizes the characters.
- Synchronous transmission is faster than asynchronous transmission because it does not require extra start and stop bits. Therefore, it is used for fast data communication between computers in computer networks.
b. Explain use of Access Card.
Ans. Access Cards:
Access cards are very similar in appearance to credit cards. They do not require a username, password or PIN. They are commonly used to open security gates in offices and many other places, where unauthorized people are not allowed to enter. Access cards are also used to open barriers in parking areas. They are an alternative to a key for opening hotel rooms, etc.
Q.5 Explain in detail types of network based on geographical area.
Ans: Types of Networks Based on Geographical Area:
Based on the geographical distance covered, computer networks are classified into Local Area Network, Wide Area Network, and Metropolitan Area Network.
Local Area Network (LAN):
The local area network is a commonly used network. It is a network that covers a limited area, usually changing from a small office to a campus of nearby buildings.
Examples of LAN include networks within a school, college, business, and organization. A local area network is shown in Fig.
Characteristics of LAN:
i) LAN is restricted to a limited geographical area.
ii) Data transmission speed.
iii) Data communication problems rarely occur.
iv) Transmission medium is owned by the user organization.
Wide Area Network (WAN):
Wide Area Network spans a large area, connecting several locations of an organization across cities, countries, and continents. A WAN is often made up of two or more LANs and/or MANs at each location of an organization and these LANs might be connected together to form a WAN.
Examples of WAN are the networks used in banks, airlines, and national database authorities like NADRA in Pakistan. Internet is another good example of WAN. A wide area network is shown in Fig.
Characteristics of WAN:
i) WAN spans a large geographical area. It can connect computers between cities and countries.
ii) Data transmission speed is slow.
iii) Data communication problems often occur.
iv) Transmission medium is leased lines or public systems such as telephone lines or satellite links.
Metropolitan Area Network (MAN):
A Metropolitan Area Network (MAN) falls between LAN and WAN. It spans an area larger than a LAN but smaller than a WAN. A metropolitan area network is shown in Fig.
Examples of MAN are networks used by telecommunication companies for providing Cable TV and Internet services.
Characteristics of MAN:
i) Data can connect computers within several blocks to buildings to the entire city.
ii) Data transmission speed is slower than LAN but faster than WAN.
iii) Fiber optic cable or wireless microwave transmission is used as a communication medium.
Class 9 Computer Science Solved Past Paper 2019 is solved for the students as per the reduced syllabus. The solution will be updated fully after the annual exams in 2021. Students are requested to give their feedback in the comments. Moreover, reporting any mistake or suggestion for improvement will be appreciated.