0% found this document useful (0 votes)
0 views6 pages

Class 9 Computer After 33 Pages

The document consists of a series of multiple-choice questions covering various topics in computer science, programming languages, networking, and internet technologies. It includes questions about low-level vs. high-level languages, network topologies, OSI layers, and the functions of different network devices. Additionally, it provides a key for the correct answers to each question.

Uploaded by

najeeb najeeb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views6 pages

Class 9 Computer After 33 Pages

The document consists of a series of multiple-choice questions covering various topics in computer science, programming languages, networking, and internet technologies. It includes questions about low-level vs. high-level languages, network topologies, OSI layers, and the functions of different network devices. Additionally, it provides a key for the correct answers to each question.

Uploaded by

najeeb najeeb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1. What is the primary purpose of a C. Neural network implementations D.

programming language? Wireless data transmission protocols


A. To design computer hardware
7. Which element is NOT part of
components B. To serve as a structured
structured programming?
method for communicating instructions to
A. Sequence B. Selection C. Recursion
a computer C. To replace human
D. Repetition
languages in technical documentation
D. To create visual animations for 8. In object-oriented programming,
entertainment what defines an object's activities?
A. The compiler used B. Its set of
2. Which characteristic applies
performable actions C. Network
exclusively to low-level languages?
transmission speed D. Database storage
A. Use of English-like keywords such as
capacity
“print” B. Requirement of detailed
knowledge about computer internals C. 9. Which field primarily uses low-
Platform independence across different level languages for development?
computer architectures D. Automatic A. Web application interfaces B.
memory management features Educational e-learning platforms C.
Operating system kernels D. Business
3. Why is machine language
spreadsheet software
impractical for human programmers?
A. It uses symbolic abbreviations called 10. What is a common application of
mnemonics B. It consists entirely of 0s high-level languages in modern
and 1s C. It requires specialized technology?
compilers for execution D. It cannot A. Writing microcontroller firmware B.
perform complex mathematical Developing intrusion detection systems
operations C. Creating machine learning models D.
Programming satellite navigation
4. What is the function of an
assembler? 11. Which component is NOT part of
A. Execute high-level language programs network communication?
B. Convert assembly language to A. Transmitter B. Protocol C.
machine language C. Debug object- Assembler D. Medium
oriented code D. Optimize storage
12. What critical function does a
requirements
protocol serve in data
5. Which advantage does assembly communication?
language offer over high-level A. Increases wireless transmission range
languages? B. Governs rules for data exchange
A. Easier learning curve for beginners B. between devices C. Converts analog
Better portability across platforms C. signals to digital format D. Provides
Built-in garbage collection D. Reduced physical cabling infrastructure
storage requirements and faster
13. Which scenario exemplifies
execution
simplex communication?
6. What fundamental concept A. Telephone conversation B. Walkie-
underlies procedural programming? talkie exchange C. Television
A. Object inheritance hierarchies B. broadcasting D. Video conference call
Modular programming with smaller parts
14. What distinguishes half-duplex A. Accesses resources from other
from full-duplex communication? computers B. Shares resources for
A. Data transmission speed B. others to use C. Cannot function without
Directional concurrency C. Error internet D. Exclusively uses wireless
correction capability D. Packet size connections
limitations
21. Which characteristic applies
15. How does synchronous ONLY to client/server networks?
transmission differ from A. All computers act as both clients and
asynchronous? servers B. Centralized administration of
A. Uses start/stop bits between resources C. Limited to ten connected
characters B. Transmits data in devices D. No dedicated hardware
continuous streams without gaps C. requirements
Requires lower bandwidth D. Only used
22. What is a key limitation of peer-
in wireless networks
to-peer networks?
16. What is a key limitation of hubs A. High implementation cost B.
in networking? Difficulty in scaling beyond small sizes
A. Inability to connect wireless devices C. Requires specialized operating systems
B. Broadcasting data to all connected D. Incompatibility with wireless devices
devices C. Excessive power
23. Which feature distinguishes LANs
consumption D. Limited to two
from WANs?
connected devices
A. Use of TCP/IP protocols B. Physical
17. How do switches improve upon area coverage C. Wireless capability D.
hub functionality? Number of connected users
A. By reducing transmission speeds for
24. What is the primary advantage of
stability B. Through intelligent packet
VPNs?
forwarding to specific nodes C. By
A. Higher data transmission speeds B.
eliminating protocol requirements D.
Free internet access C. Secure remote
Through wireless signal amplification
access via public networks D. Unlimited
18. What is the primary function of a cloud storage
router?
25. Which technology enables short-
A. Convert data formats between
range device connectivity?
networks B. Connect devices within a
A. Satellite networks B. Cellular
single LAN C. Route packets between
networks C. Bluetooth D. Fiber optics
different networks D. Amplify wireless
signals 26. What is a significant
disadvantage of wireless networks?
19. When would a gateway be
A. Requires expensive cabling B.
essential in networking?
Limited mobility range C. Vulnerability
A. Connecting two identical LANs B.
to interference D. Complex installation
Linking networks with different protocols
process
C. Extending Wi-Fi coverage D. Securing
email transmissions 27. Which topology requires
terminators on cable ends?
20. What defines a server computer
A. Star B. Ring C. Bus D. Mesh
in network architecture?
28. What happens in a star topology A. Data Link Layer B. Network Layer
if the central hub fails? C. Physical Layer D. Session Layer
A. Only direct connections fail B.
36. Which protocol is essential for
Network segmentation occurs C. Entire
internet communication?
network becomes inoperable D.
A. HTTP B. FTP C. SMTP D. TCP/IP
Automatic rerouting activates
37. What key development enabled
29. Which topology feature applies
the modern internet?
exclusively to ring networks?
A. ARPANET military origins B. TCP/IP
A. Most reliable configuration B.
protocol implementation C. World Wide
Unidirectional data flow C. Direct
Web browsers D. 5G wireless technology
connections between all nodes D.
Centralized troubleshooting 38. What critical function does DNS
provide?
30. Why is mesh topology considered
A. Packet encryption B. Domain-to-IP
highly reliable?
translation C. Error correction D.
A. Lowest implementation cost B. Single
Bandwidth allocation
cable dependency C. Centralized control
D. Multiple redundant paths 39. Which internet advantage
revolutionized commerce?
31. How does packet switching differ
A. Global connectivity B. E-commerce
from circuit switching?
capabilities C. Educational resources
A. Dedicated path establishment B.
D. Social networking
Fixed transmission timing C. Data
segmentation with independent routing 40. What is a major societal concern
D. Exclusive use in telephone systems regarding internet usage?
A. Limited entertainment options B.
32. What problem do data
Reduced communication speed C.
communication standards solve?
Privacy threats and data breaches D.
A. Increase transmission speeds B.
Decreased research capabilities
Ensure interoperability between devices
C. Reduce hardware costs D. Eliminate 41. Charles Babbage's Analytical
security protocols Engine pioneered:
A. Vacuum tube technology B.
33. Which OSI layer handles data
Transistor-based logic C. Punch card
formatting for user presentation?
programmability D. Optical storage
A. Application Layer B. Presentation
Layer C. Session Layer D. Transport 42. What technology defined first-
Layer generation computers?
A. Integrated circuits B. Transistors C.
34. What is the Transport Layer's
Vacuum tubes D. Microprocessors
primary responsibility?
A. Defining cable specifications B. 43. Third-generation computers were
Establishing end-to-end connections C. revolutionized by:
Converting domain names to IP addresses A. Magnetic core memory B. Integrated
D. Encrypting sensitive data circuits (ICs) C. Parallel processing D.
Quantum computing
35. At which OSI layer do routers
operate? 44. Fifth-generation computers aim
to incorporate:
A. Mechanical calculation B. Vacuum 53. What key component resides in the
tube reliability C. Optical fiber networks system unit?
D. Artificial intelligence A. Monitor B. Microprocessor C.
Keyboard D. Printer
45. Which memory type uses
magnetic properties? 54. How does pipelining improve CPU
A. RAM B. ROM C. Hard disks D. efficiency?
SSDs A. Increases clock speed B. Parallelizes
instruction processing C. Adds more
46. Volatile memory requires: cache memory D. Reduces power
A. Permanent storage B. Continuous consumption
power C. Optical readers D.
Mechanical actuators 55. Which memory unit is the
smallest?
47. System software primarily acts A. Kilobyte B. Megabyte C. Gigabyte
as: D. Bit
A. End-user productivity tool B.
Hardware-user intermediary C. Game 56. Non-volatile memory includes:
development platform D. Database A. RAM and cache B. ROM and hard
management system disks C. CPU registers D. ALU storage

48. What defines application 57. The Arithmetic Logic Unit (ALU)
software? performs:
A. Manages computer resources B. A. Data storage B. Input/output control
Hardware-specific programming C. Task- C. Mathematical calculations D. Network
specific user applications D. Network routing
protocol implementation 58. What distinguishes full-duplex
49. Which network type spans entire communication?
cities? A. One-way transmission B. Alternating
A. LAN B. WAN C. MAN D. VPN bidirectional transmission C. Broadcast-
only mode D. Simultaneous bidirectional
50. The OSI Physical Layer defines: transmission
A. Data encryption standards B. End-
user application interfaces C. Packet 59. HTTP specializes in:
routing algorithms D. Cabling and A. Email transmission B. File transfers
signaling hardware C. Web page delivery D. Network
addressing
51. What fundamentally enables the
internet's operation? 60. Which topology is most fault-
A. Centralized supercomputers B. tolerant?
Circuit-switched networks C. A. Bus B. Star C. Ring D. Mesh
Decentralized packet switching D. 61. VPNs utilize:
Satellite-only communication A. Dedicated leased lines exclusively B.
52. Which internet application Private fiber-optic cables C. Public
revolutionized information access? telecommunication infrastructure D.
A. Email communication B. World Wide Satellite networks only
Web C. File transfers D. Online gaming 62. The Session Layer manages:
A. Electrical voltage levels B.
Application-to-application communication 67. What is the internet's core
C. Physical cable types D. Binary data addressing system?
conversion A. HTTP domains B. MAC addresses C.
IP addresses D. Email aliases
63. Second-generation computers
replaced vacuum tubes with: 68. Which device operates at the
A. Integrated circuits B. Transistors C. Data Link Layer?
Microprocessors D. Quantum chips A. Hub B. Switch C. Router D.
Gateway
64. Assembly language uses:
A. English keywords like “IF” B. Binary 69. Object-oriented programming models
real-world:
machine code C. Symbolic mnemonics
A. Algorithms B. Objects C. Functions
D. Object-oriented structures
D. Protocols
65. Cache memory primarily
70. Firmware development typically
provides:
uses:
A. Long-term storage B. High-speed
A. High-level languages only B. Natural
data access C. Peripheral device control
language processing C. Low-level
D. Network interface
languages D. Database queries
66. In Von Neumann architecture,
instructions and data are:
A. Stored separately B. Mixed in the
same memory C. Only in CPU registers
D. Cached exclusively
Answer 11. 19. 27. 35. 43. 51. 59. 67. 75.
Key: C D D A B C D D A
1. C 12. 20. 28. 36. 44. 52. 60. 68.
B B C D D D A B
2. A
13. 21. 29. 37. 45. 53. 61. 69.
3. D
C C B B C B D B
4. B
14. 22. 30. 38. 46. 54. 62. 70.
5. C A D A D B A B C

6. D 15. 23. 31. 39. 47. 55. 63. 71.


D A D C D D D D
7. B
16. 24. 32. 40. 48. 56. 64. 72.
8. A B D B A C B D C
9. D 17. 25. 33. 41. 49. 57. 65. 73.
10. C B D D B C B D
B 18. 26. 34. 42. 50. 58. 66. 74.
A C B C D C A B

You might also like