Category: class 9th notes

  • 9th Class Computer Chapter 4: Data and Privacy

    9th Class Chapter 4: Data and Privacy Short and Simple Question & Answer

    We know you are looking for 9th class  computer chapter 2 English medium notes new syllabus 2020 PDF download. That’s why we upload computer notes for class 9 according to the new syllabus of Punjab board session 2020-2021. These notes are comprehensive easy to understand and precise. You can download these notes or view 9th class computer notes English medium online. Many students practice 2024 Biology important questions by FAIZ UL ISLAM and get good marks in the exam.

    Q.1. What are computer ethics?

    Ans: Computer ethics are the moral rules and guidelines that determine the proper use of computer system. The computer should be used according to the ethics in order to avoid any problem in the society.

    Q.2. List any five Issues related to data security.

    Ans: Five issues related to data security are confidentiality & privacy, piracy, patent, copyright and trade secrets.

    Q.3. Define confidentiality.

    Ans: Confidentiality is the responsibility to keep other’s personal information private. It is a matter of taking care of other people.

    Q.4. What is data privacy?

    Ans: Data privacy refers io the right of an individual or an organization to keep personal information private. It is typically related to the personal information stored on the computer.

    Q.5. Why has confidentiality and privacy become critical?

    Ans: The privacy and confidentiality have become very critical due to the use of computers and the Internet. The potential threat to the personal data includes the improper use of computerized dale.

    Q.6. What Is meant by piracy?

    Ans: Piracy refers to the process of making illegal copies of any work protected by the copyright law. It can be book, software, song, movie, poetry, painting, or house design etc.

    Q.7. Differentiate between authorized and unauthorized access.

    Ans: The process of accessing a computer system and its resources legally is called authorized access the process of accessing a computer system and its resources illegally is called unauthorized access.

    Q.8. What do you mean by software piracy?

    Ans: Software piracy is the illegal copying, distribution or use of copyright software. Most licensed software can only be used by one user on one computer. The user can copy the software tor backup but it is illegal to use it on different computer.

    Q.9. What type of software Is available at no cost?

    Ans: 0 The open-source software is available at no cost. Anyone can modify the source code and redistribute it.

    Q.10. What is key?

    Ans: The software companies sell software along with a confidential text called key. The software can be activated using the key. The key is only given to the users who legally buy the software.

    Q.11. Define cracking.

    Ans: Some people try to get software key using illegal means This process is known as cracking.

    Q.12. List five types of software piracy.

    Ans: Five types of software piracy are soft lifting, client-server overuse, hard disk loading, counterfeiting and online piracy.

    Q.13. What is soft lifting?

    Ans: soft lifting is a process of borrowing a software application from a colleague and installing it on your device.

    Q.14. What Is client server overuse?

    Ans: Client-server overuse is a process of installing more copies of the software than number of licenses. It is typically done in client-server network.

    Q.15. What Is hard disk loading?

    Ans: Hard disk loading Is a process of installing and selling unauthorized copies of the software on new or refurbished computers.

    Q.16. What is counterfeiting?

    Ans: Counterfeiting is a process of selling the duplicate copies of the software.

    Q.17. What Is meant by online piracy?

    Ans: Online piracy Is a process of downloading the Illegal copies of software.

    Q.18. How are computers used for fraud and misuse?

    Ans: Fraud and misuse refer to the unauthorized activities. The computers and the Internet are frequently used to perform such activities. It includes theft of money by electronic means. theft of services and theft of valuable data..

    Q.19. What is patent?

    Ans: A patent is a right that is granted to the owner for a certain period of time. It is effective way to protect the idea. It can be for any invention such as device substance, method, or process. Any other person or organization cannot copy that idea for a certain period.

    Q.20. Why Is It Important to register a patent?

    Ans: It Is important to register a patent If someone is doing research in any field and has a new idea. It stops other people to make or sell anything on the basis of that idea. The owner of the Idea can exclusively use the idea to make and sell anything.

    Q.21. What do you mean by copyright?

    Ans: A copyright is a type of legal protection that protects some Idea or product from being copied. It is illegal to use any copyrighted material such as book, software, picture, video, or music. The copyright symbol is usually used with copyrighted material.

    Q.22. What Is meant by trade secrets?

    Ans: Trade secrets refer to the secret information of a company that play Important role for Its success. They have a lot of value and importance for the company. They provide the company an advantage over the other companies.

    Q.23. Why Is It Important to protect trade secrets?

    Ans: The trade secrets must be protected carefully. It ensures that the company has a competitive advantage over others. The unauthorized use of trade secrets can harm the company.

    Q.24. What is sabotage?

    Ans: Sabotage is a serious attack on a computer system. A malicious user can attack the computer system remotely over the network. The attacker may include virus with some. free software. It may change or destroy information and sabotage important data on the system.

    Q.25. Give five examples of the organizations that store data of the people in computers?

    Ans: Five examples of these organizations are hospitals, NADRA, schools, Board of Intermediate and Secondary Education, and passport offices.

    Q.26. What is meant by data brokers?

    Ans: There are many companies that collect. buy and sell the consumer Information. These companies are known as data brokers. They use this information to know the interests of the people.

    Q.27. What are cookies?

    Ans: A lot of Information is generated when the user browses the Internet. This information is usually stored with the Web surfer known as cookies. The cookies can track the interests of the people when they visit different websites.9th Class

    Q.28. Define encryption?

    Ans: Encryption is the process of encoding plain data into unreadable format.

    Q.29. What is ciphertext?

    Ans: The unreadable format of data is called ciphertext. It is performed in encryption.

    Q.30. Define decryption?

    Ans: The process of converting ciphertext bock to plain text is called decryption.

    Q.31. How is the encrypted data converted into plain data?

    Ans: A secret code is required to convert the encrypted data into plain data in order to read it. The secret code is called key and Is just like a password.

    Q.32. Why is encryption performed?

    Ans: The encryption is performed to ensure that only authorized persons can read the data. It is an important method of providing data security. It ensures protection from hackers and privacy. The data is protected when transferred across devices.

    Q.33. What is substitution cipher method?

    Ans: Substitution cipher method is a method of encryption in which the characters of original text are replaced with some other characters. The substitution is done by a fixed predefined system. Two types of substitution cipher methods are Caesar cipher and Vigenère cipher.

    Q.34. What Is Caesar cipher method?

    Ans: Caesar cipher method replaces each alphabet in the plain text with another alphabet. Each alphabet is replaced with the alphabet that is at a fixed number of positions to the left or right of original alphabet.

    Q.35. Who was Caesar?

    Ans: Caesar was a Roman politician and military general. He was born in July 13, 100
    BC. Rome. Italy. He played an important role in the rise of Roman Empire. He was killed on March 15 44BC.

    Q.36. Write any two quotes of was Caesar?

    Ans: Experience is the teacher of all things. Men freely believe that which they desire.

    Q.37. What is Vigenère cipher method?

    Ans: Vigenère cipher method uses a table known as Vigenère Cipher table. The Vigenère cipher method works with substitution key. The key is combined with the plaintext to generate the ciphertext.

    Q.38. What is Vigenère cipher table?9th Class

    Ans: The Vigenère cipher table consists of 26 rows and 26 columns. The first row contains the original alphabets from A to Z. The alphabet is shifted one letter to the left in each subsequent row. The rows and columns are labeled by alphabets from A to Z.

    Q.39. What Is meant by Interim cipher?

    Ans: In some cases, the key in Vigenère method may have less number of cases than the plaintext. The letters from the beginning of the plaintext are used to make the length of the key same as the plaintext. It Is known as interim ciphertext.

    Q.40. What is Vigenère cipher widget?

    Ans: The Vigenère cipher widget shows animation of the encryption and decryption of plaintext. It uses Vigenère cipher method according to the given key.

    Q.41. What Is random substitution method?

    Ans: The messages encrypted with Caesar cipher method are easy to crack. This method can be modified by shifting the letter to a random letter. This IS called random substitution cipher method.

    Q.42. What do you know about frequency analysis?

    Ans: The frequency analysis is the study of the frequency of letters or group of letters in a ciphertext. This method is used as an aid to break the.

    Q.43. What is the purpose of password?

    Ans: The purpose of password is to protect data stored on a computer. It protects data from being lost. misused or deleted by any person. The system can be accessed by a person who knows the password. Password can be changed only by authorized person.

    Q.44. Write any three characteristics of a good password.

    Ans: A good password consists of at least eight characters. it does not contaln username, real name. children name or company name. It is different om previous passwords.

    Q.45. Differentiate between cryptographic key and password.

    Ans: The cryptographic key is used to read an encrypted message whereas password Is used for authentication to enter system whereas. A key is not same as the password in computer security, but a password can be used as a key. A password is generated, read, remembered, and reproduced by humans but a key is used by software or humans to process a message.

    Q.46. What Is CAPTCHA?9th Class

    Ans: CAPTCHA is a set of random letters and numbers that appear as a distorted image and a textbox. The user needs to type the characters In the Image Into the textbox to gain access to the system. CAPTCHA text is only readable by humans not the computer.

    Q.47. What Is cybercrime?

    Ans: A cybercrime is a criminal activity carried out by means of computers and the internet. In some cybercrimes, the computer is used to commit a crime such as fraud, kidnapping, murder and stealing money from bank account or credit card.

    Q.48. How do the criminal access personal information?

    Ans: The criminals use Internet to access the personal information such as username, password, and credit card number.

    Q.49. List any three types of cybercrime.

    Ans: Three types of cybercrimes are identity theft, transection fraud, DoS attack, and hacking.

    Q.50. What Is identity theft?

    Ans: The identity theft is a criminal activity in which the hacker traps someone to give the account details and password. The hacker can then use the account of the user to perform any malicious activities.

    Q.51. How does transaction fraud occur?

    Ans: The transaction fraud is a criminal activity in which the scammer performs an illegal transaction. For example, the scammer offers an item for online. Someone buys the items and makes the payment, but the scammer never delivers the item.

    Q.52. How does advance fee fraud occur?

    Ans: The advance fee fraud is a criminal activity in which the criminal informs the user that he has won a prize or lottery. He then asks the user to submit a processing fee so the prize may be dispatched. It is very common type of cybercrime in which people lose the money.

    Q.53. What is hacking and hacker?

    Ans: An act of unauthorized access to the computer or network is called hacking. The person who gains unauthorized access to the computer system is called hacker. The hackers are computer experts and use their knowledge to break into the computer system and network.

    Q.54. When does hacking usually happen?

    Ans: Hacking usually happens when user downloads a file from the Internet and executes It. The software connects hacker to the computer. The hackers typically access the information for financial benefits such as stealing money from bank account or using credit card.

    Q.55. What is spyware?

    Ans: Spyware is a type of software that is used in hacking. It connects the hacker to the computer to access important Information without user knowledge. It runs in the background and collects information such as bank details and passwords.

    Q.56. What is National Response Centre against cybercrime?

    Ans: The National Response Centre for cybercrime is a law enforcement agency of Pakistan. It is dedicated to fight cybercrimes; it is working under Federal9.

    Q.57. What is phishi (BA), Its website is www.nr3c.gov.ph Is attack?

    Ans: A phishing attack is a criminal activity in which the criminal uses fake email and website to get sensitive information such as username. password and credit card details.

    Q.58. What is meant by denial of service?

    Ans: A Denial of Service (DoS) is a cyber-attack that makes a machine or network resource unavailable. The attack makes the resource too busy by sending many requests for it. The actual user cannot get it. It sometimes overloads system so much that network is shut down.

    he class 9 Punjab Textbook of Computer Science is commonly considered the beginning of your technological journey. Besides this book, which is an excellent source for newbies, I would recommend you summarize the others information online. Moreover, This post presents you with the 9th Class Notes for Computer Science. It contains five posts against each chapter. In addition, Chapter posts contain a variety of questions, including Short Questions, Long Questions, and Multiple-Choice Questions.

    Like Our Facebook Page For Educational Updates faizulislam

    These 9th class notes prepared according to the syllabus of all Punjab Boards. Other boards other than Punjab do not follow class 9 computer science notes. These Punjab boards are Gujranwala Board, Lahore Board, Faisalabad Board, Multan Board, Rawalpindi Board, Bahawalpur Board Sargodha Board, DG Khan Board, Sahiwal Board.

  • 9th Class Computer Chapter 1: Problem-Solving

    9th Class Chapter 1: Problem-Solving Short and Simple Question & Answer

    We know you are looking for 9th class  computer chapter 1 English medium notes new syllabus 2020 PDF download. That’s why we upload computer notes for class 9 according to the new syllabus of Punjab board session 2020-2021. These notes are comprehensive easy to understand and precise. You can download these notes or view 9th class computer notes English medium online. Many students practice 2024 Biology important questions by FAIZ UL ISLAM and get good marks in the exam.

    Q.1. Define problem?

    Ans: A problem is a situation or matter that requires proper attention to be resolved.

    Q.2. What Is a problem statement?

    Ans: A problem statement is a brief description of the problem to be solved. It describes the problem and identifies its causes and solutions. The problem statement must be prepared before finding the solution to the problem.

    Q.3. What Is problem-solving?

    Ans: Problem solving is a process of identifying a problem and finding its best solution. Problem-solving is a thinking process. It is a skill that can be developed by following a well-organized approach.

    Q.4. Write the names of steps that are Involved In problem-solving?

    Ans: The steps involved in problem-solving are defining the problem, analyzing the problem, planning the solution, candid solutions, and selecting the best solution.

    Q.5. Why is it important to define a problem?

    Ans: A problem cannot be solved if it is not defined correctly. The clearly defined problem helps the user to find the solution.

    Q.6. List three strategies to define a problem?

    Ans: Three strategies to define a problem include gaining back knowledge, using guesses, and drawing a picture.

    Q. 7. Why is It important to gain background knowledge of a problem?

    Ans: It is important to understand the situation and circumstances in which the problem occurs. It allows the user to understand the given state. It also helps to know what the solution will look like and how to measure the solution.

    Q.8. What Is problem analysis? Why Is It Important?

    Ans: Problem analysis is a process of understanding the given problem. It is very important to understand a problem before trying to solve it. A clear understanding of a problem helps the user to solve it correctly and easily. It also saves money, time, and resources.

    Q.9. List five Ws to understand a problem?

    Ans: The five Ws to understand a problem are What, Who, Why, When, and Where.

    Q.10. What happens In the phase of planning the solution to a problem?

    Ans: The solution to a problem is planned after defining and analyzing the problem. The problem is assessed to find the right strategy to solve the problem. This phase specifies the actions required to solve the problem. It also specifies the resources required for the solution.

    Q. 11. State different strategies to plan the solution of a problem?

    Ans: Different strategies to plan the solution of a problem include divide and conquer; guess, check and improve; and act it out.

    Q. 12. Which strategy divides a complex problem into smaller problems and why?

    Ans: The divide and conquer strategy divides a complex problem into smaller problems. The smaller problems can be solved separately. The process of solving the problem becomes easier. It also reduces the complexity of the solution.

    Q: 13. What Is a candid solution to a problem?

    Ans: The word candid means something unplanned. The candid solution is typically found using guessing without detailed planning. It saves a lot of time but may not be the actual solution to the problem.

    Q. 14. What is a flowchart?

    Ans: A flowchart is a graphical representation of the solution of a problem. Standard symbols are used to represent different steps of the solution. Different symbols are used in flowcharts to represent different operations.

    Q. 15. Write any four flowchart symbols?

    Ans: The four flowchart symbols include terminal. input/output, process, and flow line.

    Q. 16. What Is the Importance of flowcharts?

    Ans: The flowchart is an important tool in problem-solving. It can be used to plan the solution in problem-solving. The solution can be understood easily with the help of a flowchart. It also helps the user to verify if the solution is correct or not.

    Q.17. Write any three advantages of the flowchart?

    Ans: The flowchart is easy to draw. It helps to understand the problem solution easily. It clearly shows the flow from one step to another.

    Q. 18. How Is a flowchart constructed?

    Ans: A flowchart is constructed by determining different requirements for the given problem. These requirements include input processing, decision, and output.

    Q.19. How can you show the sequence of the execution of the steps in the flowchart?

    Ans: The sequence of the execution of the steps in the flowchart is shown using the flow lines. The sequence is generally shown from top to bottom.

    Q.20. Which symbol is used to show processing in the flowchart?

    Ans: The rectangle is used to represent a processing or computational operation in the flowchart.

    Q.21. What Is the purpose of parallelogram and rectangle symbols in flowcharts?

    Ans: Parallelogram Is used to represent the input or output step in the flowchart. Rectangle is used to represent a processing or computational operation in the flowchart.

    Q.22. Which symbol is used to start and end the flowchart?

    Ans: The oval symbol is used to start and end the flowchart. It is also called a terminal symbol.

    Q.23. What is the use of a decision symbol?

    Ans: The decision symbol is used to represent the decision in the flowchart. A condition is given in the
    diamond symbol. The flow of control from the diamond symbol may go in two possible directions.
    It goes in one direction if the condition is TRUE and in the second direction if the condition is false.

    Q.24. Define algorithm?

    Ans: An algorithm is a finite number of steps to solve a problem. The steps given in the algorithm
    are in a specific order. The steps may consist of input, process, decision, and output.

    Q.25. Differentiate between flowchart and algorithm?

    Ans: The flowchart uses standard symbols but the algorithm uses simple English. A flowchart is more time-consuming, but the algorithm is less time-consuming. A flowchart is difficult to modify but an algorithm is easier to modify.

    Q.26. What Is the role of algorithm in solving a problem?

    Ans: An algorithm plays an important role in solving a problem. It is the plan for solving the problem. It helps the user to find the solution to the problem. The process of solving a problem becomes simpler and easier with the help of an algorithm.

    Q.27. Is it necessary for an algorithm to solve the problem in a finite number of steps? If yes,
    why?

    Ans: Yes. an algorithm must solve the problem in a finite number of steps. The reason is that the solution to any problem cannot consist of infinite steps. The algorithm has a clear start and end. The solution is found when all steps are performed in a sequence.

    Q.28. What Is the role of input in the efficiency of an algorithm?

    Ans: The role of input is very important in the efficiency of an algorithm. An efficient algorithm must clearly define the required input to solve the problem.

    Q.29. What factors are used to measure the efficiency of an algorithm?

    Ans: The efficiency of an algorithm is measured based on a number of steps in the algorithm and space in computer memory. An algorithm is more efficient if it takes less number of steps to solve a problem. An algorithm Is more efficient if it takes less space in computer memory.

    Q.30. What is test data?

    Ans: The test data is used to check the correctness of an algorithm. It is important to test the output of the algorithm after solving a problem. Different values of test data Are given to the algorithm as input. The output is checked to confirm that the algorithm works correctly.

    Q.31. Why is testing a solution important?

    Ans: Testing is very important to ensure the correctness of the solution. It can be used to find any errors in the solution. It helps the user to modify and improve the solution. “The testing becomes even more critical if the solution is used commercially.

    Q.32. Differentiate between valid and invalid test data?

    Ans: A type of test data that is according to the input requirements of an algorithm is called valid test data. A type of test data that is not according to the input requirements of an algorithm is called invalid test data.

    Q.33. What Is boundary test data?

    Ans: The smallest or the largest data values from the range of valid test data are called boundary
    test data. AA algorithm is tested with the boundary test data to ensure that it handles these
    values correctly.

    Q.34. What do you mean by absent data?

    Ans: The absent data means that the number of values given to a solution is less than expected.

    Q.35. What Is the process of verification?

    Ans: Verification is the process of testing if the solution Is solving the same problem for which it was designed. Suppose an algorithm is prepared to find the percentage of a student and assign the grade. The user can observe if the algorithm inputs marks and displays grades.

    Q.36. What Is the process of validation?

    Ans: Validation is the process of testing If the solution Is correct or not. Suppose an algorithm is prepared to find the percentage of a student and assign the grade. The user can check the output of the algorithm to confirm that the grade Is assigned correctly.

    Q.37. What Is a trace table?

    Ans: A trace table is a technique for testing the algorithm to ensure that it does not have any logical errors. The trace table usually consists of multiple rows and columns. Each column shows the name of the data element. Each row shows the value of the data element in each step

    he class 9 Punjab Textbook of Computer Science is commonly considered the beginning of your technological journey. Besides this book, which is an excellent source for newbies, I would recommend you summarize the others information online. Moreover, This post presents you with the 9th Class Notes for Computer Science. It contains five posts against each chapter. In addition, Chapter posts contain a variety of questions, including Short Questions, Long Questions, and Multiple-Choice Questions.

    Like Our Facebook Page For Educational Updates faizulislam

    These 9th class notes prepared according to the syllabus of all Punjab Boards. Other boards other than Punjab do not follow class 9 computer science notes. These Punjab boards are Gujranwala Board, Lahore Board, Faisalabad Board, Multan Board, Rawalpindi Board, Bahawalpur Board Sargodha Board, DG Khan Board, Sahiwal Board.

  • Class 9th physics Ch 2 Urdu Medium

    باب نمبر 1 : کائنی مینکس

    سوال 1: ریسٹ اور موشن کی تعریف کریں۔

    جواب: ریسٹ : اگر کوئی جسم اپنے گردو پیش کے کے لحاظ سے اپنی پوزیشن نہ تبدیل کر رہا ہو تو ودریسٹ میں کہلاتا ہے۔ موشن: اگر کوئی جسم اپنے گردو پیش کے کے لحاظ سے اپنی پوزیشن تبدیل کر رہا ہو تو وہ موشن میں کہلاتا ہے۔

    سوال 2: موشن کی کتنی اقسام ہیں ؟ نام لکھیں۔

    جواب: موشن کی تین اقسام ہیں۔ 1 ٹرانسلیٹری موشن 2 روٹیٹری موشن 3 وائبریٹری موشن

    سوال 3: ٹرانسلیٹری موشن کی تعریف کیجیے اور ایک مثال دیجیے۔

    جواب : ایسی موشن جس میں ھولے بغیر ایک ایسی لائن میں حرکت کرتا ہے جو سیدھی بھی ہو سکتی ہے اور دائرہ نما بھی ٹرانسلیٹری موشن کہلاتی ہے۔ 

    سوال 4: ٹرانسلیٹری موشن کی کتنی اقسام ہیں ؟ نام لکھیں۔ کی

    جواب : ٹرانسلیٹری موشن کی تین اقسام ہیں۔ میں جھولا جھولنے والے لوگوں کی موشن ٹرانسلیٹری موشن ہوتی  1 لی نیز موشن 2 سرکلر موشن 3 رینڈم موشن

    سوال 5: بی نیئر موشن کی تعریف کریں اور مثال دیں۔

    جواب: کسی جسم کی خط مستقیم میں حرکت کی نیئر موشن کہلاتی ہے۔ مثال : خط مستقیم میں اڑتا ہوا جہاز اور عمود ا نیچے گرتے ہوئے اجسام لی نیز موشن کی مثالیں ہیں۔

    سوال6: سرکلر موشن کی تعریف کریں اور مثال دیں۔

    جواب: اگر کوئی جسم دائرے میں حرکت کرے تو اس کی حرکت کو سر کلر موشن کہتے ہیں۔ مثال : سورج کے گرد زمین کی گردش اور چاند کی زمین کے گرد گردش سر کلر موشن کی مثالیں ہیں۔

    سوال7: رینڈم موشن کی تعریف کریں اور مثال دیں۔

    جواب: کسی جسم کی بے ترتیب انداز سے حرکت کورینڈم موشن کہتے ہیں۔ مثال: کیڑے مکوڑوں کی موشن اور ہوا میں گردو غبار اور دھویں کے پارٹیکلز کی موشن رینڈم موشن ہوتی ہے

    سوال 8: وائبریٹری موشن کی تعریف کریں اور مثال دیں۔

    جواب: کسی جسم کی اپنی وسطی پوزیشن سے آگے پیچھے دہرائی جانے والی موشن و ائیر بیٹری موشن کہلاتی ہے۔ مثال : بجتی ہوئی الیکٹرک بیل کے ہتھوڑے کی موشن اور ستار کے تار کی موشن وائبریٹری موشن کی مثالیں ہیں۔

    سوال 9: ٹرانسلیٹری موشن اور لینیئر موشن میں فرق واضح کریں۔

    جواب : ٹرانسلیٹری اور لی نیئر موشن میں فرق ٹرانسلیٹری موشن لی نیر موشن ایسی موشن جس میں کوئی جسم گھوٹے بغیر ایک ایسی لائن میں حرکت کرتا ہے مثال : فیرس وھیل میں جھولا جھولنے والے لوگوں کی موشن ٹرانسلیٹری موشن ایسی موشن جس میں کوئی جسم گھوٹے بغیر ایک ایسی لائن میں حرکت کرتا ہے مثال : فیرس وھیل میں جھولا جھولنے والے لوگوں کی موشن ٹرانسلیٹری موشن کسی جسم کی خط مستقیم میں حرکت ملی نیز موشن کہلاتی ہے۔

    سوال 10: سرکلر موشن اور رینڈم موشن میں فرق لکھیں۔

    جواب: وہ طبیعی مقدار میں جن کو مکمل طور پر بیان کرنے کے لیے ان کی مقداروں کے ساتھ ساتھ سمت بھی درکار ہو، ویکٹر مقدار میں کہلاتی ہیں۔ مثلا اولاسٹی ، ڈس پلیسمنٹ، فورس، مومینٹم مارک و غیرہ۔

    سوال11: ویکٹر مقداروں کو گرافیکلی کیسے ظاہر کیا جاتا ہے ؟

    جواب: ویکٹر مقدار کو گرافیکلی ظاہر کرنے کے لیے ایک سیدھی لائن کھینچی جاتی ہے۔ اس کے ایک سرے پر تیر کا نشان ہوتا ہے جو کہ سمت کو ظاہر کرتا ہے اور لائن کی لمبائی سر منتخب سکیل کے مطابق مقدار کو ظاہر کرتی ہے

    سوال12: ویکٹر مقداروں کی جمع اور تفریق سکیلر مقداروں کی طرح کیوں نہیں ہوتی ؟

    جواب: ویکٹر مقدار میں سمتی مقدار میں ہیں جبکہ سکیلر مقدار میں غیر سمتی مقدار میں ہیں۔ سمتی مقداروں کی جمع اور تفریق کے لیے ہیڈ ٹو ٹیل رول استعمال کیا جاتا ہے۔ اس لیے ویکٹر مقداروں کی جمع اور تفریق سکیلر مقداروں کی طرح کیوں نہیں ہوتی۔

    سوال13 : پوزیشن کی تعریف کریں۔

    جواب: کسی جگہ یا پونٹ کا کسی مخصوص مقام سے فاصلہ اور سمت اس جگہ کی پوزیشن کہلاتی ہے۔

    سوال14: سپیڈ اور ولاسٹی میں فرق واضح کریں۔

    جواب: سپیڈ اور ولاسٹی میں فرق سپیڈ کسی جسم کا اکائی وقت میں طے کردہ فاصلہ س سپیڈ کہلاتا ہے۔ یہ ایک سکیلر مقدار ہے۔

    سوال 15: یونیفارم سپیڈ اور یونیفارم ولاسٹی میں فرق لکھیں۔

     جواب: یونیفارم سپیڈ اور یونیفارم میں فرق یونیفارم سپید ولاسٹی کسی جسم کا اکائی وقت میں کسی خاص سمت میں طے کردہ فاصلہ س ولاسٹی کہلاتا ہے۔ یہ ایک ویکٹر مقدار ہے۔

    سوال 16: اوسط ولاسٹی کی تعریف کریں اور فارمولا لکھیں۔

    جواب: کسی جسم کے کل ڈس پلیسمنٹ اور کل وقت میں نسبت کو اوسط ولاسٹی کہتے ہیں۔ کل ڈس ڈس پلیسمنٹ بیونیفارم ہو ۔ خواہ وقت کے یہ وقفے کتنے ہی مختصر کیوں نہ ہوں۔

    سوال 17: ایکسٹریشن معلوم کرنے کا کلیہ اور یونٹ تحریر کریں۔

    جواب : ایکسٹریشن معلوم کرنے کا کلیہ ایکسٹریشن کا یونٹ میٹر فی سیکنڈ فی سیکنڈ ے کیوں نہ ہوں تواس صورت میں جواب: اگر کسی جسم کی ولاسٹی وقت کے مساوی وقفوں میں ایک ہی ہو یہ وقفے کتنے ہی

    سوال 18: یونیفارم ایکسٹریشن کی تعریف کریں۔

    جواب: ایکلریشن کو یونیفارم ایکسٹر  یشن کہتے ہیں۔

    سوال19: ریٹار ڈیشن اور ڈی سلریشن سے کیا مراد ہے ؟

    جواب: ریٹارڈیشن: اگر کسی جسم کی ولاسٹی وقت کے ساتھ کم ہو رہی ہو تو جسم کا ایکسٹریشن نیگیٹیو ہوتا ہے۔ نیگیٹیو ایکسٹریشن کورینار ڈیشن بھی کہتے ہیں۔ ڈی سلریشن: اگر کسی جسم کی ولاسٹی وقت کے ساتھ بڑھ رہی ہو تو جسم کا ایکسٹریشن پوزیٹیو ہوتا ہے۔ یوز یو ایکسپریشن کو ڈی ای که

    سوال20: گراف کی مدد سے حرکت کی پہلی مساوات اخذ کریں۔

    جواب : حرکت کی پہلی مساوات : فرض کریں کہ یونیفارم ایکسٹریشن سے خط مستقیم میں حرکت کرتے ہوئے جسم کی ابتدائی ولاسٹی ” ہے۔ وقت ” کے بعد اس کی ولاسٹی ”م“ ہو جاتی ہے۔ کے بعد اس کی ولا جسم کی حرکت سے متعلق معلومات سپیڈ ۔ ٹائم گراف شکل میں دی گئی ہے۔ خط AB کا سلوپ ایکسٹریشن ”a“ کو ظاہر کرتا ہے۔

    سوال21: گراف کی مدد سے حرکت کی دوسری مساوات اخذ کریں۔

    جواب: حرکت کی دوسری مساوات فرض کریں کہ یونیفارم ایکسلریشن سے خط مستقیم میں حرکت کرتے ہوئے جسم کی ابتدائی ولاسٹی ” ہے۔ وقت ” کے بعد اس کی ولاسٹی ” “ ہو جاتی ہے۔