Thursday, September 25, 2025

Solved PABSON Kathmandu MID TERMINAL EXAMINATION 2082 – COMPUTER SCIENCE – Grade IX

 

Solved PABSON Kathmandu

MID TERMINAL EXAMINATION 2082 – COMPUTER SCIENCE – Grade IX








Attempt all questions.

Group ‘A'(10 Marks)

Choose the correct answer.                                                      (10x1=10)

1.   A set of instructions that performs a particular task is called………..

      i) data         ii) information              iii) program     iv) hardware

 

2.   Which type of memory is volatile and loses data when power is turned off?

      i) RAM      ii) ROM            iii) Flash Memory         iv) Hard disk

 

3.   A………printer is a popular type of personal computer printer that uses a non-impact, photocopier technology.

      i) laser                   ii) dot matrix                 iii) drum           iv) ink jet

 

4.   .…….refers to the process of copying files from remote server computers to users computer.

i) Download           ii) Upload         iii) FTP             iv) None of these

 

5.   Which of the following programming languages is considered a Low-Level Language?

i) Python    ii) C++             iii) JAVA          iv) Assembly Language

 

6.   Which of the following is not a valid hexadecimal digit?

i) A            ii) E                  iii) F                 iv) G

 

7.   Which of the following is the first step in the Program Development Cycle?

      i) Coding                ii) Analyzing the problem

      iii) Maintenance      iv) Design

 

8.   In scratch, what term is used for the visual elements that users can control?

i) Characters           ii) Sprites         iii) Objects        iv) Blocks

 

9.   Which software environment is used for programming Arduino boards?

i) Scratch    ii) Arduino IDE           iii) Visual studio           iv) Eclipse

10. The color attribute is of ………….tag.

      i) <FONT>                                     ii) < HR > 

      iii) <FONT> and <HR>                 iv) None

Group ‘B' (20 Marks)

Answer the following questions in one sentence:                      (10X2=20)

11. Explain the working principles of computers with a block diagram.

Ans: The working of a computer is explained by the IPOS cycle. Data is first entered into the computer using input devices such as a keyboard or mouse. This data is processed by the CPU, which follows the instructions stored in memory. The processed data is then displayed as output through devices such as a monitor or printer. At the same time, data and results can be stored in devices such as a hard disk or pen drive for future use. This sequence of input, process, output, and storage explains how raw data is transformed into meaningful information.

 

 




12. What is an input devices? Write down appropriate input device for data 'audio' and 'video'?

Ans: Input devices are hardware components that allow users to enter data and instructions into a computer system, enabling communication between the user and the computer for processing.

      The appropriate input device for audio is microphone and video is webcam.

 

13. Convert (315)10 into binary and (A4B)16 into octal.

Division
by 2

Quotient

Remainder

(Digit)

(315)/2

157

1

(157)/2

78

1

(78)/2

39

0

(39)/2

19

1

(19)/2

9

1

(9)/2

4

1

(4)/2

2

0

(2)/2

1

0

(1)/2

0

1

= (100111011)2

(315)10 = (100111011)2

 

(A4B)16 into octal.

Convert each hex digit to 4 binary digits and then convert each 3 binary digits to octal digits (see conversion tables below):

Converting hexadecimal to binary

= A 4 B

A = 1010

4 = 0100

B = 1011

= 101 001 001 011

Again,

Converting binary to octal

101 = 5

001 = 1

001 = 1

011 = 3

= 5113

(A4B)16 = (5113)8

 

14. Perform (1011 X 101)2 + (1001)2 and (10111)2 ÷(101)2 binary operations.

 

 

 

1

0

1

1

 

 

 

x

1

0

1

 

 

 

1

0

1

1

 

 

0

0

0

0

x

 

1

0

1

1

x

X

 

1

1

0

1

1

1

Now,

 

1

1

0

1

1

1

 

 

+

1

0

0

1

1

0

0

0

0

0

0

(1011 X 101)2 + (1001)2 = (1000000)2

 

(10111)2 ÷(101)2

101)

1

0

1

1

1

(100

 

1

0

1

 

 

 

 

0

0

0

1

1

 

 

 

 

 

 

0

 

 

 

 

 

1

1

 

Q = 100

R = 1

 

15. List different types of ports and explain any one of them.

Ans: The different types of ports are  USB, HDMI, Ethernet, VGA port.

The Type-C port is a modern hardware connector commonly found in smartphones, laptops, and tablets. It is small, reversible (can be plugged in either way), and supports fast charging, high-speed data transfer, and connection with multiple accessories.

 

16. Differentiate between UI and UX design in web development.

Aspect

UI (User Interface)

UX (User Experience)

Definition

The visual elements (buttons, icons, menus).

The overall experience of using the product.

Focus

How the product looks.

How the product works and feels.

Goal

To make the product visually appealing.

To make the product easy to use and enjoyable.

Example

Design of buttons and layout of an app.

Smooth navigation and quick load times of an app.

 

17. Write down the function of following HTML tag:    

i. <TR> - Defines a row in an HTML table.       

ii. <MARQUEE> - Creates a scrolling.  

iii. <P> - Defines a paragraph.  

iv. <IMG> - Inserts an image.

18. Observe the given block and give answer of given question.

 


Question:

a)   What is the function of “When I start as a clone”?

Ans: The function of the "When I start as a clone" block in Scratch is to specify actions that should occur when a clone of the sprite is created. In this script, it makes the cloned sprite move to a random position on the screen.

 

b)   What will be the result of above script when mouse clicked?

Ans: The result of the above script when the mouse is clicked will be as follows:

·        When the green flag is clicked, the program will repeatedly create clones of the sprite as long as the mouse is held down.

·        Each clone will go to a random position on the screen.

·        If the mouse is pressed down, the clone will keep appearing in random positions.

·        When the mouse is released, the clones will be deleted.

 

 

19. Analyze the following flowchart and write the output.      (2)

The output of the flowchart is

1

2

3

4

5

20. Write flowchart to display area of rectangle.


 



 

 

Group ‘C (5X4=20)

 

21. What is programming language? Differentiate between compiler

      and interpreter.                                         (2+2)   

Ans: A programming language is a language consisting of a set of instructions provided by the user that tells a computer what task to do and how to do it.

 

 


     

22. Write the function of the following blocks.                         (4X1=4)

 


1.      Switch backdrop to backdrop1: This block changes the backdrop of the scene to "backdrop1."

2.      Set my variable to 0: This block sets a variable named "my variable" to a value of 0.

3.      If on edge, bounce: This block makes the sprite bounce when it touches the edge of the screen.

4.      Repeat until: This block repeats a set of actions until a specified condition is met. The actions inside the block will run continuously until the condition is satisfied.

 

23. Write HTML code to create the following webpage.                      (4)



<html>

<head>

       <title>Vacancy Announcement</title>

</head>

<body>

    <center><h3><u>Vacancy Announcement</u></h1></center>

    <p>XYZ Software Company requires qualified candidates for the following posts:</p>

     <img src="vac.png" height=300 width=300 align=right>

        <ol>

            <li>Software developer

            <li>Graphics designer

            <li>Website designer

        </ol>

         <b>Qualification required:</b>

        <table border=1>

            <tr>

                <th>POST</th>

                <th>Qualification</th>

            </tr>

            <tr>

                <td>Software developer</td>

                <td>BE (Computer Engineering)</td>

            </tr>

            <tr>

                <td>Graphics developer</td>

                <td>B.Sc. Computer Science</td>

            </tr>

            <tr>

                <td>Website developer</td>

                <td>B.Sc. IT</td>

            </tr>

        </table>

 

</body>

</html>

 

24. List down the components of Scratch interface. Explain any one of them.                                                                   (3+1)

Ans: The components of scratch interface are:

v  Stage

v  Sprites

v  Scripts

v  Blocks Palette

v  Backdrop

Sprites- Sprites are characters or objects that can interact in a Scratch project

25. What is web development life cycle? List all the stages of  it and

      explain any one of them.                                                    (2+1+1)

Ans: The web development life cycle is a systematic process of creating and maintaining a website or web application. The stages of web development life cycle are:

Stages of WDLC

·       Gathering Information

·       Design and Layout

·       Content creation

·       Development

·       Testing

·       Deployment

·        Maintenance and Updating

Gathering Information: This first stage focuses on understanding the project’s goals and collecting all the necessary information to build the website.

 

 

 

?ÿ@

 

Wednesday, September 24, 2025

50 MCQs - Concept of Cybersecurity - Grade IX Computer Science 2082

 



50 MCQs with Answers & Explanations


6.1 Concept of Cybersecurity

Q1. Cybersecurity mainly focuses on protecting:
i. Hardware only
ii. Computer systems, networks, and digital data

iii. Only personal devices
iv. Applications only

Answer: ii.
Explanation: Cybersecurity protects all systems, networks, and data from theft, damage, or attacks.


Q2. The three key objectives of cybersecurity (CIA) are:
i. Confidentiality, Integrity, Availability

ii. Control, Integration, Access
iii. Confidentiality, Internet, Applications
iv. Connection, Integrity, Access

Answer: i.
Explanation: CIA triad is the foundation of cybersecurity.


Q3. Which of the following ensures information is not changed or altered?
i. Confidentiality
ii. Integrity

iii. Availability
iv. Authentication

Answer: ii.
Explanation: Integrity means accuracy and trustworthiness of data.


Q4. Authentication in cybersecurity means:
i. Encrypting data
ii. Verifying user identity

iii. Blocking websites
iv. Securing Wi-Fi

Answer: ii.
Explanation: Authentication confirms that the user is genuine, usually via username/password.


Q5. Which type of cybersecurity protects Wi-Fi, routers, and servers?
i. Network Security

ii. Application Security
iii. Information Security
iv. Operational Security

Answer: i.
Explanation: Network security prevents intruders from accessing or attacking networks.


Q6. Malware includes all except:
i. Viruses
ii. Worms
iii. Ransomware
iv. Firewall

Answer: iv.
Explanation: A firewall is a security tool, not malware.


Q7. A cyberattack where criminals flood servers with traffic is called:
i. Phishing
ii. DoS/DDoS

iii. Malware
iv. Social Engineering

Answer: ii.
Explanation: Denial of Service overloads servers to make them unavailable.


Q8. Which cyberattack manipulates humans into revealing secrets?
i. Man-in-the-middle
ii. Social Engineering

iii. Worms
iv. Hacking

Answer: ii.
Explanation: Social engineering tricks people instead of breaking technology.


Q9. Which of the following is a protection method in cybersecurity?
i. Using weak passwords
ii. Strong authentication

iii. Ignoring software updates
iv. Disabling antivirus

Answer: ii.
Explanation: Strong authentication prevents unauthorized access.


Q10. Why is cybersecurity important for businesses?
i. To make systems faster
ii. To build trust with customers

iii. To reduce power consumption
iv. To block social media use

Answer: ii.
Explanation: Cybersecurity builds trust by protecting customer data.


6.2 Concept of Cybercrime

Q11. Cybercrime means:
i. Legal use of internet
ii. Illegal activities using computers or networks

iii. Only virus attacks
iv. Mobile phone usage

Answer: ii.
Explanation: Cybercrime is crime committed through digital means.


Q12. Which law in Nepal handles cybercrime issues?
i. RTI Act
ii. Electronic Transaction Act (ETA), 2063

iii. IT Constitution Act
iv. Cyber Protection Law 2010

Answer: ii.
Explanation: ETA 2063 is Nepal’s cyber law.


Q13. Which of these is NOT a type of cybercrime?
i. Hacking
ii. Phishing
iii. Identity theft
iv. Authentication

Answer: iv.
Explanation: Authentication is a security measure, not a crime.


Q14. Stealing someone’s Aadhaar or bank details is called:
i. Malware attack
ii. Identity theft

iii. Phishing
iv. Cyberbullying

Answer: ii.
Explanation: Identity theft is stealing personal information.


Q15. Example of cyberbullying is:
i. Harassing people using fake social media accounts

ii. Installing firewalls
iii. Encrypting data
iv. Using VPN

Answer: i.
Explanation: Cyberbullying uses digital platforms for harassment.


Q16. Which is an example of phishing?
i. Fake emails asking for bank login

ii. A firewall alert
iii. Strong password use
iv. Social media posting

Answer: i.
Explanation: Phishing tricks people into sharing information.


Q17. Ransomware is a type of:
i. Phishing
ii. Malware

iii. Firewall
iv. Authentication

Answer: ii.
Explanation: Ransomware locks files and demands money.


Q18. In Nepal, who handles cybercrime complaints?
i. Local police stations
ii. Cyber Bureau of Nepal

iii. Ministry of Education
iv. Nepal Telecom

Answer: ii.
Explanation: Cyber Bureau of Nepal investigates cybercrimes.


Q19. Which of the following is a virus attack example?
i. Sending abusive comments
ii. Malware infecting hospital systems demanding ransom

iii. Using VPN
iv. Installing updates

Answer: ii.
Explanation: This is ransomware (a type of malware).


Q20. Which is NOT an example of cybercrime?
i. Online fraud
ii. Hacking
iii. Encryption

iv. Cyberstalking

Answer: iii.
Explanation: Encryption is a protective method.


6.3 Prevention Methods from Cybercrime

Q21. Which is the strongest password?
i. 123456
ii. Password
iii. Ab@2025!

iv. abcd

Answer: iii.
Explanation: Strong passwords use numbers, symbols, and mixed letters.


Q22. Which of these should NOT be used in passwords?
i. Dictionary words

ii. Numbers and symbols
iii. Upper and lowercase letters
iv. Special characters

Answer: i.
Explanation: Simple words like “admin” or “password” are weak.


Q23. MFA stands for:
i. Multi-Factor Authentication

ii. Multiple File Access
iii. Main Frame Account
iv. Multi Function Action

Answer: i.
Explanation: MFA uses two or more verification steps.


Q24. Which is an example of "Something you have" in MFA?
i. Password
ii. PIN
iii. OTP

iv. Face scan

Answer: iii.
Explanation: OTP is a code sent to your device.


Q25. Which is an example of "Something you are" in MFA?
i. Fingerprint

ii. OTP
iii. Password
iv. PIN

Answer: i.
Explanation: Biometrics like fingerprints and facial recognition fall here.


Q26. Software updates are important because they:
i. Slow down devices
ii. Fix security problems

iii. Delete data
iv. Increase storage

Answer: ii.
Explanation: Updates patch vulnerabilities.


Q27. Authentication is mainly done using:
i. Username and password

ii. VPN and proxy
iii. Cookies
iv. Browsers

Answer: i.
Explanation: Basic authentication relies on username/password.


Q28. A firewall is used to:
i. Send emails
ii. Filter network traffic and block unauthorized access

iii. Store passwords
iv. Increase internet speed

Answer: ii.
Explanation: Firewalls act as protective barriers.


Q29. Which is NOT a prevention method?
i. Strong passwords
ii. Firewalls
iii. Updating software
iv. Sharing personal data publicly

Answer: iv.
Explanation: Oversharing data increases cyber risks.


Q30. Which prevents viruses and malware from spreading?
i. Firewall
ii. Antivirus

iii. VPN
iv. Encryption

Answer: ii.
Explanation: Antivirus detects and removes malicious software.


6.4 Safe Web Browsing Techniques

Q31. Safe browsing means:
i. Using internet freely without care
ii. Using internet responsibly and securely

iii. Using only Wi-Fi
iv. Avoiding social media

Answer: ii.
Explanation: Safe browsing protects privacy and devices.


Q32. Which indicates a secure website?
i. http://
ii. https://

iii. www.
iv. ftp://

Answer: ii.
Explanation: HTTPS ensures encryption and security.


Q33. VPN stands for:
i. Virtual Private Network

ii. Virtual Personal Node
iii. Virtual Protected Net
iv. Verified Private Number

Answer: i.
Explanation: VPN secures internet connections.


Q34. A secure browser includes all except:
i. Private browsing
ii. Ad-blocking
iii. Tracking protection
iv. Weak passwords

Answer: iv.
Explanation: Weak passwords reduce security.


Q35. DuckDuckGo is an example of:
i. Secure search engine

ii. Antivirus
iii. Firewall
iv. Malware

Answer: i.
Explanation: DuckDuckGo prioritizes privacy.


Q36. Which protects against harmful sites in search results?
i. Secure search engine

ii. Malware
iii. Router
iv. Cookies

Answer: i.
Explanation: Secure search engines filter unsafe sites.


Q37. Which is an example of secure browsers?
i. Mozilla Firefox

ii. Malwarebytes
iii. Windows Defender
iv. MySQL

Answer: i.
Explanation: Firefox has privacy protection features.


Q38. Why use secure websites?
i. To improve speed
ii. To protect sensitive info and prevent identity theft

iii. To increase ads
iv. To save battery

Answer: ii.
Explanation: HTTPS websites protect user data.


Q39. Which feature shows if a site is secure?
i. Lock icon
🔒
ii. Big banner
iii. Cookies
iv. Username

Answer: i.
Explanation: Lock icon in browser = secure encryption.


Q40. Which of the following is NOT a safe browsing method?
i. Using HTTPS websites
ii. Logging out of accounts
iii. Clicking on random links

iv. Using updated browsers

Answer: iii.
Explanation: Random links may be malicious.


6.5 Digital Citizen

Q41. A digital citizen is:
i. A person using social media only
ii. Someone who uses the internet responsibly

iii. Only hackers
iv. A government officer

Answer: ii.
Explanation: Digital citizens act ethically online.


Q42. Which is NOT a guideline of good digital citizenship?
i. Think before posting
ii. Protect personal info
iii. Share passwords

iv. Report bad behavior

Answer: iii.
Explanation: Sharing passwords is unsafe.


Q43. Example of good digital citizenship is:
i. Plagiarizing online content
ii. Giving credit to original creators

iii. Spreading fake news
iv. Cyberbullying

Answer: ii.
Explanation: Respecting creators shows responsibility.


Q44. Which is an example of bad online behavior?
i. Reporting abuse
ii. Using polite language
iii. Spreading fake news

iv. Protecting privacy

Answer: iii.
Explanation: Fake news harms digital society.


Q45. Good digital citizens should:
i. Overshare personal data
ii. Change passwords regularly

iii. Ignore online rules
iv. Support cyberbullying

Answer: ii.
Explanation: Changing passwords protects accounts.


6.6 Netiquette & Online Behaviors

Q46. Netiquette means:
i. Internet ethics

ii. Online fraud
iii. Password manager
iv. Malware

Answer: i.
Explanation: Netiquette = rules of online manners.


Q47. Which of these is bad netiquette?
i. Respect privacy
ii. Spamming

iii. Think before posting
iv. Give credit

Answer: ii.
Explanation: Spamming annoys and harms online spaces.


Q48. Which guideline of netiquette avoids misunderstanding?
i. Use emojis carefully

ii. Overshare data
iii. Post fake memes
iv. Troll others

Answer: i.
Explanation: Emojis must be used wisely in communication.


Q49. Why is netiquette important?
i. To increase ads
ii. To maintain respect and safety online

iii. To download faster
iv. To bypass rules

Answer: ii.
Explanation: Netiquette = safe, respectful online community.


Q50. Which is an example of good online behavior?
i. Cyberbullying
ii. Reporting abuse

iii. Using hate speech
iv. Pirating content

Answer: ii.
Explanation: Reporting harmful acts supports digital society.