Exam Prep
CBSE Class 9 ICT Important Questions and Answers 2026-27
50+ important questions and answers for CBSE Class 9 ICT exam 2026-27. Covers Internet, HTML, GIMP, web services, cyber safety with model answers.
This is a comprehensive collection of important questions from all chapters of CBSE Class 9 ICT (Information and Communication Technology). These questions are based on the latest syllabus and previous year exam patterns. Practice all of them before your exam.
Chapter 1: Internet Basics
Very Short Answer (1 mark)
Q1. What does URL stand for?
URL stands for Uniform Resource Locator. It is the complete address of a resource on the Internet.
Q2. Name the protocol used for sending emails.
SMTP (Simple Mail Transfer Protocol) is used for sending emails.
Q3. Who invented the World Wide Web?
Tim Berners-Lee invented the World Wide Web in 1989.
Q4. What is the full form of ISP?
ISP stands for Internet Service Provider.
Q5. What does DNS stand for?
DNS stands for Domain Name System. It converts domain names into IP addresses.
Short Answer (2-3 marks)
Q6. Differentiate between Internet and WWW.
| Internet | WWW |
|---|---|
| A global network of interconnected computers | A collection of web pages accessible via Internet |
| It is the infrastructure/hardware | It is a service running on the Internet |
| Started in 1969 as ARPANET | Started in 1989 by Tim Berners-Lee |
| Includes email, FTP, etc. | Only includes web pages |
Q7. What is the difference between HTTP and HTTPS?
HTTP (HyperText Transfer Protocol) transfers data in plain text without encryption. HTTPS (HTTP Secure) encrypts data using SSL/TLS before transmission. HTTPS is more secure and is indicated by a padlock icon in the browser address bar. Websites handling sensitive information like banking and shopping must use HTTPS.
Q8. List any four services provided by the Internet.
Four services provided by the Internet are:
- Email, Electronic mail for communication
- World Wide Web, Access to websites and information
- File Transfer Protocol (FTP), Upload and download files
- Video Conferencing, Live video communication
Q9. What is the role of a modem in Internet connectivity?
A modem (Modulator-Demodulator) is a device that converts digital signals from the computer into analog signals for transmission over telephone lines, and converts incoming analog signals back into digital signals. It acts as a bridge between the computer and the Internet connection.
Long Answer (5 marks)
Q10. Explain the different types of Internet connections. Which type is most commonly used in India today?
The main types of Internet connections are:
- Dial-up - Uses telephone lines, very slow (up to 56 Kbps). Cannot use phone and Internet simultaneously.
- Broadband (DSL) - Uses telephone lines but allows simultaneous phone and Internet use. Speeds up to 24 Mbps.
- Cable - Uses cable TV infrastructure. Speeds up to 100 Mbps.
- Fiber Optic - Uses light signals through fiber cables. Fastest wired connection, up to 1 Gbps.
- Wireless (Wi-Fi) - Uses radio waves. Speed depends on the router and Internet plan.
- Mobile (4G/5G) - Uses cellular networks. 4G provides up to 100 Mbps, 5G up to 1 Gbps.
In India today, mobile data (4G/5G through Jio, Airtel) and fiber optic broadband (Jio Fiber, Airtel Xstream) are the most commonly used Internet connections.
Chapter 2: HTML (HyperText Markup Language)
Very Short Answer (1 mark)
Q11. What does HTML stand for?
HTML stands for HyperText Markup Language.
Q12. Name two self-closing tags in HTML.
Two self-closing tags are <br> (line break) and <img> (image).
Q13. Which tag is used to create a hyperlink?
The <a> (anchor) tag is used to create a hyperlink.
Q14. How many heading levels are available in HTML?
HTML has 6 heading levels, from <h1> (largest) to <h6> (smallest).
Short Answer (2-3 marks)
Q15. Write HTML code to create an ordered list of three Indian cities using Roman numerals.
<ol type="I">
<li>Delhi</li>
<li>Mumbai</li>
<li>Chennai</li>
</ol>
Output:
I. Delhi
II. Mumbai
III. Chennai
Q16. What is the difference between <b> and <strong> tags?
Both <b> and <strong> make text appear bold. However, <b> is a presentational tag that only makes text bold visually. <strong> is a semantic tag that indicates the text is important or has strong emphasis. Screen readers treat <strong> differently by reading it with emphasis.
Q17. Write the HTML code to insert an image named "school.jpg" with width 400 and height 300, and with alternative text.
<img src="school.jpg" alt="My School Building" width="400" height="300">
Q18. Write HTML code to create a link that opens Google in a new tab.
<a href="https://www.google.com" target="_blank">Visit Google</a>
Long Answer (5 marks)
Q19. Write a complete HTML code to create a web page about your school with the following requirements:
- Title should be "My School", A centered heading, A paragraph about the school, An image of the school, A list of three departments, A link to the CBSE website
<!DOCTYPE html>
<html>
<head>
<title>My School</title>
</head>
<body bgcolor="lightyellow">
<center>
<h1>Welcome to Delhi Public School</h1>
</center>
<p>Delhi Public School is one of the best schools in the city.
It was established in 1995 and has excellent faculty and
infrastructure.</p>
<img src="school.jpg" alt="School Building" width="400" border="1">
<h2>Our Departments</h2>
<ul type="square">
<li>Science Department</li>
<li>Commerce Department</li>
<li>Arts Department</li>
</ul>
<p>Visit the official CBSE website:
<a href="https://www.cbse.gov.in" target="_blank">CBSE</a></p>
</body>
</html>
Chapter 3: GIMP (Image Editing)
Very Short Answer (1 mark)
Q20. What does GIMP stand for?
GIMP stands for GNU Image Manipulation Program.
Q21. What is the native file format of GIMP?
The native file format of GIMP is XCF.
Q22. Which tool is used to select a rectangular area in GIMP?
The Rectangle Select Tool (shortcut: R) is used to select a rectangular area.
Short Answer (2-3 marks)
Q23. Differentiate between lossy and lossless compression.
| Lossy Compression | Lossless Compression |
|---|---|
| Some data is permanently lost | No data is lost |
| Smaller file size | Larger file size |
| Quality decreases after compression | Quality remains the same |
| Example: JPEG | Example: PNG |
| Good for photographs | Good for graphics with text and sharp edges |
Q24. What are layers in GIMP? Why are they useful?
Layers in GIMP are like transparent sheets stacked on top of each other. Each layer can contain different elements of the image and can be edited independently without affecting other layers. They are useful because they allow non-destructive editing, make it easy to rearrange elements, and help create complex compositions by combining multiple elements.
Q25. Explain the steps to resize an image in GIMP.
Steps to resize an image in GIMP:
- Open the image in GIMP (File > Open)
- Go to Image menu
- Click on Scale Image
- Enter the desired Width and Height
- Ensure the chain link icon is connected to maintain the aspect ratio
- Select the interpolation method (usually Cubic for best quality)
- Click Scale to apply
Chapter 4: Web Services
Very Short Answer (1 mark)
Q26. What does Cc stand for in email?
Cc stands for Carbon Copy.
Q27. Name the full form of B2C in e-commerce.
B2C stands for Business to Consumer.
Short Answer (2-3 marks)
Q28. Differentiate between Cc and Bcc in email.
| Cc (Carbon Copy) | Bcc (Blind Carbon Copy) |
|---|---|
| Recipients can see who else received the email | Recipients cannot see other Bcc recipients |
| Used when transparency is needed | Used for privacy |
| All recipients are visible to everyone | Bcc recipients are hidden |
Q29. What is e-governance? Give two examples of e-governance services in India.
E-governance is the use of Information and Communication Technology by the government to deliver services to citizens electronically. Two examples of e-governance services in India are:
- DigiLocker - A platform to store and access official documents digitally
- Passport Seva - Online passport application and tracking system
Q30. What is cloud computing? Name two advantages.
Cloud computing is the delivery of computing services such as storage, servers, databases, and software over the Internet instead of using local computers. Two advantages are:
- Data can be accessed from anywhere with an Internet connection
- No need to invest in expensive hardware as resources are provided by the cloud provider
Chapter 5: Cyber Safety
Very Short Answer (1 mark)
Q31. What is phishing?
Phishing is a cyber attack where criminals send fake emails or create fake websites resembling legitimate ones to trick users into revealing personal information like passwords and bank details.
Q32. Name the law in India that deals with cybercrime.
The Information Technology Act, 2000 (IT Act, 2000) deals with cybercrime in India.
Short Answer (2-3 marks)
Q33. Differentiate between virus, worm, and Trojan horse.
| Feature | Virus | Worm | Trojan Horse |
|---|---|---|---|
| Host file | Needs a host file | Self-contained | Disguised as useful software |
| Spread | Spreads when infected file is executed | Spreads automatically via network | Spread by tricking the user |
| Replication | Replicates by attaching to files | Replicates itself independently | Does not replicate |
Q34. List five rules for creating a strong password.
Five rules for creating a strong password:
- Use at least 8-12 characters
- Include uppercase and lowercase letters
- Include numbers (0-9)
- Include special characters (!@#$%^&*)
- Avoid using personal information like name, birthday, or common words
Q35. What is cyberbullying? How can you deal with it?
Cyberbullying is the use of technology (social media, messaging, email) to harass, threaten, embarrass, or target another person. To deal with cyberbullying:
- Do not respond to the bully
- Save evidence by taking screenshots
- Block the bully on all platforms
- Report the behavior to the platform administrators
- Tell a trusted adult like a parent or teacher
Long Answer (5 marks)
Q36. Explain any five types of malware with examples.
Five types of malware are:
-
Virus - A program that attaches itself to a legitimate file and spreads when the file is executed. It can corrupt data, delete files, or slow down the system. Example: ILOVEYOU virus.
-
Worm - A standalone program that replicates itself and spreads across networks without needing a host file or user action. It consumes network bandwidth. Example: SQL Slammer worm.
-
Trojan Horse - A malicious program disguised as useful software. Users install it thinking it is helpful, but it performs harmful actions like stealing data. Example: A fake antivirus program.
-
Ransomware - Malware that encrypts the victim's files and demands a ransom payment to restore access. Example: WannaCry ransomware.
-
Spyware - Software that secretly monitors user activity, collects personal information, and sends it to third parties without the user's knowledge. Example: Keyloggers that record keystrokes to steal passwords.
Practice Questions for Self-Study
Try writing answers to these additional questions:
Q37. What is the difference between a web browser and a web server?
Q38. Write HTML code to create a definition list with five computer science terms and their meanings.
Q39. Explain the steps to apply a Gaussian Blur filter in GIMP.
Q40. What is spam? How can you protect yourself from spam emails?
Q41. Differentiate between POP3 and IMAP protocols.
Q42. Write HTML code to create a table with your weekly class timetable (use <table>, <tr>, <th>, <td> tags).
Q43. What are cookies? Are they harmful? Explain.
Q44. Explain the advantages and disadvantages of e-commerce.
Q45. What is a firewall? Explain its types.
Exam Tips
- Practice writing HTML code by hand - The exam requires you to write code on paper
- Learn the keyboard shortcuts of GIMP tools
- Memorize full forms - URL, DNS, HTTP, FTP, SMTP, ISP, etc.
- Know the differences - Internet vs WWW, HTTP vs HTTPS, Virus vs Worm
- Use tables in your answers for comparison questions, it earns more marks
- Draw diagrams where possible, network topology, GIMP interface
- Give Indian examples for e-governance and e-commerce questions
- Practice 5-mark questions - Write complete answers with introduction, explanation, and examples
Want to learn more?
Explore free chapter-wise notes with quizzes and code playground
Prefer watching over reading?
Subscribe for free.