Saturday 18 February 2023

Computer Science For Class IX (Science) - Solved Model Paper 2023- By BSEK

Go To Index
Class IX (Science)
Computer Science Model paper 2023





Solved Model Paper
SECTION "B" (40%)
Short Answer Questions (24 Marks)


Note: Answer any Eight (8) questions from this section. Each carries 3 marks.
Q.2:How can we apply Margins in a document?
Ans: Word has a variety of predefined margin sizes to choose from the list. We can apply different margins as:
To Use Predefined Margins:
  • Select the Layout tab, then click the Margins command.
  • A drop-down menu will appear. Click the predefined margin size reuired.
  • The margins of the document will be changed.

To Use Custom Margins:
  • Word also allows you to customize the size of your margins in the Page Setup dialog box.
  • From the Layout tab, click Margins.
  • Select Custom Margins from the drop-down menu.
  • Selecting Custom Margins.
  • The Page Setup dialog box will appear.
  • Adjust the values for each margin, then click OK.
  • The margins of the document will be changed.

Q.3: Write three benefits of using relationships in the database.
Ans: A relationship is an important component of a relational database.
  1. It establishes a connection between a pair of tables that are logically related to each other. A pair of tables is logically related via the data each contains.
  2. It helps to further refine table structures and minimize redundant data. As we establish a relationship between a pair of tables, we will inevitably make minor modifications to the table structures. These refinements will make the structures more efficient and minimize any redundant data that the tables may contain.
  3. It is the mechanism that enables us to draw data from multiple tables simultaneously. A properly defined relationship ensures relationship-level integrity, which guarantees that the relationship itself is reliable and sound.

Q.4: What is authentication mechanism?
Ans: AUTHENTICATION MECHANISM:
The authentication mechanism is the hardware or software-based mechanism that forces users to prove their identity before accessing data on a device. The process makes sure the only authenticated user gets access to data or devices.

Q.5: What is Network Switch?
Ans: NETWORK SWITCH:
A switch or network switch is a networking device that connects computers and other devices like printers, scanners and cameras on a network. Data cables from all computers and other devices of network are plugged into the switch to enable communication between them.

Q.6: What are the three differences between ordered list and unordered lists.
Ans: Difference between ordered list and unordered lists
S.No.Ordered ListUnordered List
1. An ordered list also displays a list of related items. It is used where the order of the list is important e.g. names of students in order of their exam ranks. An unordered list is a list of related items in which the order of items is irrelevant.
2. It is defined by <ol> tag and each of its list item is defined by <li>. It is defined by <ul> tag and each of its list item is defined by <li> tag.
3. The web browser will display these list items with numbers, roman numbers or alphabets etc, instead of bullet points. The web browser will display these list items as bullet points.
4. Ordered lists can also be defined with two of its attributes: start and reversed OR with a value attribute which is used to place that item at a specific position or number in the list. There is no such attribute can be defined in unordered list

Q.7:Define hyperlink in HTML?
Ans: HYPERLINKS:
Hyperlinks allow a user to navigate from one web page to another. It also enables users to navigate to different sections within the same web page. Hyperlinks convert text or other media into clickable objects.
Definition:

Q.8: What is Ethical Hacking?
Ans: Ethical Hacking:
Ethical Hacking sometimes called as Penetration Testing. It is an act of intruding / penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used, by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users.
Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.

Q.9: Why it is important to install an antivirus?
Ans: Importance Of Antivirus Software
1. Save from Harmful Threats:
To keep our computer secure and free from viruses, we need to install an antivirus software. Antivirus software protects computer from viruses, spyware, malware, Trojans, phishing attacks, rootkits and spam attacks, as well as any other cyber threats. In order to protect business data and its computer systems, antivirus software is necessary.

2. Scan System:
Antivirus software provides real-time protection for computer. It scans system quickly to detect and delete infected files or programs. In addition, it allows to arrange drives or files to scan computer.

3. Prevent to Install Malicious Code:
Antivirus software also protects online transactions by preventing malicious programs from recording that type on keyboard. It also actively removes any malicious code, if detected.

Q.10: Define the term WWW use on internet?
Ans: WWW:
WWW is stand for World Wide Web. The word world wide web (www) is commonly known as the web. The Web is a collection of computers connected through a network to provide publicly accessible information.

Q.11 Define malware? and its types?
Ans: MALWARE:
The term malware is the contraction of malicious software. Malware is a broad term that encompasses computer viruses, worms, spyware, adware and others. Malware is a program that is written generally to cause a mess. They can be so dangerous that they can also damage devices. However commonly malware encrypt, steal or delete data, hijack core functions of computing and disturb different activities.
Types Of Malware:
Types of malware can include computer viruses, worms, adware, and spyware.
(i) Computer Virus:
A computer virus is a computer program that can spread across computers and networks by making copies of itself, usually without the user's knowledge. It can also modify other computer programs, insert its own code and change computer settings. 
Examples: Boot Sector, Resident, Macro Viruses and File Infector are some examples of viruses.

(ii) Worm:
A computer worm spreads copies of itself from computer to computer. It does not need to attach itself to a file or program to cause damage. It can do several malicious tasks, such as dropping other malware, copying itself onto devices physically attached to the affected system, deleting files, and consuming internal storage and memory resources.

(iii) Adware:
Adware is advertising-supported software. They present endless ads and pop-up windows that could potentially consume memory and processing resources. Adware can also change the different settings of internet browsers like homepage and default search engine. Normally, these are not as dangerous as other malware.
Example: Adware programs include games, desktop toolbars or utilities. 

(iv) Spyware:
Spyware is a malware that monitors a device and steals important information about a person or organization without their consent and sends such information to another person or organization. Spyware takes control over a mobile phone or computer without the user's knowledge.
Examples: System monitors, cookies trackers, rootkits and key-loggers are few examples of Spyware.

Q.No.12: Define TCP/IP model.
Ans: TCP/IP Model:
TCP/ IP is a suite of communication protocols used to interconnect network devices on the internet. These are set of rules and procedures. TCP/IP specifies how data is exchanged over the internet by providing end-to-end communications. It also identifies how data should be broken into packets, addressed, transmitted, routed and received at the destination.

Q.13: Define sorting in MS excel with example?
Ans: Sorting:
Sorting is the process of rearranging or reordering data based on different criteria like size, quality, value and quantity. MS Excel has the ability to sort data according to the needs of the user.
Example:
To help better understand this concept, take or create a list of products with their unit prices and quantities as:
  1. The objective is to sort given list of products with prices and quantities, in alphabetical order based on the names of the products.
  2. To achieve this, first select all the rows and columns which make up given product list then go to the Data tab and select the Sort option.
  3. In the Sort dialog box, choose Product from the Sort by dropdown list and make sure that in the Order dropdown list, A to Z is selected.
  4. Given Data will be rearranged and sorted alphabetically based on the values in Product column and their respective prices and quantities will also be rearranged as sorted data.
  5. This data can also be sorted in terms of unit price and quantity.

SECTION "C" (40%)
Descriptive Answer Questions (24 Marks)


Note: Answer any Eight (8) questions from this section. Each carries 3 marks.
Q.14: Define Table of Contents (ToC)? How to create a table of content.
Ans: Table of Contents (ToC):
A Table of Contents (ToC) is an organized listing of the sections, groups and headings of content in a document and identified by page numbers where they are placed.
It provides an overview of the document and allows readers to go directly to specific section or content in the document. ToC usually appears after the Title Page in a document.

Creating ToC In a Document:
  • To create a Table of Contents in MS Word document, Go to the References Tab  (or File Tab in MS Word 2010) where Table of Contents button appears as the first option of that tab.
  • MS Word provides several options of creating a ToC that include Automatic Table creation, Manual Table creation or the user can even create a Customized Table of Contents based on the requirements of the document.

Types OF ToC:
A user can create to type of table of contents in a document, namely:
  1. An Automatic table or
  2. A Manual table

(i) Automatic Table:
  • Automatic Table creates a Table of Contents automatically based on the content used as Heading presets of MS Word.
  • Based on the type of Heading, Automatic Table of Contents will create the appropriate levels and show page numbers where those Headings are placed.
  • MS Word 2010 provides an advanced feature for automatically creating a ToC.
  • The only difference between Automatic Table 1 and Automatic Table 2 is the title of the table that is “Contents” or “Table of Contents”.

(ii) Manual Table:
  • Choosing Manual Table from the Table of Contents menu will create a template of a generic table of contents.
  • This table will need to be edited and defined manually by providing all the headings, sub-headings and page numbers.
  • To extend the table, simply copy and paste the template lines and edit them to preserve proper formatting.

Q.15: Briefly describe any six types of website?
Ans: Types Of Website:
There are different types of specialized websites such as Portal, News, Informational, Educational, Personal, Business, Blogs, Forums, Entertainment and Social.

(1) Portal:
  • A web portal is a website that provides a single access point of information for all of its users.
  • It collects information from different sources like emails, forums, search engines and presents it to the user in a uniform way.
  • Example:
    Yahoo and MSN are common examples of web portal.

(2) News:
  • A news website is the modern-day alternative for newspapers.
  • Such websites contain everyday information related to current affairs, sports, politics, weather, health, technology, entertainment, etc.

(3) Informational:
  • Informational websites provide detailed information of any field.
  • There are many dedicated informational websites for science, arts, sports, online trainings, research, etc.

(4) Educational:
  • Educational websites are purely designed to deliver educational material for both, teachers and students.
  • Example:
    sabaq.pk, khan academy.org, etc.

(5) Personal:
  • A person can share about his or her biography or achievements in a custom developed website.

(6) Business:
  • A business website is the best way for any organization to market their products and services.
  • It also tells about the teams, policies and procedures of that business.
  • For instance:
    www.psx.com.pk is the website of Pakistan Stock Exchange.

(7) Blogs:
  • A blog is a special type of website that is composed of articles and posts.
  • These articles are organized into categories and sorted by the time when they were published.
  • Eample:
    Wordpress is a popular blog site.

(8) Forums:
  • A forum is an online place where different users can discuss about any topic.
  • These topics can be categorized so that users can easily locate topics of their interest.

(9) Entertainment:
  • An entertainment website serves content like videos or games purely for the purpose of entertainment.
  • Example:
    Youtube is widely used for entertainment.

(10) Social:
  • Social website is a platform where different people get together and socialize with each other.
  • They can also share their ideas, opinions and media.
  • Example:
    Facebook and Twitter are instances of social networking websites.

Q.16: Draw and define the components of ER diagram?
Ans:Components of ER Diagram:
  • ER Design is made up of different components like Attributes, Relationships, etc.
  • There are defined symbols and shapes to represent each one of them.
  • Some of the shapes used to define these components are:
    (a) Rectangle
    (b) Ellipse
    (c) Diamond
    (d) Connecting lines


Q.17: Describe the different types of breaks in MS Word.
Ans: BREAKS:
A document break indicates that how the document is to be partitioned to Word processor.

TYPES OF BREAKS IN MS WORD:
There are two types of document breaks, namely:
  • Page breaks and
  • Section breaks
These two types are further subdivided into several different kinds of page and section breaks.

PAGE BREAKS:
The page breaks partition only the body text of the document.

Types Of Page Breaks:
There are three kinds of page breaks, namely:
  1. Simple page breaks:
    ► Mark the point at which one page ends and the next page begins in the text. It will force all the text behind the cursor onto the next page.

  2. Column breaks:
    ► Indicates that if a document have columns, any text to the right of the cursor where the column beak is inserted will begin in the next column.

  3. Text wrapping breaks:
    ► A text wrapping break moves any text to the right of the cursor to the next line.
    ► This kind of break may be particularly useful when a document contains images. It separates text around image on web, such as caption text of an object from body text.


SECTION BREAKS:
The second type of document break is the section break, which partitions both the body text of the document, as well as its associated formatting, such as page margins, headers and footers, page numbers, footnotes, etc.

Types Of Section Breaks:
The section breaks are of four kinds, namely:
  1. Next page:
    ► Insert a next page section break forces the text to the right of the cursor and start the new section on the following or next page.
    ► It partitions the document into sections, allowing for a change in margins, headers and footers, as well as differently numbered pages and footnotes.
    ► This is most useful when a document must be divided into chapters or sections.

  2. Continuous:
    ► Insert a continuous section break and start the new section on the same page.
    ► It allows the user to change headers and footers, page numbers, margins, etc.
    ► This kind of section break is most useful when a document has already been composed in part or in full, but still requires different formatting such as to footnotes, headings, or pagination in separate sections of the work.
    ► This allows for one section of a document to end and another to begin on the same page.

  3. Even page:
    ► Insert an even page section break and it will shift all the text to the right of the cursor to the top of the next even-numbered page.

  4. Odd page breaks:
    ► Insert an odd page break and it will move the text to the right of the cursor to the top of the next odd-numbered page.

Q.18: Write the functions of an Operating System?
Ans: Function Of Operating System:
Operating system manages every activity of a computer. It is the master control program that provides an interface for a user to communicate with computer. System software and application software run on operating system.
Operating System performs the following functions like:
  • Booting
  • Resource Management
  • User Interface or Command Interpreter
  • Memory Management
  • Input / Output Management
  • File Management
  • Process Management
  • User Management.

(i) Booting:
  • Booting is a process of starting the computer operating system.
  • It checks the computer resources and makes it ready to perform different tasks.

(ii) Resource Management:
  • Operating system automatically manages all the hardware and software resources of a computer when application programs are executed by computer users.
  • This includes allocation and de-allocation of processor, memory, access to shared cache memory and access to network resources.

(iii) User Interface or Command Interpreter:
  • We interact with operating system through user interface or Command Interpreter.
  • User Interface or command interpreter is one of the parts of operating system which reads the commands from user, interprets them and translates them into machine language instructions that the computer hardware can understand.

(iv) Memory Management
  • Memory management module performs the task of allocation and de-allocation of memory space to programs and data in need of these resources.

(v) Input / Output (I/O) Management
  • It is the process of controlling the operations of all the I/O devices (such as keyboard, mouse, monitor, printer etc.) attached to computer.
  • An Operating System provides the device driver to facilitate I/O functions involving I/O devices.
  • These device drivers are software that control I/O devices through their controllers.

(vi) File Management
  • It is a part of operating system that organize and keep tracks of computer files and folders.
  • It manages all the file-related activities such as organization storage, retrieval, deleting, creating, naming or renaming, opening, moving, copying, searching, sharing and protection etc. of files.

(vii) Process Management
  • It is an essential part of OS.
  • A process is a job or activity to be performed by the system.
  • Process management manages creation, deletion, suspension and resumption of processes.
  • The term process refers to program code that has been loaded into a computer's memory for execution by the central processing unit (CPU).
  • In a multi-programming system, there will be a number of computing processes.
  • The operating system must ensure that each process gets a fair share of the CPU's time.
  • The OS decides the order in which processes have access to the processor, and how much processing time each process should get. This function of OS is called process scheduling.

(viii) User Management
  • User management is an important feature of operating system to maintain a secure computer system.
  • The OS gives full control over a computer to a person known as administrator only.
  • Administrator can install various programs and also creates and manage user accounts by assigning them a user name and password.
  • In modern operating systems, user management describes the ability of administrators to control user access to various computer resources like software, I/O devices, storage system, networks, etc.
  • Administrator creates and manage user accounts. The user is assigned a user name and password.

Q.19: Explain computer crimes in our daily life?
Ans: Computer Crime in Real Life:
As technology is growing the data security has become so crucial. We can be a victim of computer crime at any time. Computer crime can range from an international data security threat to a personal offense.
As far as personal offenses are concerned, hacking the social media and mail accounts are so common. There are many genres of computer crime or now called cyber-crimes.

Major Computer Crime Recorded Around The World:
  • Hacking Email:
    In 2013, hackers managed to hack 1 billion email accounts of the users.
  • Virus attacked:
    Likewise, in 2017, the Wanna Cry virus attacked the National Health Service in the United Kingdom which made the whole system nonfunctional for several days.

Examples Of Computer Crimes In Real-Life:
Some examples of such crimes in real life are:
(i) Hacking
  • Hacking is perhaps the most common crime in the computer world. However, the scope of hacking is much wider.
  • Hackers can steal our WiFi, email or social media accounts' passwords.
  • Hackers also attack a website and take it down.
  • The hackers can also steal sensitive information from government and business organizations, make fraudulent transactions and erase data on the cloud or network computers.

(ii) Credit and Debit Card Scam:
  • Keeping debit or credit cards is a common practice but insecure use of these cards can be dangerous. If a person has information about our debit or credit card he or she can make fraudulent transactions. There are various ways to get this information.
  • One way is through scamming.
    Scammers set small machines inside an ATM or credit card machine. These machines copy the data which is then misused by the scammers. Debit and credit cards are also secured with PIN codes. User has to keep this code secret otherwise any person can use the card for online shopping and other purposes.
  • All he or she needs to know our credit card number, PIN and security code printed on the back of the cards.

(iii) Phishing:
  • Phishing is a method of trying to gather personal information using false e-mails and websites.
  • In Phishing, perpetrators contact the target person through email, telephone or text message and pose as a legitimate and trusted individual.
  • He or she asks the target to provide sensitive data such as personally identifiable information, banking and credit card details and passwords for different reasons. The information is then used to access different accounts and can result in identity theft and financial loss.

(iv) Click-jacking:
  • Click-jacking is a malicious technique of tricking a user into clicking on a web page element, such as:
    ► You have seen any video tagged as “OMG? You won't believe what this boy has done!” Or
    ►You have found a button on a website that asked to click to claim a reward you had never applied for.
    This is a kind of fraud which is called Click-jacking.
  • Usually, culprits target children or novice internet users to click on a link containing malware or trick them into sharing private information via social media sites.

(v) Cyber Bullying or Harassment:
  • Electronic means like a computer, mobile phone or internet are also used for online bullying or harassment.
  • Harmful bullying behavior can include:
    Posting rumors
    Threats
    Passing inappropriate remarks
    Leaking personal information
    Blackmailing and
    Committing hate speech
  • The perpetrator does it with the intent to cause harm to the victim.
  • Victims may experience lower self-esteem, intent to commit suicide and a variety of negative emotional responses, including being scared, frustrated, angry and depressed.




No comments:

Post a Comment