You are on page 1of 5

Marking Scheme

Midterm Examination 2018-19

Class………IX………… Subject……IT…………………
Time…………2hrs…………… M. Marks………50…………
No. Division Marks
of Marks (Question
1. A) Studies 1
2 C) 1024 GB 1
3 A)Many 1
4 A) world wide web 1
5 C) Folder 1
6 A)Local Area Network 1
7 A) 5.45 1
8 C)Similar to pen 1
10 D) 50-80cm 1
11 A) A B)the 1x2 2
12 GUI-: Graphical User Interface 1x2 2
URL-: Uniform Resource Locator
13 a. Half past two 1x2 2
b. Quarter past five
14 Input Device -:
1) Mouse
2) Keyboard 1/2x2
3) Microphone
4) Scanner 2
Note -: ANY two
Output device-:
1) Speaker 1/2x2
2) Monitor
3) Printer
Note-: Any two
15 The most important software on the computer is the 1x2 2
operating system, which controls and manages the hardware
connected to your computer. The operating system provides an
interface that helps you to interact with the computer
16 a) Rapid Typing Tutor 1x2 2
b) Typing Trainer
c) Type Faster
Note: Any two
17 Keyboard: A set of keys that resembles a keyboard on a 1
typewriter. You use the keyboard to type text such as letters
or numbers into the computer.

Over view of keys-:

1) Keys labeled from F1 to F12 are function keys. You use them
to perform specific functions.

2) Keys, such as Control (CTRL), SHIFT,

TAB, are special keys.
3) There are keys which are used for entering letters and numbers.

4) Keys such as the arrow keys, HOME, END, PAGE UP, and
Navigation keys.
18. The Internet connection is provided by an Internet service 1
provider (ISP).

3)Jio reliance
NOTE- Any Two

1X2 3

19. Computer privacy means that your data, such as personal files and 1
e-mail messages, is not accessible by anyone without your
permission. Computer privacy deals with the measures that
you can take to restrict access to your data.
4 Measures to protect -: 1/2x4
1) Implement user identification
2) Set username and password
3) Keep password secure
4) Lock computer
5) Install and update protective software
Note – any four
20 To connect to the Internet, Seema need -: 3
a) computing device such as mobile, computer 1x3
handheld device
b) a connection device, such as modem

c) Internet Service Provider (ISP). Such as BSNL, MTNL,


21 Touch typing can be learned by performing special exercises: 1x3 3

1. Stage one of the process begins with learning the home
row of the keyboard. This is followed by learning the
lower and upper rows, the number row, upper-case letters
and special symbols.
2. Stage two involves memorizing frequently used syllables
and typing words containing these syllables.
3. Stage three involves typing actual text to perfect the skills
22 1. Green letters denote right inputs.
2. Yellow letter stand for right inputs exceeding the 1x3 3
acceptable timeframe.
3. Red letters denote wrong inputs within the acceptable
4. Orange letters denote wrong inputs that also exceed the
acceptable timeframe.
Note- Any three
23 2
Computer system-
1. Input: This is the process of entering data and programs in to
the computer system. You should know that computer is an
electronic machine like any other machine which takes as inputs
raw data and performs some processing giving out processed data.
Therefore, the input unit takes data from us to the computer in an
organized manner for processing. 3 5

2. Storage: The process of saving data and instructions

permanently is known as storage. Data has to be fed into the
system before the actual processing starts. It is because the
processing speed of Central Processing Unit is so fast that the data
has to be provided to CPU with the same speed. Therefore the
data is first stored in the storage unit for faster access and
processing. This storage unit or the primary storage of the
computer system is designed to do the above functionality. It
provides space for storing data and instructions.
The storage unit performs the following major functions:
• All data and instructions are stored here before and after
• Intermediate results of processing are also stored here.
3. Processing: The task of performing operations like arithmetic
and logical operations is called processing. The Central
Processing Unit (CPU) takes data and instructions from the
storage unit and makes all sorts of calculations based on the
instructions given and the type of data provided. It is then sent
back to the storage unit.
4. Output: This is the process of producing results from the data
for getting useful information.. Similarly the output produced by
the computer after processing must also be kept somewhere inside
the computer before being given to you in human readable form.
Again the output is also stored inside the computer for further
5. Control: The manner how instructions are executed and the
above operations are performed. Controlling of all operations like
input, processing and output are performed by control unit. It
takes care of step by step processing of all operations inside the
Arithmetic Logical Unit (ALU) Logical Unit After you enter
data through the input device it is stored in the primary storage
unit. The actual processing of the data and instruction are
performed by Arithmetic Logical Unit. The major operations
performed by the ALU are addition, subtraction, multiplication,
division, logic and comparison. Data is transferred to ALU from
storage unit when required. After processing the output is returned
back to storage unit for further processing or getting stored.

23 The World Wide web or Web is a way of accessing and sharing 2

information over the Internet by using Web browsers. It is an
information-sharing model that is built on top of the Internet.

Three components of world wide web -:

1) Web browser-: A Web browser is a software program that
enables you to view and interact with various resources on the
Web. 1

2)web page -: A Web page is a formatted text document on the 1

Web that a Web browser can display. Most Web pages on the
Internet allow you to quickly move to another Web page. 1

3)Web site-: A Web site is one or more Web pages that reside
on a single server. This server is known as a Web server 5

24 5

Terms -:Any Five

A) Software -: Software is a collection of instructions and related

data that tells a computer what to do and how to do.

B) Worm-: Worms are viruses that replicate themselves once they

attack a computer, making it difficult to remove them. A
common worm, known as Trojan horse

C) Firewall-: A firewall enables you to filter the Internet traffic

before it reaches your computer or private network.

D)E-Commerce -: E-commerce refers to the business transactions

made over the Internet, such as
buying and selling items online.

E) NIC - Network interface card (NIC): It allows a computer

to be connected to other computers so that information can
be exchanged between them.:

F)Cookies -: Cookies are small files that are created on

your computer by previously visited Web sites to identify
and track your preferences. Their purpose is to provide a more
personal experience while visiting a Web site.