Class 9 Extra Question & Answer Computer Science Chapter 5

Short Answer Questions

Q. Name two areas where electronic technologies are commonly used.

Ans. Electronic technologies are used in business sector and in government sector.

Q. Give one example of day-to-day use of electronic technologies.

Ans. An example is making notes or recording daily transactions electronically.

Q. Give two examples of how mobile technology has changed.

Ans. Mobile technology has become smaller in size and faster in performance.

Q. Mention any two sectors where IT has become life changing.

Ans. IT has become life changing in medicine and banking sector.

Q. What big impact has the Internet made in global communication?

Ans. The Internet has opened the door for people to share views, exchange information, and connect globally.

Q. What are two online facilities provided by the Internet?

Ans. Examples are online shopping and online banking.

Q. What is plagiarism?

Ans. Plagiarism is the act of stealing someone’s ideas or works and passing them off as your own without giving proper credit.

Q. Give two examples of works that can be plagiarized.

Ans. Text and media (like images or videos) can be plagiarized.

Q. Can plagiarism happen unintentionally?

Ans. Yes, plagiarism can happen unintentionally, for example, by copying from a source without giving acknowledgement.

Q. Is plagiarism always considered a crime?

Ans. No, plagiarism is not always a crime, but it is a violation of academic integrity and journalistic ethics.

Q. How many common types of plagiarism are there?

Ans. There are four common types of plagiarism.

Q. What is direct plagiarism?

Ans. Direct plagiarism happens when someone copies complete sentences or paragraphs written by another person without quotation marks or giving credit.

Q. What is mosaic plagiarism?

Ans. Mosaic plagiarism occurs when a person copies phrases or replaces words with synonyms while keeping the same structure and meaning of the text.

Q. What is self plagiarism?

Ans. Self plagiarism happens when a student reuses parts of their own previous work (like term papers or thesis) without permission.

Q. Give one example of accidental plagiarism.

Ans. Forgetting to cite a source or misquoting a reference is an example of accidental plagiarism.

Q. Why is it important to understand different types of plagiarism?

Ans. It is important to understand the types of plagiarism because each one is a form of dishonesty and can have serious consequences in academics and professional life. Knowing them helps students and researchers avoid mistakes, give proper credit, and maintain academic integrity.

Q. Why is plagiarism considered an ethical issue?

Ans. Because plagiarism is a form of theft where a writer uses someone else’s work or ideas to gain benefit without giving credit.

Q. Mention two simple ways to avoid plagiarism.

Ans. (i) Cite your source, and (ii) Use quotation marks when inserting another person’s words.

Q. What is the correct way of paraphrasing?

Ans. Paraphrasing means rewriting a source’s ideas into your own words without changing the meaning.

Q. What is intellectual property?

Ans. Intellectual property refers to creative works or inventions such as literary works, images, inventions, and symbols that are legally protected.

Q. Why should plagiarism be avoided? How can it be prevented?

Ans. Plagiarism should be avoided because it is an ethical issue and a form of dishonesty. A person who plagiarizes is stealing someone else’s work, whether for grades, money, or recognition. To avoid plagiarism:

Q. Explain the concept of Intellectual Property Rights (IPR).

Ans. Intellectual Property Rights protect the creations of the human mind. Just as physical property is protected by law, creative works such as inventions, literary works, images, and symbols are also legally protected. With the growth of the Internet, IPR laws have become even more important. These rights allow the owner to decide how much information should be shared or distributed.

Q. What are the types of laws that protect intellectual property? Explain.

Ans. There are three main laws:

1. Copyrights: Protect literary and artistic works.

2. Trademarks: Protect brand names, logos, and symbols.

3. Patents: Protect inventions and discoveries.

   These laws ensure that the creator remains the real owner and has the right to control and protect their work.

Q. What does the © symbol represent?

Ans. The © symbol represents copyright, which shows that the material is the sole property of the owner and cannot be used without permission.

Q. What is a trademark?

Ans. A trademark is a distinctive sign, such as words, letters, or numbers, that identifies goods or services of a company or individual.

Q. What is a patent?

Ans. A patent gives the inventor the exclusive right to use, sell, or prevent others from using their invention.

Q. What does integrity of information mean?

Ans. Integrity means protecting data from unauthorized changes so that it remains reliable and correct.

Q. What is the most common way of protecting a network resource?

Ans. By assigning a unique name and a corresponding password.

Q. What is a firewall?

Ans. A firewall is a network security system that filters and regulates network traffic between a trusted internal network and the internet.

Q. What is an antivirus?

Ans. An antivirus is a tool used to detect and remove malicious software such as viruses, worms, Trojan horses, adware, spyware, and keyloggers.

Q. What is the first line of defense against unauthorized access?

Ans. Passwords are the first line of defense against unauthorized access.

Q. Write two guidelines for creating strong passwords.

Ans. (i) Use at least 8 characters, (ii) Use a mix of uppercase and lowercase letters, numbers, and special characters.

Q. What is cybercrime?

Ans. Cybercrime is a criminal activity that uses or targets a computer, computer network, or device. It can be done by hackers or cybercriminals for illegal purposes like stealing information or money.

Q. Who are hackers and crackers?

Ans.  A Hacker is someone who breaks into computer systems to gain unauthorized access. Hacking is illegal, even if no harm is done.

 A Cracker also breaks into systems, but with the intention of stealing passwords, files, or programs for personal gain.

Q. Mention any three ways to protect yourself against cybercrime.

Ans.

1. Keep software and operating systems updated.

2. Use strong passwords.

3. Never open attachments in spam emails.

Q. What is software piracy?

Ans. Software piracy is the illegal copying, distributing, or selling of software that is protected by law. It is against copyright rules.

Q. Who is called a software pirate?

Ans. A person who participates in software piracy, like copying or selling unauthorized software, is called a software pirate.

Q. Write the names of four types of software piracy.

Ans.

1. Softlifting

2. Hard Disk Loading

3. Counterfeiting

4. Renting

Q. What is softlifting? Give an example.

Ans. Softlifting happens when one licensed copy of software is shared with unauthorized users. For example, buying one copy of Microsoft Office and installing it on many computers.

Q. What is counterfeiting in software piracy?

Ans. Counterfeiting means making fake copies of software and selling them by designing boxes, CDs, and manuals to look like original products.

Q. What are computer ethics?

Ans. Computer ethics are rules and guidelines that help people use computers properly, safely, and respectfully. They ensure privacy, security, and honesty in the use of computers.

Long Answer Questions

Q. Why are computer ethics important?

Ans. Computer ethics are important because they:

 Protect our privacy.

 Maintain our security.

 Teach us to respect others’ work.

  This helps us live safely and peacefully in the digital world.

 

Q. Explain the concept of copyright with examples.

Ans. Copyright is the legal right of the owner over their creative works such as books, magazines, web pages, music, or software. The © symbol indicates copyright and usually appears with “All Rights Reserved.” It is unlawful and unethical to copy or use these materials without the permission of the owner. For example, copying a song or book without permission is a violation of copyright.

 

Q. Differentiate between trademark and patent.

Ans.

 Trademark: A sign, word, or logo that identifies a product or service, ensuring only the owner has the right to use it. Example: Nike’s “swoosh” logo.

 Patent: A legal right granted to an inventor to exclusively make, sell, or prevent others from using their invention. Example: The patent for the light bulb by Thomas Edison.

  Both protect intellectual property, but trademarks focus on branding, while patents protect inventions.

 

Q. What is network security and why is it necessary?

Ans. Network security protects networks from unauthorized access and threats. It is crucial for government, business, and personal communications. Preventive measures such as usernames and passwords, encryption, and monitoring protect sensitive transactions. Without network security, hackers can steal data or disrupt services.

 

Q. Explain the role of firewalls in network security.

Ans. Firewalls act as a barrier between a trusted internal network and the untrusted internet. They monitor all messages entering or leaving a network, allowing only safe traffic. Firewalls may be softwarebased (on personal computers) or hardwarebased (in routers). They help prevent unauthorized access, data theft, and cyberattacks, making them essential for private networks and intranets.

 

Q. Explain the role of antivirus software in computer security.

 

Ans. Antivirus software is designed to detect and remove malicious software. Originally it was made to fight computer viruses, but modern antivirus protects against a wide range of threats including worms, Trojan horses, spyware, adware, and key loggers. By scanning files and monitoring system activities, antivirus prevents damage, data theft, and unauthorized access to the computer.

Looking for complete and easy-to-understand Class 9 Computer Science SEBA notes? You’re in the right place! This page offers all chapter-wise notes based on the latest SEBA 2025 syllabus. Whether you’re preparing for exams, doing classwork, or revising before a test, our notes are perfect for you. The content includes definitions, short and long answer questions, solved examples, diagrams, and key concepts explained in simple English. Topics covered include Introduction to Computers, Generations of Computers, Computer System Components, Hardware and Software, Memory Devices, Input and Output Devices, Computer Languages, Operating System, Internet Basics, and Programming Fundamentals. All notes are designed to help students understand concepts clearly and score better in exams. PDF downloads are also available for offline use. These SEBA Class 9 Computer Science notes are trusted by many students and written by subject experts. Start learning now and boost your computer knowledge with the best Class 9 ICT resources online!

Scroll to Top