Matric Notes Computer 9th TCA Notes

Matric Notes Computer 9th

Matric Computer 9th, Book Exercise Questions, Long Questions, Multiple Choice Questions (MCQs)

Chapter Name MCQs Ex SQs
Ch 1 Problem Solving MCQs
Ch 2 Binary System MCQs Ex SQs
Ch 3 Networks MCQs Ex SQs
Ch 4 Data and Privacy MCQs Ex SQs
Ch 5 Designing Website MCQs Ex SQs

All MCQs of Computer 9th are given below. If you want to review questions you can do so by clicking the above links.

Category: Computer 9th Ex

Computer 9th Ex Ch 1-5

Computer 9th Ch 1 Problem Solving Ex MCQs

TCA Notes Computer 9th Ch 1 Problem Solving Ex MCQs

You can prepare these MCQs below before attempting.

1 / 10

Which solutions are not reached through proper algorithms or work planning?

2 / 10

Which is a graphical representation of an algorithm?

3 / 10

Which symbol in the flowchart is used to either start or end the flowchart?

4 / 10

Which means to test if the required solution is there?

5 / 10

In a error, the solution is working but not giving required results.

6 / 10

Before problem solving, we need to first a problem.

7 / 10

An algorithm produces a defined set of :

8 / 10

A flowchart utilizes various to map out the order of steps.

9 / 10

In flow charts ♢ symbol is used to show a:

10 / 10

Which is used to test the solutions?

Your score is

The average score is 0%

0%

Computer 9th Ch 2 Binary System Ex MCQs

TCA Notes Computer 9th Ch 2 Binary System Ex MCQs

You can prepare these MCQs below before attempting.

1 / 12

Expression (A + B) . (A + C) is equal to:

2 / 12

The order of application of two separate terms is not important in:

3 / 12

"Is it cold outside" is:

4 / 12

Number "17" is equal to in binary system.

5 / 12

1 Petabyte is equal to:

  1. (1,024)4 bytes
  2. (1,024)6 bytes
  3. (1,024)5 bytes
  4. (1,024)7 bytes

6 / 12

Hexadecimal system has total numbers.

7 / 12

Temporary memory ___ is and permanent memory is ____:

8 / 12

Data to a processor is provided through:

9 / 12

At least byte is required to store any piece of information in a computer's memory.

10 / 12

Which is used to assemble more than one propositions into one proposition?

11 / 12

In primary and secondary storages, data is stored in the form of:

12 / 12

According to law there is no change in results if priority of expressions is changed.

Your score is

The average score is 0%

0%

Computer 9th Ch 3 Networks Ex MCQs

TCA Notes Computer 9th Ch 3 Networks Ex MCQs

You can prepare these MCQs below before attempting.

1 / 12

The IPv4 address is made up of binary bits.

2 / 12

Routing is process of taking data from one device and sending it to another device in different.

3 / 12

DHCP stands for:

4 / 12

Communications protocols cover.

5 / 12

The receiver must be capable of accepting the:

6 / 12

A is a computer device that accesses a service made available by a server.

7 / 12

Which allow users to users to communicate using e-mail, newsgroups, etc?

8 / 12

Web browser and web servers function together as a system.

9 / 12

A protocol defines ___ and ___for communication between a sender and a receiver.

10 / 12

Routers connect multiple together.

11 / 12

Every data packet has

12 / 12

IP addressing must be understood as path of the for conversations over the Internet.

Your score is

The average score is 0%

0%

Computer 9th Ch 4 Data and Privacy Ex MCQs

TCA Notes Computer 9th Ch 4 Data and Privacy Ex MCQs

You can prepare these MCQs below before attempting.

1 / 10

Which of the following doesn't includes the types of software piracy?

2 / 10

Which of the following is not a cybercrime?

3 / 10

Which of the following is not the characteristics of phishing emails?

4 / 10

Which of the following is not characteristics of phishing website?

5 / 10

Which of the following is not a characteristic of good password?

6 / 10

Making illegal copies of software is called:

7 / 10

Which is a general term for any type of information processing that can be represented mathematically?

8 / 10

Which is the process of encoding data?

9 / 10

When a key has less number of character than the text to the encrypt, then repeating letters of the key is called:

10 / 10

Which is a cyber attack to make machine or network resource unavailable for a user?

Your score is

The average score is 0%

0%

Computer 9th Ch 5 Designing Website Ex MCQs

TCA Notes Computer 9th Ch 5 Designing Website Ex MCQs

You can prepare these MCQs below before attempting.

1 / 19

An individual list item can contain another entire list called:

2 / 19

HTML is not a language.

3 / 19

Webpages can be created and modified by using:

4 / 19

An HTML element usually consists of a tags.

5 / 19

The elements is a container for metadata(data about data):

6 / 19

To save the HTML page, you can use as file extension.

7 / 19

There are __ number of heading in HTML document.

8 / 19

tag used to display data in tabular form.

9 / 19

A hyperlink can be applied to.

10 / 19

In "body" tag is used to make a a picture of background image of a webpage?

11 / 19

Which make a cell span more than one row?

12 / 19

By clicking on special text called which bring you to the next page.

13 / 19

The  ___ attribute specifies the foreground text colour of the webpage.

14 / 19

In HTML, images are defined with the tag.

15 / 19

Which refers to the way tags are used to define the page layout and elements within the page?

16 / 19

HTML is a computer language which is used to create:

17 / 19

Which tag makes the enclosed text bold?

18 / 19

Tags and text that are not directly displayed on the page and written in ___ section.

19 / 19

Which tag is used for inserting a line break.

Your score is

The average score is 0%

0%

Category: Computer 9th Additional

Computer 9th Additional Ch 1-5

Computer 9th Ch 1 Problem Solving Additional MCQs

TCA Notes Computer 9th Ch 1 Problem Solving Additional MCQs

You can prepare these MCQs below before attempting.

1 / 11

Which of the following test if the solution is according to given problem?

2 / 11

Technique used to test algorithms.

3 / 11

Divide and conquer is used to solve:

4 / 11

Which technique has drawn a pictorial representation of the solution?

5 / 11

Steps to solve a particular problem.

6 / 11

Test data that comply with the input requirement of the algorithm:

7 / 11

Test data that does not comply with the input requirements of the algorithm.

8 / 11

A solution tested on extreme values.

9 / 11

To check how the system reacts on entering data in inappropriate format.

10 / 11

To investigate that the solution still works if less number of inputs are given than expected:

11 / 11

A well-defined problem is the one that does not contain:

Your score is

The average score is 0%

0%

Computer 9th Ch 2 Binary System Additional MCQs

TCA Notes Computer 9th Ch 2 Binary System Additional MCQs

You can prepare these MCQs below before attempting.

1 / 22

Which number system consists of 0s and 1s.

2 / 22

Which language is understood by the computer?

3 / 22

Which number system has base 10 as it Uses ten digits from 0 to 9.

4 / 22

Which number system has base 2?

5 / 22

Which number system has base 16?

6 / 22

Every proposition takes one of two values true or false, and these values are called:

7 / 22

A device which holds the data as long as it has power supply connected to it is called:

8 / 22

A device which can hold data even if it is not connected to any power source is called:

9 / 22

In Boolean algebra 'AND' Operation is denoted by:

10 / 22

In Boolean algebra "OR' operation is denoted by:

11 / 22

Which table is used to show whether the Statement is true or false?

12 / 22

Decimal value of 'A':

13 / 22

Example of volatile memory:

14 / 22

A 1S a sentence that can either be true or false.

15 / 22

Hard drives,. flash Floppy disk drives and memory cards are example of memory:

16 / 22

Digital computers store data in:

17 / 22

ASCII stands for:

18 / 22

Any computing hardware that is used for storing, porting and extracting data, is called a:

19 / 22

The smallest amount of data to be stored in computer's memory is a 0 or 1 is called:

20 / 22

Group of eight bits, enough space to store single ASCII character called:

21 / 22

1KB = ___ bytes.

22 / 22

1 MB = ___ bytes.

  1. (1.024)5
  2. (1,024)2
  3. 3000
  4. 4000

Your score is

The average score is 0%

0%

Computer 9th Ch 3 Networks Additional MCQs

TCA Notes Computer 9th Ch 3 Networks Additional MCQs

You can prepare these MCQs below before attempting.

1 / 36

____ is used by routers to determine the path to the destination network.

2 / 36

Email stands for:

3 / 36

Rules are defined for the communication between sender and receiver called:

4 / 36

___ is the physical path connects sender and receiver.

5 / 36

A ___ is a networking device that forwards data packets from one network to another.

6 / 36

Physical arrangements of devices and connecting lines called:

7 / 36

Which is used to transfer file over a network?

8 / 36

A ___ is a physical computer dedicated to run services to serve the needs of its clients.

9 / 36

A ___ connection is a direct link only between two devices.

10 / 36

Remote control and a TV is an example of connection.

11 / 36

In ___ connection, there between a sender and multiple receivers.

12 / 36

In a Wi-Fi based network a single link shared among ___ devices.

13 / 36

Number of basic topologies?

14 / 36

Which topology connects all devices of the network through a single common cable (backbone) having exactly two end points?

15 / 36

In which topology connect all devices using point to point connections via cables to a central point is known as a Hub or Switch.

16 / 36

Which topology connects a computer with exactly two other computers forming a ring of computers:

17 / 36

IPv6 can allow up to address.

  1. 2128
  2. 2127
  3. 2126
  4. 2125

18 / 36

In which topology connects all devices with each other through a direct link:

19 / 36

How many layers in TCP/IP model?

20 / 36

In a data communication system, a message is sent in the form of:

21 / 36

Which contains information about the sender and the receiver?

22 / 36

___ is also called header of a message?

23 / 36

Formal agreement between two parties?

24 / 36

Suit of protocols that provides end-to-end connectivity between devices.

25 / 36

Which layer establishes connection between a client and a server?

26 / 36

Data received from the layer is hidden inside the header at each layer this is called:

27 / 36

Which is a protocol used by Word Wide Web (WWW) to transfer web pages between a client and a web server?

28 / 36

A web server is also called an:

29 / 36

Which Protocol is a standard protocol to transmit emails?

30 / 36

Servers serve a request sent by a client. This request is called:

31 / 36

How many standards of IP addressing?

32 / 36

When the Internet Protocol was originally designed. the standard was known as Internet Protocol Version?

33 / 36

IPv4 is divided in groups by

34 / 36

In IPv4 each group can contain a decimal value from:

35 / 36

IPv6 consists of:

36 / 36

In IPv6, there are groups separated by:

Your score is

The average score is 0%

0%

Computer 9th Ch 4 Data and Privacy Additional MCQs

TCA Notes Computer 9th Ch 4 Data and Privacy Additional MCQs

You can prepare these MCQs below before attempting.

1 / 20

___ is called borrowing and installing a copy of a software application from colleague?

2 / 20

__ is installing more copies of the software than you have license for?

3 / 20

__ is installing and selling unauthorized copies of software refurbished or new computers?

4 / 20

Which is called duplicating and selling copyrighted programs?

5 / 20

Using computer for the purpose of some unauthorized activities is called:

6 / 20

Which can protect an idea so that it won't be misuse and the owner will attain its full rights?

7 / 20

Encoding means conversion of the data to an unreadable format which is called:

8 / 20

Which are used for authentication to enter a system?

9 / 20

A crime in which computer network or devices are used is called a:

10 / 20

Illegally accessing someone else's computer is called:

11 / 20

Which is the illegal copying, distribution, or usage of software?

12 / 20

Some malicious user disguises himself as our friend and tries to get some confidential information:

13 / 20

A ___ is a computer program written with negative intentions.

14 / 20

Which terms relates to correctness of data?

15 / 20

By using __ companies are able to track purchases and gather personal data:

16 / 20

Which is the process of encoding data in such a way that only authorized person can read it?

17 / 20

A computer expert who can steal data when it moves from one location to other, is called:

18 / 20

In which methods of encryption in which the characters of original text are replaced by some other characters?

19 / 20

In which method, we replace each alphabet in the plaintext. by another alphabet:

20 / 20

In which method, substitution key that is combined with the plaintext to generate the ciphertext:

Your score is

The average score is 0%

0%

Computer 9th Ch 5 Designing Website Additional MCQs

TCA Notes Computer 9th Ch 5 Designing Website Additional MCQs

You can prepare these MCQs below before attempting.

1 / 12

A website consist of:

2 / 12

The visible part of the HTML document is between:

3 / 12

To make a cell span more than one columns,. attribute is used.

4 / 12

To move from one part of the same page to the other page we use.

5 / 12

___ tells the browser how the contents are structured inside a webpage.

6 / 12

Some tags do not have closing tags and they are called:

7 / 12

Which are the properties associated with tags.

8 / 12

An HTML document primarily consists of __ sections.

9 / 12

Which of the following tags is used to insert space?

10 / 12

Which tags will make the text underline that is within the tags?

11 / 12

Which tags will make the text italic that is within the tags?

12 / 12

The <a></a> tag is known as:

Your score is

The average score is 0%

0%

Matric Notes Computer 9th TCA Notes