SlideShare a Scribd company logo
1 of 25
Download to read offline
COMPUTER SCIENCE
Class: 9th
BY: SIR SALMAN SAEED
Unit 1: Problem Solving
1.1: Answer the following questions.
Q: No.2: Define problem analysis. Explain your answer along with an example.
Ans: “Problem analysis is the process to figure out 5Ws from a problem statement”.
Problem analysis helps to understand a given problem.
For Example:
Suppose your class teacher assigns you a task to prepare a list of students in your school
whose names start with letter ‘a’. The list is required in ordered to prepare an alphabetical
directory of all school students and there is only one week to complete the task.
What: Students name starting with letter ‘A’
Who: Students
Why: To prepare directory of students
When: Within a week
Where: School
Q: No.3: Define an algorithm and argue on its role and importance in problem
solving.
Ans: Algorithm: “A set of steps to solve a problem, is called algorithm.”
Role of Algorithm:
An algorithm has an important role in problem solving as it provides a step-by-step guide to
the problem solver. It is a complete description of the solution.
Q: No.4: Suppose a problem has multiple algorithms. How would you choose the
most efficient one? Explain with an example.
Ans: Efficiency of an algorithm is measured on the basis of following two factors:
(i). Number of steps
(ii). Space used in computer memory
For example:
Let’s suppose we have two algorithms to solve a problem. One algorithm has N-steps whereas
the other algorithm has N2
-steps. In this case the previous an algorithm(N-steps) is more
efficient.
Q: No.5: How do you determine requirements for a flowchart?
Ans: In a flowchart, we determine requirements by determining:
(i). Input
(ii). Processing
(iii). Decision making
(iv). Output
Q: No.6: Explain types of test data.
Ans: Different types of data are:
(i) VALID TEST DATA: A type of test data that is according to the input requirements of an
algorithm is called valid test data.
(ii) INVALID TEST DATA: A type of test data that is not according to the input requirements of
an algorithm is called invalid data.
(iii) BOUNNDARY TEST DATA VALUES: The smallest or the largest data values from the range
of valid test data is called boundary test data.
(iv) WRONG DATA FORMATS: The wrong data format means the values that are different
than valid test data.
(v) ABSENT DATA: The absent data means that the number of values given to the solution is
less than expected.
Q: No.7: Describe a trace table.
Ans: Trace Table:
“A table that is used to test an algorithm, is called trace table.”
The trace table is used to make sure that no logical errors occur while the algorithm is being
processed. The table usually takes the form of multi-column and multi-row table. Each column
shows the data names, while row shows the data values.
1.2 Choose the correct option.
1. Which solutions are not reached through proper algorithms or work planning?
a) Prepared solution
b) Candid solution
c) Strategized solution
d) Best solution
2. _____________is a graphical representation of an algorithm.
a) Matrix
b) Graph
c) Flowchart
d) Solution
3. Which symbol in the flowchart is used to either start or end the flowchart?
a) Terminal
b) Connector
c) Process
d) Decision
4. ____________means to test if the required solution is there.
a) Verification
b) Algorithm
c) Validation
d) Flowchart
5. In a _________ error, the solution is working but not giving required results.
a) Random error b) Logical error
c) Syntax error d) Runtime error
1.3 Fill in the blanks.
(1). Before problem solving, we need to first _____________ a problem. (Analyze)
(2). An algorithm produces a defined set of _______. (Steps)
(3). A flowchart utilizes various__________ and __________ to map out the order of steps‫۔‬
(Symbol, Text)
(4). In flowchart symbol is used to show a ____________. (Decision Making)
(5). ___________ is used to test the solutions. (Verification)
_________________________ END OF CHAPTER - (1) __________________________
Unit 2: Binary System
2.1: Multiple Choice Questions.
1. Expression (A + B) . (A+ C) is equal to__________________.
(i) A + (B.C) (iii) A.B + A.C
(ii) A.(B.C) (iv) A + (B + C)
2. The order of application of two separate terms is not important in_____________.
(i) Associative Law (iii) Commutative Law
(ii) Distributive Law (iv) Identity Law
3. “Is it cold outside” is____________.
(i) Boolean Proposition (iii) Categorical Proposition
(ii) Moral Proposition (iv) None of above
4. Number “17” is equal to ______ in binary system.
(i) 10000 (iii) 10110
(ii) 10001 (iv) 10100
5. 1 Petabyte is equal to __________.
(i) (1024)4
bytes (iii) (1024)6
bytes
(ii) (1024)5
bytes (iv) (1024)7
bytes
6. Hexadecimal system has total _________ numbers.
(i) 17 (iii) 16
(ii) 18 (iv) 15
2.2: Answer the following questions.
1. Convert (69610)10 to Hexadecimal.
Ans: To convert (69610)10 to hexadecimal, we will divide it with 16.
As, A = 10
E = 14
F = 15
So, (69610)10 in Hexadecimal is (10FEA)16.
2. Differentiate between volatile and non-volatile memory.
Ans: The difference between volatile and non-volatile memory is:
Volatile Memory Non - Volatile Memory
(i). A device which holds data as long
as it has power supply
connected to it, is called volatile
memory.
A device which holds data even if it has
no power supply
connected to it, is called Non-volatile
memory.
(ii). For Example: RAM For Example: Memory Cards
3. Differentiate between temporary and permanent storage.
Ans: The difference between temporary and permanent memory is:
Temporary Memory Permanent Memory
(i). A device which holds data as long
as it has power supply connected
to it, is called temporary (volatile)
memory.
A device which holds data even if it has
no power supply connected to it, is
called Permanent (Non-volatile)
memory.
(ii). For Example: RAM For Example: Memory Cards
4. Write the truth table for X AND Y where:
X = It is sunny
Y = Today is Monday
X Y X AND Y
T T T
T F F
F T F
F F F
2.3 Fill in the blanks.
1. Temporary memory is ___________and permanent memory is_____________. (Volatile,
Non-Volatile)
2. Data to a processor is provided through____________. (RAM)
3. At least______ byte is required to store any piece of information in a computer's memory.
(One)
4. ____________is used to assemble more than one propositions into one proposition.
(Compound Proposition)
5. In primary and secondary storages, data is stored in the form of____________. (bytes)
6. According to _____________ law there is no change in results if priority of expressions is
changed. (Associative)
2.4: Perform the following conversions
1. (ABCD)16 to binary.
Ans: To convert (ABCD)16 to binary, we have:
A = 1010 B = 1011 C = 1100 D = 1101
So, (ABCD)16 in binary is (1010101111001101)2.
2. (0010110010001101001)2 to hexadecimal.
Ans: To convert (0010110010001101001)2 to hexadecimal, first of all we will make
four digits groups form right to left side:
1001 = 9 0110 = 6 0100 = 4 0110 = 6
001 = 1
So, (0010110010001101001)2 to hexadecimal is (16469)16.
_________________________ END OF CHAPTER - (2) _________________________
Unit 3: Networks
3.1 Choose the correct option.
1. The IPv4 address is made up of _______ binary bits.
(i) 31 (ii) 29
(ii) 32 (iv) 30
2. Routing is process of taking from one device and sending it to another device in
different_______.
(i) Channel (ii) Network
(ii) Path (iv) Area
3. DHCP stands for ________.
(i) Data Hosting Computer Protocol
(ii) Dynamic Host Computer Protocol
(iii) Dynamic Host Configuration Protocol
(iv) None of the above
4. Communications protocols cover _________.
(i) Authentication (ii) Error detection
(ii) Correction (iv) Above all
5. The receiver must be capable of accepting the ________.
(i) Protocol (ii) Message
(ii) Address (iv) Information
3.2 Fill in the blanks.
1. A _________ is a computer device that accesses a service made available by a server. (Client)
2. __________ allow users to communication using e-mail, newsgroups, etc. (Mail Server)
3. Web browsers and web server function together as a________ system. (Client Server)
4. A protocol defines ______ and _______ for communication between a sender and a receiver.
(Rule and Regulation)
5. Routers connect multiple __________together. (Network)
6. Every data packed has an ___________addresses. (IP)
7. IP addressing must be understood as part of the _________ for conversations over internet.
(Protocol)
8. Email stand for ____________. (Electronic Mail)
9. In a computer a network, devices are connected through communication______________.
(Channel)
10. A________ accesses a service made available by a server. (Client)
3.3 Write short answers.
1. How client and server communicate with each other?
Ans: A client is a computer that accesses a service provided by a server. For example: to check
email we use web browser as a client. The client provides a user interface to carry out the
action, like giving username and password. It forwards request to the server, which in return
provides the required service.
2. What are the main components of communication?
Ans: The main components of communication system are:
(i) Sender
(ii) Receiver
(iii) Message
(iv) Protocol
(v) Communication Medium
3. How telephone addressing relates with network addressing?
Ans: Suppose you want to make a phone call to your friend. Before calling, you need to know
exact telephone address that is the telephone number of your friend. On the internet, the
telephone number corresponds to an IP address (Internet Protocol). Like a telephone
number, all IP addresses are unique.
4. What is the difference between static and dynamic IP?
Ans: If an IP address of a device is fixed in a network, it is called Static IP address.
If each time a new connection is made a new IP address is assigned, it is called Dynamic IP
address.
5. Define communication channel?
Ans: Communication channel:
“The physical path that connects sender and
receiver, is called Communication channel.”
For example: Optical Fiber.
6. Describe the working of web browser?
Ans: Web browsers are used to access the World Wide Web in an easy manner. Web
browser and web server function together as a client server system.
7. What is the difference between point-to-point and multipoint connection?
Ans: The difference between point-to-point and multipoint connection is:
Point-to-Point Connection Multi-Point Connection
(i). A point-to-point connection is a
direct link between two devices.
In a multipoint connection, there is a link
between sender and multiple receivers.
(ii). For Example: TV and Remote For Example: Wi-Fi
8. What is application sharing? Answer with the help of an example.
Ans: Application can be shared over the network. It means that more one user can use a
same application.
For Example: Banking System
9. What are the advantages and disadvantages of star topology over bus
topology?
Ans: The advantages and disadvantages of star topology over bus topology are:
Advantages Disadvantages
(i). Star topology is more reliable. Star topology needs more cables for setup.
(ii). It is easy to manage and maintain. It is more expensive.
(iii). Hub controls the whole network. If the hub fails, the whole network shuts down.
10. In a client server model, is client software or hardware? Give reasons to
support your answer.
Ans: Generally, a client is a hardware device which avails services from the server.
For example: Mobile Phone
3.4 Answer the following questions.
1. What is network topology? Describe bus, star, ring and mesh topologies with a diagram of
each. (See Page – 58 of Text Book)
2. What is TCP/IP? Describe its five layers with their functions. (Page – 62)
3. What are the advantages and disadvantages of star topology over bus topology? (Page–58)
4. What are the sizes of IPv4 and IPv6? Explain the method to calculate the size of these both
standards. (Page – 67)
_________________________ END OF CHAPTER - (3) ___________________________
Unit 4: Data and Privacy
4-1 Choose the correct option.
1. Which of the following doesn't includes the types of software piracy?
(i) Softlifiting
(ii) Liability
(iii) Client server overuse
(iv) Online piracy
2. Which of the following is not a cybercrime?
(i) Hacking
(ii) Phishing crime
(iii) Identity Theft
(iv) Decryption
3. Which of the following is not the characteristics of phishing emails?
(i) Official data breach notification
(ii) Email account update
(iii) IT reminder
(iv) Similar domain of actual website
4. Which of the following is not characteristics of phishing website?
(i) Similar domain of actual website
(ii) Using of forms to collect visitors
(iii) Actual link to web content
(iv) Email account updates
5. Which of the following is not a characteristic of good password?
(i) Is eight characters long
(ii) Doesn't contain username
(iii) Contains uppercase letters
(iv) Password is your name only
4-2 Fill in the blanks:
1. Making illegal copies of software is called_____________. (Piracy)
2. _____________ is a general term for any type of information processing that can be
represented mathematically. (Computation)
3. ___________ is the process of encoding data. (Encryption)
4. When a key has less number of character than the text to encrypt, then repeating
letters of the key is called___________. (Interim Cypher text)
5. __________is a cyber-attack to make machine or network resource unavailable for a
user. (Denial of Service)
4-3 Answer the following questions.
1. Define cypher text.
Ans: Cypher text:
“The conversion of text into an unreadable format through
encoding, is called cypher text.”
The cypher text is generated to safe our data from unauthorized persons.
2. Why do we need an installation key whereas a software can be protected
with a password?
Ans: We need an installation key as it used to encrypt and process the software,
algorithm and message. Whereas, a password is used only for authentication to enter or
protect a system.
3. Define Denial of Service.
Ans: Denial of Service:
“A cyber-attack to make a machine or network
resource unavailable for a user, is called Denial
of Service.”
It means that a service is denied/unavailable. It is also written as DoS.
For Example:
Suppose that if you want to visit a website but someone else is already sending too
many requests to the same website, then you may not able to access that website. In
this case, a service becomes very slow or it becomes unavailable.
4. Give a reason to add captcha on websites.
Ans: The captcha is added on website to keep it safe from unauthorized users, robots
or hackers. It is a text in irregular form which is readable for human but not easily for a
machine.
5. What is Patent, and why do we need to register it?
Ans: Patent:
“The Process of getting benefits from innovative/new
ideas, is called Patent.”
Patent is a way to protect an idea. We need to register it as it gives us right to save our
ideas from being used by others.
_____________________ END OF CHAPTER - (4) ___________________
Unit 5: Designing a website
5.1 Choose the correct option.
1. An individual list item can contain another entire list called
(i) Ordered list
(ii) Unordered list
(iii) Nested list
(iv) Definition list
2. HTML is not a _________ language.
(i) Programing
(ii) Markup
(iii) Both i and ii
(iv) None of above
(1). Webpages can be created and modified by using____________.
(i) Notepad
(ii) Notepad ++
(iii) TextEdit
(iv) All of above
(2). An HTML element usually consists of a __________tags.
(i) Start
(ii) End
(iii) Start and End
(iv) None of above
(3). The element is a container for metadata (data about data).
(i) <body>
(ii) <head>
(iii) <title>
(iv) <html>
(4). To save the HTML Page, you can use as file extension.
(i) Htm
(ii) Html
(iii) Xhtml
(iv) Both i and ii
(5). There are___________ of headings in HTML document.
(i) 4
(ii) 5
(iii) 6
(iv) 1
(6). ___________tag is used to display data in tabular form.
(i) td
(ii) table
(iii) tr
(iv) th
(7). A hyperlink can be applied to__________.
(i) Image
(ii) Text
(iii) Both i and ii
(8). In "body" tag __________is used to make a picture of a background image of a
webpage?
(i) Bg
(ii) Background
(iii) Bgiamge
(iv) Both i and ii
5.2 Fill in the blanks.
1. ________make a cell span more than one row. (rowspan)
2. By clicking on special text called __________which bring you to the next page. (hyperlink)
3. The _____attribute specifies the foreground colour of the webpage. (text)
4. In HTML, images are defined with the tag. ( <img> )
5. _______refers to the way tags are used to define the page layout and elements within
the page. (A Markup Language)
6. HTML is a computer language which is used to create_____________. (A Webpage)
7. ______tag makes the enclosed text bold. ( <b> )
8. Tags and text that are not directly displayed on the page are written in______ section.
( <head> )
9. __________tag is used for inserting a line break. ( <br> )
10._________attribute is used with img tag to display the text if image could not load in
browser. (alt)
5.3Give short answers.
1. Differentiate between ordered and unordered list.
Ans: The difference between ordered and unordered list is as follows:
Ordered List Unordered List
(i). The order of the list is important. The order of the list is not important.
(ii). The shuffling of items affects the list. The shuffling of items does not affect
the list.
(iii). It is created by using <ol> and </ol>
tags.
It is created by using <ul> and </ul>
tags.
(iv). For Example:
<ol>
<li> First item </li>
<li> Second item </li>
</ol>
For Example:
<ul>
<li> First item </li>
<li> Second item </li>
</ul>
2. Describe the basic text formatting tags.
Ans: The <font> tag specifies the font styles, font size, and colour of text. You can use
color attribute of the <font> tag to specify the colour of text. For specifying the size of
text, size attribute is used. Similarly, face attribute is used to set the font style of text.
For Example:
<font colour = ” red” size = ”5” face = ” Arial”> Beautiful Text </font>
3. What is difference between hyperlink and anchor?
Ans: The difference between hyperlink and anchor is as follows:
Hyperlink Anchor
(i). A Hyperlink can be a text, graphic
or an icon on webpage, that when
clicked, takes you to another
webpage.
Anchor links allow you to go from one
part to another part of the same page.
(ii). The <a> tag is used to create
hyperlink.
The <a> tag is used to create anchor
link.
(iii). For Example:
<a href =
“http://www.google.com”>
Visit Google </a>
For Example:
<a name = “Top”> </a>
<a href = “#Top”> Go to Top </a>
4. Create a basic table with following attributes:
• colspan • rowspan
Ans:
(i) colspan attribute is used to combine(span) more than one columns. The table
with colspan attribute is:
<table>
<tr>
<th> Name </th> <th colspan = ”2”> Telephone </th>
</tr>
<tr>
<td> Ali Ahmad </td>
<td> 0619056783 </td>
<td> 0616712396 </td>
</tr> Output:
</table>
Name Telephone
Ali Ahmad 0619056783 0616712396
(ii) rowspan attribute is used to combine(span) more than one rows. The table
with rowspan attribute is:
<table>
<tr>
<th> Name: </th>
<td> Ali Ahmad </td>
</tr>
<tr>
<th rowspan = ”2”> Telephone: </th>
<td> 0619056783 </td>
</tr>
<tr> Output:
<td> 0616712396 </td>
</tr>
</table>
5. Explain the steps involved to create a HTML page.
Ans: To create a HTML page, following steps are involved:
(1) Text Editor
(2) HTML code
(3) .html extension
(4) Webpage Preview
Explanation:
To create a webpage, you need a text editor (Notepad, Textedit etc.). It is a software to
edit text in a file.
Step 1: Open Text editor.
Step 2: Write some HTML code.
Step 3: Save the HTML page with extension .htm or .html.
Step 4: Double click the HTML file to view your first webpage. The web browser (Google)
is automatically opened to show your webpage.
Name: Ali Ahmad
Telephone:
0619056783
0616712396
5.4Write the output of the following HTML:
<html>
<head>
<title> My Webpage</title>
</head>
<body>
<ol>
<li> Sports
<dl>
<dt> Cricket </dt>
<dd> Each team has 11 players</dd>
<dt>Badminton</dt>
<dd> Each team has 1 or 2 players</dd>
<dt> Chess</dt>
<dd>Each team has exactly 1 player</dd>
</dl>
<li>Cities of Pakistan
<dt>Lahore</dt>
<dd>Capital of Punjab</dd>
<dt>Karachi</dt>
<dd>Capital of Sindh</dd>
<dt>Peshawar </dt>
<dd>Capital of Khyber Pakhtunkhwa</dd>
<dt>Quetta </dt>
<dd>Capital of Balochistan </dd>
</dl>
</li>
</ol>
</body>
</html>
Ans: Output:
My Webpage
1. Sports
Cricket
Each team has 11 players
Badminton
Each team has 1 or 2 players
Chess
Each team has exactly 1 player
2. Cities of Pakistan
Lahore
Capital of Punjab
Karachi
Capital of Sindh
Peshawar
Capital of Khyber Pakhtunkhwa
Quetta
Capital of Balochistan
5.5 Write HTML to get the following output Algorithms:
• Plain Interest Calculation
This algorithm takes number of years, amount and interest rate as input and produces
total plain interest
1. Start
2. Input numbers years, amount, rate
3. Set Plain Interest to years * (amount*rate/100)
4. Print Plain Interest
5. Stop
Ans: HTML Code for Plain Interest Calculation is:
<html>
<body>
<p> This algorithm takes number of years, amount and interest rate as input and
produces total plain interest</p>
<ol>
<li> Start </li>
<li> Input numbers years, amount, rate </li>
<li> Set Plain Interest to years * (amount*rate/100) </li>
<li> Print Plain Interest </li>
<li>Stop </li>
</ol>
</body>
</html>
• Acceleration Calculation
This algorithm takes mass and force as input and produces acceleration
1. Start
2. Input numbers mass, force
3. Set Acc to force/mass
4. Print Acc
5. Stop
Ans: HTML Code for Acceleration Calculation is:
<html>
<body>
<p> This algorithm takes mass and force as input and produces acceleration </p>
<ol>
<li> Start </li>
<li> Input numbers mass, force </li>
<li> Set Acc to force/mass </li>
<li> Print Acc </li>
<li>Stop </li>
</ol>
</body>
</html>
_______________________ END OF CHAPTER - (5) _______________________
Unit 1: Problem Solving
(1). Define problem.
(2). Why is it important to understand a problem before solving it?
(3). What is problem analysis?
(4). What is meant by Divide and Conquer?
(5). Discuss the term: “Prototype”.
(6). What is candid solution?
(7). How a best solution is selected from multiple solutions?
(8). Define flowchart.
(9). What is the importance of flowchart in problem solving?
(10).Define input with example.
(11).Define processing with example.
(12).Define output and give an example.
(13).Draw a flowchart to find the volume of a cube.
(14).Draw a flowchart to find the area of parallelogram.
(15).Draw a flowchart to find acceleration of moving object with given mass and force applied.
(16).Define an algorithm with example.
(17).What is the role of algorithm in problem solving?
(18).Write an algorithm to display larger number of three given numbers.
(19).Write an algorithm to find the area of a triangle.
(20).How a best algorithm is selected from multiple algorithms?
(21).Differentiate between flowchart and algorithm.
(22).List some advantages of flowchart.
(23).Give some advantages of flowchart over algorithm?
(24).List some advantages of algorithm.
(25).Define test data.
(26).What is the importance of testing in problem solving?
(27).Define validation.
(28).Define verification.
(29).Differentiate between valid and invalid test data.
(30).What are boundary test data values?
(31).What is trace table?
All Important - Short Questions
Unit 2: Binary System
(1). Define number system.
(2). Discuss decimal number system with example.
(3). What is binary system?
(4). Discuss hexadecimal number system.
(5). Convert (156)10 to binary.
(6). Convert (1000001)2 to decimal.
(7). Convert (C921)16 to decimal.
(8). Convert (A23)16 to binary.
(9).Define memory
(10).What is want by volatile memory?
(11).Why secondary storage is permanent?
(12).How data is represented in computer?
(13).Define ASCII code with example.
(14).Differentiate between memory and storage.
(15).Define storage device.
(16).What is an external storage device?
(17).Define bit.
(18).What is byte?
(19).Discuss Boolean proposition.
(20).Define logical operators.
(21).Discuss AND operator.
(22).Discuss OR operator and draw truth table.
(23).Prove that: A + B = B + A
(24).What is logical expression?
(25).Draw truth table for: (A.B).C = A. (B.C)
(26).What are Truth values?
Unit 3: Networks
(1). Define computer network.
(2). What is communication media?
(3). What is network of networks?
(4). List some benefits of computer network.
(5). Define server in network.
(6). What is a client in computer network?
(7). Discuss different types of connection.
(8). Discuss multi-point connection. Give example.
(9). What is meant by topology?
(10). Discuss bus topology.
(11). Discuss star topology.
(12). What is Hub in star topology?
(13). Which topology is the best? Give reason.
(14). Define data communication?
(15). List components of a communication system.
(16). What is sender? Give example.
(17). What is protocol?
(18). List basic layers of computer network.
(19). Discuss FTP.
(20). What is HTTP?
(21). Why we need addressing schemes?
(22). What is meant by www?
(23). Discuss IP-Addressing.
(24). Define router.
(25). Define ISP. Give an example.
Unit 4: Data and Privacy
(1). Why we need data privacy?
(2). Define data privacy.
(3). Define Piracy.
(4). What are open-source software? Discuss.
(5). Discuss soft lifting.
(6). What is meant by phishing?
(7). What is Patent?
(8). Discuss copy right law.
(9). How trade secrets are important for an organization?
(10).Define sabotage with example.
(11).Discuss data brokers.
(12).What is meant by computation?
(13).Discuss the term: “confidentiality”.
(14).What are cookies?
(15).Define encryption of data.
(16).What is the importance of encryption?
(17).Define password. Give an example.
(18).Define key.
(19).What is Captcha?
(20).List some characteristics of good password.
(21).Define cybercrime with example.
(22).What is meant by Hacking?
(23).List some characteristics of phishing email.
(24).List some characteristics of website.
(25).What is DoS?
Unit 5: Designing Website
(1). Define HTML.
(2). Write steps to create a webpage in HTML.
(3). What are paired tags?
(4). Write HTML code to print a paragraph.
(5). Differentiate between ordered and unordered lists.
(6). Discuss nested list.
(7). Write HTML code to add an image.
(8). Define hyperlink.
(9). Define Anchor.
(10).Write HTML code to create a table.
9th_Computer Full Exercise
9th_Computer Full Exercise

More Related Content

Similar to 9th_Computer Full Exercise

VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxskilljiolms
 
Grouping and Displaying Data to Convey Meaning: Tables & Graphs chapter_2 _fr...
Grouping and Displaying Data to Convey Meaning: Tables & Graphs chapter_2 _fr...Grouping and Displaying Data to Convey Meaning: Tables & Graphs chapter_2 _fr...
Grouping and Displaying Data to Convey Meaning: Tables & Graphs chapter_2 _fr...Prashant Borkar
 
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxDue 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxjacksnathalie
 
M150 A Fall2010 T01
M150 A Fall2010 T01M150 A Fall2010 T01
M150 A Fall2010 T01abdalodainat
 
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfSubject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfakilastationarrymdu
 
C++ Loops General Discussion of Loops A loop is a.docx
C++ Loops  General Discussion of Loops A loop is a.docxC++ Loops  General Discussion of Loops A loop is a.docx
C++ Loops General Discussion of Loops A loop is a.docxhumphrieskalyn
 
Dbms question
Dbms questionDbms question
Dbms questionRicky Dky
 
cprogramming questions for practice end term
cprogramming questions for practice end termcprogramming questions for practice end term
cprogramming questions for practice end termSheelendra3
 
Instructions · Take this test during the week (with late submiss.docx
Instructions · Take this test during the week (with late submiss.docxInstructions · Take this test during the week (with late submiss.docx
Instructions · Take this test during the week (with late submiss.docxnormanibarber20063
 
9th Comp Ch 1 LQ.pdf
9th Comp Ch 1 LQ.pdf9th Comp Ch 1 LQ.pdf
9th Comp Ch 1 LQ.pdfNaeem Mughal
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd semsmumbahelp
 
 staple  here  (-­‐2  if  not  stapled  or .docx
  staple  here  (-­‐2  if  not  stapled  or .docx  staple  here  (-­‐2  if  not  stapled  or .docx
 staple  here  (-­‐2  if  not  stapled  or .docxmayank272369
 
spreadsheet program
spreadsheet programspreadsheet program
spreadsheet programsamina khan
 
chapter one && two.pdf
chapter one && two.pdfchapter one && two.pdf
chapter one && two.pdfmiftah88
 
Java Foundations: Data Types and Type Conversion
Java Foundations: Data Types and Type ConversionJava Foundations: Data Types and Type Conversion
Java Foundations: Data Types and Type ConversionSvetlin Nakov
 
5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdf5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdfBizuayehuDesalegn
 
C basic questions&amp;ansrs by shiva kumar kella
C basic questions&amp;ansrs by shiva kumar kellaC basic questions&amp;ansrs by shiva kumar kella
C basic questions&amp;ansrs by shiva kumar kellaManoj Kumar kothagulla
 

Similar to 9th_Computer Full Exercise (20)

Clmd4 a epasg7_8
Clmd4 a epasg7_8Clmd4 a epasg7_8
Clmd4 a epasg7_8
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptx
 
Grouping and Displaying Data to Convey Meaning: Tables & Graphs chapter_2 _fr...
Grouping and Displaying Data to Convey Meaning: Tables & Graphs chapter_2 _fr...Grouping and Displaying Data to Convey Meaning: Tables & Graphs chapter_2 _fr...
Grouping and Displaying Data to Convey Meaning: Tables & Graphs chapter_2 _fr...
 
Adobe
AdobeAdobe
Adobe
 
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxDue 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docx
 
M150 A Fall2010 T01
M150 A Fall2010 T01M150 A Fall2010 T01
M150 A Fall2010 T01
 
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdfSubject name Object Oriented Analysis and DesignMultiple Choice (.pdf
Subject name Object Oriented Analysis and DesignMultiple Choice (.pdf
 
C++ Loops General Discussion of Loops A loop is a.docx
C++ Loops  General Discussion of Loops A loop is a.docxC++ Loops  General Discussion of Loops A loop is a.docx
C++ Loops General Discussion of Loops A loop is a.docx
 
Dbms question
Dbms questionDbms question
Dbms question
 
cprogramming questions for practice end term
cprogramming questions for practice end termcprogramming questions for practice end term
cprogramming questions for practice end term
 
Instructions · Take this test during the week (with late submiss.docx
Instructions · Take this test during the week (with late submiss.docxInstructions · Take this test during the week (with late submiss.docx
Instructions · Take this test during the week (with late submiss.docx
 
9th Comp Ch 1 LQ.pdf
9th Comp Ch 1 LQ.pdf9th Comp Ch 1 LQ.pdf
9th Comp Ch 1 LQ.pdf
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd sem
 
 staple  here  (-­‐2  if  not  stapled  or .docx
  staple  here  (-­‐2  if  not  stapled  or .docx  staple  here  (-­‐2  if  not  stapled  or .docx
 staple  here  (-­‐2  if  not  stapled  or .docx
 
spreadsheet program
spreadsheet programspreadsheet program
spreadsheet program
 
chapter one && two.pdf
chapter one && two.pdfchapter one && two.pdf
chapter one && two.pdf
 
Java Foundations: Data Types and Type Conversion
Java Foundations: Data Types and Type ConversionJava Foundations: Data Types and Type Conversion
Java Foundations: Data Types and Type Conversion
 
5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdf5_2018_08_07!07_51_31_AM.pdf
5_2018_08_07!07_51_31_AM.pdf
 
Session2
Session2Session2
Session2
 
C basic questions&amp;ansrs by shiva kumar kella
C basic questions&amp;ansrs by shiva kumar kellaC basic questions&amp;ansrs by shiva kumar kella
C basic questions&amp;ansrs by shiva kumar kella
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

9th_Computer Full Exercise

  • 2. Unit 1: Problem Solving 1.1: Answer the following questions. Q: No.2: Define problem analysis. Explain your answer along with an example. Ans: “Problem analysis is the process to figure out 5Ws from a problem statement”. Problem analysis helps to understand a given problem. For Example: Suppose your class teacher assigns you a task to prepare a list of students in your school whose names start with letter ‘a’. The list is required in ordered to prepare an alphabetical directory of all school students and there is only one week to complete the task. What: Students name starting with letter ‘A’ Who: Students Why: To prepare directory of students When: Within a week Where: School Q: No.3: Define an algorithm and argue on its role and importance in problem solving. Ans: Algorithm: “A set of steps to solve a problem, is called algorithm.” Role of Algorithm: An algorithm has an important role in problem solving as it provides a step-by-step guide to the problem solver. It is a complete description of the solution. Q: No.4: Suppose a problem has multiple algorithms. How would you choose the most efficient one? Explain with an example. Ans: Efficiency of an algorithm is measured on the basis of following two factors:
  • 3. (i). Number of steps (ii). Space used in computer memory For example: Let’s suppose we have two algorithms to solve a problem. One algorithm has N-steps whereas the other algorithm has N2 -steps. In this case the previous an algorithm(N-steps) is more efficient. Q: No.5: How do you determine requirements for a flowchart? Ans: In a flowchart, we determine requirements by determining: (i). Input (ii). Processing (iii). Decision making (iv). Output Q: No.6: Explain types of test data. Ans: Different types of data are: (i) VALID TEST DATA: A type of test data that is according to the input requirements of an algorithm is called valid test data. (ii) INVALID TEST DATA: A type of test data that is not according to the input requirements of an algorithm is called invalid data. (iii) BOUNNDARY TEST DATA VALUES: The smallest or the largest data values from the range of valid test data is called boundary test data. (iv) WRONG DATA FORMATS: The wrong data format means the values that are different than valid test data. (v) ABSENT DATA: The absent data means that the number of values given to the solution is less than expected. Q: No.7: Describe a trace table. Ans: Trace Table: “A table that is used to test an algorithm, is called trace table.” The trace table is used to make sure that no logical errors occur while the algorithm is being processed. The table usually takes the form of multi-column and multi-row table. Each column shows the data names, while row shows the data values.
  • 4. 1.2 Choose the correct option. 1. Which solutions are not reached through proper algorithms or work planning? a) Prepared solution b) Candid solution c) Strategized solution d) Best solution 2. _____________is a graphical representation of an algorithm. a) Matrix b) Graph c) Flowchart d) Solution 3. Which symbol in the flowchart is used to either start or end the flowchart? a) Terminal b) Connector c) Process d) Decision 4. ____________means to test if the required solution is there. a) Verification b) Algorithm c) Validation d) Flowchart 5. In a _________ error, the solution is working but not giving required results. a) Random error b) Logical error c) Syntax error d) Runtime error 1.3 Fill in the blanks. (1). Before problem solving, we need to first _____________ a problem. (Analyze) (2). An algorithm produces a defined set of _______. (Steps) (3). A flowchart utilizes various__________ and __________ to map out the order of steps‫۔‬ (Symbol, Text) (4). In flowchart symbol is used to show a ____________. (Decision Making) (5). ___________ is used to test the solutions. (Verification) _________________________ END OF CHAPTER - (1) __________________________
  • 5. Unit 2: Binary System 2.1: Multiple Choice Questions. 1. Expression (A + B) . (A+ C) is equal to__________________. (i) A + (B.C) (iii) A.B + A.C (ii) A.(B.C) (iv) A + (B + C) 2. The order of application of two separate terms is not important in_____________. (i) Associative Law (iii) Commutative Law (ii) Distributive Law (iv) Identity Law 3. “Is it cold outside” is____________. (i) Boolean Proposition (iii) Categorical Proposition (ii) Moral Proposition (iv) None of above 4. Number “17” is equal to ______ in binary system. (i) 10000 (iii) 10110 (ii) 10001 (iv) 10100 5. 1 Petabyte is equal to __________. (i) (1024)4 bytes (iii) (1024)6 bytes (ii) (1024)5 bytes (iv) (1024)7 bytes 6. Hexadecimal system has total _________ numbers. (i) 17 (iii) 16 (ii) 18 (iv) 15 2.2: Answer the following questions. 1. Convert (69610)10 to Hexadecimal. Ans: To convert (69610)10 to hexadecimal, we will divide it with 16. As, A = 10 E = 14 F = 15 So, (69610)10 in Hexadecimal is (10FEA)16.
  • 6. 2. Differentiate between volatile and non-volatile memory. Ans: The difference between volatile and non-volatile memory is: Volatile Memory Non - Volatile Memory (i). A device which holds data as long as it has power supply connected to it, is called volatile memory. A device which holds data even if it has no power supply connected to it, is called Non-volatile memory. (ii). For Example: RAM For Example: Memory Cards 3. Differentiate between temporary and permanent storage. Ans: The difference between temporary and permanent memory is: Temporary Memory Permanent Memory (i). A device which holds data as long as it has power supply connected to it, is called temporary (volatile) memory. A device which holds data even if it has no power supply connected to it, is called Permanent (Non-volatile) memory. (ii). For Example: RAM For Example: Memory Cards 4. Write the truth table for X AND Y where: X = It is sunny Y = Today is Monday X Y X AND Y T T T T F F F T F F F F
  • 7. 2.3 Fill in the blanks. 1. Temporary memory is ___________and permanent memory is_____________. (Volatile, Non-Volatile) 2. Data to a processor is provided through____________. (RAM) 3. At least______ byte is required to store any piece of information in a computer's memory. (One) 4. ____________is used to assemble more than one propositions into one proposition. (Compound Proposition) 5. In primary and secondary storages, data is stored in the form of____________. (bytes) 6. According to _____________ law there is no change in results if priority of expressions is changed. (Associative) 2.4: Perform the following conversions 1. (ABCD)16 to binary. Ans: To convert (ABCD)16 to binary, we have: A = 1010 B = 1011 C = 1100 D = 1101 So, (ABCD)16 in binary is (1010101111001101)2. 2. (0010110010001101001)2 to hexadecimal. Ans: To convert (0010110010001101001)2 to hexadecimal, first of all we will make four digits groups form right to left side: 1001 = 9 0110 = 6 0100 = 4 0110 = 6 001 = 1 So, (0010110010001101001)2 to hexadecimal is (16469)16. _________________________ END OF CHAPTER - (2) _________________________
  • 8. Unit 3: Networks 3.1 Choose the correct option. 1. The IPv4 address is made up of _______ binary bits. (i) 31 (ii) 29 (ii) 32 (iv) 30 2. Routing is process of taking from one device and sending it to another device in different_______. (i) Channel (ii) Network (ii) Path (iv) Area 3. DHCP stands for ________. (i) Data Hosting Computer Protocol (ii) Dynamic Host Computer Protocol (iii) Dynamic Host Configuration Protocol (iv) None of the above 4. Communications protocols cover _________. (i) Authentication (ii) Error detection (ii) Correction (iv) Above all 5. The receiver must be capable of accepting the ________. (i) Protocol (ii) Message (ii) Address (iv) Information 3.2 Fill in the blanks. 1. A _________ is a computer device that accesses a service made available by a server. (Client) 2. __________ allow users to communication using e-mail, newsgroups, etc. (Mail Server) 3. Web browsers and web server function together as a________ system. (Client Server) 4. A protocol defines ______ and _______ for communication between a sender and a receiver. (Rule and Regulation) 5. Routers connect multiple __________together. (Network) 6. Every data packed has an ___________addresses. (IP) 7. IP addressing must be understood as part of the _________ for conversations over internet. (Protocol) 8. Email stand for ____________. (Electronic Mail) 9. In a computer a network, devices are connected through communication______________. (Channel) 10. A________ accesses a service made available by a server. (Client)
  • 9. 3.3 Write short answers. 1. How client and server communicate with each other? Ans: A client is a computer that accesses a service provided by a server. For example: to check email we use web browser as a client. The client provides a user interface to carry out the action, like giving username and password. It forwards request to the server, which in return provides the required service. 2. What are the main components of communication? Ans: The main components of communication system are: (i) Sender (ii) Receiver (iii) Message (iv) Protocol (v) Communication Medium 3. How telephone addressing relates with network addressing? Ans: Suppose you want to make a phone call to your friend. Before calling, you need to know exact telephone address that is the telephone number of your friend. On the internet, the telephone number corresponds to an IP address (Internet Protocol). Like a telephone number, all IP addresses are unique. 4. What is the difference between static and dynamic IP? Ans: If an IP address of a device is fixed in a network, it is called Static IP address. If each time a new connection is made a new IP address is assigned, it is called Dynamic IP address. 5. Define communication channel? Ans: Communication channel: “The physical path that connects sender and receiver, is called Communication channel.” For example: Optical Fiber. 6. Describe the working of web browser? Ans: Web browsers are used to access the World Wide Web in an easy manner. Web browser and web server function together as a client server system.
  • 10. 7. What is the difference between point-to-point and multipoint connection? Ans: The difference between point-to-point and multipoint connection is: Point-to-Point Connection Multi-Point Connection (i). A point-to-point connection is a direct link between two devices. In a multipoint connection, there is a link between sender and multiple receivers. (ii). For Example: TV and Remote For Example: Wi-Fi 8. What is application sharing? Answer with the help of an example. Ans: Application can be shared over the network. It means that more one user can use a same application. For Example: Banking System 9. What are the advantages and disadvantages of star topology over bus topology? Ans: The advantages and disadvantages of star topology over bus topology are: Advantages Disadvantages (i). Star topology is more reliable. Star topology needs more cables for setup. (ii). It is easy to manage and maintain. It is more expensive. (iii). Hub controls the whole network. If the hub fails, the whole network shuts down. 10. In a client server model, is client software or hardware? Give reasons to support your answer. Ans: Generally, a client is a hardware device which avails services from the server. For example: Mobile Phone 3.4 Answer the following questions. 1. What is network topology? Describe bus, star, ring and mesh topologies with a diagram of each. (See Page – 58 of Text Book) 2. What is TCP/IP? Describe its five layers with their functions. (Page – 62) 3. What are the advantages and disadvantages of star topology over bus topology? (Page–58) 4. What are the sizes of IPv4 and IPv6? Explain the method to calculate the size of these both standards. (Page – 67) _________________________ END OF CHAPTER - (3) ___________________________
  • 11. Unit 4: Data and Privacy 4-1 Choose the correct option. 1. Which of the following doesn't includes the types of software piracy? (i) Softlifiting (ii) Liability (iii) Client server overuse (iv) Online piracy 2. Which of the following is not a cybercrime? (i) Hacking (ii) Phishing crime (iii) Identity Theft (iv) Decryption 3. Which of the following is not the characteristics of phishing emails? (i) Official data breach notification (ii) Email account update (iii) IT reminder (iv) Similar domain of actual website 4. Which of the following is not characteristics of phishing website? (i) Similar domain of actual website (ii) Using of forms to collect visitors (iii) Actual link to web content (iv) Email account updates 5. Which of the following is not a characteristic of good password? (i) Is eight characters long (ii) Doesn't contain username (iii) Contains uppercase letters (iv) Password is your name only 4-2 Fill in the blanks: 1. Making illegal copies of software is called_____________. (Piracy) 2. _____________ is a general term for any type of information processing that can be represented mathematically. (Computation) 3. ___________ is the process of encoding data. (Encryption) 4. When a key has less number of character than the text to encrypt, then repeating letters of the key is called___________. (Interim Cypher text) 5. __________is a cyber-attack to make machine or network resource unavailable for a user. (Denial of Service)
  • 12. 4-3 Answer the following questions. 1. Define cypher text. Ans: Cypher text: “The conversion of text into an unreadable format through encoding, is called cypher text.” The cypher text is generated to safe our data from unauthorized persons. 2. Why do we need an installation key whereas a software can be protected with a password? Ans: We need an installation key as it used to encrypt and process the software, algorithm and message. Whereas, a password is used only for authentication to enter or protect a system. 3. Define Denial of Service. Ans: Denial of Service: “A cyber-attack to make a machine or network resource unavailable for a user, is called Denial of Service.” It means that a service is denied/unavailable. It is also written as DoS. For Example: Suppose that if you want to visit a website but someone else is already sending too many requests to the same website, then you may not able to access that website. In this case, a service becomes very slow or it becomes unavailable. 4. Give a reason to add captcha on websites. Ans: The captcha is added on website to keep it safe from unauthorized users, robots or hackers. It is a text in irregular form which is readable for human but not easily for a machine. 5. What is Patent, and why do we need to register it? Ans: Patent: “The Process of getting benefits from innovative/new ideas, is called Patent.” Patent is a way to protect an idea. We need to register it as it gives us right to save our ideas from being used by others. _____________________ END OF CHAPTER - (4) ___________________
  • 13. Unit 5: Designing a website 5.1 Choose the correct option. 1. An individual list item can contain another entire list called (i) Ordered list (ii) Unordered list (iii) Nested list (iv) Definition list 2. HTML is not a _________ language. (i) Programing (ii) Markup (iii) Both i and ii (iv) None of above (1). Webpages can be created and modified by using____________. (i) Notepad (ii) Notepad ++ (iii) TextEdit (iv) All of above (2). An HTML element usually consists of a __________tags. (i) Start (ii) End (iii) Start and End (iv) None of above (3). The element is a container for metadata (data about data). (i) <body> (ii) <head> (iii) <title> (iv) <html> (4). To save the HTML Page, you can use as file extension. (i) Htm (ii) Html (iii) Xhtml (iv) Both i and ii (5). There are___________ of headings in HTML document. (i) 4 (ii) 5 (iii) 6 (iv) 1 (6). ___________tag is used to display data in tabular form. (i) td (ii) table (iii) tr (iv) th (7). A hyperlink can be applied to__________. (i) Image (ii) Text (iii) Both i and ii (8). In "body" tag __________is used to make a picture of a background image of a webpage? (i) Bg (ii) Background (iii) Bgiamge (iv) Both i and ii
  • 14. 5.2 Fill in the blanks. 1. ________make a cell span more than one row. (rowspan) 2. By clicking on special text called __________which bring you to the next page. (hyperlink) 3. The _____attribute specifies the foreground colour of the webpage. (text) 4. In HTML, images are defined with the tag. ( <img> ) 5. _______refers to the way tags are used to define the page layout and elements within the page. (A Markup Language) 6. HTML is a computer language which is used to create_____________. (A Webpage) 7. ______tag makes the enclosed text bold. ( <b> ) 8. Tags and text that are not directly displayed on the page are written in______ section. ( <head> ) 9. __________tag is used for inserting a line break. ( <br> ) 10._________attribute is used with img tag to display the text if image could not load in browser. (alt) 5.3Give short answers. 1. Differentiate between ordered and unordered list. Ans: The difference between ordered and unordered list is as follows: Ordered List Unordered List (i). The order of the list is important. The order of the list is not important. (ii). The shuffling of items affects the list. The shuffling of items does not affect the list. (iii). It is created by using <ol> and </ol> tags. It is created by using <ul> and </ul> tags. (iv). For Example: <ol> <li> First item </li> <li> Second item </li> </ol> For Example: <ul> <li> First item </li> <li> Second item </li> </ul> 2. Describe the basic text formatting tags. Ans: The <font> tag specifies the font styles, font size, and colour of text. You can use color attribute of the <font> tag to specify the colour of text. For specifying the size of text, size attribute is used. Similarly, face attribute is used to set the font style of text. For Example: <font colour = ” red” size = ”5” face = ” Arial”> Beautiful Text </font>
  • 15. 3. What is difference between hyperlink and anchor? Ans: The difference between hyperlink and anchor is as follows: Hyperlink Anchor (i). A Hyperlink can be a text, graphic or an icon on webpage, that when clicked, takes you to another webpage. Anchor links allow you to go from one part to another part of the same page. (ii). The <a> tag is used to create hyperlink. The <a> tag is used to create anchor link. (iii). For Example: <a href = “http://www.google.com”> Visit Google </a> For Example: <a name = “Top”> </a> <a href = “#Top”> Go to Top </a> 4. Create a basic table with following attributes: • colspan • rowspan Ans: (i) colspan attribute is used to combine(span) more than one columns. The table with colspan attribute is: <table> <tr> <th> Name </th> <th colspan = ”2”> Telephone </th> </tr> <tr> <td> Ali Ahmad </td> <td> 0619056783 </td> <td> 0616712396 </td> </tr> Output: </table> Name Telephone Ali Ahmad 0619056783 0616712396
  • 16. (ii) rowspan attribute is used to combine(span) more than one rows. The table with rowspan attribute is: <table> <tr> <th> Name: </th> <td> Ali Ahmad </td> </tr> <tr> <th rowspan = ”2”> Telephone: </th> <td> 0619056783 </td> </tr> <tr> Output: <td> 0616712396 </td> </tr> </table> 5. Explain the steps involved to create a HTML page. Ans: To create a HTML page, following steps are involved: (1) Text Editor (2) HTML code (3) .html extension (4) Webpage Preview Explanation: To create a webpage, you need a text editor (Notepad, Textedit etc.). It is a software to edit text in a file. Step 1: Open Text editor. Step 2: Write some HTML code. Step 3: Save the HTML page with extension .htm or .html. Step 4: Double click the HTML file to view your first webpage. The web browser (Google) is automatically opened to show your webpage. Name: Ali Ahmad Telephone: 0619056783 0616712396
  • 17. 5.4Write the output of the following HTML: <html> <head> <title> My Webpage</title> </head> <body> <ol> <li> Sports <dl> <dt> Cricket </dt> <dd> Each team has 11 players</dd> <dt>Badminton</dt> <dd> Each team has 1 or 2 players</dd> <dt> Chess</dt> <dd>Each team has exactly 1 player</dd> </dl> <li>Cities of Pakistan <dt>Lahore</dt> <dd>Capital of Punjab</dd> <dt>Karachi</dt> <dd>Capital of Sindh</dd> <dt>Peshawar </dt> <dd>Capital of Khyber Pakhtunkhwa</dd> <dt>Quetta </dt> <dd>Capital of Balochistan </dd> </dl> </li> </ol> </body> </html>
  • 18. Ans: Output: My Webpage 1. Sports Cricket Each team has 11 players Badminton Each team has 1 or 2 players Chess Each team has exactly 1 player 2. Cities of Pakistan Lahore Capital of Punjab Karachi Capital of Sindh Peshawar Capital of Khyber Pakhtunkhwa Quetta Capital of Balochistan 5.5 Write HTML to get the following output Algorithms: • Plain Interest Calculation This algorithm takes number of years, amount and interest rate as input and produces total plain interest 1. Start 2. Input numbers years, amount, rate 3. Set Plain Interest to years * (amount*rate/100) 4. Print Plain Interest 5. Stop
  • 19. Ans: HTML Code for Plain Interest Calculation is: <html> <body> <p> This algorithm takes number of years, amount and interest rate as input and produces total plain interest</p> <ol> <li> Start </li> <li> Input numbers years, amount, rate </li> <li> Set Plain Interest to years * (amount*rate/100) </li> <li> Print Plain Interest </li> <li>Stop </li> </ol> </body> </html> • Acceleration Calculation This algorithm takes mass and force as input and produces acceleration 1. Start 2. Input numbers mass, force 3. Set Acc to force/mass 4. Print Acc 5. Stop Ans: HTML Code for Acceleration Calculation is: <html> <body> <p> This algorithm takes mass and force as input and produces acceleration </p> <ol> <li> Start </li> <li> Input numbers mass, force </li> <li> Set Acc to force/mass </li> <li> Print Acc </li> <li>Stop </li> </ol> </body> </html> _______________________ END OF CHAPTER - (5) _______________________
  • 20. Unit 1: Problem Solving (1). Define problem. (2). Why is it important to understand a problem before solving it? (3). What is problem analysis? (4). What is meant by Divide and Conquer? (5). Discuss the term: “Prototype”. (6). What is candid solution? (7). How a best solution is selected from multiple solutions? (8). Define flowchart. (9). What is the importance of flowchart in problem solving? (10).Define input with example. (11).Define processing with example. (12).Define output and give an example. (13).Draw a flowchart to find the volume of a cube. (14).Draw a flowchart to find the area of parallelogram. (15).Draw a flowchart to find acceleration of moving object with given mass and force applied. (16).Define an algorithm with example. (17).What is the role of algorithm in problem solving? (18).Write an algorithm to display larger number of three given numbers. (19).Write an algorithm to find the area of a triangle. (20).How a best algorithm is selected from multiple algorithms? (21).Differentiate between flowchart and algorithm. (22).List some advantages of flowchart. (23).Give some advantages of flowchart over algorithm? (24).List some advantages of algorithm. (25).Define test data. (26).What is the importance of testing in problem solving? (27).Define validation. (28).Define verification. (29).Differentiate between valid and invalid test data. (30).What are boundary test data values? (31).What is trace table? All Important - Short Questions
  • 21. Unit 2: Binary System (1). Define number system. (2). Discuss decimal number system with example. (3). What is binary system? (4). Discuss hexadecimal number system. (5). Convert (156)10 to binary. (6). Convert (1000001)2 to decimal. (7). Convert (C921)16 to decimal. (8). Convert (A23)16 to binary. (9).Define memory (10).What is want by volatile memory? (11).Why secondary storage is permanent? (12).How data is represented in computer? (13).Define ASCII code with example. (14).Differentiate between memory and storage. (15).Define storage device. (16).What is an external storage device? (17).Define bit. (18).What is byte? (19).Discuss Boolean proposition. (20).Define logical operators. (21).Discuss AND operator. (22).Discuss OR operator and draw truth table. (23).Prove that: A + B = B + A (24).What is logical expression? (25).Draw truth table for: (A.B).C = A. (B.C) (26).What are Truth values?
  • 22. Unit 3: Networks (1). Define computer network. (2). What is communication media? (3). What is network of networks? (4). List some benefits of computer network. (5). Define server in network. (6). What is a client in computer network? (7). Discuss different types of connection. (8). Discuss multi-point connection. Give example. (9). What is meant by topology? (10). Discuss bus topology. (11). Discuss star topology. (12). What is Hub in star topology? (13). Which topology is the best? Give reason. (14). Define data communication? (15). List components of a communication system. (16). What is sender? Give example. (17). What is protocol? (18). List basic layers of computer network. (19). Discuss FTP. (20). What is HTTP? (21). Why we need addressing schemes? (22). What is meant by www? (23). Discuss IP-Addressing. (24). Define router. (25). Define ISP. Give an example. Unit 4: Data and Privacy (1). Why we need data privacy? (2). Define data privacy. (3). Define Piracy. (4). What are open-source software? Discuss.
  • 23. (5). Discuss soft lifting. (6). What is meant by phishing? (7). What is Patent? (8). Discuss copy right law. (9). How trade secrets are important for an organization? (10).Define sabotage with example. (11).Discuss data brokers. (12).What is meant by computation? (13).Discuss the term: “confidentiality”. (14).What are cookies? (15).Define encryption of data. (16).What is the importance of encryption? (17).Define password. Give an example. (18).Define key. (19).What is Captcha? (20).List some characteristics of good password. (21).Define cybercrime with example. (22).What is meant by Hacking? (23).List some characteristics of phishing email. (24).List some characteristics of website. (25).What is DoS? Unit 5: Designing Website (1). Define HTML. (2). Write steps to create a webpage in HTML. (3). What are paired tags? (4). Write HTML code to print a paragraph. (5). Differentiate between ordered and unordered lists. (6). Discuss nested list. (7). Write HTML code to add an image. (8). Define hyperlink. (9). Define Anchor. (10).Write HTML code to create a table.