Monday, 18 April 2022

Computer (English And Urdu) - Solved Model Paper 2022 - For Class IX (Science Group)

 GO TO INDEX
Computer
Solved Model Paper 2022
For Class IX (Science Group)




Solution
SECTION 'B'

Q.2: What is motherboard? what are its components?
Ans: Motherboard:
The motherboard is the main board which connects different parts of computer.
Construction:
  • We can find CPU, memory slots, expansion slots and a number of chipsets on motherboard.
  • Motherboards are made of layered fiberglass.
  • These layers contain copper lines that form the circuitry by which electrical signals are provided to all parts of computer.
  • Various components of computer may be attached, detached and upgraded on motherboard.
  • According to need of the user. Motherboards also have connectors called ports. These ports are used to connect input, output and other peripheral devices.
Function:
Just like nervous system it allows communication between all parts of the computer.

Components Of Motherboard:
It includes the following general components:
  1. Microprocessor (CPU)
  2. Slots (PCI slot)
  3. Ports (VGA port, USB port, LAN port, Audio in port, Audio out port.)
  4. Buses
  5. RAM and ROM
  6. Other electronic components for example resistors, capacitors, diodes, transistors, jumpers etc.

Q.3: What is the difference  between Compiler and Assembler.
Ans: Compiler and Assembler are language translator which are used to make a program executable. Both have different methods to translate the code into machine level.
Difference between Compiler and Assembler
S.NoCompilerAssembler
1. Translate high level code into a machine language Translate low level code into a machine code
2. Translate the whole code into machine at the same time It checks each instruction and converts into machine code
3. There are seven phases for translation. There are only two phases for machine code
4. The translation is according to version of machine The output is in Binary (0, 1) format
5. It is easy in debugging It is difficult in debugging

Q.4: Why it is important to install an antivirus?
Ans: Importance Of Antivirus Software:
1. Save from Harmful Threats
  • To keep our computer secure and free from viruses, we need to install an antivirus software.
  • Antivirus software protects computer from viruses, spyware, malware, Trojans, phishing attacks, rootkits and spam attacks, as well as any other cyber threats.
  • In order to protect business data and its computer systems, antivirus software is necessary.

2. Scan System:
  • Antivirus software provides real-time protection for computer.
  • It scans system quickly to detect and delete infected files or programs.
  • In addition, it allows to arrange drives or files to scan computer.

3. Prevent to Install Malicious Code:
  • Antivirus software also protects online transactions by preventing malicious programs from recording that type on keyboard.
  • It also actively removes any malicious code, if detected.

Q.5: List three uses of spreadsheets in business.
Ans: Uses Of Spreadsheets In Business:
  1. Storing Data:
    Examples: a list of clients, contact information, employee time sheets, sales, and purchases, etc.

  2. Manipulate And Analyze Data:
    Examples: Calculating profit and losses, managing budgets and wages, help in accounting etc.

  3. Visualization Or Presentation:
    Examples: Show business performance, and plan future strategy in a graphical way by using charts and tables etc.

  4. Business Accounting:
    Examples: Formulas make easy to calculate, handle and store huge data.
(Note: Write down three uses only as mentioned in question)

Q.6: What is difference between Data Rate/Bit Rate and Baud Rate?
Ans: Difference between Data Rate/Bit Rate and Baud Rate:
S.NO. Data Rate/Bit Rate Baud Rate
1. Bit rate tells the number of bits transmitted per unit of time (Second). Baud rate is used when we want to know the number of signal units transmitted per unit of time (Second).
2. Bit rate is the number bits (0's and 1's) transmitted per second. Baud rate is the number of times a signal is traveling comprised of bits. One signal can represent more than one bit.
3. Formula:
 Bit rate = baud rate x the number of bits per signal unit
 Formula:
 Baud rate = bit rate / the number of bits per signal unit

Q.7: Explain the importance of computer security in daily life? Write any three reasons.
Ans: Importance of Computer Security:
1. Prevent from viruses and malware:
  • Computer security is important for our computer's overall health.
  • It keeps our information protected and helps prevent viruses and malware, which allows programs to run quicker and smoother.

2. Secure Private Information:
  • It safeguards confidential and sensitive information.
  • The advancement in science and technology has changed day to day activities. We rely on computers and mobile phones, where we access a lot of information which we do not want to share with others. This information may include our passwords, banking details, contacts, pictures, etc. To protect this information we need to make our devices secured that no one can damage or access this information without our consent.

3. Provide Safe Environment:
  • Computer Security is important as it enables people to perform their work in safe environments.
  • It helps in the execution of essential business processes.

Q.8. What is the Difference between web hosting and web server.
Ans: Difference Between web Hosting And Web Server
S. No.Web HostingWeb Server
1. A web hosting is a service that has access to an internet server. It is sold by specific companies called "web hosters". They rent their servers to their customers, allowing them to create their websites.  A web server is an entity that accepts requests via HTTP or a similar protocol and generates a response to access any website. It can be numeric in the case of Apache web server program, or physical, as a dedicated machine (computer which runs software).
2. Web host types are shared host, dedicated host, free host and reseller host among others. Web servers can be of different types such as proxy servers, mail servers, applications servers and others.
3. A web host uses mltiple networks devices, such as it uses switches and routers to relay information from servers and to servers. Web hosts store multiple servers in multiple data centers and also helps in managing data (hardware and software) properly for their customers. A web server receives data and performs all the operations before returning their results to clients. When any server whether a physical or a software server receives a request then after that it takes the help of the related database and then fills the HTML files with all the recently received information which has been generated.
4. Example, a web host is a group of companies such as HostGator, Godaddy Hosting, Blue Host, and so much more hosting company. Example: Web servers like Apache, Google Web server, etc. run the software. We can also call this software a web server.

9. Discuss the importance of ERD in business.
Ans: Entity Relationship Diagram (ERD) graphically displays the structure of a database. Following are the importance of Entity-relationship diagram (ERD) in business.
  • Assist the Database Developer:
    The ER Diagram assists the design even before the construction of tables begins.
  • Visualizing Data:
    This helps the users to plan how to organize data. Entity relationship diagramming is functional as a method of better visualizing data. Every manager of a multinational enterprise knows that spreadsheets are pretty much useless when it comes to understanding the overall picture of their entity's operations and how they are structured in relation to each other.ERD takes advantage of the basic learning strategy that's programmed into our minds by extending the programming into compatible and digestible visualizations of the relationships making up our entity.
  • Documentation Tool:
    ER Diagrams can work as a documentation to make others understand the core of the database. Software applications that diagram entity relationships are meant to make those relationships come to life on the screen (and in our mind), thus making them much easier to understand.
  • Logic of the database:
    It communicates the logical structure of the database to the users. It's only with ERD software that senior management, board and stockholders will be able to assess the whole business and to plot a viable strategy. Basically, an ERD's function is to bring all of that data stored in our servers to life so we can make sense of it.
  • Blueprint:
    An ER Diagram is considered as the blueprint of the database. An ERD tells a story about our entity's current state. It's also an essential part of how we analyze events and plan for the future. So diagramming should not only show what the current state of affairs is, but it should also show the potential ways structures and organizations within an entity can be altered and the potential effects of these changes. For groups that operate with hundreds or thousands of interconnected entities on a multinational scale, without planning, can not make sense.

Q.10: Explain artificial intelligence with one examples.
Ans: Artificial Intelligence (A.I.):
  • The term Artificial Intelligence comprises of two words ‘Artificial’ and ‘Intelligence’, where, Artificial means ‘copy of  something natural’ and ‘Intelligence’ means ‘able to think.’ So, Artificial Intelligence can be defined as 'a copy of a human brain with thinking ability.'
  • The term A.I. may also be referred to any machine that displays qualities associated with a human brain such as learning, reasoning and problem solving.
  • According to John McCarthy, who is known as the father of AI, 
    “AI is the science and engineering of making intelligent machines, especially computer programs.”
  • A.I is based on simulating human intelligence in machines that can easily mimic and execute tasks from simple to more complex operations.
Examples:
    AI is found everywhere in the modern world. Some example of AI are:
    • Electronic Mail:
      Electronic Mail is also called Email. There are lot of services of Emails, such as Gmail, Yahoo Mail, and Live etc. These mails systems have AI, to identify the SPAM emails and messages. The AI system protects your Email from viruses and fraud.

    • Web Browsers: 
      Web browsers mean Google Chrome, Firefox, Opera, and other related programs which provides you safe surfing the Internet. These programs have AI system to protect you from harmful websites and other Internet services.

    • GPS Application:
      GPS (Global Positioning System) applications are useful to find the best route for travelling. GPS applications are also based on AI system to monitor traffic in real time, accidents information, and about busy road.

    • A.I. is also used for Machine Learning. It learns from our daily routines and suggests us different options. Like google maps suggest the best ways for our daily commute.
    • A.I. is vastly used in scientific experiment, healthcare and space technologies.
    (Notes: Write down only one example as mention is question)

    Q.11: What are the advantages using database?
    Ans: Advantages Of Database:
    • A database is playing a leading role to enhance the efficiency and performance of any organization.
    • The goal of database is to minimize the loss and increase the productivity and efficiency of any organization in the age of information technology.
    • Nowadays, everyone is familiar with term database, it is mathematically developed data structure which converts raw input data into meaningful information for a particular organization.
    • These days, database can be seen in every field of life, for example: in industries, health, agriculture, schooling, business and banking
    • The databases can be developed according to the size of its records for a particular organization.
    • Databases can be small in size with a few records or very large like: NADRA (National Database Registration Authority) databases which keep the multi millions of records.

    Q.12: What is a word processor? Write any three applications of a word processor.
    Ans: MS WORD PROCESSOR:
    Microsoft Word (MS Word) is one of the most famous word-processing software. It was first released and made public in early 1980s by Bill Gates, the founder of Microsoft.
    Latest versions of MS Word come as a part of Microsoft Office Suite which includes other software as well like MS Excel, MS PowerPoint MS Access, MS One Note, MS Publisher and MS Outlook.

    Applications / Uses / Advantages Of MS Word Processor:
    MS Word is still most widely used word-processing software in the world.
    • It allows its user to type text and manipulate it.
    • MS Word first introduced the concept of WYSIWYG (What You See Is What You Get) by introducing text formatting and document preview exactly as we would get it on a paper.
    • It has advanced features like tables, images, advanced formatting and reviewing that give its users the ability to customize their documents as required.


    Q.13: Define IPV4 address.
    Ans: IPV4 ADDRESS:
    • IPV4 stands for Internet Protocol version 4. IP address is a unique number or address used to identify a device on a network. The device could be a computer, printer, smart phone, tablet, etc.
    • Every device connected to the internet must have an IP address to communicate with other devices.
    • IP address acts as a telephone number or a car registration number.
    • It shows ownership and location.
    • IP address allows a device to communicate and be located by other devices on the internet.
    • IP version 4 (IPV4) addresses are comprised of four number segments separated by dots.
    Example: of an IP address is:

    Parts Of IPV4:
    An IPV4 address is made up of 32 binary bits, which is divided into two parts:
    Network: The network portion of the address mentions the computer network.
    Host: The host portion identifies the computer or any other computing device.


    SECTION 'C'


    Q.14: Identify and explain HTML tags used for formatting of the content?
    Ans: HTML TAGS FOR FORMATTING OF THE CONTENT:
    Some HTML tags introduce content directly into the web page while others enhance the design and format of that content.
    Some most commonly used HTML tags which are used for formatting of the content are:

    Headings:

    TAGDESCRIPTION
    <h1> - <h6>
    •   It is used to define six levels of HTML headings (h1, h2, h3, h4, h5 and h6) with <h1> being heaviest heading and <h6> being the lightest heading.



    Text Formatting:

    TAGDESCRIPTION
    <b> , <i> , <u>
    •   These tags are used to bold, italicize and underline text respectively.

    <pre>
    •  It is used to define a preformatted text.
    •  The web browser displays such text with spaces and line breaks as defined in HTML codes.

    <font>
    •  It is used to define the font, size and color of its text.
    •  This tag can be composed with three attributes: size, color and face.
    •  This tag is supported till version 4.1 of HTML.

    <center>
    •  It is used to align its text to the horizontal center of the web page.
    •  This tag is supported till version 4.1 of HTML.

    <sub>
    •  It defines subscript text which is under the baseline of other text and has a smaller size.
    • e.g. H2O

    <sup>
    •  It defines superscript text which is slightly above the normal line of other text and has a smaller size.
    • e.g. E=mc2


    Q.15: Define malware? And describe different types of malware?
    Ans: MALWARE:
    • The term malware is the contraction of malicious software.
    • Malware is a broad term that encompasses computer viruses, worms, spyware, adware and others.
    • Malware is a program that is written generally to cause a mess. They can be so dangerous that they can also damage devices.
    • However commonly malware encrypt, steal or delete data, hijack core functions of computing and disturb different activities.

    Types Of Different Malware:
    Types of malware can include computer viruses, worms, adware, and spyware.
    (i) Computer Virus:
    • A computer virus is a computer program that can spread across computers and networks by making copies of itself, usually without the user's knowledge.
    • It can also modify other computer programs, insert its own code and change computer settings.
    • Viruses are harmful. They can range from displaying irritating messages to make all the documents inaccessible or even delete them.
    • Viruses generally latch on a host file and when they execute they infect other files or programs.
    • Examples: Boot Sector, Resident, Macro Viruses and File Infector are some examples of viruses.

    (ii) Worm:
    • A computer worm spreads copies of itself from computer to computer.
    • A worm can replicate itself without any human interaction.
    • It does not need to attach itself to a file or program to cause damage.
    • It can do several malicious tasks, such as dropping other malware, copying itself onto devices physically attached to the affected system, deleting files, and consuming internal storage and memory resources.

    (iii) Adware:
    • Adware is advertising-supported software.
    • They present endless ads and pop-up windows that could potentially consume memory and processing resources. Adware can also change the different settings of internet browsers like homepage and default search engine.
    • Normally, these are not as dangerous as other malware. However, Adware annoys the user and slows down the processing.
    • The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in little windows that may not be closed.
    • Adware programs include games, desktop toolbars or utilities.
    • Commonly, adware is web-based and collects web browser data to target advertisements, especially pop-ups.

    (iv) Spyware:
    • Spyware is a malware that monitors a device and steals important information about a person or organization without their consent and sends such information to another person or organization.
    • Spyware takes control over a mobile phone or computer without the user's knowledge.
    • They capture information like web browsing history, e-mail messages, usernames and passwords and online payment information.
    • Spyware can come through cookies or even when we install software without reading its terms and conditions.
    • Examples: System monitors, cookies trackers, rootkits and key-loggers are few examples of Spyware.


    Q.16: Describe 1st, 2nd and 4th generation of computer with advantages?
    Ans: First Generation of Computers (1940 to1956):
    Main Features
    • Technology Used: Vacuum Tubes
    • Size: Very large in size (Main frame)
    • Language: Low level Machine language (i.e. 1's and 0's).
    • Main memory (primary internal storage): Magnetic drums
    • External storage: Punched card
    • I/O Device: Punched cards and papers
    • Operating system: Batch processing operating system (i.e human operates to set system, no proper operating system)
    • Use: Scientific and research purpose.
    Example:  ENIAC, EDVAC, UNIVAC

    Advantages:
    • Vacuum tubes were as electronic components.
    • Electronic digital computers were developed for the first time.
    • These computers were the fastest calculating devices of their time.
    • Computations were performed in millisecond.
    • Punch cards were used for input and output.



    Second Generation of Computers (1956 to 1963):
    Main Features
    • Technology Used: Transistors.
    • Size: smaller and faster (main frame), cheaper and more efficient.
    • Language: Assembly language and a high language FORTRAN
    • Main memory (internal storage): Magnetic core (RAM and ROM)
    • External storage: Magnetic tapes and magnetic disk
    • I/O Device: Punched card
    • Operating system: Batch processing and Multi-programming
    • Use: commercial productions, scientific and engineering analysis and design
    Example: IBM 7094 and IBM 1401

    Advantages:
    • Transistors were used as internal components.
    • Smaller in size as compared to first generation computers.
    • Reliability increased.
    • Magnetic tape and were used as wider secondary storage.
    • Heat produces less than previous generation computers.
    • Computation were perform in micro second.
    • Less hardware and maintenance problem.
    • Less electricity consumption as compared to 1s generation computer.
    • Better portability.
    • Commercially used.

    Fourth Generation of Computers (1971 to Present):
    Main Features
    • Technology Used: Microprocessors.
    • Size: micro computer (faster, less expensive, smaller and more reliable)
    • Language: More high languages like C, C++, Java etc.
    • Main memory (internal storage): Semi-conductor memories RAM and ROM (EPROM and SRAM)
    • External storage: Magnetic storage
    • I/O Device: Monitor (output)
    • Operating system: Time sharing, real time and distributed operating system,  with development of Graphical User Interfaces (GUIs) (DOS and UNIX
    • Use: in every field of life like space applications, business and art work.
    Example: Apple Macintosh, IBM PC.

    Advantages:
    • Smaller in size compared to previous generation computers due to the use of Integrated Circuit (IC).
    • Computations speed was in Nano seconds.
    • Reliability increased in these computers.
    • Heat generation was rare.
    • Less electricity consumption.
    • Hardware failure was very rare.
    • These computers were general purpose.
    • Very easy portable computers.
    • Commercially production was cheaper and easier.

    For Computer (IX)  Chapter-wise MCQs and noes CLICK HERE

    For Computer Practicals Click Here



    No comments:

    Post a Comment