(Computing) Grade 8
3rd Term 2024-25
Cambridge Wing
Unit 2: Managing Data
Q1: What is a simulator? Explain with examples.
Ans:
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Q2: Define the role of Goal Seek in Excel?
Ans:
________________________________________________________________
________________________________________________________________
Q3: Why is it important that data collected is suitable for its purpose?
Ans:
________________________________________________________________
________________________________________________________________
Q4: What could happen if data is incomplete or missing?
Ans:
________________________________________________________________
________________________________________________________________
Q5: What is data collection form?
Ans:
________________________________________________________________
________________________________________________________________
Q6: Why is validation used?
Ans:
________________________________________________________________
________________________________________________________________
Q7: Name 3 rules of data validation.
Ans: __________________________________________________________
Validation check Description
.
Q8: How to evaluate databases?
Ans:
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Q9: What are the important things that we can check when we store a data
into the database?
Ans:
1. ___________________________________________________________
___________________________________________________________
___________________________________________________________
2. ___________________________________________________________
___________________________________________________________
___________________________________________________________
3. ___________________________________________________________
___________________________________________________________
___________________________________________________________
4. ___________________________________________________________
___________________________________________________________
___________________________________________________________
Unit 3: Network & Digital Communication
Q1: Explain the different types of networks.
Ans:
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Q2: How many devices can a PAN have?
Ans:
_____________________________________________________________
Q3: Where are the devices normally located in PAN?
Ans: _________________________________________________________
Q4: Who owns the network hardware in PAN?
Ans: _________________________________________________________
Q5: How many devices can a LAN have?
Ans: _________________________________________________________
Q6: Where are the devices normally located in a LAN?
Ans: _________________________________________________________
Q7: Who owns the network hardware in LAN?
Ans: _________________________________________________________
Q8: How many devices can a WAN have?
Ans: _________________________________________________________
Q9: Where are the devices normally located in WAN?
Ans: _________________________________________________________
Q10: Who owns the network hardware in WAN?
Ans: _________________________________________________________
Q11: Which type of network connection normally has a faster transmission
speed?
Ans: _________________________________________________________
Q12: Which type of network connection is normally more secure?
Ans: _________________________________________________________
Q13: Which type of network connection is normally cheaper to set up?
Ans: _________________________________________________________
Q14: Which type of network connection is normally more reliable?
Ans: _________________________________________________________
Q15: Give one similarity between a LAN and a WAN.
Ans: _________________________________________________________
Q16: Give one similarity between a PAN and LAN
Ans: _________________________________________________________
Q17: Give 2 differences between a PAN and WAN
Ans:
1. ___________________________________________________________
_______________________________________________________
2. ___________________________________________________________
_______________________________________________________
Q18: Give 3 facts about a firewall
Ans:
__________________________________
__________________________________
__________________________________
__________________________________
Q19: State what antivirus software will do if it finds a virus in a file on your
computer.
Ans: ______________________________________________
Multiple Choice:
1. What is a simulator?
a) A type of computer game
b) A copy of a system or scenario used to practice skills
c) A tool for drawing models
d) A device for measuring speed
2. Which of the following is an example of a simulator?
a) A model aero plane
b) A flight simulator
c) A spreadsheet
d) A textbook
3. What is a key feature of a simulator?
a) The color of the screen
b) Important or interesting information it provides
c) The brand of the computer
d) The number of buttons
4. What data might a flight simulator require as input?
a) Favorite color
b) Speed settings and direction controls
c) Weather forecast for next week
d) User’s name
5. Why is data validation important in a database?
a) To make the database look colorful
b) To ensure accuracy and consistency of data
c) To slow down data entry
d) To delete unnecessary data
6. What does a "presence check" validation rule do?
a) Ensures data is within a specified range
b) Ensures a field is not left blank
c) Checks the length of the data
d) Changes the format of the data
7. What is the purpose of a "range check"?
a) To limit data to a specific set of values
b) To ensure data is in uppercase
c) To count the number of records
d) To sort data alphabetically
8. Which tool in a spreadsheet helps test "what-if" scenarios?
a) Font changer
b) Goal seek
c) Spell check
d) Print preview
9. What is a primary key in a database?
a) A field with unique entries for each record
b) The first record entered
c) A backup of the database
d) A password for the database
10. What does "null" mean in a database?
a) Zero
b) Unknown or missing data
c) Corrupted data
d) A duplicate entry
11. Which of the following is NOT a validation check?
a) Presence check
b) Format check
c) Color check
d) Range check
12. Why might a zoo use a simulator?
a) To plan animal enclosures
b) To feed the animals
c) To clean the zoo
d) To sell tickets
13. What is the purpose of a data collection form?
a) To store data in a database
b) To delete old records
c) To change validation rules
d) To backup the database
14. Which field in a book review database might need a range
check?
a) Reviewer’s first name
b) Book title
c) Review score (1-5)
d) Date of review
15. What is a "what-if" analysis used for?
a) To predict outcomes by changing values
b) To delete incorrect data
c) To format spreadsheets
d) To create graphs
16. What is a PAN (Personal Area Network)?
a) A network connecting devices across multiple countries
b) A small network with devices close together, often in the same room
c) A network used only in schools
d) A type of internet connection
17. Which of the following is an example of a LAN (Local Area
Network)?
a) A smartwatch connected to a phone
b) Computers in a school lab sharing files
c) Video chatting between two cities
d) Streaming a movie on a tablet
18. What is the largest example of a WAN (Wide Area Network)?
a) A home Wi-Fi network
b) The internet
c) A Bluetooth connection
d) A PAN
19. Which type of cable transmits data using light?
a) Copper cables
b) Fiber optic cables
c) HDMI cables
d) Ethernet cables
20. What is a key advantage of fiber optic cables over copper cables?
a) They are cheaper to install
b) They are immune to electromagnetic interference
c) They are thicker
d) They use electrical signals
21. Which network connection is typically more secure?
a) Wireless
b) Wired
c) Both are equally secure
d) Neither is secure
22. What does an echo check do?
a) Encrypts data for security
b) Compares sent and received data to detect errors
c) Blocks unauthorized access to a network
d) Scans for viruses
23. What is the purpose of a firewall?
a) To speed up data transmission
b) To act as a barrier against unauthorized data access
c) To connect devices in a PAN
d) To repair corrupted files
24. Which software scans files for malicious programs like viruses?
a) Firewall
b) Antivirus
c) Echo check
d) Spyware
25. What happens to a virus when detected by antivirus software?
a) It is automatically deleted
b) It is moved to quarantine
c) It is encrypted
d) It is ignored
Fill in the Blanks
1. A simulator is a type of ________ that helps people practice skills.
2. A ________ simulator allows pilots to practice flying safely on the
ground.
3. The ________ tool in a spreadsheet helps find values needed to
achieve a goal.
4. A ________ check ensures data is not left blank in a database.
5. A ________ key is a unique identifier for each record in a database.
6. The ________ of data refers to its structure, such as DD/MM/YYYY
for dates.
7. A ________ check limits data to a specific length, like 25 characters
for a name.
8. In a database, a ________ is a set of data about a single object.
9. A ________ is a guided tool that helps create forms in a database.
10. The earliest known flight simulator was called the ________.
11. A ________ is a network where devices are located over a large
geographical area, such as a city or country.
12. ________ cables are made of thin strips of glass and transmit data
using light.
13. A ________ checks if transmitted data matches the original to
detect errors.
14. ________ is software that records secret information about
computer use and sends it to cybercriminals.
15. A ________ acts like a bodyguard for a computer by blocking
unauthorized data.
True or False
1. A simulator is only used for entertainment purposes.
2. Data validation ensures that all entered data is accurate and consistent.
3. A "range check" can be used to ensure a review score is between 1 and
5.
4. A database does not need a primary key to function correctly.
5. A "what-if" analysis is used to change values and observe outcomes in a
spreadsheet.
6. A PAN typically connects devices across multiple buildings.
7. Copper cables are more expensive to install than fibre optic cables.
8. Wireless connections are generally faster than wired connections.
9. Antispyware scans for viruses on a computer.
10.The internet is an example of a WAN.