9th Class Computer Notes Chapter-01

Sharing is Caring

PROBLEM SOLVING:

If you are searching the topic “9th Class Computer Notes Chapter-01” & “9th Class Computer Notes” for matric classes according to new Syllabus then, you are on the right place, because we are providing the Quality material for education of Students and their problems.

9th Class Computer Notes Chapter-01:

MCQs from Text Book Exercise and others included in this Practice panel. By practicing again and again, Student can get good practice on this topic “Problem Solving” i.e. 9th Class Computer Science MCQs Chapter-01.

 

0%
2 votes, 4.5 avg
50

Start Your Test Now

Time is over

Thanks for taking Quiz, Click Finish Button to see your Result


Computer Ch#01, 09th Class

Here MCQs for your Revision

For Good Revision & Grip on Concept, You Should take the MCQs and Revise it again and again

Good Luck. . . .  (:

Welcome

Please provide information & fill-up this form

1 / 53

It is important to _______________ before jumping into the solution of a problem.

2 / 53

__________ keyword is use in algorithm to show the termination point of the algorithm.

3 / 53

Logical Error means the solution is ________________

4 / 53

Usually a computer programmer can use these steps _________

5 / 53

A clear understanding of a problem ____________

6 / 53

A set of Steps to Solve a problem is called____________

7 / 53

In problem solving steps after analyzing a problem, which step we have to start?

8 / 53

In flowchart, taking data from users is called ______________

9 / 53

5-Ws (What, Who, When, Where & Why) are used to __________________

10 / 53

____________ means to test whether the solution is correct or not.

11 / 53

In flowchart, ____________ is used to display information which is exhibits the processed result.

12 / 53

Graphical presentation of the steps to solve a problem is called ____________

13 / 53

______________ is a graphical representation of the process but ____________ write these steps in human understandable language.

14 / 53

Trace Table is a technique used to test algorithm as ____________________

15 / 53

Testing an algorithm using invalid data ensure that _______________

16 / 53

Which is not an advantage of flowchart?

17 / 53

After solving a problem, we need ____________whether it is correct or not, we use Test data.

18 / 53

_________ keyword /Notation is used in algorithm to display value.

19 / 53

If an algorithm is failed during verification, then it is important to ________________

20 / 53

____________ is type of test data, which complies with the input requirement of the algorithm.

21 / 53

In algorithm _________ Notation is used for starting point of an algorithm.

22 / 53

In flowchart, ____________ used as conditional operation that determine which one of the two paths to take.

23 / 53

During solving a problem, if the problem is not well defined then we can use the strategy, ____________

24 / 53

Trace table is in form of _________________

25 / 53

best statement for a problem: _______________

26 / 53

In flowchart to determine whether a statement is true or false and taking a appropriate step, we use ___________

27 / 53

A well-defined problem is one that _____________

28 / 53

In flowchart, _______ keyword is used to keep counting the number of input given by user or processing.

29 / 53

____________means to test if the solution, is actually solving the same problem for it was designed.

30 / 53

Which is not an Importance & Benefits of a flowchart?

31 / 53

The Solution is verified means; it is _______________

32 / 53

During draw a flowchart, _________ is used to display / print the result on some output device.

33 / 53

Which type of data can be used to test the problem?

34 / 53

In flowchart, we use symbols which are connected with the help of “Arrows” to show ______________

35 / 53

“Planning a solution” includes following sub steps______________

36 / 53

Invalid test Data is type of test data that _____________

37 / 53

Designer/ Programmer have option to take these steps____________

38 / 53

The word algorithm comes from the name of Arabic researcher / writer ______________

39 / 53

Which is the disadvantage of algorithm?

40 / 53

In flowchart, ________ represent Operations to Process and change values.

41 / 53

There can be _________ algorithm to solve a single problem.

42 / 53

Efficiency of algorithm can be measured by _____________

43 / 53

In flowchart, ___________ indicate start and end of a flowchart.

44 / 53

______________ is essential to point out the defects and errors in solution of some problem.

45 / 53

In Algorithm ___________ keywords are used for check the condition.

46 / 53

________ keywords are used in algorithm, to transfer control to any other step in an algorithm.

47 / 53

If an algorithm is used less space than it may be _____________

48 / 53

In algorithm__________ notation is used to get input from the user.

49 / 53

In flowchart, ___________ is used to connect parts of a flow chart on different pages.

50 / 53

Which One is not used in flowchart?

51 / 53

An algorithm is considered more efficient if it takes _____________ to reach the result

52 / 53

The ______________ step is used to performing calculation & storing the result of calculation.

53 / 53

__________________is one of the key activates to improve quality of a solution.

Your score is

Share  your Result with friends:

LinkedIn Facebook
0%

Can u write your Feelings

How You Feel this

If you find any mistake in MCQs, please inform us by Commenting or by Contact us menu to improve the Quality of this free content.

.

Let’s see, How Students Solve this . . . . . . . Results  . . .

Click here to see the resultsRead more

 

.

.

.

MCQS Chap # 01 – Computer Science 9th Class (Open/ Download)

.

.

Short Questions Chap#01 – Computer Science 9th Class  (Open/ Download)

.

.

Long Questions Chap #01 – Computer Science 9th Class (Open/ Download)

 

We know, the importance of Computer science  study in every class is most important for students, including for students of 9th Class & 10th Class or other classes. If we talk Matric Classes Student of Science Classes or Arts classes, Computer Science is equally important for both Classes. Every Student of 9th & 10th Class is trying to search the topic like “9th Class Computer Notes pdf”, 10th Class Computer Science Notes PDF”, 9th Class Computer MCQs Chapter-01, 9th Class Computer Notes Chapter-01 New Syllabus, Class 9 Computer MCQs Chapter-01 New Syllabus, 9th Class Computer MCQs Chapter-01, adamjee notes class 9 Computer 2022, adamjee notes for class 9 Computer, adamjee notes for class 9, adamjee notes.

Class 9 Computer Science Chapter-Wise Notes

 

 

9th Class Computer Notes Chapter-04

Sharing is Caring

DATA AND PRIVACY:

If you are searching the topic “9th Class Computer Notes Chapter-04” & “9th Class Computer Notes MCQs, Short Questions, Long Questions & Conceptual Questions” for matric classes according to new Syllabus then, you are on the right place, because we are providing the Quality material for education of Students and their problems.

9th Class Computer Notes Chapter-04:

MCQs from Text Book Exercise and others included in this Practice panel. By practicing again and again, Student can get good practice on this topic “Data and Privacy” i.e. 9th Class Computer Science MCQs Chapter-04.

 

0%
0 votes, 0 avg
7

Start Your Test Now

Time is over

Thanks for taking Quiz, Click Finish Button to see your Result


Computer Ch#04, 09th Class

Here MCQs for your Revision

For Good Revision & Grip on Concept, You Should take the MCQs and Revise it again and again

Good Luck. . . .  (:

Welcome

Please provide information & fill-up this form

1 / 56

If a company sells emails IDs and phone numbers to another company for marketing purpose, it is ______________

2 / 56

Encoding means conversion of the data to an unreadable format which is called _________

3 / 56

Using Cookies companies are able to gather ________________

4 / 56

Which one is not a software piracy?

5 / 56

Piracy means making _____________ of copywrite data.

6 / 56

Which of the following is the plan text of this Cipher Text “UFPNXYFS”

7 / 56

Patent is a way to protect ____________

8 / 56

___________ is the process of encoding data.

9 / 56

Secrete code is required to read / convert ciphertext to plain text is called_______

10 / 56

The foundation of all ____________________ of data is formed on ethical principle.

11 / 56

When a key has less numbers of character then the text to encrypt, repeating letters of the key is called ___________

12 / 56

Which of the following in not a cybercrime?

13 / 56

__________is the process of encoding data in such a way that only authorized person can read it.

14 / 56

Copywrite of software means that ______________

15 / 56

Which of the following is not a characteristic of good password?

16 / 56

______________ are ubiquitous and are widely used by people of almost all ages to store and share data.

17 / 56

A crime in which __________________ are used is called cybercrime.

18 / 56

_________ is a cyber-attack to make machine or network resource unavailable for a user.

19 / 56

Protecting data from malicious users is called ________________

20 / 56

If we have data of others, it is our ethical responsibility to keep it ________________

21 / 56

Which would be an example of phishing Email by Hackers?

22 / 56

Phishing Emails are showing as __________________

23 / 56

A computer virus is a computer program written _____________

24 / 56

Which is not a good characteristic of a good password?

25 / 56

Making illegal copies of software is called ____________

26 / 56

Keeping _________ of data has become difficult in this era of computer & internet.

27 / 56

Which one is not a fraud & misuse of data?

28 / 56

Which of these is main aspect to secure our data?

29 / 56

One of them is not a data security issue ___________

30 / 56

Illegally accessing someone’s else computer is called _____________

31 / 56

__________ method is replacing alphabets in some fixed number of steps to the left /right of original alphabet in sequence of alphabet.

32 / 56

Companies interested to collect information about his consumer to know about _________

33 / 56

Companies want to read minds of web surfers and some times they store some piece of information with web surfers PC, called___________

34 / 56

_____________ is a program which can change / destroy an information or sabotage a precious data.

35 / 56

A computer expert who can steal data when it moves from one location to other is called _________

36 / 56

Identify the wrong plaintext of encrypted text by Caesar Cipher Method Four Character substitution to the right.

37 / 56

_______________ are secrets that are playing an important role for the success of a company.

38 / 56

DoS attackers target the web servers of banking / trade organization to ____________

39 / 56

A good password should be ____________

40 / 56

___________ is uses a Table for substituting the letters of plaintext.

41 / 56

Which of the following is not the characteristics of phishing emails?

42 / 56

Anyone, who doesn’t want to share his information with unintending person the main reason is __________

43 / 56

________ was a roman politician and military general, who used the method of encryption for sending message to his solders.

44 / 56

_________ is a cyber-attack to make a machine/ Network resource unavailable by sending any requests in small amount of time

45 / 56

The main purpose to convert plaintext to ciphertext is __________

46 / 56

This is the Importance of encrypting a data _________

47 / 56

_________________ says that idea or product of someone cannot be copied.

48 / 56

________ is a general term for any type of information processing that can be represented mathematically.

49 / 56

_____________ is a general term for any type of information processing that can be represented mathematically.

50 / 56

Which of the following is not characteristics of phishing website?

51 / 56

Availability of your data means that data will be available when ____________

52 / 56

Integrity means that you want to keep your data ____________

53 / 56

Passwords are used for authentication to enter a system, whereas ____________ are used to read an encrypted message.

54 / 56

If the key has less number of letters then, ________________ in Vigenere Cipher Method.

55 / 56

Which of the following doesn’t includes the types of software piracy?

56 / 56

Substitution cipher method are methods of encryption in which ______________

Your score is

Share  your Result with friends:

LinkedIn Facebook
0%

Can u write your Feelings

How You Feel this

If you find any mistake in MCQs, please inform us by Commenting or by Contact us menu to improve the Quality of this free content.

.

Let’s see, How Students Solve this . . . . . . . Results  . . .

Click here to see the resultsRead more

 

.

.

MCQs Chap # 04 Computer Science 9th  (Open/ Download)

. .

Short Questions Chap # 04 Computer Science 9th  (Open/ Download)

. .

Long Questions Chap # 04 Computer Science 9th  (Open/ Download)

.

.

We know, the importance of Computer science  study in every class is most important for students, including for students of 9th Class & 10th Class or other classes. If we talk Matric Classes Student of Science Classes or Arts classes, Computer Science is equally important for both Classes. Every Student of 9th & 10th Class is trying to search the topic like “9th Class Computer Notes pdf”, 10th Class Computer Science Notes PDF”, 9th Class Computer MCQs Chapter-04, 9th Class Computer Notes Chapter-04 New Syllabus, Class 9 Computer MCQs Chapter-04 New Syllabus, 9th Class computer Short Questions Chapter 04, 9th Class Computer Long Questions Chapter 04, 9th Class Computer Conceptual Questions Chapter 04 .

Class 9 Computer Science Chapter-Wise MCQs

 

 

9th Class Computer Notes Chapter-05

Sharing is Caring

Designing Website:

If you are searching the topic “9th Class Computer Notes Chapter-05” & “9th Class Computer Notes MCQs, Short Questions, Long Questions, Conceptual Questions” for matric classes according to new Syllabus then, you are on the right place, because we are providing the Quality material for education of Students and their problems.

9th Class Computer Notes Chapter-05:

MCQs from Text Book Exercise and others included in this Practice panel. By practicing again and again, Student can get good practice on this topic “Designing Website” i.e. 9th Class Computer Science MCQs Chapter-05.

 

0%
1 votes, 5 avg
13

Revise / Test Your MCQs

Time is over

Thanks for taking Quiz, Click Finish Button to see your Result


Computer Ch#05, 09th Class

Here MCQs for your Revision

For Good Revision & Grip on Concept, You Should take the MCQs and Revise it again and again

Good Luck. . . .  (:

Welcome

Please provide information & fill-up this form

1 / 67

In HTML Table, to make a cell span more than one column, __________attribute is used.

2 / 67

A website consists of many _____________

3 / 67

HTML stand for ________________

4 / 67

To save the HTML page, you can use __________ as file extension.

5 / 67

In HTML, images are defined with the ____________ tag.

6 / 67

In HTML, Table is defined by __________ Tag

7 / 67

In a webpage images are added with the _________ Tag

8 / 67

__________ refers to the way tags are used to define the page layout and elements within the page.

9 / 67

An HTML documents primarily consist of Sections, which are__________

10 / 67

____________Tag is used to create a hyperlink.

11 / 67

In order to insert extra space in HTML Text we have to use ____________

12 / 67

In ____________ the ordered of the list is not important.

13 / 67

_________of <Body> Tag specifies the background image of a HTML documents.

14 / 67

The purpose of hyperlink is that by clicking on this _____________

15 / 67

__________of <Body> tag specifies the foreground text color of a HTML documents.

16 / 67

In __________ keeps each list item with an ordered number.

17 / 67

________is such an icon, graphic or text that when clicked it takes you to some other webpage.

18 / 67

____________ are the properties associated with Tags and provide information about Tag

19 / 67

____________of <Body> tag specifies the background color of a HTML documents.

20 / 67

Which are the types of List used in HTML.

21 / 67

_______tells the browser how the contents are structured inside a webpage.

22 / 67

____________ part of the HTML documents is between <body> & </body>

23 / 67

In HTML Table, __________ is defined with the <td> tag.

24 / 67

a hyperlink can be applied to _______________

25 / 67

__________ is used to define/ show some terms and their descriptions

26 / 67

The __________ tag used to specify the style, size and color of text.

27 / 67

To specify the title of the webpage we use <Title> </Title> tag inside ___________ tag.

28 / 67

HTML is a computer language which is used to create a____________

29 / 67

___________ attribute is used with “img” tag to display the text if image could not lead in browser.

30 / 67

__________is used to specify the URL if linked webpage.

31 / 67

An HTML element usually consist of a __________ tag

32 / 67

Tags and text that are not directly displayed on the page are written in ___________ section.

33 / 67

In HTML Table, to make a cell span more than one Row, ___________ attribute is used.

34 / 67

HTML documents begin and end with ____________ Tag and also it is a top level that tag that contain whole contents of website

35 / 67

There are ____________ of Tags used in HTML

36 / 67

__________ tag is used to display data in tabular form.

37 / 67

The _______Tag insert a line break without starting a new paragraph.

38 / 67

Webpages can be created and modified by using ____________

39 / 67

Tag consist of Startup Tag, End Tag and contents between them is called_______

40 / 67

________ make a cell span more than one row.

41 / 67

The webpage elements are represented by tags due to marking of each element language is called ___________

42 / 67

___________ tag is used for inserting a line break.

43 / 67

__________ contains the actual content of a webpage that is visible inside a webpage.

44 / 67

There are _____________ of headings in HTML documents

45 / 67

The __________ element is a container for metadata (data about data)

46 / 67

In “body” tag __________ is used to make a picture of a background image of a webpage?

47 / 67

________ Tag is used to create unordered list

48 / 67

___________typically defines the document title, style and other information about the whole HTML document

49 / 67

Some tags have not startup and End Tags these are called__________

50 / 67

The term hypertext is used due to the special text in a webpage called________

51 / 67

HTML is not _______________ language

52 / 67

To move from one part of the same page to the same page we use _____________

53 / 67

The head element is a container for ____________

54 / 67

The ________ attribute specifies the foreground text colour of the webpage.

55 / 67

By clicking on special text called__________ which bring you to the next page.

56 / 67

The _________ Tag are used to start and end the Heading.

57 / 67

In HTML Table, ________is defined by <tr> tag.

58 / 67

In HTML, in a list, a list item can contain another list is called__________

59 / 67

_________provides an alternate text for an image if the image is not displayed due to any reason.

60 / 67

An individual list item can contain another entire list called____________

61 / 67

____________ Tag is used to create ordered list.

62 / 67

___________ tag makes the enclosed text bold.

63 / 67

In HTML Table, ________is defined with <th> tag.

64 / 67

________ Tag is used to create and define the description list.

65 / 67

The ____________ Tag marks starting of a paragraph and Closing of a paragraph.

66 / 67

__________links allow you to go from one part of the same page to another part.

67 / 67

A software which can understands the HTML and display the contents is called____________

Your score is

Share  your Result with friends:

LinkedIn Facebook
0%

Can u write your Feelings

How You Feel this

  If you find any mistake in MCQs, please inform us by Commenting or by Contact us menu to improve the Quality of this free content.

Let’s see, How Students Solve this . . . . . . . Results  . . .

Click here to see the resultsRead more

 

MCQs Chapter # 5 –  Computer Science 9th (Open/ Download)

. .

Short Questions Chapter # 5 –  Computer Science 9th (Open/ Download)

.

.

Long Questions Chapter # 5 –  Computer Science 9th (Open/ Download)

.. .

We know, the importance of Computer science  study in every class is most important for students, including for students of 9th Class & 10th Class or other classes. If we talk Matric Classes Student of Science Classes or Arts classes, Computer Science is equally important for both Classes. Every Student of 9th & 10th Class is trying to search the topic like “9th Class Computer Notes pdf”, 10th Class Computer Science Notes PDF”, 9th Class Computer MCQs Chapter-05, 9th Class Computer Notes Chapter-05 New Syllabus, Class 9 Computer MCQs Chapter-05 New Syllabus, 9th Class Computer MCQs Chapter 05, 9th Class Computer Short Questions Chapter 05, 9th Class Computer Long Questions Chapter 05, 9th Class Computer Conceptual Questions Chapter 05.

Class 9 Computer Science Chapter-Wise MCQs

 

 

9th Class Computer Notes Chapter-02

9th Class Computer MCQs Chapter-02
Sharing is Caring

Binary System:

If you are searching the topic “9th Class Computer Notes Chapter-02” & “9th Class Computer MCQs, Long Questions, Short Questions & Conceptual Questions” for matric classes then, you are on the right place, because we are providing the Quality material for education of Students and their problems.

9th Class Computer Notes Chapter-02:

MCQs from Text Book Exercise and others included in this Practice panel. By practicing again and again, Student can get good practice on this topic “Binary System” i.e. 9th Class Computer Science MCQs Chapter-02. Best of Luck.

 

0%
0 votes, 0 avg
23

Start Your Test Now

Time is over

Thanks for taking Quiz, Click Finish Button to see your Result


Computer Ch#02, 09th Class

Here MCQs for your Revision

For Good Revision & Grip on Concept, You Should take the MCQs and Revise it again and again

Good Luck. . . .  (:

Welcome

Please provide information & fill-up this form

1 / 70

Expression (A + B ) . (A+C) is equal to ____________

2 / 70

_____________ is any physical device which used for storing data.

3 / 70

The smallest unit of data, can hold only one value 0 or 1 called __________

4 / 70

All the characters on keyboard have an associated code which is called ___________

5 / 70

This Expression “A + ( B . C ) = ( A + B ) ( A + C )”  is the example of __________

6 / 70

During conversion Binary to Hexadecimal, if the left group has been less then 4-digits then, we simply ______________

7 / 70

This Expression “( A + B ) + C = A  + ( B + C )” is the example of __________

8 / 70

Number “17” is equal to ___________ in binary system.

9 / 70

If “E” is in Hexadecimal, then its binary value is ____________

10 / 70

Any computer hardware that is used for storing, porting and extracting data is called __________

11 / 70

___________ may also be written as  ﬧP

12 / 70

Data to a processor is provided through______________

11 characters left

13 / 70

If “F” is in Hexadecimal, then its binary value is ____________

14 / 70

ASCII Codes are represented in Computer Memory after __________

15 / 70

Which Unit size of memory is smallest in computer memory?

16 / 70

1-Petabyte is equal to ______________

  • (1024)4 bytes
  • (1024)6 bytes
  • (1024)5 bytes
  • (1024)7 bytes

Select Correct Option

17 / 70

__________ may also be written as “P . Q”

18 / 70

According to _________ law there is no change in result if priority of expressions is changed.

19 / 70

______________help us to simplify complex Boolean Expression.

20 / 70

This Expression “A + 0 = A”  is the example of __________

21 / 70

During conversion Binary to Hexadecimal, we make the group from ___________

22 / 70

The number system which has base 10, also it uses ten digits (0-9) is called________

23 / 70

“236598” is an example of _____________

24 / 70

To Convert ________________________, we divide the number by 2 and take Quotient and Remainder.

25 / 70

ASCII stands for ________________

26 / 70

Best example of _____________ is Random Access Memory (RAM)

27 / 70

External Devises are just plug and play, it means________

28 / 70

Group of Eight bits is enough space to store single ASCII character, which is called _______

29 / 70

This is not a characteristic of Secondary storage devices_____________

30 / 70

Permanent memory is also called __________

31 / 70

Which is/ are the characteristic of volatile memory devices?

32 / 70

“1001001” is an example of _____________

33 / 70

The logical operator___________ is not a connector but it is used to negate a proposition.

34 / 70

The main types of Computer Memory is/ are ______________

35 / 70

Temporary Memory is also called __________

36 / 70

The number system which has base 2 and it uses only 2-digits (0, 1) is called _______

37 / 70

Which Unit size of memory is smallest in computer memory?

38 / 70

“BO93A5” is an example of ______________

39 / 70

To convert_____________, simply convert each hexadecimal digit to four binary values

40 / 70

This Expression “A + B  =  B + A” is the example of __________

41 / 70

If “C” is in Hexadecimal, then its binary value is ____________

42 / 70

Commonly used number systems are ______________

43 / 70

“It is Cold outside” is a ____________

44 / 70

To assemble more than one operation and make a single proposition, we use _________

45 / 70

A device which holds data as long as, it has power supply connected to it, is called _______

46 / 70

The order of application of two separate terms is not important in _____________

47 / 70

In Boolean algebra, if we use OR Operator, the compound composition is true if ______________

48 / 70

To Convert ______________________, divide the number by 16 and take Quotient and Remainder.

49 / 70

At least _________ byte(s) is required to store any piece of information in a computer’s memory.

50 / 70

A Truth Table is used to check the truth value of a proposition when ___________ are used.

51 / 70

In Non-Volatile memory, if we turn of power, the data stored in devices __________

52 / 70

___________ are assigned on the bases of Truthfulness or falsity of a proposition.

53 / 70

Hardware used for Storage devices may be _____________

54 / 70

All Digital devices / Computers store data in _____________

55 / 70

Typical Example of _______________ is Hard drive, Memory Card, Flash Drive.

56 / 70

_____________ may also be written as “P + Q”

57 / 70

Hexadecimal system has total _____ numbers.

58 / 70

A device which can hold data even if it is not connected to any power source, is called __________

59 / 70

In primary and secondary storages, data is stored in the form of _________

60 / 70

If “9” is in Hexadecimal, then its binary value is ____________

61 / 70

The number system which has base 16 and it use 16-digits (0to 9, A, B, C, D, E, F) is called _______

62 / 70

A number system is the system of representation of ____________

63 / 70

  1. A Truth Table is used to check a proposition, weather it is _____________

64 / 70

In computer memory, At least one piece of information take place _____________

65 / 70

According to Boolean algebra, ___________ is a sentence that can either be true or false.

66 / 70

Which Unit size of memory is biggest in computer memory?

67 / 70

Every proposition takes one out of two values _________, which is called truth values

68 / 70

___________ is used to assemble more than one proposition into one proposition.

69 / 70

We get a _____________when some logical operator is applied to the Boolean proposition.

70 / 70

Compound proposition is true only if ________________

Your score is

Share  your Result with friends:

LinkedIn Facebook
0%

Can u write your Feelings

How You Feel this

If you find any mistake in MCQs, please inform us by Commenting or by Contact us menu to improve the Quality of this free content.

Let’s see, How Students Solve this . . . . . . . Results  . . .

Click here to see the resultsRead more

 

MCQs Chap # 02 – Computer Science 9th Class (Open/ Download)

. .

Short Question Answers Chap # 02 – Computer Science 9th Class (Open/ Download)

. .

Long Question Answers Chap # 02 – Computer Science 9th Class (Open/ Download)

 

9th Class Computer Science Notes & MCQS:

We know, the importance of Computer science  study in every class is most important for students, including for students of 9th Class & 10th Class or other classes. If we talk Matric Classes Student of Science Classes or Arts classes, Computer Science is equally important for both Classes. Every Student of 9th & 10th Class is trying to search the topic like 9th Class Computer Notes pdf, 10th Class Computer Science Notes PDF, 9th Class Computer MCQs Chapter-02, 9th Class Computer Notes Chapter-02, Class 9 Computer MCQs Chapter-02, 9th class Computer Notes Chapter 02, adamjee notes class 9 Computer 2022, adamjee notes for class 9 Computer, adamjee notes for class 9, adamjee notes.

Class 9 Computer Science Chapter-Wise Notes

 

9th Class Computer Notes Chapter-03

Sharing is Caring

Networks:

If you are searching the topic “9th Class Computer Notes Chapter-03” & “9th Class Computer MCQs, Short Questions, Long Question Answers, Conceptual Questions” for matric classes then, you are on the right place, because we are providing the Quality material for education of Students and their problems. Lets discuss about Class 9 Computer Notes Chapter-03.

Class 9 Computer Notes Chapter-03:

MCQs from Text Book Exercise and others included in this Practice panel. By practicing again and again, Student can get good practice on this topic “Networks” i.e. 9th Class Computer Science MCQs Chapter-03. Best of Luck.

 

0%
2 votes, 4.5 avg
18

Start Your Test Now

Time is over

Thanks for taking Quiz, Click Finish Button to see your Result


Computer Ch#03, 09th Class

Here MCQs for your Revision

For Good Revision & Grip on Concept, You Should take the MCQs and Revise it again and again

Good Luck. . . .  (:

Welcome

Please provide information & fill-up this form

1 / 90

In networking computers are connected or linked with each other through a ______

2 / 90

TCP/IP protocol consist five layers, select which is also part of this protocol.

3 / 90

Which is not a purpose of networking?

4 / 90

Routers Connect Multiple ______ together

5 / 90

In Communication System, each message has main parts, which are ________

6 / 90

_________ is a set of rules and procedures for communication process.

7 / 90

__________is a process of taking data from one device and sending it to another device on a different network.

8 / 90

The receiver must be capable to accepting the ________

9 / 90

In Networking, a Client may be a ____________

10 / 90

If each time a new connection is made a new IP Address assigned it, it is called ___________

11 / 90

IPv4 can provides the number of IP addresses which are ______________

12 / 90

___________ is a device that receive the massage of communication process.

13 / 90

A Wi-Fi based network is an example of ____________

14 / 90

In Communication System, Sender is also called ____________

15 / 90

IPv4 address divided into ______ groups which is separated by “.”

16 / 90

A router is a Networking device that forwards data packets ___________________

17 / 90

“HTTP” stands for _______________

18 / 90

IPv4 have four groups, each group can contain values ____________

19 / 90

If IP address of a device is fixed in a network, it is called ________________

20 / 90

________ connects all devices with each other through a direct link.

21 / 90

The IPV4 Address is made up of _____ binary bits.

22 / 90

Email stand for _____________

23 / 90

The type of basic network topology is/ are ___________

24 / 90

TCP/IP protocol consist five layers, select one which is not a part of this protocol.

25 / 90

Web browsers and web servers function together as a ______ system.

26 / 90

In ___________ the central point is known as Hub/ Switch Control all the traffic.

27 / 90

A router is placed at the meeting point of _____________________

28 / 90

A protocol defines as _____________ for communication between a sender and a receiver.

29 / 90

Which is a purpose of Sharing Sources on Internet?

30 / 90

IPv6 have Eight Groups, each group can contain value ______________

31 / 90

We get internet service from some companies called _________________

32 / 90

FTP protocol used for the purpose of _____________

33 / 90

The main component of a communication system are / is ____________

34 / 90

____________ is a physical path that connects two communication devices.

35 / 90

The possible type of Networking connection is ____________

36 / 90

SMTP protocol used for the purpose of _____________

37 / 90

IPv6 address divided into __________ groups, which are separated by “:”

38 / 90

A unique identifier that is associated with a device which is connected to internet, is called ___________

39 / 90

In Communication system, Receiver is also called __________

40 / 90

____________ means a direct connection between to devices (sender or receiver).

41 / 90

URL stand for ____________________

42 / 90

1st part _____________ is the actual content of message whereas 2nd part __________ is the information about sender and receiver

43 / 90

The purpose of network is to facilitate _______________

44 / 90

A _________is a physical computer dedicated to run services to serve the needs of its client.

45 / 90

In a computer network, devices are connected through communication________

46 / 90

TCP/IP stands for _________________

47 / 90

Which kind of Servers exist in Networking?

48 / 90

A network ________________ is a formal agreement between 2 components to send and receive information.

49 / 90

Transmission medium can be a _______________

50 / 90

TCP/IP stands for _________________

51 / 90

In networking, Every data packet has an ________ address.

52 / 90

__________ connects all devices of network through single common cable having two end point.

53 / 90

WWW stands for ____________________

54 / 90

In ____________  if there is a problem in a communication cable, then all other devices can stop functioning.

55 / 90

In ___________ failure of any single device does not affect other devices connected with same cable.

56 / 90

“SMTP” stand for ______________

57 / 90

By Networking we can increase the sharing capacity of computer, means ________________

58 / 90

In networking, a __________ accesses a service made available by a server.

59 / 90

In Networking, Client is a process that access a services provided by ______________

60 / 90

A standard method for designing application, where data is kept central location and shared with clients on request is called _____________ method.

61 / 90

Communications protocols cover _________

62 / 90

Transmission medium is the path which connects ___________ and used to transmit data.

63 / 90

In _____________ if there is any problem in cable then only respective computer gets disconnected from the network

64 / 90

__________ connects a computer with other computers forming a ring of computers.

65 / 90

Data Communication means exchange of messages between __________ through some medium.

66 / 90

_____________ is a suit of protocol that provides end-to-end connectivity between devices.

67 / 90

Connection between remote & TV is an example of _____________

68 / 90

IP Address is assigned by __________________________ server.

69 / 90

____________ is a device that initiate the communication process

70 / 90

____________ there is a link between a sender and multiple receivers.

71 / 90

Network are connected together to make a larger network which is called ___________

72 / 90

Most widely used Application layer protocols are _____________

73 / 90

“FTP” Stand for ________________

74 / 90

By using _____________ a user can store and access his files remotely.

75 / 90

Routing is process of taking data from one device and sending it to another device in different _______

76 / 90

_____________ is a formal agreement between two parties.

77 / 90

___________is considered as the most well-known example of Network of Networks

78 / 90

The basic types of IP address is / are _________________

79 / 90

_____________ Connects all devices using point to point connections via cable to center point.

80 / 90

Physical Structure of network can be described in term of ______________

81 / 90

HTTP protocol used for the purpose of _____________

82 / 90

Which is not a purpose of sharing Sources on internet?

83 / 90

Which of these are/is the purpose of Computer Networking.

84 / 90

IP addressing must be understood as part of the ______ for conversations over the internet.

85 / 90

DHCP stand for _________

86 / 90

__________is geometrical representation of the relationship amount the interconnected devices.

87 / 90

In communication system information can be presented in the form of ____________

88 / 90

_______ allow users to communicate using e-mail, newsgroup, etc.

89 / 90

A ________ is a computer device that accesses a service made available by a server.

90 / 90

__________ is an expensive topology in term of cable cot as it uses a lengthy cable to connect computer.

Your score is

Share  your Result with friends:

LinkedIn Facebook
0%

Can u write your Feelings

How You Feel this

If you find any mistake in MCQs, please inform us by Commenting or by Contact us menu to improve the Quality of this free content.

Let’s see, How Students Solve this . . . . . . . Results  . . .

Click here to see the resultsRead more

 

MCQs Chap # 03 – Computer Science 9th  (Open/ Download)

. .

Short Questions Chap # 03 – Computer Science 9th  (Open/ Download)

. .

Long Questions Chap # 03 – Computer Science 9th  (Open/ Download)

.

9th Class Computer Science Notes Chapter-03 & MCQS:

We know, the importance of Computer science  study in every class is most important for students, including for students of 9th Class & 10th Class or other classes. If we talk Matric Classes Student of Science Classes or Arts classes, Computer Science is equally important for both Classes. Every Student of 9th & 10th Class is trying to search the topic like “9th Class Computer Notes pdf”, 10th Class Computer Science Notes PDF”, 9th Class Computer MCQs Chapter-03, 9th Class Computer Notes Chapter-03, Class 9 Computer MCQs Chapter-03, 9th Class Computer Short Questions, 9th Class Computer Long Questions, 9th Class Computer Conceptual Questions, Class 9 Computer Notes Chapter-03 .

Class 9 Computer Science Chapter-Wise MCQs