09 Computer Applications Sp 01f
09 Computer Applications Sp 01f
Maximum Marks: 50
Time Allowed: : 2 hours
General Instructions:
Section A
a) Magnetic tape
b) Optical disk
c) Magnetic disk
d) All of these
a) De bumper
b) Sobig
c) MS-Blaster
d) Melissa
6. Which of the following tabs on the Borders and Shading dialog box is clicked on to apply a page border?
a) Page color
b) Page border
c) Borders
d) Shading
a) Quick heal
b) All of these
c) Mcafee
d) Kaspersky
a) vertical
b) Horizontal
c) Portrait
d) Landscape
9. Which of the following programs are predefined and help in carrying out some basic tasks?
a) Library programs
b) Language translators
c) Application programs
d) Utility programs
10. Which of the following is used to hold a video conference call with your friends?
a) E-learning
b) Video-conferencing
c) E-shopping
d) E-banking
11. Assertion (A): Mobile application or simply an app is a small application software meant to be used on mobile devices
such as tablets, smartphones, etc.
Reason (R): Software that performs special functions or provides functions that are much more than the basic operation
of the computer is known as application software.
12. Assertion (A): A header and footer is the text that is added to the top and bottom of every page. It may include
information such as title or page number, etc., related to a document.
Reason (R): Mail merge is the process of automatic combining of a letter with a mailing list to generate multiple copies
of the letter with the different addresses and other variable information, filled in.
OR
15. Write the various tips which help you to protect yourself on social media.
16. Multimedia can Stimulate the eyes, ears, brain and fingertips of 4 person. With respect to the given statement explain the
meaning of multimedia.
OR
Kavita works in a Multinational Company (MNC) and needs to work online from home also. She requires fast Internet
connection. Which type of Internet connection in your view would be best suited for her? Apart from browsing on the
Internet she will require uploading/downloading of files to/from remote sites. Which protocol will help her to perform
this activity?
OR
19. Differentiate between long-distance wireless media and short-distance wireless media.
Section C
OR
22. Write command for the operations (i) to (iii) based on the spreadsheet below:
Section D
24. Mr. Sonu wants to secure his profile in a Social Networking site. To do this, he needs to change some privacy settings of
his profile in the social networking site. Suggest some privacy settings that will safeguard his identity.
OR
Sonu felt that he had been a victim of cyberstalking for a long period of time. Give some steps you should take for
reporting cybercrimes.
Section E
25. Read the text carefully and answer the questions:
Word processing software is used to manipulate a text document, such as a resume or a report. You typically enter text by
typing, and the software provides tools for copying, deleting and various types of formatting. Some of the functions of
word-processing software include:
1. Creating, editing, saving and printing documents.
2. Copying, pasting, moving and deleting text within a document.
3. Formatting text, such as font type, bolding, underlining or italicizing.
4. Creating and editing tables.
5. Inserting elements from other software, such as illustrations or photographs.
6. Correcting spelling and grammar.
Word processing includes a number of tools to format your pages. For example, you can organise your text into columns,
add page numbers, insert illustrations, etc. However, word processing does not give you complete control over the look
and feel of your document. When design becomes important, you may need to use desktop publishing software to give
you more control over the layout of your pages.
i. What is a font?
ii. Name any hardware and software requirement for text element in multimedia.
To practice more questions & prepare well for exams, download myCBSEguide.com App. It provides complete
study material for CBSE, NCERT, JEE (main), NEET-UG and NDA exams. Teachers can use Examin8.com App
to create similar papers with their own name and logo.
Solution
Section A
1. (c) Internet Relay Chat
Explanation:
All options such as magnetic tape, magnetic disk and optical disk are not primary storage device. They are all secondary
storage device.
3. (a) De bumper
Explanation:
Page border
Antivirus is a kind of software program that helps to detect and remove viruses form the user's computer and provides a
safe environment for users to work on.
8. (c) Portrait
Explanation:
Portrait
Video-conferencing
11. (b) Both A and R are true but R is not the correct explanation of A.
Explanation:
12. (b) Both A and R are true but R is not the correct explanation of A.
Explanation:
Section B
13. A Laser printer is a type of printer that is linked to a computer producing good-quality printed material by using a laser
to form a pattern of electrostatically charged dots on a light-sensitive drum, which attract toner (or dry ink powder). The
toner is transferred to a piece of paper and fixed by a heating process.
Inkjet printer uses ink cartridges whereas laser printer uses toner cartridges. Inkjet printers spray tiny drops of ink onto
the paper and produce good quality output without making too much of noise.
OR
i. Select the text or cells with text you want to change. To select all text in a Word document, press Ctrl + A.
ii. On the Home tab, click the font size in the Font Size box.
15. i. Be selective on who you accept as a friend on your social networks.
ii. Be cautious when you click on links.
iii. Never use the same password for all yours account.
16. Multimedia means any combination of text, audio, images, animation or video used for communicating through
messages or information.
OR
Kavita should prefer broadband connection. FTP protocol will help her in uploading and downloading of files.
17. Antivirus software is one of the most useful utility software. It is an application designed for detecting and removing the
viruses from the computer system. Both free and paid antivirus utility programs are available on the Internet.
OR
19. Differences between long-distance and short-distance wireless media are as follows:
20. An optical disc is a storage medium from which data is read and written by using lasers. There are different types of
optical discs-CD/DVD/Blu-ray disc.
i. Compact Disc: A compact disc is a portable storage medium that can be used to record and store audio, video and
other digital media. A standard compact disc measures 4.7 inches or 120 millimetres (mm) in diameter. It is 1.2 mm
thick and weighs between 15 grams to 20 grams, and has a capacity of 80 minutes of audio, or 650 megabytes (MB)
to 700 MB of data.
ii. Digital Versatile Disc: A digital versatile disc is an optical disc with a 4.7 GB storage capacity which is enough for a
133-minute film. DVDs can be single or double-sided. They have two layers on each side. A double-sided, two-
layered DVD can hold up to 17 GB of video, audio or other information.
iii. Blu-ray Disc: Blu-ray is the latest technology in the optical disc storage. A Blu-ray disc can store a large amount of
high-definition (HD) data. Its storage capacity is five times higher than the storage capacity of traditional DVDs and
can hold up to 25 GB on a single-layer disc and 50 GB on a dual-layer disc.
21. Perform the below mentioned steps to insert pictures from the computer.
Step 1: Place the cursor where you want the picture to appear.
Step 2: Click on the Insert tab and select the Pictures option in the Illustrations group. The Insert Picture dialog box will
appear on the screen.
Step 3: Choose the picture you wish to add. Click on the Insert button and the picture will get inserted.
OR
i. Select the Design tab, then click the format Background command of the Customise group.
i. Patent: It is a legal document that gives the inventor sole rights to make, sell or use an invention. A person, a group
of persons, an organisation or a company can get their invention covered under a patent to protect it from
unauthorised use.
ii. Trademark: A logo or symbol that is printed on a business item to make it exclusive is known as a trademark. A
trademark is valid for 10 years and can be renewed after that.
iii. Copyright: It is a right that is granted by law to the creator or inventor for his or her original work. The rights
concerning a copy of any product are reserved by the creator or the company that has published the work. Copyright
covers literary and artistic works such as books, plays, articles, music compositions and much more.
Section D
24. Some of the common privacy settings associated with social networking sites are:
i. The default privacy settings is "Public", which may also be "Friends" or "Custom". The first two options are good for
someone who has a small group of friends they don’t mind sharing everything with or who has no personal
identifying information on their profile and doesn’t mind it all being public. But for those of us who want a little
more control over exactly who sees what on our profiles, it’s time to familiarise yourself with the "Custom" option.
ii. How You Connect: This section allows you to change how people find you, who can post to your wall and who sees
what information on your wall.
iii. How Tags Work: This option controls who can tag you in pictures, you can see the pictures you’re tagged in and
who can tag people in the pictures that you post. By default, Facebook shows the pictures you are tagged in publicly,
even if you do not have a public wall.
iv. Apps and Websites: This section controls the third-party apps that are allowed to access and interact with your
profile without compromising it.
v. Privacy of Each Post: This option is for convenience where each time you make a post, you can choose if that post
is public, only to friends, only to you and more. You can even set it to show only to certain lists that you have.
OR
Here are few steps you should keep in mind for reporting cybercrimes:
i. The first step is to register a written complaint to the immediate cyber cell in the city. The Information Technology
Act, categorically provides that a cybercrime has global jurisdiction, meaning that the crime may be reported in the
Cyber Crime Units of any city, irrespective of the place where the act was committed. At the time of filing the
complaint, the person reporting the crime may also be required to provide their name, contact details and mailing
address along with the application, which is to be addressed to the Head of the Cyber Crime Cell of the city.
ii. In case of non-availability of cyber-cells in the city, one can file a FIR in the local police station, commissioner or
judicial magistrate of the city.
iii. Offences covered by the Indian Penal Code may also be reported at a local police station by lodging a First
Information Report (FIR) irrespective of the jurisdiction in which the offence was committed.
25. i. A font is a graphical representation of text that may include a different typeface, point size, weight, color or
design.
iii. The amount of space allocated for the footer section of a page is called footer workspace.
ii. The hardware and software requirements for text matter as follows:
a. Keyboard
b. Optical Character Recognition (OCR)
c. Text Editors
d. Text Style
iii. Generative Graphics is extensively used in drawings and illustrations in the form of 2-D and 3-D pictures. It is
created for mathematical representation of simple objects.
iv. Real Audio is a proprietary format, and is used for streaming audio that enables you to play digital audio files in
real-time.
To practice more questions & prepare well for exams, download myCBSEguide.com App. It provides complete
study material for CBSE, NCERT, JEE (main), NEET-UG and NDA exams. Teachers can
use Examin8.com App to create similar papers with their own name and logo.