Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
183 views24 pages

G7-ICT-EOS2 Revision - Part 2 - Answer

Uploaded by

teamalpaca33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
183 views24 pages

G7-ICT-EOS2 Revision - Part 2 - Answer

Uploaded by

teamalpaca33
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

q20.

Place each scenario in the correct column of the table below,


depending on whether it describes a PAN, a LAN or a WA

A smart blood-
pressure monitor that
A multinational pairs with an app to A network of
company that shares track health statistics computers and
software and files devices that are used
between offices using by students and staff
a network in a school

A network that shares


A smart watch that is internet access that A chain of shops that
used by someone people can connect to communicates their
who likes to read their via Wi-Fi in an airport stock data and
emails on the go payments through
one network
Type of network

PAN LAN WAN

ANS:

q21. Explain:
How firewalls protect a network and why they are
important?
ANS:

q22. How antivirus software and anti-spyware provide


protection to keep data secure on a network.
ANS:

q22. Categorise each of the scenarios below into the appropriate


threat to a network. You can write the letter that represents each
threat in the correct position in the table.
A A malicious user emails a file to a victim. When the victim has
downloaded and run the file, it has caused their My Documents
folder to be deleted from their computer.
B A user is using an Instant Messenger on their Android device. They
are sent a game file called fungame.exe. The user downloads
fungame.exe and runs it. Later that week, they notice that their
webcam is turning on and off by itself and mouse movements are
occurring without them touching their mouse.
C A user visits a website to download some software to enable them
to edit images. After installing the software, the home page on
their internet browser has changed to a new page. They notice
that there are lots of advertising banners and notifications
happening on their device.
Adware Trojan Virus

ANS:

q22. Look at the pseudocode below and annotate


(describe) the mistakes that have been made in how the
pseudocode has been written.
HINT: There are at least 5 mistakes.
ANS:
q23. Look at the pseudocode below. Create the flowchart to match it.
ANS:
q24. Describe how a linear search works on this data set to find the data item
‘Tiger’.
Cat Hamster Bat Parrot Horse Lion Tiger Camel Bear Swan

_______________________________________________________
____________________________________________________
_______________________________________________________
_____________________________________________________
_______________________________________________________
_______________________________________________________

ANS:

q25.Sort the different inputs and outputs on the micro:bit into the
correct column of the table below.

A compass accelerometer touch temperature sensor


button sensor

buzzer microphone B button light sensor display

Input Output
ANS:

q26. a. Look at the following pseudocode.


Explain what it shows.

__________________________________________________________
__________________________________________________________
__________________________________________________________

b. Develop and complete the following test plan for the pseudocode.
Test number Data entered Expected outcome Pass/Fail

ANS:
q27. Which of the following is system software?
a. Application software
b. Operating System
c. A graphics/art design app
d. Entertainment software

q.28. Which of the following is NOT an example of utility software?


a. anti-virus software
b. racing game
c. compression software
d. backup software

q.29. Describe TWO functions of an operating system. (In this question, a "function" means: a task
that the operating system does)
ANS: any two:

 Provides a user interface


 Manages how software uses and access the memory
 Manages how software uses and access the file system / hard disk drive
 Manages how software uses and access the processor / CPU

q.30. Use the following words to complete the paragraph below to


describe how data is stored inside a digital device.
OFF ON electrical switches digits binary

Computers represent data using a combination of 1s and 0s. Data


stored in this format is known as ____________ data. This is possible
because of the way in which digital devices use ____________
signals to represent binary ____________. Each digital device is
made from millions of tiny ____________ called transistors. Each of
these switches can only ever be ____________ (1) or ____________
(0).
ANS:

q.31. Write "TRUE" in the correct box below to show whether each
statement relates to RAM or ROM memory.
Statement RAM ROM

Volatile memory .

Non-volatile memory

Having more of this type of memory can speed up processing

Content fixed at manufacturing

Close to the processor

Contents can be changed

Storing too much data or instructions here can slow processing


down
q32. Write TRUE or FALSE for each of the statements below about data
transmission.
Statement TRUE/FALSE

Compression always results in reduction of the file size

Compressed files require a larger bandwidth for transmission

Compressed files require a shorter data-transmission time

Moving images cannot be compressed

Compressed files must be decompressed at the other end


before they can be viewed again

Data compression reduces the number of 1s and 0s needed


to represent the data

q32. omplete the following paragraph about decomposition using the


words below.
combined easier independently breaking

multiple smaller different


Decomposition is the process of breaking a problem down into
smaller sub-problems. Decomposition makes problems easier to
solve and allows multiple people to work on different parts of the
same problem. As each sub problem is solved, it allows this to be
tested independently before being combined to solve the full
problem.
ANS:

q.33 Using a computer to research something on the internet, then saving


what you have found in a word-processed document.
Order Instruction

Log on to the computer.

Complete your research.

Turn the computer on.

Log off.

Save your document.

Type your findings into the word


processor.

Open the web browser.

Open the word processor.


ANS:

Unit 5:
### 8MD.01 Identify key features of models such as simulators, including their data requirements.
1 Write two advantages of data modelling.

Any two or any logical answer

### 8MD.02 Design appropriate forms, including data validation, to collect data for given purposes.
2. Virtual reality and Augmented reality simulations has many uses in the society now a days, write
two benefits of using them.

- Safe training environment


-Lower cost
-Easier collaboration
- Skill development
OR
Any logically appropriate answer

3. In a database, Primary key field must be unique

True
### 8MD.03 Know how to use spreadsheets that are models of real-life systems, using what-if analysis to compare alternative
scenarios.
4. One benefit of using database is data sharing.

True

### 8MD.04 Evaluate the suitability of data that have been collected for particular purposes.
### 8MD.06 Evaluate the suitability of pre-existing databases for given purposes.

5. Describe the roles of each validation check.


Validation check Description
Presence check It ensures that an important data item is not left blank.

Length check It ensures that a data item has the correct number of characters.

Range check It ensures that data is within an upper and a lower limit.

Format check It ensures that data matches a fixed pattern.

Type check It ensures that data matches the data type assigned to a particular field.

### 8MD.05 Know how to add validation rules to a database structure.

6. Write two main features of a Database.

Choose two main features of a Database from the list below.

 It is related.
 The data can not be duplicate in a database.
 Data can not be altered.
 It is well organized.

Or any appropriate answer


### 8CT.04 Explain the need for searching algorithms.
### 8CT.05 Describe and use linear searches.

7.

Number of fields:.........5..........

Number of records:.....5............

Number of data items:.....25......

8. Match the keywords with their definations.

a. Validation rule

A rule that specifies the characteristics of a valid data item.

b. Validation text

Text displayed to aid the user when they make an error entering data.

c Conditions

A set of rules used to test data during the process of validation.

### 8MD.07 Identify the data that are required for specific applications.

09. A librarian has designed the following database to record details about. Use what you
have learned about getting the data structure right to restructure the database for the librarian
by completing the data type for the list of fields below:

hints: Short text , long text, currency, data and time, number, boolean, memo

Member ID Auto number


Name Text
Address Long text
Date Joined Date and time
Currency/
Membership fees
Number
### 8CS.09 Identify the use of augmented reality in familiar contexts, including education and
entertainment. << This LO is too tangential to the material; omitted from this unit test.

10.

Lenin is creating a database to track students information.


State FOUR fields with data type that Lenin may have in the database.
Field 1: .......................................................................................
Field 2: .......................................................................................
Field 3: .......................................................................................
Field 4: .......................................................................................
[4+4]
Any valid fields, for example:
Name(Short Text), ID(Auto Number/ Number), Class(Short text), Address(Long Text), Subjects
taken(Short Text), Date of birth( Date and time), Contact number( Short text or number)

Unit 6:

1. Tick whether each description is the 'waterfall' or 'iterative' process.


Description Waterfall Iterative
model process

More time is spent on the planning stage before


moving to implementation

The project is developed throughout the process

The project starts and moves down to the next step


as each individual step is completed

The client is involved in each stage to help to refine


and develop the product

The client delivers the project details and then sees


the final product at the end

The project is split into smaller sections and the


sections are looked at in order of priority
2. Look at the pseudocode below , What would be the output if the
number guessed and input was each of the following?
START
setNumber = 50
number = INPUT a guessed number
IF number greater than setNumber THEN
OUTPUT "Lower"
ELSEIF number less than setNumber THEN
OUTPUT "Higher"
ELSE
OUTPUT "You guessed"
ENDIF
STOP

a 25 ______________

b 60 ______________

c 100 ______________
d 45 ______________

e 49 ______________

f 51 ______________

g 50 ______________

ANS:

3. Make a list of the main characteristics of pseudocode.


_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
ANS:

4. Copy each example below into the correct section of the table for
its data type.

75 0.5 HI 123_21 Welcome YES 1

123abc 222 FALSE 5.69 NO TRUE 1.01

Data Example
type

String

Integer
Real

Boolean

ANS:

5. Look at the pseudocode below.


START
money = 20.00
spent = INPUT "How much did you spend?"
moneyLeft = money - spent
IF moneyLeft >= 10 THEN
OUTPUT "Keep shopping, you have $", moneyLeft, "left"
ELSEIF moneyLeft >= 0 AND moneyLeft < 10 THEN
OUTPUT "Be careful spending, you have $", moneyLeft,
"left"
ELSE
OUTPUT "Money all gone"
ENDIF
STOP

What will be the output for the following amounts of money spent?
a 5.50
_______________________________________________________
b 1.10
_______________________________________________________
c 6.70
_______________________________________________________
d 19.20
_______________________________________________________
e 15.30
_______________________________________________________
ANS:

You might also like