Search This Blog

Monday 20 February 2023

English Paper II (Compulsory) For Class X (Science) - Model Paper 2023- By BSEK (Solved By Ustani G)

Go To Index
Class X (Science)
English Paper II
Solved Model paper 2023






Special Thanks To Miss Ustani G
(YouTube Channel)
Prepared by Exampill


Section "B" (40%)
SHORT ANSWER QUESTIONS (40 Marks)

Q.2: Answer any 5 following questions: (10 Marks)
1- Why was the poet asked to go down again in the poem “The voice of God”?
Ans: The poet was asked to go down again because God lives among the people.

2- Why is China having a rapid progress?
Ans: China is having a rapid progress because they believe that everyone ought to work.

3- What lesson did the King learn from the spider?
Ans: The king learnt that one should not lose hope in difficulties. One should keep on trying and never be a victim of despair. One who defies despair is sure to win every battle of life.

4- What is the message of the poem Little Things?
Ans: The message of the poem is that we should take care of little things. Little deeds of kindness and little words of love look like small things, but they can make a great change. Our world can become an Eden if we are kind and loving.

5- What happened to Mr. Abdul Karim when he went for a walk?
Ans: When Mr. Karim went for a walk, a head jumped and blocked his way. In fear, he just closed his eyes and started running towards the house.

6- How did the caliph decide the case?
Ans: The Caliph asked the two men to place their hands on the horse. When the beggar touched the horse, it winced but when the rich man touched the horse, it snorted and neighed with pleasure. This way, the Caliph decided the owner of the horse.

7- How can social media be handy for the students now a days?
Ans: Nowadays, students can easily interact with educators and researches in any part of the world and gain from their knowledge and wisdom.

Q.3: DO AS DIRECTED: (20 Marks)
i) Use Preposition:
  1. He succeeded in getting what he wanted.
  2. The shop does not have the toy I was looking for.

ii) Article:
  1. This is the most important question.
  2. I want an apple for breakfast.

iii) Change the Voice:
  1. Where did they spend all the money?
    Ans: Where was all the money spent by them? (Passive Voice)

  2. The carpenter makes a beautiful dressing table.
    Ans: A beautiful dressing table is made by the carpenter. (Passive Voice)

  3. He will convey my important message to him.
    Ans: My important message will be conveyed by him to him. (Passive Voice)

iv) Change the Narration:
  1. He says to them,”You are doing your work.”
    Ans: He says to them that they are doing their work. (Indirect Speech)

  2. She said,” Fish cannot live without water.”
    Ans: She said that fish cannot live without water. (Indirect Speech)

  3. They exclaimed that those mangoes were very sweet.
    Ans: They said,” These mangoes are very sweet.” (Direct Speech)

  4. She said to him,” Did you see the snake in the compound of this house?”
    Ans: She asked him if he saw the snake in the compound of that house. (Indirect Speech)

v) Transformation of Sentences: (Formation Of Sentences - Change the following sentences as suggested in the bracket)
  1. Did he go there in his mother’s absence?  (Change into assertive)
    Ans: He went there in his mother’s absence.

  2. Girls are playing hide and seek in the moon lit night. - (Change into future continuous)
    Ans: Girls will be playing hide and seek in the moon lit night.

  3. Has it been drizzling since noon? - (Change into past perfect continuous)
    Ans: Had it been drizzling since noon?

  4. Thirsty crow does not fly here and there. - (Change into interrogative)
    Ans: Does thirsty crow not fly here and there?

  5. I have so many oranges. (Change into negative)
    Ans: I do not have so many oranges.

  6. Now it is my turn said he to them (Punctuate)
    Ans: “Now, it is my turn,” said he to them.

vi) (a) Give prefix to - Relevant
Ans: Irrelevant

(b) Give suffix to - Wonder
Ans: Wonderful

(c) Write homophone of  - Accept
Ans: Except
(a homophone is a word having same sound but different meaning)

Q.4: Indicate the kind of part of speech of the underlined words for instance Adverb. (5 Marks)
  1. I have learned this poem before.
    Ans: Adverb

  2. She told me the same story twice.
    Ans: Adverb

  3. He talked very mildly.
    Ans: adverb

  4. He was ordered to stand still here.
    Ans: Adverb

  5. They are partly wrong on this matter.
    Ans: Adverb

Q.5: Translate the following paragraph into Urdu or Sindhi. (5 Marks)
The environment is the surrounding of an organism. The environment in which an organism lives is made up of various components like air, water, land, etc. These components are found in fixed proportions to create a harmonious balance in the environment for the organism to live in. Any kind of undesirable and unwanted change in the proportions of these components can be termed as pollution. This issue is increasing with every passing year. It is an issue that creates economic, physical, and social troubles.

ترجمہ:
 ماحول ایک حیاتیات کے ارد گرد ہے. وہ ماحول جس میں ایک جاندار رہتا ہے۔ یہ مختلف اجزاء جیسے ہوا، پانی، زمین وغیرہ  سے بنا ہے۔ حیاتیات کے رہنے کے لیے ماحول میں ایک ہم آہنگ توازن پیدا کرنے کے لیے تناسب۔ ان اجزاء کے تناسب میں کسی بھی قسم کی ناپسندیدہ اور ناپسندیدہ تبدیلی کو آلودگی کہا جا سکتا ہے۔ یہ مسئلہ ہر گزرتے سال کے ساتھ بڑھتا جا رہا ہے۔ یہ ایک ایسا مسئلہ ہے جو معاشی، جسمانی اور سماجی پریشانیوں کو جنم دیتا ہے۔


Section "C" (40%)
(DESCRIPTIVE ANSWER QUESTIONS)

Q.6: Read the following passage and fill in the blanks from the options provided in the box.
(Abide, Laws, Family, Suffering, Lives) (5 Marks)
Helmet laws are constituted to save the lives of motorbike riders. Those who abide by the laws, not only save their own lives but also protect their family from unnecessary harm and suffering. Although this is challenging to wear it, but for the purpose of protection, it is so important.

Q.7: Write an essay of any one of the following: (10 Marks)
  1. Importance of health education


  2. Problem of Karachi
    Click Here To View Essay

  3. Energy Crisis in Pakistan
    Click Here To View Essay

Q.8: Write a letter to your cousin inviting him / her to spend summer vacation with you . (10 Marks)

OR
Write a letter to the editor of newspaper, complaining about the shortage of playground in your area.


Q.9: Read the following passage and answer the questions given below:
Educating boys and girls together has always been an important and stressful issue. Many parents believe that the educational process can be more effective if the classes are divided according to the gender of the students. Although same-gender schools are considered too conservative and strict in today’s times. Nevertheless, there are still supporters of this manner of education. Some parents are not in favor of a co-educational system as they feel that the presence of the opposite gender distracts the attention of students and prevents them from concentrating on studies.
On the other hand, supporters of co-education feel that as boys and girls are different, it is a valuable experience for both genders to communicate with each other. Moreover, the earlier boys and girls begin to communicate, the sooner they acquire social skills, which are crucial to communicating freely in the world. Further, if there are girls in the class, boys may well possibly try to behave better in order not to lose face in front of the girls.
(i) According to the writer, why are some parents not in favor of the co-education system? (3)
Ans: Some parents are not in favor of a co-educational system as they feel that the presence of the opposite gender distracts the attention of students and prevents them from concentrating on studies.

(ii) According to the writer, why are socializing skills important? (3)
Ans: Socializing skills are important to communicate freely in the world.

(iii) Find a word from the above passage that means: (4)
Ans: Meanings Of Words (Synonyms)
a. Traditional - conservative
b. paying attention - concentrating
c. vital - important / crucial
d. Unfairness - issue

(iv) Write the summary of the above passage. (5)
Educating boys and girls together is an important and stressful issue. Some parents are not in favor of a co-educational system as they feel that the opposite gender prevents them from concentrating on studies, while others agree that it is a valuable experience for both genders to communicate with each other.


For Joining Our Whats app Group Contact: 03242232725
Note:
Join And Also follow our fb page link is given below:
  • Share & Send All Your Friends Ustani G Education Information Group
  • Daily Informative News
  • Matric & Inter Board News
  • University Updated
  • Annual/Supply Exam Updated
  • Marksheet Updated
  • Guess Paper
  • Important Notes
  • Results Information
  • Questions Papers

Rule:
Personal messages allowed nahi hain Koi bhi kici k inbox me ja kr kici ko tang nhn kry ga complain ai foran remove. Thanx



Saturday 18 February 2023

Geography Of Pakistan Paper-I (For Foreigners Only) For Class IX (Science) - Model Paper 2023- By BSEK

Go To Index
Class IX (Science)
Geography Of Pakistan Paper-I Model paper 2023




English Literature For Class IX (Science) - Guess Papers 2020 - By Innovative Literacy Institution

Go To Index
Class IX (Science)
English Literature Model paper 2023




Sindhi Normal Course (For Sindhi Muslims Candidates) For Class IX (Science) - Model Paper 2023- By BSEK

Go To Index
Class IX (Science)
Sindhi Normal Course Model paper 2023





Religious Studies (For Non Muslims Candidates) For Class IX (Science) - Model Paper 2023- By BSEK

Go To Index
Class IX (Science)
Religious Studies Model paper 2023





Islamiyaat (Compulsory) For Class IX (Science) - Solved Model Paper 2023- By BSEK

Go To Index
Class IX (Science)
Islamiyaat Model paper 2023






حل شدہ پرچہ
حصہ "ب" (مختصر جواب کے سوالات)

سوال نمبر 2:- مندرجہ ذیل قرآنی آیات میں سے کسی دو کا ترجمہ تحریر کیجیۓ۔
(i) Ayat No.4

(ii) Ayat No.7

(iii) Ayat No.12

(iv) Ayat No.17

سوال نمبر 3:- مندرجہ ذیل احادیث نبوی صلی اننہ علیہ والہ وسلم میں سے کسی دو کا ترجمہ تحریر کیجیۓ۔
(i) Hadees No.1

(ii) Hadees No.8

(iii) Hadees No.11

(iv) Hadees No.15

نوٹ:- مندرجہ ذیل سوالات میں سے کسی چھ کا مختصر جوابات تحریر کیجیۓ۔
سوال نمبر 4: اولاد کے کوئی تین حقوق بیان کیجیۓ۔
جواب:- یہاں کلک کریں اور سوال نمبر 3 دیکھیۓ

سوال نمبر 5: ہجرت مدینہ کے تین اسباب تحریر کیجیۓ

جواب:- یہاں کلک کریں اور سوال نمبر 2 دیکھیۓ



For Islamiyaat notes Click Here


Mathematics (علم ریاضی) For Class IX (Science) - Solved Model Paper 2023- By BSEK

Go To Index
Class IX (Science)
Mathematics Solved Model paper 2023

By Sir Wasim Ahmad











(Note: Double click on video to view Q.13- How to draw a graph)




Physics For Class IX (Science) - Solved Model Paper 2023- By BSEK - Solved By Sir Wasim Ahmad

Go To Index
Class IX (Science)
Physics Solved Model paper 2023

Solved By Sir Wasim Ahmad



SOLVED MODEL PAPER
SECTION "B" (40%)
SHORT ANSWER QUESTIONS (24 Marks)

Note: Answer any eight (8) questions from this section. Each carries 3 marks.
Q.2: Define significant figure. Determine the number of significant figure in:
(i) 1.33 (ii) 0.0012 (iii) 7.00 (iv) 0.00101

Ans: Significant figure:
The members of reliably known digits in a value are known as significant figure.
Value Significant Figure
1.333
0.00122
7.003
0.001013

Q.3: Write down three difference between Speed and Velocity.
Ans: Difference Between Speed And Velocity:
Speed Velocity
Definition Distance covered by an object in a unit time is called speed. Rate of change of displacement with respect to time is called velocity.
Formulav = S/tν = Δd/t
Nature It is a scalar quantity It is a vector quantity
Unit The SI unit is meter per second (m/s) The SI unit is meter per second (m/s)

Q.4: State Newton's second law of motion. Show the relationship between applied force and the acceleration produced in the body.
Ans: Second Law Of Motion:
Definition:
When a force acts on a body it produces  acceleration in the direction of force. The acceleration is directly proportional to force and inversely proportion to mass of body.
Mathematically:
If "F" is a force applied on a body of mass "m" which produces an acceleration "a" is the body then











Computer Science For Class IX (Science) - Solved Model Paper 2023- By BSEK

Go To Index
Class IX (Science)
Computer Science Model paper 2023





Solved Model Paper
SECTION "B" (40%)
Short Answer Questions (24 Marks)


Note: Answer any Eight (8) questions from this section. Each carries 3 marks.
Q.2:How can we apply Margins in a document?
Ans: Word has a variety of predefined margin sizes to choose from the list. We can apply different margins as:
To Use Predefined Margins:
  • Select the Layout tab, then click the Margins command.
  • A drop-down menu will appear. Click the predefined margin size reuired.
  • The margins of the document will be changed.

To Use Custom Margins:
  • Word also allows you to customize the size of your margins in the Page Setup dialog box.
  • From the Layout tab, click Margins.
  • Select Custom Margins from the drop-down menu.
  • Selecting Custom Margins.
  • The Page Setup dialog box will appear.
  • Adjust the values for each margin, then click OK.
  • The margins of the document will be changed.

Q.3: Write three benefits of using relationships in the database.
Ans: A relationship is an important component of a relational database.
  1. It establishes a connection between a pair of tables that are logically related to each other. A pair of tables is logically related via the data each contains.
  2. It helps to further refine table structures and minimize redundant data. As we establish a relationship between a pair of tables, we will inevitably make minor modifications to the table structures. These refinements will make the structures more efficient and minimize any redundant data that the tables may contain.
  3. It is the mechanism that enables us to draw data from multiple tables simultaneously. A properly defined relationship ensures relationship-level integrity, which guarantees that the relationship itself is reliable and sound.

Q.4: What is authentication mechanism?
Ans: AUTHENTICATION MECHANISM:
The authentication mechanism is the hardware or software-based mechanism that forces users to prove their identity before accessing data on a device. The process makes sure the only authenticated user gets access to data or devices.

Q.5: What is Network Switch?
Ans: NETWORK SWITCH:
A switch or network switch is a networking device that connects computers and other devices like printers, scanners and cameras on a network. Data cables from all computers and other devices of network are plugged into the switch to enable communication between them.

Q.6: What are the three differences between ordered list and unordered lists.
Ans: Difference between ordered list and unordered lists
S.No.Ordered ListUnordered List
1. An ordered list also displays a list of related items. It is used where the order of the list is important e.g. names of students in order of their exam ranks. An unordered list is a list of related items in which the order of items is irrelevant.
2. It is defined by <ol> tag and each of its list item is defined by <li>. It is defined by <ul> tag and each of its list item is defined by <li> tag.
3. The web browser will display these list items with numbers, roman numbers or alphabets etc, instead of bullet points. The web browser will display these list items as bullet points.
4. Ordered lists can also be defined with two of its attributes: start and reversed OR with a value attribute which is used to place that item at a specific position or number in the list. There is no such attribute can be defined in unordered list

Q.7:Define hyperlink in HTML?
Ans: HYPERLINKS:
Hyperlinks allow a user to navigate from one web page to another. It also enables users to navigate to different sections within the same web page. Hyperlinks convert text or other media into clickable objects.
Definition:

Q.8: What is Ethical Hacking?
Ans: Ethical Hacking:
Ethical Hacking sometimes called as Penetration Testing. It is an act of intruding / penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used, by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users.
Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.

Q.9: Why it is important to install an antivirus?
Ans: Importance Of Antivirus Software
1. Save from Harmful Threats:
To keep our computer secure and free from viruses, we need to install an antivirus software. Antivirus software protects computer from viruses, spyware, malware, Trojans, phishing attacks, rootkits and spam attacks, as well as any other cyber threats. In order to protect business data and its computer systems, antivirus software is necessary.

2. Scan System:
Antivirus software provides real-time protection for computer. It scans system quickly to detect and delete infected files or programs. In addition, it allows to arrange drives or files to scan computer.

3. Prevent to Install Malicious Code:
Antivirus software also protects online transactions by preventing malicious programs from recording that type on keyboard. It also actively removes any malicious code, if detected.

Q.10: Define the term WWW use on internet?
Ans: WWW:
WWW is stand for World Wide Web. The word world wide web (www) is commonly known as the web. The Web is a collection of computers connected through a network to provide publicly accessible information.

Q.11 Define malware? and its types?
Ans: MALWARE:
The term malware is the contraction of malicious software. Malware is a broad term that encompasses computer viruses, worms, spyware, adware and others. Malware is a program that is written generally to cause a mess. They can be so dangerous that they can also damage devices. However commonly malware encrypt, steal or delete data, hijack core functions of computing and disturb different activities.
Types Of Malware:
Types of malware can include computer viruses, worms, adware, and spyware.
(i) Computer Virus:
A computer virus is a computer program that can spread across computers and networks by making copies of itself, usually without the user's knowledge. It can also modify other computer programs, insert its own code and change computer settings. 
Examples: Boot Sector, Resident, Macro Viruses and File Infector are some examples of viruses.

(ii) Worm:
A computer worm spreads copies of itself from computer to computer. It does not need to attach itself to a file or program to cause damage. It can do several malicious tasks, such as dropping other malware, copying itself onto devices physically attached to the affected system, deleting files, and consuming internal storage and memory resources.

(iii) Adware:
Adware is advertising-supported software. They present endless ads and pop-up windows that could potentially consume memory and processing resources. Adware can also change the different settings of internet browsers like homepage and default search engine. Normally, these are not as dangerous as other malware.
Example: Adware programs include games, desktop toolbars or utilities. 

(iv) Spyware:
Spyware is a malware that monitors a device and steals important information about a person or organization without their consent and sends such information to another person or organization. Spyware takes control over a mobile phone or computer without the user's knowledge.
Examples: System monitors, cookies trackers, rootkits and key-loggers are few examples of Spyware.

Q.No.12: Define TCP/IP model.
Ans: TCP/IP Model:
TCP/ IP is a suite of communication protocols used to interconnect network devices on the internet. These are set of rules and procedures. TCP/IP specifies how data is exchanged over the internet by providing end-to-end communications. It also identifies how data should be broken into packets, addressed, transmitted, routed and received at the destination.

Q.13: Define sorting in MS excel with example?
Ans: Sorting:
Sorting is the process of rearranging or reordering data based on different criteria like size, quality, value and quantity. MS Excel has the ability to sort data according to the needs of the user.
Example:
To help better understand this concept, take or create a list of products with their unit prices and quantities as:
  1. The objective is to sort given list of products with prices and quantities, in alphabetical order based on the names of the products.
  2. To achieve this, first select all the rows and columns which make up given product list then go to the Data tab and select the Sort option.
  3. In the Sort dialog box, choose Product from the Sort by dropdown list and make sure that in the Order dropdown list, A to Z is selected.
  4. Given Data will be rearranged and sorted alphabetically based on the values in Product column and their respective prices and quantities will also be rearranged as sorted data.
  5. This data can also be sorted in terms of unit price and quantity.

SECTION "C" (40%)
Descriptive Answer Questions (24 Marks)


Note: Answer any Eight (8) questions from this section. Each carries 3 marks.
Q.14: Define Table of Contents (ToC)? How to create a table of content.
Ans: Table of Contents (ToC):
A Table of Contents (ToC) is an organized listing of the sections, groups and headings of content in a document and identified by page numbers where they are placed.
It provides an overview of the document and allows readers to go directly to specific section or content in the document. ToC usually appears after the Title Page in a document.

Creating ToC In a Document:
  • To create a Table of Contents in MS Word document, Go to the References Tab  (or File Tab in MS Word 2010) where Table of Contents button appears as the first option of that tab.
  • MS Word provides several options of creating a ToC that include Automatic Table creation, Manual Table creation or the user can even create a Customized Table of Contents based on the requirements of the document.

Types OF ToC:
A user can create to type of table of contents in a document, namely:
  1. An Automatic table or
  2. A Manual table

(i) Automatic Table:
  • Automatic Table creates a Table of Contents automatically based on the content used as Heading presets of MS Word.
  • Based on the type of Heading, Automatic Table of Contents will create the appropriate levels and show page numbers where those Headings are placed.
  • MS Word 2010 provides an advanced feature for automatically creating a ToC.
  • The only difference between Automatic Table 1 and Automatic Table 2 is the title of the table that is “Contents” or “Table of Contents”.

(ii) Manual Table:
  • Choosing Manual Table from the Table of Contents menu will create a template of a generic table of contents.
  • This table will need to be edited and defined manually by providing all the headings, sub-headings and page numbers.
  • To extend the table, simply copy and paste the template lines and edit them to preserve proper formatting.

Q.15: Briefly describe any six types of website?
Ans: Types Of Website:
There are different types of specialized websites such as Portal, News, Informational, Educational, Personal, Business, Blogs, Forums, Entertainment and Social.

(1) Portal:
  • A web portal is a website that provides a single access point of information for all of its users.
  • It collects information from different sources like emails, forums, search engines and presents it to the user in a uniform way.
  • Example:
    Yahoo and MSN are common examples of web portal.

(2) News:
  • A news website is the modern-day alternative for newspapers.
  • Such websites contain everyday information related to current affairs, sports, politics, weather, health, technology, entertainment, etc.

(3) Informational:
  • Informational websites provide detailed information of any field.
  • There are many dedicated informational websites for science, arts, sports, online trainings, research, etc.

(4) Educational:
  • Educational websites are purely designed to deliver educational material for both, teachers and students.
  • Example:
    sabaq.pk, khan academy.org, etc.

(5) Personal:
  • A person can share about his or her biography or achievements in a custom developed website.

(6) Business:
  • A business website is the best way for any organization to market their products and services.
  • It also tells about the teams, policies and procedures of that business.
  • For instance:
    www.psx.com.pk is the website of Pakistan Stock Exchange.

(7) Blogs:
  • A blog is a special type of website that is composed of articles and posts.
  • These articles are organized into categories and sorted by the time when they were published.
  • Eample:
    Wordpress is a popular blog site.

(8) Forums:
  • A forum is an online place where different users can discuss about any topic.
  • These topics can be categorized so that users can easily locate topics of their interest.

(9) Entertainment:
  • An entertainment website serves content like videos or games purely for the purpose of entertainment.
  • Example:
    Youtube is widely used for entertainment.

(10) Social:
  • Social website is a platform where different people get together and socialize with each other.
  • They can also share their ideas, opinions and media.
  • Example:
    Facebook and Twitter are instances of social networking websites.

Q.16: Draw and define the components of ER diagram?
Ans:Components of ER Diagram:
  • ER Design is made up of different components like Attributes, Relationships, etc.
  • There are defined symbols and shapes to represent each one of them.
  • Some of the shapes used to define these components are:
    (a) Rectangle
    (b) Ellipse
    (c) Diamond
    (d) Connecting lines


Q.17: Describe the different types of breaks in MS Word.
Ans: BREAKS:
A document break indicates that how the document is to be partitioned to Word processor.

TYPES OF BREAKS IN MS WORD:
There are two types of document breaks, namely:
  • Page breaks and
  • Section breaks
These two types are further subdivided into several different kinds of page and section breaks.

PAGE BREAKS:
The page breaks partition only the body text of the document.

Types Of Page Breaks:
There are three kinds of page breaks, namely:
  1. Simple page breaks:
    ► Mark the point at which one page ends and the next page begins in the text. It will force all the text behind the cursor onto the next page.

  2. Column breaks:
    ► Indicates that if a document have columns, any text to the right of the cursor where the column beak is inserted will begin in the next column.

  3. Text wrapping breaks:
    ► A text wrapping break moves any text to the right of the cursor to the next line.
    ► This kind of break may be particularly useful when a document contains images. It separates text around image on web, such as caption text of an object from body text.


SECTION BREAKS:
The second type of document break is the section break, which partitions both the body text of the document, as well as its associated formatting, such as page margins, headers and footers, page numbers, footnotes, etc.

Types Of Section Breaks:
The section breaks are of four kinds, namely:
  1. Next page:
    ► Insert a next page section break forces the text to the right of the cursor and start the new section on the following or next page.
    ► It partitions the document into sections, allowing for a change in margins, headers and footers, as well as differently numbered pages and footnotes.
    ► This is most useful when a document must be divided into chapters or sections.

  2. Continuous:
    ► Insert a continuous section break and start the new section on the same page.
    ► It allows the user to change headers and footers, page numbers, margins, etc.
    ► This kind of section break is most useful when a document has already been composed in part or in full, but still requires different formatting such as to footnotes, headings, or pagination in separate sections of the work.
    ► This allows for one section of a document to end and another to begin on the same page.

  3. Even page:
    ► Insert an even page section break and it will shift all the text to the right of the cursor to the top of the next even-numbered page.

  4. Odd page breaks:
    ► Insert an odd page break and it will move the text to the right of the cursor to the top of the next odd-numbered page.

Q.18: Write the functions of an Operating System?
Ans: Function Of Operating System:
Operating system manages every activity of a computer. It is the master control program that provides an interface for a user to communicate with computer. System software and application software run on operating system.
Operating System performs the following functions like:
  • Booting
  • Resource Management
  • User Interface or Command Interpreter
  • Memory Management
  • Input / Output Management
  • File Management
  • Process Management
  • User Management.

(i) Booting:
  • Booting is a process of starting the computer operating system.
  • It checks the computer resources and makes it ready to perform different tasks.

(ii) Resource Management:
  • Operating system automatically manages all the hardware and software resources of a computer when application programs are executed by computer users.
  • This includes allocation and de-allocation of processor, memory, access to shared cache memory and access to network resources.

(iii) User Interface or Command Interpreter:
  • We interact with operating system through user interface or Command Interpreter.
  • User Interface or command interpreter is one of the parts of operating system which reads the commands from user, interprets them and translates them into machine language instructions that the computer hardware can understand.

(iv) Memory Management
  • Memory management module performs the task of allocation and de-allocation of memory space to programs and data in need of these resources.

(v) Input / Output (I/O) Management
  • It is the process of controlling the operations of all the I/O devices (such as keyboard, mouse, monitor, printer etc.) attached to computer.
  • An Operating System provides the device driver to facilitate I/O functions involving I/O devices.
  • These device drivers are software that control I/O devices through their controllers.

(vi) File Management
  • It is a part of operating system that organize and keep tracks of computer files and folders.
  • It manages all the file-related activities such as organization storage, retrieval, deleting, creating, naming or renaming, opening, moving, copying, searching, sharing and protection etc. of files.

(vii) Process Management
  • It is an essential part of OS.
  • A process is a job or activity to be performed by the system.
  • Process management manages creation, deletion, suspension and resumption of processes.
  • The term process refers to program code that has been loaded into a computer's memory for execution by the central processing unit (CPU).
  • In a multi-programming system, there will be a number of computing processes.
  • The operating system must ensure that each process gets a fair share of the CPU's time.
  • The OS decides the order in which processes have access to the processor, and how much processing time each process should get. This function of OS is called process scheduling.

(viii) User Management
  • User management is an important feature of operating system to maintain a secure computer system.
  • The OS gives full control over a computer to a person known as administrator only.
  • Administrator can install various programs and also creates and manage user accounts by assigning them a user name and password.
  • In modern operating systems, user management describes the ability of administrators to control user access to various computer resources like software, I/O devices, storage system, networks, etc.
  • Administrator creates and manage user accounts. The user is assigned a user name and password.

Q.19: Explain computer crimes in our daily life?
Ans: Computer Crime in Real Life:
As technology is growing the data security has become so crucial. We can be a victim of computer crime at any time. Computer crime can range from an international data security threat to a personal offense.
As far as personal offenses are concerned, hacking the social media and mail accounts are so common. There are many genres of computer crime or now called cyber-crimes.

Major Computer Crime Recorded Around The World:
  • Hacking Email:
    In 2013, hackers managed to hack 1 billion email accounts of the users.
  • Virus attacked:
    Likewise, in 2017, the Wanna Cry virus attacked the National Health Service in the United Kingdom which made the whole system nonfunctional for several days.

Examples Of Computer Crimes In Real-Life:
Some examples of such crimes in real life are:
(i) Hacking
  • Hacking is perhaps the most common crime in the computer world. However, the scope of hacking is much wider.
  • Hackers can steal our WiFi, email or social media accounts' passwords.
  • Hackers also attack a website and take it down.
  • The hackers can also steal sensitive information from government and business organizations, make fraudulent transactions and erase data on the cloud or network computers.

(ii) Credit and Debit Card Scam:
  • Keeping debit or credit cards is a common practice but insecure use of these cards can be dangerous. If a person has information about our debit or credit card he or she can make fraudulent transactions. There are various ways to get this information.
  • One way is through scamming.
    Scammers set small machines inside an ATM or credit card machine. These machines copy the data which is then misused by the scammers. Debit and credit cards are also secured with PIN codes. User has to keep this code secret otherwise any person can use the card for online shopping and other purposes.
  • All he or she needs to know our credit card number, PIN and security code printed on the back of the cards.

(iii) Phishing:
  • Phishing is a method of trying to gather personal information using false e-mails and websites.
  • In Phishing, perpetrators contact the target person through email, telephone or text message and pose as a legitimate and trusted individual.
  • He or she asks the target to provide sensitive data such as personally identifiable information, banking and credit card details and passwords for different reasons. The information is then used to access different accounts and can result in identity theft and financial loss.

(iv) Click-jacking:
  • Click-jacking is a malicious technique of tricking a user into clicking on a web page element, such as:
    ► You have seen any video tagged as “OMG? You won't believe what this boy has done!” Or
    ►You have found a button on a website that asked to click to claim a reward you had never applied for.
    This is a kind of fraud which is called Click-jacking.
  • Usually, culprits target children or novice internet users to click on a link containing malware or trick them into sharing private information via social media sites.

(v) Cyber Bullying or Harassment:
  • Electronic means like a computer, mobile phone or internet are also used for online bullying or harassment.
  • Harmful bullying behavior can include:
    Posting rumors
    Threats
    Passing inappropriate remarks
    Leaking personal information
    Blackmailing and
    Committing hate speech
  • The perpetrator does it with the intent to cause harm to the victim.
  • Victims may experience lower self-esteem, intent to commit suicide and a variety of negative emotional responses, including being scared, frustrated, angry and depressed.




Biology (علم حیاتیات) For Class IX (Science) - Solved Model Paper 2023- By BSEK

Go To Index
Class IX (Science)
Biology Solved Model paper 2023


For Biology Notes In English Click Here


Solved Model paper
SECTION "B" (40%) 
SHORT ANSWERS QUESTIONS (24 Marks)


Q.2: Name and define any three branches of biology?
(Note: do any three as mentioned in question)
Ans: BRANCHES OF BIOLOGY:
Modern biology deals with the structure, function and many other descriptions of living things. Advance research during the 20th Century has led to the division of biology into specialized branches. Some important branches are defined below:
  1. Morphology (Gr. morph; form, logos; discourse):
    The study of external form and structure of organisms.

  2.  Anatomy (Gr. ana; part/up, tome; cutting):
    The study of internal parts of body of living organisms by cutting them open.

  3. Cell biology (L. cells, compartment, Gk. Bios= life; logos; discourse):
    The study of cell and its organelle.

  4. Histology (Gr. histos: tissue; logos, discourse):
    The study of structure of tissues of plant and animals.

  5. Physiology (Gr. physis; nature, logos, discourse):
    The study about functions of living organisms.

  6. Taxonomy (Gr. taxis, arrangement, nomos: name):
    The study of the rules, principles, grouping and naming the living organisms.

  7. Genetics (Gr. genesis; descent, origin):
    The study of heredity, that is transferring of characters from parents to offspring.

  8. Developmental biology (Gr. embryon; embryo, logos, discourse):
    The study of formation and development of embryo.

  9. Environmental biology:
    The study of relationship between living organisms and non-living factors of environment and their effects on each other.

  10. Paleontology (Gr. palaios; ancient, ontos; being, logos: discourse):
    The study of remote past organic life, with the help of fossils.

  11. Biotechnology:
    The study about techniques for manipulation of gene to bring the changes in structure and location of genes to achieve desirable characters is called biotechnology.

  12. Socio-biology (L. sociare; to associate,):
    The study of social behavior of living organisms. i.e interaction between themselves.

  13. Parasitology (Gr. para; up):
    The study of parasites.

  14. Pharmacology (Gr. pharmakon, drug;):
    The study about action of drugs.

  15. Molecular biology:
    The study of organic molecules which constitute cell and its organelles.

Q.3: Name the main organ found in:
i) Reproductive System
ii)Respiratory System
iii) Excretory System

Ans: Different Organs With Relative Organ Systems:
i) Reproductive system:
  • Male: Testes, vasa efferentia, urinogenital dust, Fat bodies
  • Female: Ovaries, Oviduct, Ovisac, Fat bodies

ii) Respiratory system:
  • Buccal: Lining of mouth
  • Cutaneos: Moist Skin
  • Pulmonary: Lungs,nostrils, laryngo-tracheal chamber, bronchi, Alveoli

iii) Excretory system:
Kidneys, Ureter, Urinary Bladder, Cloacal aperture

Organs Found in other Organ Systems:

 Organ SystemOrgans
 Digestive system  Alimentary Canal: Mouth, buccal cavity, Pharynx, Esophagus, stomach, small intestine (Duodenum, Ileum) , large intestine, cloaca, cloacal aperture.
Glands: liver with gall bladder and pancreas.
 Circulatory system Heart, left and right atria, left and right ventricles, truncus arteriosus, Aortae, Vena cavae 
 Nervous system  Brain, Spinal Cord, Nerves