0% found this document useful (0 votes)
41 views2 pages

P FLP

This document contains a test for a 9th grade computer class with 50 total marks. It includes multiple choice, short answer, and long answer questions testing knowledge of computer fundamentals like algorithms, memory, binary, networking, encryption, HTML, and cybercrime. Students are asked to choose the correct answer for 10 multiple choice questions worth 1 mark each. They also must answer short response questions worth 2 marks each from three parts testing different concepts. Finally, students must fully answer two of six longer questions worth 8 marks each. The test covers a wide range of essential computer science and networking topics.

Uploaded by

CRO TJSS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views2 pages

P FLP

This document contains a test for a 9th grade computer class with 50 total marks. It includes multiple choice, short answer, and long answer questions testing knowledge of computer fundamentals like algorithms, memory, binary, networking, encryption, HTML, and cybercrime. Students are asked to choose the correct answer for 10 multiple choice questions worth 1 mark each. They also must answer short response questions worth 2 marks each from three parts testing different concepts. Finally, students must fully answer two of six longer questions worth 8 marks each. The test covers a wide range of essential computer science and networking topics.

Uploaded by

CRO TJSS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

The Jalal School System

Test session
Subject: Computer Class: 9th Full Book Total Marks: 50

Student Name:________________________
Objective type
Q1. Choose the correct option. (10*1=10)
1. ------------- means to test if the required solution is there.
(A) Verification (B) Algorithm (C) Validation (D) Flowchart
2. Total steps of problems solving are:
(A) 2 (B) 3 (C) 5 (D) 7
3. In which memory is the data temporarily stored?
(A) Volatile memory (B) Non-volatile memory (C) Both of these (D) None of
these
4. Computer understands only:
(A) Assembly Language (B) C++ Language (C) Basic Language (D) Binary
Language
5. ............. is a suit of protocols that provides end to end connectivity between devices.
(A) TCP/IP (B) OSI (C) IPV4 (D) HTML
6. In a computer network, device are connected through communication:
(A) Channel (B) Address (C) Client (D) Server
7. Encoding of data is an example of:
(A) Patent (B) Confidentiality (C) Copyright (D) Encryption
8. Illegally accessing someone else’s computer is called:
(A) Virus (B) Hacking (C) Piracy (D) Decryption
9. HTML document starts with ......... tag:
(A) <htm> (B) <html> (C) </html> (D) <hr>
10. Used to insert an extra space in the paragraph:
(A) "&nbsp " (B) "&nbsb;" (C) "&spac;" (D) "<space>"
Subjective type
Part 1: Write short answers of any four (4) (4*2=8)
1. What is divide and conquer rule?
2. What is candid solution?
3. What is byte?
4. Which symbol of flow chart will be used to represent the condition "n < = 5"?
5. Write the difference between paired tag and singular tag.
6. Define HTML?
Part 2: Write short answers of any four (4) (4*2=8)
1. Define the number system.
2. Convert (A23)16 into binary.
3. Describe the non-volatile memory.
4. Prepare truth table for 'OR operator.
5. Describe the purpose of encryption.
6. What is meant by phishing attack?
Part 3: Write short answers of any four (4) (4*2=8)
1. What are the names of communication medium?
2. Define protocol.
3. What is the use of SMTP?
4. What is meant by physical layer?
5. What is meant by attributes of tags in HTML?
6. Write the method of creating graphical hyperlink.
Attempt any two (2) questions (8*2=16)
1. Describe types of test data in detail.
2. What is router? Explain the process of routing with the help of example.
3. Explain cybercrime in detail?

>>>>>>>>>>>>>>>>>>>Best of Luck<<<<<<<<<<<<<<<<<<<

You might also like