Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

Shield International School

Cambridge Secondary Year 8 –


Advent 2023/24
Computing – Revision Pack

The following sets of questions are designed to guide you on the main things to
focus on for your revision toward the end-of-term examination in Computing.
The questions are grouped according to topics to help easily find answers in
your coursebook and other provided learning materials.
This pack contains no answers. You are supposed to try your hands on as
many questions as you can if not all of them.
If you meet any questions that you find difficult to answer, do not hesitate to
ask your class mates and/or your teacher.

1
SET 1 – NETWORKING COMPUTERS AND SECURITY ISSUES
Question 1 – Expand the following acronyms as used in computer networking. [5]

1. WWAN …wireless…area…

network……………………………………………………………………………………….

2. PAN …personal…area…

network………………………………………………………………………………………………..

3. LAN …local…area…network

………………………………………………………………………………………………..

4. WAP …wireless…access…

p+oint………………………………………………………………………………………………..

5. ARQ …Automatic…Repeat…

reQuest………………………………………………………………………………………………

Question 2 – Write three advantages of networking computers

1. You…are…able…to…share…

files…………………………………………………………………………………………………………

…………………………………………………………………………………………………

2. ……users…can…connect…to…the…

internet……………………………………………………………………………………………………

……………………………………………………………………………………………

3. …users…can…share…

files…………………………………………………………………………………………………………

………………………………………………………………………………………………………

Question 3 – Write two drawbacks of networking computers

2
1. Its…

expensive……………………………………………………………………………………………………

………………………………………………………………………………………

2. …prone…to…

hacking……………………………………………………………………………………………………

……………………………………………………………………………………………………

Question 4 – Write two statements to explain each of the following terms as used in computing. [8]

1. Networks …1Information is being produced

3. Information is being

produced……………………………………………………………………………………………..

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

2. File servers 1…Stores…and…manages…files…and…data…for…multiple…

users……………………………………………

………2…can…be…used…to…share…

resources………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………

3. Bluetooth 1…it…works…only…in…close…

range………………………………………………………………………………………..

2…it…is…used…to…share…

resources………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………

3
4. Echo checking … `

……………………………………………………………………………………………………..

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

Question 5 – Describe ARQ as a method of detecting errors in data transmission over a network. [5]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

Question 6 – Many hardware devices are used to connect computers to create networks. Examples of such devices

include routers, switches, ethernet cables, repeaters and many more.

1. Write one difference between a router and a switch. [1]

……………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………….

2. Write one similarity between a router and switch. [1]

4
…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

3. Write one function of repeaters in a network. [2]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

4. Another name for ethernet cable is ……………………………………………………………………………… [1]

5. Apart from ethernet cables, which other is used for creating networks? This cable is sometimes laid under sea to

connect different countries and continents. …………………………………………………………………… [2]

6. Write two advantages of using the cable you mentioned in question 6 above. [2]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

Question 7 – Smart devices often make use of networks. For example, a vacuum cleaner can clean autonomously

according to the settings of the user.

1. Mention three smart devices in a bank that make use of networks. [3]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

2. Mention three smart devices in a school that make use of networks. [3]

Question 8 – A server is a computer that is usually very powerful and that provides services to other devices on a

network.

1. Write three functions of a print server. [3]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

5
…………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………..

2. Write two differences between a mail server and a web server. [2]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

Question 9 – Networking computers comes with security issues. One of such issues is ransomware.

1. Write three things you know about ransomware. [3]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………..

2. Mention three other security threats of networking computers. [3]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

3. Firewalls can be software or hardware used to prevent security threats on networks. Describe three functions of a

firewall. [3]

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

…………………………………………………………………………………………………………………………………

………………………………………………………………………………………………………………………………..

SET 2 – PLANNING COMPUTER PROGRAMS – ALGORITHMS AND FLOWCHARTS

6
Question 1 – Study the flowchart below and answer the questions that follow.

4
5

7 9

8
i. Give the flowchart an appropriate title
…………………………………………………………………………………………………………………………………
……………………………………………………………………………………………………………

ii. The elements in the flowchart are numbered. Use the numbers to answer the questions that
follow.
a. Which element is called a flowline? ……………………………………………………..
b. Which elements are used for input and output? ……………………………………….
c. Which element is used for decision or selection? ………………………………………………..
d. Which elements are called terminals? ……………………………………………………………..
Question 2 – Variables are memory locations for storing data.

1. Write three rules for creating variable identifiers or names. [3]

…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………

7
2. Variable identifiers such as name and Name point to the same location in memory. True or
false?

Question 3 – Write three things each you know about the following concepts or terms. [9]

1. Algorithms
i. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
ii. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
iii. ……………………………………………………………………………………………………………….
2. Pseudocodes
i. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
ii. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
iii. ……………………………………………………………………………………………………………….
3. Flowcharts
i. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
ii. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….
iii. ………………………………………………………………………………………………………………
……………………………………………………………………………………………………………….

Question 4 – Many programming languages like Python have keywords.

1. Explain the term keyword [2]

…………………………………………………………………………………………………………………………….

2. Write three examples of keyword in Python. [3]

…………………………………………………………………………………………………………………………………
…………………………………………………………………………………………………………………………………

Question 5 – Translate the pseudocode below to flowchart.

8
START
number = INPUT (“Enter number”)
IF 0 < number < 10 THEN
OUTPUT “blue"
ELSE IF 10 < number <= 20 THEN
OUTPUT “red" Question 6 – Translate the flowchart below into a pseudocode.
ELSE IF 20 < number <= 30 THEN
OUTPUT “green" Write your pseudocode on the lines in
ELSE
OUTPUT “it is not a correct the box.
option"
ENDIF
END

9
Question 7 – Write a pseudocode to solve the task below:

 Ask a user to enter three numbers one at a time


 Compare the three numbers
 Display the greatest number

Question 8 – Write a flowchart to solve the task below:


Assume the input for a student is name, student number, and three grades.
Output the student’s name and an Success if the average of the three grades is 65
or more. Otherwise (else), output the student’s name, a Unsuccess, and the number
of additional points needed for an Success.

Question 9 - Write a flowchart to solve the task below:


Ask a user to enter a number.
If the number is even, the program should display “even”
Else the program should display “odd”

10
SET 3 – PRACTICAL TASKS – BASIC COMPUTER PROGRAMS IN PYTHON
Task 1.0 – Create a folder with the naming convention YourName_Python_Tasks on the desktop of
your computer. For example, James_Python_Tasks. You will save all your tasks in this folder.

Task 1.1 – Translate the flowchart below into a Python program. Save your file with the name task1.1 in the folder you
created in Task 1.0.

Task 1.2 – Translate the pseudocode in Question 5 to a program in Python. Save the file with the name
task1.2 in the folder you created in Task 1.0
Task 1.3 – Translate the pseudocode in Question 8 to a Python program. Save your program with the file name task1.3 in
the folder you created in Task 1.0
Task 1.4 – Translate the pseudocode in Question 9 to a Python program. Save your program with the file name task1.4 in
the folder you created in Task 1.0

HAPPY REVISION!

11

You might also like