Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
74 views4 pages

Computer 9th (Chapter 6)

The document outlines an examination format for a Computer Science course, including sections for multiple-choice questions, short answer questions, and detailed essay questions. It emphasizes the importance of following instructions, such as using a specific answer sheet and avoiding lead pencils. The content covers various topics related to computing, social networking, and ethical concerns in technology.

Uploaded by

Mahmood Syed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views4 pages

Computer 9th (Chapter 6)

The document outlines an examination format for a Computer Science course, including sections for multiple-choice questions, short answer questions, and detailed essay questions. It emphasizes the importance of following instructions, such as using a specific answer sheet and avoiding lead pencils. The content covers various topics related to computing, social networking, and ethical concerns in technology.

Uploaded by

Mahmood Syed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Pedagogia Evening Coaching

Classes Student’s Name:

Roll No

COMPUTER SCIENCE SSC-I ⓪ ⓪ ⓪ ⓪ ⓪ ⓪ ⓪

SECTION – A (Marks 10) ① ① ① ① ① ① ①

TIME ALLOWED: ② ② ② ② ② ② ②
③ ③ ③ ③ ③ ③ ③
Section-A is compulsory. All parts of this section are to be answered on this page and ④ ④ ④ ④ ④ ④ ④
handed over to the Centre superintendent. Deleting/overwriting is not allowed. Do not
use
‫ہے۔‬ ‫ہیں‬lead pencil.
‫اجازت ن‬ ‫حّصہ اّو ل الزمی ہے۔ اس کے جوابات اسی صفحہ پر دے کر ناظم مرکز کے حوالے کریں۔ کاٹ کر دوبارہ لکھنے کی‬ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤
‫ کریکولم کے مطابق درست دائرہ کو ُپر کریں۔‬،‫لیڈ پینسل کا استعمال ممنوع ہے۔ ہر سوال کے سامنے دئے گئے‬ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥
⑦ ⑦ ⑦ ⑦ ⑦ ⑦ ⑦
⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧
Answer Sheet no: _______ Sign. of Invigilator: _______ ⑨ ⑨ ⑨ ⑨ ⑨ ⑨ ⑨
Fill the relevant bubble against each question
___________ .Candidate Sign
:according to curriculum
QUESTIONS A B C D A B C D
Increased Improved
Enhanced Privacy
accessibilit healthcar
What is an ethical concern cybersecurit breaches
1 y to e through Ⓐ Ⓑ Ⓒ Ⓓ
related to computing? y and data
informatio measures telemedicin
misuse
n e
Improved
Reduced telemedicin
Which of the following is a access of Increased e and Lower
2 personal benefit of medical medical health healthcar Ⓐ Ⓑ Ⓒ Ⓓ
computing in healthcare? informatio errors care e costs
n accessibilit
y
Downloadin Accepting
Using g files friend
Sharing
strong, from requests
personal
unique unknown from
Safe use of digital platforms informatio
3 passwords sources strangers Ⓐ Ⓑ Ⓒ Ⓓ
includes: n with
for each without without
anyone
online scanning verifying
online
account for their
malware identity
Facilitatin Fostering
Promoting
g offline Enhancing
Which of the following is a social
cyberbullyin communit critical
4 potential harmful effect of awareness Ⓐ Ⓑ Ⓒ Ⓓ
and
g y thinking
social networking? and
harassme engageme skills
activism
nt nt
5 Which of the following is an Using Respectin Modifying Updating Ⓐ Ⓑ Ⓒ Ⓓ
example of inappropriate licensed g software software software
software use? software copyrights code regularly
for and without to
personal licenses permissio improve
projects n from the its
developer performanc
PEDAGOGIA EDUCATION SYSTEM
SESSION (R&T NOVEMBER 2024)
Pedagogia Evening Coaching
Classes
e
Increased
connectivit Reduced
What is one potential Improved
Enhanced y and exposure
offline
6 beneficial effect of social personal networkin to diverse Ⓐ Ⓑ Ⓒ Ⓓ
communicati
networking platforms? privacy g viewpoint
on skills
opportuniti s
es
Treating
computer Sharing
Using Ignoring
What does responsible use equipmen passwords
7 outdated software Ⓐ Ⓑ Ⓒ Ⓓ
of hardware entail? t with care with
software updates
and friends
respect
Regularly Sharing Disabling
Downloadi
updating software antivirus
Which of the following is an ng and
software licenses software
8 example of appropriate use using Ⓐ Ⓑ Ⓒ Ⓓ
to the with for faster
of software? cracked
latest multiple performanc
software
version users e
It
It
automates
primarily
tasks,
benefits
It It has no leading to
large
How does computing job
increases impact on corporation
9 contribute to economic displaceme Ⓐ Ⓑ Ⓒ Ⓓ
manual job s,
practices? nt but also
labor jobs markets neglecting
creating
small
new job
businesse
opportuniti
s
es
By
providing
By
a platform By
In what way can social decreasin By limiting
for increasing
networking platforms g the customer
1 marketing operation
positively impact reach and engageme Ⓐ Ⓑ Ⓒ Ⓓ
0 , customer al costs
businesses and visibility of nt and
engageme and
entrepreneurs? businesse feedback
nt and inefficiencies
s
networkin
g

PEDAGOGIA EDUCATION SYSTEM


SESSION (R&T NOVEMBER 2024)
Pedagogia Evening Coaching
Classes
COMPUTER SCIENCE SSC-I

TIME ALLOWED: Total Marks Section B and


C: 20
Note: The questions of Section B and C are to be answered on the separately provided answer book. Use
supplementary answer sheet i.e. Sheet – B if required. Write your answers neatly and legibly.
SECTION- B (Marks 10)
Q.2 Attempt the following questions. (05 x 02 =
10)
Sketch the positive impacts of
i. O Summarize some of the adverse
social networking in today’s 02 02
R effects of social networking.
society.
Define the following terms with 01
Criticize about the role
ii. 02 O example: +
computing plays in shaping
R ☞ Patents
educational practices. 01
☞ Trademarks

iii. Examine the computing 02 O Write few benefits of computing 02


influence on personal privacy. R innovation.

Interpret the dangers associated How do you stay safe while


iv. 02 O 02
with the spread of fake news conducting data searches
R
online. online?
Briefly describe the following 01 Briefly describe the following 01
concept related to malicious concept related to malicious
v. + O +
software with example: software with example:
R
☞ Software Piracy 01 ☞ Pharming 01
☞ Cookies ☞ Phishing

SECTION- C (Marks 10)


Note: Attempt the following questions in detail. (02 x 05 =
10)
Describe the following
Describe the following computer
computer related laws:
related laws:
☞ General Data Protection
☞ Digital Millennium Copyright
Q. 05 O Regulation (GDPR) 05
3 Act (DMCA) R ☞ Electronic Communication
☞ Cybersecurity Law
Privacy Act (ECPA)
☞ Computer Fraud and Abuse
Act (CFAA) ☞ Children’s Online Privacy
protection Act (COPPA)
Identify the precautions that
Q. need to be taken to ensure the 05 O Describe the appropriate and 05
4 physical safety of computer R responsible use of software?
hardware.

PEDAGOGIA EDUCATION SYSTEM


SESSION (R&T NOVEMBER 2024)
Pedagogia Evening Coaching
Classes

PEDAGOGIA EDUCATION SYSTEM


SESSION (R&T NOVEMBER 2024)

You might also like