Showing:
Class 9 (669 questions)
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which of the following is a key difference between HTTP and HTTPS?
A. HTTPS is used only for small files.
B. HTTPS uses encryption (SSL/TLS) for secure data transmission.
C. HTTP is faster than HTTPS.
D. HTTPS does not use TCP/IP.
Cyber
Advanced Networking Concepts
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which network topology requires a central controller (hub or switch) to which all nodes are connected?
A. Bus Topology
B. Ring Topology
C. Star Topology
D. Mesh Topology
Cyber
Advanced Networking Concepts
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which function of the operating system is responsible for allocating space to programs and data?
A. File Management
B. Process Management
C. Memory Management
D. Device Management
Cyber
Operating System Functions
thumb_up 0
people 1 answers
check_circle 100%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which security function does the operating system provide to ensure only authorized users access the system?
A. Job Accounting.
B. User Authentication (Passwords/Biometrics).
C. Error-Detecting Aids.
D. Memory Paging.
Cyber
Operating System Functions
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which operating system type is designed to guarantee a response to events within a specific time constraint?
A. Real-time Operating System (RTOS).
B. Batch Operating System.
C. Mobile Operating System.
D. Network Operating System.
Cyber
Operating System Functions
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
What is the purpose of "Spooling" in an operating system?
A. To increase RAM capacity.
B. To manage data flow to devices that cannot handle interleaved data streams, like printers.
C. To directly execute user code.
D. To permanently delete files.
Cyber
Operating System Functions
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which function of the OS involves allocating and deallocating memory space to programs, ensuring efficient memory usage?
A. Device Management.
B. Memory Management.
C. Security.
D. Job Accounting.
Cyber
Operating System Functions
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which component of an operating system is responsible for managing the execution of processes, ensuring efficient CPU utilization?
A. File System
B. Processor Management/Scheduling
C. User Interface
D. Device Drivers
Cyber
Operating System Functions
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which of the following is NOT a core function of an operating system?
A. Process Management.
B. Memory Management.
C. Compiling Code.
D. File System Management.
Cyber
Operating System Functions
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
What is the primary role of an operating system?
A. To compile source code into executable files.
B. To manage hardware resources and provide services to applications.
C. To design user interfaces only.
D. To edit documents and create presentations.
Cyber
Operating System Functions
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
What is the "compression ratio" in data compression?
A. The sum of original and compressed file sizes.
B. The ratio of the compressed file size to the original file size.
C. The ratio of the original file size to the compressed file size.
D. The speed of compression.
Cyber
Data Compression
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which of the following is INCORRECT regarding Data Compression?
A. Lossy compression gives a higher compression ratio than lossless.
B. Lossless compression is reversible.
C. Lossy compression is ideal for text documents.
D. ZIP is a commonly used lossless format.
Cyber
Data Compression
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
A text file containing a repeated sequence of characters is best compressed using which technique?
A. Run-Length Encoding (RLE)
B. JPEG
C. MP3
D. Transform Coding
Cyber
Data Compression
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which type of compression allows the exact original data to be reconstructed upon decompression?
A. Lossy Compression
B. Lossless Compression
C. JPEG Compression
D. MP3 Compression
Cyber
Data Compression
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
What is the primary purpose of data compression?
A. To increase the resolution of an image.
B. To reduce the file size for saving storage space or speeding up transmission.
C. To encrypt data for security.
D. To delete files permanently.
Cyber
Data Compression
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
If a computer uses 16-bit Unicode for characters, how many different characters can it represent?
A. 16
B. 256
C. 65,536
D. 1024
Cyber
Data Representation
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
13. Which of the following lists the units of storage in ascending order?
A. Bit, Byte, Kilobyte, Megabyte, Gigabyte, Terabyte
B. Byte, Bit, Megabyte, Kilobyte, Gigabyte, Terabyte
C. Bit, Byte, Megabyte, Kilobyte, Terabyte, Gigabyte
D. Terabyte, Gigabyte, Megabyte, Kilobyte, Byte, Bit
Cyber
Data Representation
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
What does the "WORM" acronym stand for in storage devices?
A. Write Once Read Many
B. Write Often Read Many
C. Write Once Read Memory
D. Working Only Real Memory
Cyber
Data Representation
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which character encoding standard is used to represent characters from almost all languages in the world?
A. ASCII
B. Unicode
C. BCD
D. EBCDIC
Cyber
Data Representation
thumb_up 0
people 0 answers
check_circle 0%
-
by GIANSH GUPTA KHUNDKER
· Class 9
Which of the following number systems is used directly by computer hardware?
A. Decimal
B. Hexadecimal
C. Binary
D. Octal
Cyber
Data Representation
thumb_up 0
people 0 answers
check_circle 0%