Professional Documents
Culture Documents
Computing Year 8 Revision Pack
Computing Year 8 Revision Pack
The following sets of questions are designed to guide you on the main things to
focus on for your revision toward the end-of-term examination in Computing.
The questions are grouped according to topics to help easily find answers in
your coursebook and other provided learning materials.
This pack contains no answers. You are supposed to try your hands on as
many questions as you can if not all of them.
If you meet any questions that you find difficult to answer, do not hesitate to
ask your class mates and/or your teacher.
1
SET 1 – NETWORKING COMPUTERS AND SECURITY ISSUES
Question 1 – Expand the following acronyms as used in computer networking. [5]
1. WWAN …wireless…area…
network……………………………………………………………………………………….
2. PAN …personal…area…
network………………………………………………………………………………………………..
3. LAN …local…area…network
………………………………………………………………………………………………..
4. WAP …wireless…access…
p+oint………………………………………………………………………………………………..
5. ARQ …Automatic…Repeat…
reQuest………………………………………………………………………………………………
1. You…are…able…to…share…
files…………………………………………………………………………………………………………
…………………………………………………………………………………………………
2. ……users…can…connect…to…the…
internet……………………………………………………………………………………………………
……………………………………………………………………………………………
3. …users…can…share…
files…………………………………………………………………………………………………………
………………………………………………………………………………………………………
2
1. Its…
expensive……………………………………………………………………………………………………
………………………………………………………………………………………
2. …prone…to…
hacking……………………………………………………………………………………………………
……………………………………………………………………………………………………
Question 4 – Write two statements to explain each of the following terms as used in computing. [8]
3. Information is being
produced……………………………………………………………………………………………..
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
users……………………………………………
………2…can…be…used…to…share…
resources………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………
3. Bluetooth 1…it…works…only…in…close…
range………………………………………………………………………………………..
2…it…is…used…to…share…
resources………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………
3
4. Echo checking … `
……………………………………………………………………………………………………..
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
Question 5 – Describe ARQ as a method of detecting errors in data transmission over a network. [5]
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
Question 6 – Many hardware devices are used to connect computers to create networks. Examples of such devices
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………….
4
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
5. Apart from ethernet cables, which other is used for creating networks? This cable is sometimes laid under sea to
6. Write two advantages of using the cable you mentioned in question 6 above. [2]
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
Question 7 – Smart devices often make use of networks. For example, a vacuum cleaner can clean autonomously
1. Mention three smart devices in a bank that make use of networks. [3]
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
2. Mention three smart devices in a school that make use of networks. [3]
Question 8 – A server is a computer that is usually very powerful and that provides services to other devices on a
network.
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
5
…………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………..
2. Write two differences between a mail server and a web server. [2]
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
Question 9 – Networking computers comes with security issues. One of such issues is ransomware.
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………..
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
3. Firewalls can be software or hardware used to prevent security threats on networks. Describe three functions of a
firewall. [3]
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………..
6
Question 1 – Study the flowchart below and answer the questions that follow.
4
5
7 9
8
i. Give the flowchart an appropriate title
…………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………
ii. The elements in the flowchart are numbered. Use the numbers to answer the questions that
follow.
a. Which element is called a flowline? ……………………………………………………..
b. Which elements are used for input and output? ……………………………………….
c. Which element is used for decision or selection? ………………………………………………..
d. Which elements are called terminals? ……………………………………………………………..
Question 2 – Variables are memory locations for storing data.
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
7
2. Variable identifiers such as name and Name point to the same location in memory. True or
false?
Question 3 – Write three things each you know about the following concepts or terms. [9]
1. Algorithms
i. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
ii. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
iii. ……………………………………………………………………………………………………………….
2. Pseudocodes
i. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
ii. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
iii. ……………………………………………………………………………………………………………….
3. Flowcharts
i. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
ii. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
iii. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………….
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
8
START
number = INPUT (“Enter number”)
IF 0 < number < 10 THEN
OUTPUT “blue"
ELSE IF 10 < number <= 20 THEN
OUTPUT “red" Question 6 – Translate the flowchart below into a pseudocode.
ELSE IF 20 < number <= 30 THEN
OUTPUT “green" Write your pseudocode on the lines in
ELSE
OUTPUT “it is not a correct the box.
option"
ENDIF
END
9
Question 7 – Write a pseudocode to solve the task below:
10
SET 3 – PRACTICAL TASKS – BASIC COMPUTER PROGRAMS IN PYTHON
Task 1.0 – Create a folder with the naming convention YourName_Python_Tasks on the desktop of
your computer. For example, James_Python_Tasks. You will save all your tasks in this folder.
Task 1.1 – Translate the flowchart below into a Python program. Save your file with the name task1.1 in the folder you
created in Task 1.0.
Task 1.2 – Translate the pseudocode in Question 5 to a program in Python. Save the file with the name
task1.2 in the folder you created in Task 1.0
Task 1.3 – Translate the pseudocode in Question 8 to a Python program. Save your program with the file name task1.3 in
the folder you created in Task 1.0
Task 1.4 – Translate the pseudocode in Question 9 to a Python program. Save your program with the file name task1.4 in
the folder you created in Task 1.0
HAPPY REVISION!
11